Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
The Top Twelve Threats No Computer User Should Ignore > NetSparsh - Viral Content you Love & Share

The Top Twelve Threats No Computer User Should Ignore

The internet is undoubtedly a fantastic resource for families and offers a rich vein of educational content.

However, there are potential dangers - welcome to the seedy world of viruses, spam, trojans, pornography, spyware and other nasties.

These are the Top Twelve Threats No Computer User Should Ignore.

1. Viruses - A computer program that copies itself. They often disrupt your computer system or damage your data. Viruses are usually received by email attachments so be careful opening anything from a dubious source. They can affect anyone, for example, the destructive Mydoom worm affected one out of three small and mid-sized businesses.

2. Spyware - Sends information about you and your computer to somebody else. Spyware may send the addresses of sites you have visited or worse still, transmit personal information. With today's concerns about identify theft this is a real worry. For example, CoolWebSearch may hijack web searches, home page, and other Internet Explorer settings. Spyware is normally received as part of shareware or freeware downloaded from the web.

3. IP Spoofing - A technique to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an address indicating that the message is coming from a trusted host.

4. Trojans - An apparently legitimate computer program that is really intended to disrupt and damage computer activity by sending information, perhaps even passwords onto a third party without you knowing. As an example, recent emails entitled "Osama Bin Laden Captured" attempted to download the "Trj/Small.B." Trojan if the embedded URL was clicked. This trojan attempts to hijack the PC.

5. Spam - Unsolicited mail often promoting products of a dubious financial or sexual nature. Don't leave your email address on websites and internet bulletin boards as they are harvested by spammers.

6. Adware - puts advertisements on your screen. These take many forms including popups, popunders and advertisements that appear later, even if your browser is closed. Some are sent using the Windows Messenger service which allows a spammer to direct an advertisement straight to your computer by sequentially sending messages to IP addresses. Always irritating, they are also often of a pornographic nature.

7. Diallers - for those of us still with dial up modems, dialler programs redirect calls to a very expensive number. You won't know until you get the bill.

8. Hijackers - Hijackers take control of your web browser and may reset your home page, search bar and search pages. They can redirect you to undesirable sites or stop you going to particular sites.

9. Hackers - With so much personal data available online to anyone with a password you must be sure your password is secure. If you are using your mother's maiden name, your cat's name or your birthday then your password is at risk. Here are two tips for making a secure password. Method One - pick two random unrelated three letter words and two digits. Mix them up and what do you have? A secure password such as "red19cat" or "hotpin73". Method Two - pick a short sequence of words such as Now Is The Winter Of Our Discontent Made Glorious' and you have a password of "nitwoodmg". You could even change the I's and O's to digits.

10. Phishing - Emails purporting to come from reliable sources such as Paypal, Ebay or your bank. Often wanting you to verify your account details, they can look very realistic but are generally scams to harvest usernames and passwords. Always open a new browser winder and type the address there, rather than clicking on the link provided.

11. Hoaxes - Chain letters, scams, false alarms. At best they take up time and bandwidth but at worst vulnerable can be victims of fraud. Pass it on!

12. Stranger-danger ? For those of us with children - do you know what they actually do when they are online? Are they working on homework tasks, downloading illegal music or pornography? Or are they chatting to strangers in chat rooms? You should consider blocking access to undesirable sites and logging their activity with a surveillance tool. Oh, and don't forget that where children are concerned, computers should always be kept in a family room and never in their bedroom.

Three Step Action Plan

There are three basic, essential steps that should be taken to ensure your PC is kept threat-free.

Firstly , be sensible when opening attachments or following email instructions from apparently reputable sites.

Secondly , make sure you are using the latest service pack of Windows as Microsoft is continually closing loopholes to tighten up security.

Finally, there's a range of low cost tools such as firewalls, antivirus, spam blockers and spyware killers available. Like everything else they vary in quality and you tend to get what you pay for so always do your research first and perhaps try a free trial before getting your credit card out.

The author, Kai Chandler, edits http://www.surfcontrols.com which specializes in providing reviews and recommendations of top-rated tools to help protect your online experience.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

The Verge

Google discloses Microsoft Edge security flaw before a patch is ready
The Verge
Microsoft and Google have been bitter rivals for at least a decade, and the pair have had several disagreements over security vulnerability disclosure in recent years. Google is stoking those disagreements again this week by disclosing a Microsoft Edge ...
Edge browser suffers security flaw which Microsoft failed to fix on timeTechRadar

all 13 news articles »

New York Magazine

Kelly Orders Changes to Security Clearance Process at White House
New York Magazine
White House chief of staff John Kelly has approved an overhaul of how the White House handles temporary security clearances after facing bipartisan pressure in the wake of the Rob Porter scandal. Porter, the former White House staff secretary, had been ...
John Kelly overhauls White House security clearancesVox
Chief of Staff Orders an Overhaul for Security ClearancesNew York Times
Chief Of Staff Kelly Wants New White House Security Clearance RulesNPR
CNN -Axios -Washington Post -Washington Post
all 288 news articles »

CBS News

Should we rethink school shootings as a homeland security threat?
CBS News
When a 29-year-old man from Uzbekistan plowed a truck into a crowd of people in Manhattan in October, killing eight, President Trump's response to the attack as a matter of homeland security was swift. Within hours, the president decried the attack and ...

