If you use the internet, you have probably been infected with a virus, trojan or spyware. According to the SANS Internet Storm Center, the average unprotected PC is infected within 20 minutes of normal internet usage. Many people want to know what they did to get infected. Unfortunately, usually it was just one wrong click.
Here are the top reasons people get infected and how to prevent these common internet security threats.
10. Exchanging files in chat rooms.
You should never download files from sources you don't trust. Viruses and other internet security threats can look like valid files or photos. Always scan files with a virus scanner before opening them.
9. Clicking on popup ads.
If you're like most people, you probably don't like popup ads. But whether you like them or not, you should never click on them. Popup ads can take you to a website that secretly downloads adware onto your computer. Enabling a popup blocker on your computer can help protect you. Some popups come from adware programs that have downloaded onto your computer, so if you still see popups after installing a popup blocker, scan your computer for spyware or adware.
8. Email attachments.
Viruses can be sent out as email attachments to infect your computer if you open them. If you download your email into an email program, scan all email attachments with a virus scanner. Most major webmail programs scan attachments before you download them, but you should still not download files from unknown sources. "Phishing" email, claiming to be from your bank or other financial institution which asks you to provide personal information or download something to your computer is another common email threat.
7. Instant messaging.
Because people are cautious with email attachments, new viruses are spreading through instant messaging programs. Infections look like valid files or photos, so always be careful accepting file transfers, even from sources you trust.
6. Downloading music.
Many websites that advertise free music downloads are loaded with spyware. You can even get spyware from these websites without manually starting a download. Other sites make you accept a spyware download to get the music you want.
5. Browsing websites.
Some websites use "drive-by downloads" ? misleading dialogue boxes to secretly install spyware programs. Sometimes spyware can install even if you do not choose "yes" or "accept". Keep your browser security settings on default to protect yourself against these infections.
4. Installing free programs or screen savers.
Check the license agreement of any program you install to confirm it does not come bundled with other programs. License agreements are supposed to explain if the software you are downloading will cause advertisements or other downloads. These programs may have long or confusing license agreements where they have buried this information. Always carefully read what you agree to before you download free software.
3. Adult-related websites.
Many of these sites make a profit by forcing viewers to download spyware and adware to access their site. You may not be able to view these sites if you are using a secure browser or have your security settings too high.
2. P2P programs like Kazaa or Limewire.
If you share music using peer-to-peer networks, you may be forced to download advertising software onto your computer. This software can generate popups from within your computer. In these cases, you may see popups even if you are not online.
1. Gaming websites.
It may seem that viewing spoilers for online games will let you win faster, but it can slow down your computer with spyware. Mick Lathrop, part of StopSign's Spyware Research team says, "I get most of my spyware samples from gaming-related websites." Avoid any site that requires a software download to access information.
Even if you have an anti-virus product on your computer, confirm that it protects against the growing threat of spyware. Enable a popup blocker and firewall for further protection. Using safe browsing habits and good security software can keep you safe on the internet.
Marla Porter is part of the Product Development Team at eAcceleration Corp., the makers of StopSign anti-virus and spyware remover. StopSign detects and removes viruses, trojans, spyware, worms, keyloggers and browser hijackers. Learn more about StopSign at http://www.stopsign.com. StopSign is a product of eAcceleration Corp: http://www.eacceleration.com.
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
First I would like to stress I am condoning the... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
So you want to know who your kids are chatting... Read More
You've seen it in the news - 40 million credit... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
Phishing is a relatively new form of online fraud that... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
Internet scams and frauds are on the rise! The quantity... Read More
Over £5 billion pounds was spent on online shopping in... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
Watching how the traditional media covers the latest virus or... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
The first thing people think about when defending their computers... Read More
This is the second in a series of articles highlighting... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
If you are a parent, you have probably wondered at... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
By browsing a web page, you could infect your computer... Read More
The most frustrating part of having Spyware on your computer... Read More
A little bit of time invested into learning about internet... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
First, let's do a little recap'. As I stated in... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
Imagine my surprise when I received a phone call from... Read More
If you have used a Windows machine for a while,... Read More
Computer security for most can be described in 2 words,... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
With the advent of the World Wide Web, a whole... Read More
The Message Must Get Through The year is 300A.D.,... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
In today's times spyware is a very serious issue and... Read More
In recent days, I was one of the unfortunate persons... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
If you are wondering how to fight spyware for safe... Read More
A couple of days ago, I was searching for a... Read More
Millions of people make purchases online, but many people are... Read More
They're out there. Individuals trying to make a quick buck... Read More
If you use the internet, you have probably been infected... Read More
Over the past few years as the internet has become... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
You may not realize it, but as you are surfing... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
This is the second in a series of articles highlighting... Read More
A little bit of time invested into learning about internet... Read More
As more people are logging onto the Internet everyday, Network... Read More
Chris Simpson, head of Scotland Yard's computer crime unit was... Read More
Sooner or later everyone with an email account will receive... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
If you know what is the 'Fishing' then it's very... Read More
Fishing on the Internet has come a long way. However,... Read More
First the basic definition of Spyware: It is a type... Read More
Computer infections can be broken up into 4 main categories... Read More
Recently I have received email from my bank/credit Card Company,... Read More
Microsoft routinely releases new security updates, many of which are... Read More
Imagine my surprise when I received a phone call from... Read More
Identity theft rates one of the fastest growing crimes in... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
Today the internet is a mine field of malicious code... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
Computer security for most can be described in 2 words,... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
Whether we like it or not, we are all living... Read More
By browsing a web page, you could infect your computer... Read More
If you are a parent, you have probably wondered at... Read More
Internet Security |