Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
The Top Twelve Threats No Computer User Should Ignore > NetSparsh - Viral Content you Love & Share

The Top Twelve Threats No Computer User Should Ignore

The internet is undoubtedly a fantastic resource for families and offers a rich vein of educational content.

However, there are potential dangers - welcome to the seedy world of viruses, spam, trojans, pornography, spyware and other nasties.

These are the Top Twelve Threats No Computer User Should Ignore.

1. Viruses - A computer program that copies itself. They often disrupt your computer system or damage your data. Viruses are usually received by email attachments so be careful opening anything from a dubious source. They can affect anyone, for example, the destructive Mydoom worm affected one out of three small and mid-sized businesses.

2. Spyware - Sends information about you and your computer to somebody else. Spyware may send the addresses of sites you have visited or worse still, transmit personal information. With today's concerns about identify theft this is a real worry. For example, CoolWebSearch may hijack web searches, home page, and other Internet Explorer settings. Spyware is normally received as part of shareware or freeware downloaded from the web.

3. IP Spoofing - A technique to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an address indicating that the message is coming from a trusted host.

4. Trojans - An apparently legitimate computer program that is really intended to disrupt and damage computer activity by sending information, perhaps even passwords onto a third party without you knowing. As an example, recent emails entitled "Osama Bin Laden Captured" attempted to download the "Trj/Small.B." Trojan if the embedded URL was clicked. This trojan attempts to hijack the PC.

5. Spam - Unsolicited mail often promoting products of a dubious financial or sexual nature. Don't leave your email address on websites and internet bulletin boards as they are harvested by spammers.

6. Adware - puts advertisements on your screen. These take many forms including popups, popunders and advertisements that appear later, even if your browser is closed. Some are sent using the Windows Messenger service which allows a spammer to direct an advertisement straight to your computer by sequentially sending messages to IP addresses. Always irritating, they are also often of a pornographic nature.

7. Diallers - for those of us still with dial up modems, dialler programs redirect calls to a very expensive number. You won't know until you get the bill.

8. Hijackers - Hijackers take control of your web browser and may reset your home page, search bar and search pages. They can redirect you to undesirable sites or stop you going to particular sites.

9. Hackers - With so much personal data available online to anyone with a password you must be sure your password is secure. If you are using your mother's maiden name, your cat's name or your birthday then your password is at risk. Here are two tips for making a secure password. Method One - pick two random unrelated three letter words and two digits. Mix them up and what do you have? A secure password such as "red19cat" or "hotpin73". Method Two - pick a short sequence of words such as Now Is The Winter Of Our Discontent Made Glorious' and you have a password of "nitwoodmg". You could even change the I's and O's to digits.

10. Phishing - Emails purporting to come from reliable sources such as Paypal, Ebay or your bank. Often wanting you to verify your account details, they can look very realistic but are generally scams to harvest usernames and passwords. Always open a new browser winder and type the address there, rather than clicking on the link provided.

11. Hoaxes - Chain letters, scams, false alarms. At best they take up time and bandwidth but at worst vulnerable can be victims of fraud. Pass it on!

12. Stranger-danger ? For those of us with children - do you know what they actually do when they are online? Are they working on homework tasks, downloading illegal music or pornography? Or are they chatting to strangers in chat rooms? You should consider blocking access to undesirable sites and logging their activity with a surveillance tool. Oh, and don't forget that where children are concerned, computers should always be kept in a family room and never in their bedroom.

Three Step Action Plan

There are three basic, essential steps that should be taken to ensure your PC is kept threat-free.

Firstly , be sensible when opening attachments or following email instructions from apparently reputable sites.

Secondly , make sure you are using the latest service pack of Windows as Microsoft is continually closing loopholes to tighten up security.

Finally, there's a range of low cost tools such as firewalls, antivirus, spam blockers and spyware killers available. Like everything else they vary in quality and you tend to get what you pay for so always do your research first and perhaps try a free trial before getting your credit card out.

The author, Kai Chandler, edits http://www.surfcontrols.com which specializes in providing reviews and recommendations of top-rated tools to help protect your online experience.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

NBCNews.com

Sandy Hook shooting anniversary: How schools have changed ...
NBCNews.com
These are among the physical reinforcements that have become more common in schools across the country in the five years since the tragedy at Sandy Hook Elementary, as more and more schools try to address security concerns. Experts say the Dec. 14 ...
The legacy of Newtown: Lockdowns, active-shooter training and school securityWashington Post
Sandy Hook's legacy: More security in elementary schoolsThe Denver Post
Sheryl Crow releases new song, 'The Dreaming Kind,' for 5th anniversary of Sandy Hook school shootingABC News
YouTube -PEOPLE.com
all 150 news articles »

TechCrunch

Upstream Security reels in $9M Series A to protect connected cars
TechCrunch
Upstream Security, a new startup founded by two cyber security industry veterans, announced a $9 million Series A today to help protect connected vehicles and eventually autonomous cars. Today, that probably means a car using a service like OnStar to ...

