Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
The Top Twelve Threats No Computer User Should Ignore > NetSparsh - Viral Content you Love & Share

The Top Twelve Threats No Computer User Should Ignore

The internet is undoubtedly a fantastic resource for families and offers a rich vein of educational content.

However, there are potential dangers - welcome to the seedy world of viruses, spam, trojans, pornography, spyware and other nasties.

These are the Top Twelve Threats No Computer User Should Ignore.

1. Viruses - A computer program that copies itself. They often disrupt your computer system or damage your data. Viruses are usually received by email attachments so be careful opening anything from a dubious source. They can affect anyone, for example, the destructive Mydoom worm affected one out of three small and mid-sized businesses.

2. Spyware - Sends information about you and your computer to somebody else. Spyware may send the addresses of sites you have visited or worse still, transmit personal information. With today's concerns about identify theft this is a real worry. For example, CoolWebSearch may hijack web searches, home page, and other Internet Explorer settings. Spyware is normally received as part of shareware or freeware downloaded from the web.

3. IP Spoofing - A technique to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an address indicating that the message is coming from a trusted host.

4. Trojans - An apparently legitimate computer program that is really intended to disrupt and damage computer activity by sending information, perhaps even passwords onto a third party without you knowing. As an example, recent emails entitled "Osama Bin Laden Captured" attempted to download the "Trj/Small.B." Trojan if the embedded URL was clicked. This trojan attempts to hijack the PC.

5. Spam - Unsolicited mail often promoting products of a dubious financial or sexual nature. Don't leave your email address on websites and internet bulletin boards as they are harvested by spammers.

6. Adware - puts advertisements on your screen. These take many forms including popups, popunders and advertisements that appear later, even if your browser is closed. Some are sent using the Windows Messenger service which allows a spammer to direct an advertisement straight to your computer by sequentially sending messages to IP addresses. Always irritating, they are also often of a pornographic nature.

7. Diallers - for those of us still with dial up modems, dialler programs redirect calls to a very expensive number. You won't know until you get the bill.

8. Hijackers - Hijackers take control of your web browser and may reset your home page, search bar and search pages. They can redirect you to undesirable sites or stop you going to particular sites.

9. Hackers - With so much personal data available online to anyone with a password you must be sure your password is secure. If you are using your mother's maiden name, your cat's name or your birthday then your password is at risk. Here are two tips for making a secure password. Method One - pick two random unrelated three letter words and two digits. Mix them up and what do you have? A secure password such as "red19cat" or "hotpin73". Method Two - pick a short sequence of words such as Now Is The Winter Of Our Discontent Made Glorious' and you have a password of "nitwoodmg". You could even change the I's and O's to digits.

10. Phishing - Emails purporting to come from reliable sources such as Paypal, Ebay or your bank. Often wanting you to verify your account details, they can look very realistic but are generally scams to harvest usernames and passwords. Always open a new browser winder and type the address there, rather than clicking on the link provided.

11. Hoaxes - Chain letters, scams, false alarms. At best they take up time and bandwidth but at worst vulnerable can be victims of fraud. Pass it on!

12. Stranger-danger ? For those of us with children - do you know what they actually do when they are online? Are they working on homework tasks, downloading illegal music or pornography? Or are they chatting to strangers in chat rooms? You should consider blocking access to undesirable sites and logging their activity with a surveillance tool. Oh, and don't forget that where children are concerned, computers should always be kept in a family room and never in their bedroom.

Three Step Action Plan

There are three basic, essential steps that should be taken to ensure your PC is kept threat-free.

Firstly , be sensible when opening attachments or following email instructions from apparently reputable sites.

Secondly , make sure you are using the latest service pack of Windows as Microsoft is continually closing loopholes to tighten up security.

Finally, there's a range of low cost tools such as firewalls, antivirus, spam blockers and spyware killers available. Like everything else they vary in quality and you tend to get what you pay for so always do your research first and perhaps try a free trial before getting your credit card out.

The author, Kai Chandler, edits http://www.surfcontrols.com which specializes in providing reviews and recommendations of top-rated tools to help protect your online experience.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

TechCrunch

Security, privacy experts weigh in on the ICE doxxing
TechCrunch
In what appears to be the latest salvo in a new, wired form of protest, developer Sam Lavigne posted code that scrapes LinkedIn to find Immigration and Customs Enforcement employee accounts. His code, which basically a Python-based tool that scans ...
Trump signs executive order on immigration, but says 'zero tolerance' will continueUSA TODAY
GitHub, Medium, and Twitter take down database of ICE employee LinkedIn accountsThe Verge
Federal agencies continue to advance capabilities with Azure Government – Azure Government CloudMSDN Blogs - Microsoft
GitHub
all 42 news articles »

EFF

Journalists and Digital Security: Some Thoughts on the NYT Leak Case
EFF
The leak investigation involving a Senate staffer and a New York Times reporter raises significant issues about journalists, digital security, and the ability of journalists to protect confidential sources. The New York Times recently revealed that the ...


