Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
The Top Twelve Threats No Computer User Should Ignore > NetSparsh - Viral Content you Love & Share

The Top Twelve Threats No Computer User Should Ignore

The internet is undoubtedly a fantastic resource for families and offers a rich vein of educational content.

However, there are potential dangers - welcome to the seedy world of viruses, spam, trojans, pornography, spyware and other nasties.

These are the Top Twelve Threats No Computer User Should Ignore.

1. Viruses - A computer program that copies itself. They often disrupt your computer system or damage your data. Viruses are usually received by email attachments so be careful opening anything from a dubious source. They can affect anyone, for example, the destructive Mydoom worm affected one out of three small and mid-sized businesses.

2. Spyware - Sends information about you and your computer to somebody else. Spyware may send the addresses of sites you have visited or worse still, transmit personal information. With today's concerns about identify theft this is a real worry. For example, CoolWebSearch may hijack web searches, home page, and other Internet Explorer settings. Spyware is normally received as part of shareware or freeware downloaded from the web.

3. IP Spoofing - A technique to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an address indicating that the message is coming from a trusted host.

4. Trojans - An apparently legitimate computer program that is really intended to disrupt and damage computer activity by sending information, perhaps even passwords onto a third party without you knowing. As an example, recent emails entitled "Osama Bin Laden Captured" attempted to download the "Trj/Small.B." Trojan if the embedded URL was clicked. This trojan attempts to hijack the PC.

5. Spam - Unsolicited mail often promoting products of a dubious financial or sexual nature. Don't leave your email address on websites and internet bulletin boards as they are harvested by spammers.

6. Adware - puts advertisements on your screen. These take many forms including popups, popunders and advertisements that appear later, even if your browser is closed. Some are sent using the Windows Messenger service which allows a spammer to direct an advertisement straight to your computer by sequentially sending messages to IP addresses. Always irritating, they are also often of a pornographic nature.

7. Diallers - for those of us still with dial up modems, dialler programs redirect calls to a very expensive number. You won't know until you get the bill.

8. Hijackers - Hijackers take control of your web browser and may reset your home page, search bar and search pages. They can redirect you to undesirable sites or stop you going to particular sites.

9. Hackers - With so much personal data available online to anyone with a password you must be sure your password is secure. If you are using your mother's maiden name, your cat's name or your birthday then your password is at risk. Here are two tips for making a secure password. Method One - pick two random unrelated three letter words and two digits. Mix them up and what do you have? A secure password such as "red19cat" or "hotpin73". Method Two - pick a short sequence of words such as Now Is The Winter Of Our Discontent Made Glorious' and you have a password of "nitwoodmg". You could even change the I's and O's to digits.

10. Phishing - Emails purporting to come from reliable sources such as Paypal, Ebay or your bank. Often wanting you to verify your account details, they can look very realistic but are generally scams to harvest usernames and passwords. Always open a new browser winder and type the address there, rather than clicking on the link provided.

11. Hoaxes - Chain letters, scams, false alarms. At best they take up time and bandwidth but at worst vulnerable can be victims of fraud. Pass it on!

12. Stranger-danger ? For those of us with children - do you know what they actually do when they are online? Are they working on homework tasks, downloading illegal music or pornography? Or are they chatting to strangers in chat rooms? You should consider blocking access to undesirable sites and logging their activity with a surveillance tool. Oh, and don't forget that where children are concerned, computers should always be kept in a family room and never in their bedroom.

Three Step Action Plan

There are three basic, essential steps that should be taken to ensure your PC is kept threat-free.

Firstly , be sensible when opening attachments or following email instructions from apparently reputable sites.

Secondly , make sure you are using the latest service pack of Windows as Microsoft is continually closing loopholes to tighten up security.

Finally, there's a range of low cost tools such as firewalls, antivirus, spam blockers and spyware killers available. Like everything else they vary in quality and you tend to get what you pay for so always do your research first and perhaps try a free trial before getting your credit card out.

The author, Kai Chandler, edits http://www.surfcontrols.com which specializes in providing reviews and recommendations of top-rated tools to help protect your online experience.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

NPR

Hacks, Security Gaps And Oligarchs: The Business Of Voting Comes Under Scrutiny
NPR
"Election officials have been doing a ton around election security, but if that same thing isn't going on at the vendor level, then that creates a really big potential vulnerability for the entire system," said Edgardo Cortéz, an election security ...

and more »

WOAI

Security guard nearly run over after stumbling onto drug deal
WOAI
SAN ANTONIO - A security guard is nearly run over after breaking up a drug deal on Perrin Central near Perrin Beitel and Wurzbach Parkway. Police said that about 1 a.m. Friday the guard saw four people in the parking lot of the Oak Springs Apartments ...

and more »

Politico

NSA: Security breaches of hacking tools curtailed snooping
Politico
The National Security Agency shut down expensive and vital operations as a result of top secret information being spirited out of its headquarters by a fired NSA computer engineer who claims he took the sensitive records home to work on bolstering his ...