and more »

Fox News

Sessions: terror attacks show immigration a security issue
Fox News
Homeland Security Secretary Kirstjen Nielsen, the former deputy White House chief of staff confirmed last week by the Senate, said "while we are not aware of any specific credible threats today we are taking additional security precautions and ...
Recent NYC terror attacks show immigration is a security issue, Jeff Sessions saysChicago Tribune

all 30 news articles »

CSO Online

5 top machine learning use cases for security | CSO Online
CSO Online
Machine learning will make sense of the security threats your organization faces and help your staff focus on more valuable, strategic tasks. It could also be the answer to the next WannaCry.

and more »

Knicks.com

Safety and Security Notice
Knicks.com
The Madison Square Garden Company places the safety and security of our guests above all else. In light of the incident in New York yesterday morning, we have increased security measures across all of our venues and are working closely with local law ...

and more »

Fox News

Trump to release national security strategy next week
Fox News
WASHINGTON – President Donald Trump is set to unveil his first National Security Strategy next Monday. National security adviser H.R. McMaster said the strategy will incorporate four core national interests: the protection of American people; advancing ...
Trump to Unveil Key National Security StrategyU.S. News & World Report
Trump's New National Security Strategy Not Likely to Alter the Pattern of 'Promiscuous Intervention'Reason
Trump will announce new US security strategy on Monday: adviserReuters

all 11 news articles »

UN News Centre

ICC Prosecutor asks Security Council to act on outstanding arrest warrants
UN News Centre
Fatou Bensouda, Chief Prosecutor for the International Criminal Court (ICC), during the Security Council on the situation in Sudan and South Sudan. UN Photo/Rick Bajornas. Tweet. Print. 12 December 2017 – Omar Al Bashir recently travelled to countries ...

and more »

Medscape

Cyber Security Is a Serious Problem for Physicians: Survey
Medscape
More than four in five US physicians (83%) have experienced some form of a cyber attack, according to new research released today by the American Medical Association (AMA) and Accenture. Fifty-five percent of the 1300 physicians who responded to the ...

and more »

Baltimore Sun

US energy approach will affect national security
Baltimore Sun
Clean energy also matters from a national security point of view, in part because the strength of our national defense is tied to the strength of our economy. Developing homegrown, renewable sources of energy also boosts energy independence. Loosening ...


War on the Rocks

What Would an Honest National Security Strategy Say?
War on the Rocks
Staffers on the U.S. National Security Council are currently putting the finishing touches to the Trump administration's congressionally mandated National Security Strategy. The strategy is supposed to describe America's interests, identify the threats ...

Google News

8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft

Ebay is a great site and is used by many... Read More

Five Excellent Indie Encryption And Security Solutions You Have Not Heard About

1. Geek Superhero http://www.deprice.com/geeksuperhero.htmGeek Superhero watches your computer for changes,... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? ---------------------------------------... Read More

How to Fight Spyware

If you are wondering how to fight spyware for safe... Read More

Secrets On Security: A Gentle Introduction To Cryptography

Let us take the example of scrambling an egg. First,... Read More

Firewall Protection - Does Your Firewall Do This?

The first thing people think about when defending their computers... Read More

Identity Theft - Dont Blame The Internet

Identity theft ? also known as ID theft, identity fraud... Read More

Avoid Internet Theft, Fraud and Phishing

Since its birth, the Internet has grown and expanded to... Read More

Dont Miss Information Because of Misinformation

It has been said that with the wealth of information,... Read More

Spyware Removal

Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More

The Attack of the Advertiser - Spy Mother Spy

The menacing campaigns that drive the corporate spyware and adware... Read More

How To Cover Your Tracks On The Internet

Every single time you access a website, you leave tracks.... Read More

Phishing and Pharming: Dangerous Scams

As soon as almost all computer users already got used... Read More

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy,... Read More

Phishing - Identity Theft & Credit Card Fraud

What is Phishing? Phishing is a relatively newly coined term... Read More

Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc.

Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More

What is Hacking? Are You a Hacker?

WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More

Do You Know What your Kids Are Doing Online?

It's a sad statistic, but hundreds of unsuspecting kids are... Read More

Is Your Email Private? Part 1 of 3

In a word, no - an email message has always... Read More

Passwords or Pass Phrase? Protecting your Intellectual Property

Much has been said on the theory of password protection... Read More

Password Security and Safety

There is nothing more important that password security in world... Read More

Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk

The trash folder in my main inbox hit 4000 today.... Read More

Why Corporations Need to Worry About Phishing

Phishing is a relatively new form of online fraud that... Read More

Securing Your Accounts With Well-Crafted Passwords

In the past I've never really paid much attention to... Read More

8 Surefire Ways to Spot an E-Mail Identity Theft Scam!

The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More