BBC News

Venezuela crisis: UN says security forces killed hundreds
BBC News
Venezuelan security forces have carried out hundreds of arbitrary killings under the guise of fighting crime, the UN's human rights body says. In a report, it cites "shocking" accounts of young men being killed during operations, often in poor ...
Killings by security forces rife in Venezuela, rule of law 'virtually absent': UNReuters
Venezuelan security forces killed 'hundreds', rule of law 'virtually absent', UN saysTelegraph.co.uk

all 222 news articles »

Los Angeles Times

Protesters gather outside Homeland Security Secretary Kirstjen Nielsen's home
Los Angeles Times
About two dozen people gathered Friday morning outside the Virginia home of Homeland Security Secretary Kirstjen Nielsen in response to the Trump administration's policy on separating children from their parents at the border. According to an organizer ...
Homeland Security Secretary Kirstjen Nielsen heckled outside her homeKGO-TV
DHS Secretary Nielsen casts immigration crisis as 'a national security issue'ABC News
Shaheen calls for Homeland Security secretary's resignationConcord Monitor
Facebook
all 1,716 news articles »

Security Intelligence (blog)

Why Security Skills Should Be Taught, Not Hired
Security Intelligence (blog)
Chief information security officers (CISOs) across the globe have long lamented the fact that so many job applicants lack the security skills they need to fill crucial security positions. Put bluntly: IT leaders have simply failed to create a pipeline ...


Digital Trends

Improving security means killing the password, but that battle has just begun
Digital Trends
(in)Secure is a weekly column that dives into the rapidly escalating topic of cybersecurity. Passwords are often cited as the biggest problem with modern digital security. They're supposed to be complicated, unique, and ever changing, and yet few ...

and more »

Tom's Guide

Millions of Baby Monitors, Security Cameras Easy to Hack
Tom's Guide
In a new report, information-security firm SEC Consult details a vulnerability the snoop might have exploited. If SEC Consult is right, many other baby monitors, security cameras and webcams made by the same manufacturer (hint: it isn't FREDI) might be ...


NBCNews.com

Biometric scanning now more widely available, speeding security lines
NBCNews.com
Biometric scanning now more widely available, speeding security lines. Fri, Jun 22. Now 12 stadiums across the country have “Clear,” a biometric technology often seen in airports that helps speed up the security process. Share Video; Facebook · Twitter ...


Wall Street Journal

EU Set to Impose Sanctions on Myanmar Security Officials
Wall Street Journal
The European Union is set to impose sanctions on seven Myanmar military and border guard police officials over the mass expulsion of ethnic Rohingya, according to diplomats, in a sign that EU leaders will go beyond words in punishing Myanmar security ...

and more »

Mac Rumors

Apple iOS Passcode Crack Revealed by Security Researcher. Watch the Exploit in Action
Fortune
An iPhone can be unlocked with a virtual keyboard pretending to type lots of passcodes, a security researcher revealed Friday. By sending all possible four-digit PIN combinations as if they came from a USB keyboard, the cracking method bypasses Apple's ...
Security Researcher Discovers Method for Brute Forcing iPhone Passcode in iOS 11Mac Rumors

all 74 news articles »
Google News

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More

Cyber Crooks Go Phishing

"Phishing," the latest craze among online evil-doers, has nothing to... Read More

Behavior to Stay Safer Online

1. Importance of a Virus Scanner: A Antivirus program can... Read More

Its Time to Sing the Encryption Song - Again!

Yes, I'm wearing my encryption hat again. Why you may... Read More

Breaking Into Your PC: News...

You'd better learn news from media, not from emails, security... Read More

Just Whos Computer is this Anyway?

Well, this is an article I never thought I would... Read More

Spyware, This Time Its Personal!

First the basic definition of Spyware: It is a type... Read More

Internet Identity Theft - How You Can Shield Yourself

With the advent of the World Wide Web, a whole... Read More

An Open Letter From a So-called Stupid

Someone recently told me, "You would have to be a... Read More

Phishing: A Scary Way of Life

The Federal Bureau of Investigation has identified "phishing" as the... Read More

8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft

Ebay is a great site and is used by many... Read More

Dont Miss Information Because of Misinformation

It has been said that with the wealth of information,... Read More

Personal Firewalls - Secure Your Computer

There has not been a time in the history of... Read More

How To Give Away Your Personal Information

Identity Theft and Your Personal Information -------------------------------------------- Identity theft is... Read More

Consumers: Shop Online and Get Information Safely

Do you really have to know how feeds work? Not... Read More

Is Adware - Spyware Putting Your Privacy at Risk

Do you sometimes notice your computer running slower. Is your... Read More

Identity Theft - Dont Blame The Internet

Identity theft ? also known as ID theft, identity fraud... Read More

Can I Guess Your Password?

We all know that it's dangerous to use the same... Read More

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

Five Excellent Indie Encryption And Security Solutions You Have Not Heard About

1. Geek Superhero http://www.deprice.com/geeksuperhero.htmGeek Superhero watches your computer for changes,... Read More

Is The Internet Over Regulated

Today's Internet or World Wide Web is being over regulated.But,... Read More

Internet Small Business and Fraud

Be careful of sites that promise to send you "instant... Read More

Spyware Removal

Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More

Criminals are Fishing For Your Identity

What is Phishing? In a typical Phishing attack, a criminal... Read More

Top 10 tips for Safe Internet Shopping

Over £5 billion pounds was spent on online shopping in... Read More