If you use the internet, you have probably been infected with a virus, trojan or spyware. According to the SANS Internet Storm Center, the average unprotected PC is infected within 20 minutes of normal internet usage. Many people want to know what they did to get infected. Unfortunately, usually it was just one wrong click.
Here are the top reasons people get infected and how to prevent these common internet security threats.
10. Exchanging files in chat rooms.
You should never download files from sources you don't trust. Viruses and other internet security threats can look like valid files or photos. Always scan files with a virus scanner before opening them.
9. Clicking on popup ads.
If you're like most people, you probably don't like popup ads. But whether you like them or not, you should never click on them. Popup ads can take you to a website that secretly downloads adware onto your computer. Enabling a popup blocker on your computer can help protect you. Some popups come from adware programs that have downloaded onto your computer, so if you still see popups after installing a popup blocker, scan your computer for spyware or adware.
8. Email attachments.
Viruses can be sent out as email attachments to infect your computer if you open them. If you download your email into an email program, scan all email attachments with a virus scanner. Most major webmail programs scan attachments before you download them, but you should still not download files from unknown sources. "Phishing" email, claiming to be from your bank or other financial institution which asks you to provide personal information or download something to your computer is another common email threat.
7. Instant messaging.
Because people are cautious with email attachments, new viruses are spreading through instant messaging programs. Infections look like valid files or photos, so always be careful accepting file transfers, even from sources you trust.
6. Downloading music.
Many websites that advertise free music downloads are loaded with spyware. You can even get spyware from these websites without manually starting a download. Other sites make you accept a spyware download to get the music you want.
5. Browsing websites.
Some websites use "drive-by downloads" ? misleading dialogue boxes to secretly install spyware programs. Sometimes spyware can install even if you do not choose "yes" or "accept". Keep your browser security settings on default to protect yourself against these infections.
4. Installing free programs or screen savers.
Check the license agreement of any program you install to confirm it does not come bundled with other programs. License agreements are supposed to explain if the software you are downloading will cause advertisements or other downloads. These programs may have long or confusing license agreements where they have buried this information. Always carefully read what you agree to before you download free software.
3. Adult-related websites.
Many of these sites make a profit by forcing viewers to download spyware and adware to access their site. You may not be able to view these sites if you are using a secure browser or have your security settings too high.
2. P2P programs like Kazaa or Limewire.
If you share music using peer-to-peer networks, you may be forced to download advertising software onto your computer. This software can generate popups from within your computer. In these cases, you may see popups even if you are not online.
1. Gaming websites.
It may seem that viewing spoilers for online games will let you win faster, but it can slow down your computer with spyware. Mick Lathrop, part of StopSign's Spyware Research team says, "I get most of my spyware samples from gaming-related websites." Avoid any site that requires a software download to access information.
Even if you have an anti-virus product on your computer, confirm that it protects against the growing threat of spyware. Enable a popup blocker and firewall for further protection. Using safe browsing habits and good security software can keep you safe on the internet.
Marla Porter is part of the Product Development Team at eAcceleration Corp., the makers of StopSign anti-virus and spyware remover. StopSign detects and removes viruses, trojans, spyware, worms, keyloggers and browser hijackers. Learn more about StopSign at http://www.stopsign.com. StopSign is a product of eAcceleration Corp: http://www.eacceleration.com.
![]() |
|
![]() |
|
![]() |
|
![]() |
So called phishers try to catch the information about the... Read More
I am the victim of an internet scam. It is... Read More
When the Internet first came about, it was realized it... Read More
Ok, ok, I know you've seen them. All those pop... Read More
A few nights ago I received an email from "2CO"... Read More
Many of us have run into an annoying and time-consuming... Read More
Having a good Spyware eliminator on your computer is vital... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
Recently I have received email from my bank/credit Card Company,... Read More
Working from home has its advantages, including no commute, a... Read More
Viruses are, however, not the only malicious software programs out... Read More
Security leaks can be a big problem for any site... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
Huge number of spyware software applications are available in the... Read More
Internet scams and frauds are on the rise! The quantity... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
There are folks out there who use their powers for... Read More
First I would like to stress I am condoning the... Read More
The trash folder in my main inbox hit 4000 today.... Read More
The 1998 Data Protection Act was not an extension to,... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
As you know, this time the virus under the name... Read More
Only the top spyware removers are successful at detecting and... Read More
In the past I've never really paid much attention to... Read More
Imagine my surprise when I received a phone call from... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
Microsoft routinely releases new security updates, many of which are... Read More
By browsing a web page, you could infect your computer... Read More
They're out there. Individuals trying to make a quick buck... Read More
The top five online scams on the Internet hit nearly... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
The average computer is packed with hidden software that can... Read More
Long gone are the days that we could feel secure... Read More
The 1998 Data Protection Act was not an extension to,... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
Every now and then you can read about a new... Read More
It has been said that with the wealth of information,... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
As you know, this time the virus under the name... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
Imagine my surprise when I received a phone call from... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
Spyware is software that runs on a personal computer without... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
Ebay is a great site and is used by many... Read More
When surfing the Internet you probably take your anonymity for... Read More
Shopping for horse gifts or other gift items on the... Read More
Have you ever got an email asking you to confirm... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
Pharming is one of the latest online scams and rapidly... Read More
The Internet is a vast International Network of people and... Read More
First, let's do a little recap'. As I stated in... Read More
Nobody wants to pay to remove spyware. At the very... Read More
Spyware symptoms happen when your computer gets bogged down with... Read More
Threats we ordinary Web users face online leave us no... Read More
You've seen it in the news - 40 million credit... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
Computer security for most can be described in 2 words,... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
Internet Security |