Mashable

A woman accosted a security guard with a fanny pack containing a pigeon
Mashable
A well-planned surprise can be an absolute joy. A surprise birthday party? So much fun! An unexpected gift? Yes, please! A surprise pigeon? Hard pass. Following an altercation with employees at a Social Security Administration office in Virginia on ...
Woman hits security guard with fanny pack containing pigeon, police sayMyPalmBeachPost
Woman pulls knife on security guard, hits him with fanny pack that had pigeon insideWashington Post
Woman pulls knife on security guard, then hits him with bag that had pigeon insideThe Independent

all 37 news articles »

WIRED

Clouldflare and Google Will Help Sync the Internet's Clocks—and Make You Safer
WIRED
The internet's decentralized nature means that the clocks behind every web browser and web application can actually have major discrepancies, which in turn can undermine security protections. In a step toward addressing these inconsistencies, the ...


The Verge

Amazon is turning the Echo into a security system
The Verge
Amazon is adding a few new features to the Echo that turn it into one of the basic pieces of a smart security system. Since Echo speakers are always listening, they'll be able to start listening for the sound of broken glass, or for a smoke or carbon ...
Alexa Guard turns Echo products into security devicesTechCrunch
Alexa Guard makes your Echo a home security deviceEngadget
ADT and Amazon Team Up to Provide Customers With New Home Security FeaturesNasdaq

all 2,304 news articles »

USA TODAY

Terrorism task force investigating 'security breach' at Orlando Melbourne airport
USA TODAY
MELBOURNE, Fla. – The Joint Terrorism Task Force is overseeing the investigation into an overnight incident involving a man suspected of hopping a fence at the Orlando Melbourne International Airport and boarding a vacant American Airlines Airbus in a ...
Student with pilot's license arrested after security breach at Melbourne International AirportWFTV Orlando
Orlando Melbourne International Airport security breach: What we knowFlorida Today
Officials ID student pilot accused of breaching Florida airport securityNews 13 Orlando
SpaceCoastDaily.com -Palm Beach Post -Florida Today
all 1,042 news articles »

The State of NAIC's Data Security Model Law
Insurance Journal
Most states have yet to adopt a cyber security model law for the insurance industry like the one approved by the National Association of Insurance Commissioners in 2017, but one expert believes the industry should be prepared for what he sees as an ...


ZDNet

SingHealth data breach reveals several 'inadequate' security measures
ZDNet
Investigation into Singapore's most severe cybersecurity breach has uncovered several poor security practices, including the use of weak administrative passwords and unpatched workstations. The findings were revealed on the first day of hearings led by ...

and more »

CIO

Pentagon CIOs struggle with legacy tech, security. Sound familiar?
CIO
Flanders, CIO of the Defense Health Agency, is gearing up to consolidate control over the Pentagon's sprawling network of treatment centers, in the process centralizing a far-flung set of IT operations that raise a host of security and device ...

Google News

Make Money Online - Defend Against The Latest Scam

First, let's do a little recap'. As I stated in... Read More

Phishing

Recently I have received email from my bank/credit Card Company,... Read More

Spyware Protection Software

Spyware protection software is the easiest way of removing spyware... Read More

The One Critical Piece Of Free Software Thats Been Overlooked

Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More

Phishing: A Scary Way of Life

The Federal Bureau of Investigation has identified "phishing" as the... Read More

Burning Bridges is Bad, But Firewalls are Good

When you signed up for that ultra-fast DSL or Cable... Read More

Detect Spyware Online

You can detect spyware online using free spyware cleaners and... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More

Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers

I am the victim of an internet scam. It is... Read More

Spyware Programs Are Out To Get You!

The average computer is packed with hidden software that can... Read More

How to Protect Yourself Against Online Criminals

Credit card fraud is a growing problem for online businesses... Read More

Technology and Techniques Used in Industrial Espionage

Industrial Espionage. These methodologies are being used on a daily... Read More

Securing Your Accounts With Well-Crafted Passwords

In the past I've never really paid much attention to... Read More

File Sharing - What You Need to Know!

File sharing on p2p is soaring despite the music and... Read More

Phishing, Fraudulent, and Malicious Websites

Whether we like it or not, we are all living... Read More

The Importance of Protecting Your PC from Viruses and Spam

Today the internet is a mine field of malicious code... Read More

How To Prevent Spyware Attacking Your Computer

Spyware is software or hardware installed on a computer without... Read More

A Painless Plagiarism Solution

A crowded marketplace can lead to unethical webmasters using underhand... Read More

An Open Letter From a So-called Stupid

Someone recently told me, "You would have to be a... Read More

Viruses and Worms: The Problems and Their Solutions

History and BackgroundThe virus was one of the first ever... Read More

Message Board Security Problems

Security leaks can be a big problem for any site... Read More

What Every Internet Marketer Should Know About Spyware

If you run any type of Internet business, Adware and... Read More

Avoid Internet Theft, Fraud and Phishing

Since its birth, the Internet has grown and expanded to... Read More

Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda

Fishing on the Internet has come a long way. However,... Read More

Is Adware - Spyware Putting Your Privacy at Risk

Do you sometimes notice your computer running slower. Is your... Read More