What's new

Threats and frauds [if you want keep clean your computer must read it]

Strawberrry

Forum Veteran
Elite
Joined
Aug 2, 2016
Posts
1,611
Solutions
4
Reaction
635
Points
528
We are always pertaining to the word virus whenever our system is infected by any malicious program...
Now is our chance to be enlightened and be able to distinguish/differentiate/correct the misconceptions...


Malware

Malware stands for Malicious Software. It includes any program or file that is designed to do harm. To distribute them h@ckers will often hide them inside other programs on websites or send them to you by e-mail. These include:
  • Viruses and Worms
  • Trojan Horses
  • Adware and Spyware
  • Phishing / Pharming
  • Spam and Hoax letters

Types of Malware

Malware can gain remote access to your system thus allowing data to be sent to the häçker and further infect others through disabling anti-virus and firewall software.

Pharming

Pharming is an attack in which a user can be fooled into entering sensitive data such as a password or credit card number into a malicious web site that impersonates a legitimate web site. The attacker does not have to rely on having the user click on a link in an email. Even if the user correctly enters a URL (web address) into a browser`s address bar, the attacker can still redirect the user to a malicious web site.

Adware

Adware stands for Advertising Supported Software. It refers to any software that automatically plays, displays or downloads advertisements. These adverts are seen after software is installed on a computer or while the application is being used.

Viruses

A virus is a malicious computer program that can copy itself and infect a computer by corrupting or modifying files. It does this without permission or knowledge of the user. A virus replicates itself by attaching to another object e.g. via e-mail attachments, internet downloads, diskettes, CDs, etc.

Spyware

Spyware is software that is used to gather information about a person or organization without their knowledge. Spyware displays advertisements related to what it finds from spying on you. This is called Targeted advertising.

Phishing

An e-mail that masquerades as a legitimate contact from a business or organization in an attempt to s†éál personal or financial information is called Phishing. Phishing often states that there is a problem or threatens to terminate an account if you do not respond.

Spam

Spam is unsolicited e-mail on the Internet. In almost all cases, the senders address is ;spoofed i.e. it pretends to be from a legitimate sender. Spam is a common carrier of malicious code. Difficult to stop completely without stopping a valid mail from time to time.

Trojan Horses

These are delivery vehicles for malicious or destructive computer programs, similar to viruses or worms. häçkers, virus writers, and even advertisers can embed malicious code into any program or file that appears to be harmless or useful, such as an animation or video game.

Worms

A malicious computer program, like a virus, but a worm can spread itself without any user interaction Usually more dangerous than a virus as they can cause harm to the network. Worms are also invisible to the user.

Antivirus Software

Regardless of the type of anti virus software software running on your PC it should have the following characteristics.


It will have an antivirus detector, that continuously monitors your system.
An email scanner than detects viruses in incoming emails. An update manager which ensures your virus database is up to date.

You can also update the database now rather than waiting for periodic updates.
  • Do not permit activities which can distribute viruses such as peer-to-peer file sharing from your computer. Also scan all new files, such as those on CDs, DVDs, USB drives, flash memory sticks, and diskettes.

Malware Examples

Adware / Spyware

Adware / Spyware comes in many different forms, a common approach is to try to get you to click on a button which will install the malware onto your computer.

  • Do not install Free Anti-Spyware software or software claiming to speed up your PC. It is usually spyware itself. Pop-up Windows should be closed down immediately.
  • Never click on links that you receive through Instant Messaging software either. Again this is probably a hidden installation of Spyware or Adware.

Phishing Attacks

A classic phishing attack will often state that there is a problem and threatens to terminate an account if you do not respond by installing software or entering account details on another site. Now if you look at the properties of the sender, it appears genuine BUT if we hover over the link you can see that it is clearly from another domain You do not have permission to view the full content of this post. Log in or register now..
Never install unauthorized software on your PC or reply to an email with personal or financial information. If you fear you may be a victim of phishing, contact the appropriate financial institution etc.

Pharming Attacks

A pharming website is one which allows a h@cker to redirect that websites traffic to another web site. At this site they can s†éál your financial or personal details typically on a registration form.
Pharming conscious websites typically use the HTTPS web protocol on their login page to allow the user to verify the web sites identity.
If an attacker attempts to impersonate a site using HTTPS, the user will receive a message from the browser indicating that the web site certificate does not match the address being visited.
Under these circumstances you should never proceed and press No. You will return to the previous page.

Spam Email

Spam email is often (although NOT ALWAYS) redirected to your Junk email folder or else quarantined on the company mail server.
  • Do not open unsolicited messages, just delete them.
  • Be very wary of emails with links on them, especially when they link to other domains.
  • Do not reply to emails trying to sell you something if the supplier is unknown to you.
  • Do not respond to emails from financial institutions. Reputable organizations will never ask you for account details etc by email.
  • Never open mail that has Re: in the subject line if you did not originally send a message to that address.
  • Do not post your email on any websites and do not use a second disposable email account from providers such as hotmail or yahoo as this will greatly increase the amount of junk mail you get.
  • Do not forward chain letters
  • Never open mail that has Re: in the subject line if you did not originally send a message to that address.
  • Do not post your email on any websites and do not use a second disposable email account from providers such as hotmail or yahoo as this will greatly increase the amount of junk mail you get.
  • Do not forward chain letters.

Email Golden Rules

Remember these golden rules surrounding email:
  • Never open unfamiliar RE: emails.
  • Do not put your email on the web (e.g. Facebook, Twitter etc.)
  • Do not use free mailboxes for work emails such as Hotmail or Yahoo.
  • Ignore chain letters.
  • Be wary of replying to spam messages or clicking unsubscribe
  • Do not send personal or financial data via email.

Install latest p@tches

It is very important to keep your Operating System up to date with the very latest updates, services packs and patches. Ensure that updates are automatically downloaded.
 

Similar threads

Back
Top