and more »

Bloomberg

Three Things Worrying the Global Security Establishment
Bloomberg
After a year of U.S. President Donald Trump, the trans-Atlantic security establishment seems unsure whether to be relieved that a major war hasn't begun on his watch or alarmed at the scale of emerging risks. Speeches and panel discussions at the ...
The Munich Security Conference is one of the premier global forums, so what's with the malaise?Washington Post
'Do not test Israel's resolve,' Netanyahu tells Iran at Munich Security ConferenceFRANCE 24
Hot Debate Around Iran Nuclear Deal on Final Day of Munich Security ConferenceSputnik International

all 360 news articles »

Reuters

Carnival probes security personnel's response to brawl in South Pacific cruise
Reuters
SYDNEY (Reuters) - Carnival Corp (CCL.N), the world's largest cruise operator, said on Monday it was investigating the response of its security personnel to a brawl that broke out on one of its South Pacific cruises that resulted in 23 passengers being ...
Carnival to review security response to brawls on Australia-based shipUSA TODAY

all 129 news articles »

Business Insider

A Secret Service agent tackled a Chinese security official over the nuclear football when Trump visited China
Business Insider
The news website Axios reported on Sunday that a Secret Service member tackled a Chinese security official during President Donald Trump's trip to China in November. The incident reportedly began when the Chinese security detail tried to prevent the ...
Chinese, US security officials scuffled over 'nuclear football' during Trump trip, says reportSouth China Morning Post
John Kelly and Secret Service agent scuffled with Chinese security officials over nuclear 'football' in Beijing ...The Japan Times
US and China reportedly scuffled over nuclear 'football' during Trump's Beijing visitCNBC
Mediaite
all 41 news articles »

Engadget

Air Force security hackathon leads to record payout
Engadget
The US Air Force's second security hackathon has paid dividends... both for the military and the people finding holes in its defenses. HackerOne has revealed the results of the Hack the Air Force 2.0 challenge from the end of 2017, and it led to ...


Los Angeles Times

USC students explore civil rights, national security in university's first history class on WWII internment
Los Angeles Times
USC student Matthew Weisbly has Jewish and Japanese relatives who experienced the Holocaust and internment. (Christina House / Los Angeles Times). USC faculty member Susan Kamei was struck by discomforting moments of deja vu during the 2016 ...


Bloomberg

Electric Vehicles May Raise India's Risk of Cyber-Security Breaches
Bloomberg
India's dependence on imported components for electric vehicles could make the country vulnerable to cyber-security breaches, according to the government's chief policy think-tank. India should manufacture the majority of the parts needed for its ...

and more »

ZDNet

Government agrees to up Medicare card privacy and security controls
ZDNet
The federal government has agreed to the 14 recommendations made by the independent review of health providers' access to Medicare card numbers, touting an individual's privacy and card information security. One recommendation made by the review in ...

and more »
Google News

Identity Theft Offline -- So Many Possibilities

Chris Simpson, head of Scotland Yard's computer crime unit was... Read More

The Top Twelve Threats No Computer User Should Ignore

The internet is undoubtedly a fantastic resource for families and... Read More

IPv6 - Next Step In IP Security

IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More

Phishing - Identity Theft & Credit Card Fraud

What is Phishing? Phishing is a relatively newly coined term... Read More

Are You Surfing Safe?

Ok, you've got a computer, and you get online. You... Read More

Online Shoppers, Beware of a New Scam

Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More

Internet Scams: Dont be a Victim

As the number of people using the Internet as an... Read More

Computer-Virus Writers: A Few Bats In The Belfry?

"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More

Check Out That Privacy Policy

Before you enter your name, address or any other data... Read More

Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders

Can you protect your computer from all possible viruses and... Read More

New Mass Mailing Spamming Internet Trojan for the Windows Platform

May. 16th 2005 - MicroWorld has reported the discovery of... Read More

Secrets On Security: A Gentle Introduction To Cryptography

Let us take the example of scrambling an egg. First,... Read More

What to Look for before You Purchase Spyware Software

Huge number of spyware software applications are available in the... Read More

Cyber Crooks Go Phishing

"Phishing," the latest craze among online evil-doers, has nothing to... Read More

Social Engineering - The Real E-Terrorism?

One evening, during the graveyard shift, an AOL technical support... Read More

Parental Control - Dangers To Your Child Online & Internet Child Safety Tips

Did you know...? 1 in 5 children who use computer... Read More

How to Thwart the Barbarian Spyware!

Today,on most internet user's computers, we have the ability to... Read More

40 Million People Hacked - YOU as Identity Theft Victim

Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More

Data Security; Are Your Company Assets Really Secure?

Is your data secure? Think again. Securing data is unlike... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

An Open Door To Your Home Wireless Internet Network Security?

This is not some new fangled techno-speak, it is a... Read More

The Importance of Protecting Your PC from Viruses and Spam

Today the internet is a mine field of malicious code... Read More

The Never Ending Spyware Story

It's been with us since 1993, it's gotten more intrusive,... Read More

Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and... Read More

What is Hacking? Are You a Hacker?

WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More