The internet is undoubtedly a fantastic resource for families and offers a rich vein of educational content.
However, there are potential dangers - welcome to the seedy world of viruses, spam, trojans, pornography, spyware and other nasties.
These are the Top Twelve Threats No Computer User Should Ignore.
1. Viruses - A computer program that copies itself. They often disrupt your computer system or damage your data. Viruses are usually received by email attachments so be careful opening anything from a dubious source. They can affect anyone, for example, the destructive Mydoom worm affected one out of three small and mid-sized businesses.
2. Spyware - Sends information about you and your computer to somebody else. Spyware may send the addresses of sites you have visited or worse still, transmit personal information. With today's concerns about identify theft this is a real worry. For example, CoolWebSearch may hijack web searches, home page, and other Internet Explorer settings. Spyware is normally received as part of shareware or freeware downloaded from the web.
3. IP Spoofing - A technique to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an address indicating that the message is coming from a trusted host.
4. Trojans - An apparently legitimate computer program that is really intended to disrupt and damage computer activity by sending information, perhaps even passwords onto a third party without you knowing. As an example, recent emails entitled "Osama Bin Laden Captured" attempted to download the "Trj/Small.B." Trojan if the embedded URL was clicked. This trojan attempts to hijack the PC.
5. Spam - Unsolicited mail often promoting products of a dubious financial or sexual nature. Don't leave your email address on websites and internet bulletin boards as they are harvested by spammers.
6. Adware - puts advertisements on your screen. These take many forms including popups, popunders and advertisements that appear later, even if your browser is closed. Some are sent using the Windows Messenger service which allows a spammer to direct an advertisement straight to your computer by sequentially sending messages to IP addresses. Always irritating, they are also often of a pornographic nature.
7. Diallers - for those of us still with dial up modems, dialler programs redirect calls to a very expensive number. You won't know until you get the bill.
8. Hijackers - Hijackers take control of your web browser and may reset your home page, search bar and search pages. They can redirect you to undesirable sites or stop you going to particular sites.
9. Hackers - With so much personal data available online to anyone with a password you must be sure your password is secure. If you are using your mother's maiden name, your cat's name or your birthday then your password is at risk. Here are two tips for making a secure password. Method One - pick two random unrelated three letter words and two digits. Mix them up and what do you have? A secure password such as "red19cat" or "hotpin73". Method Two - pick a short sequence of words such as Now Is The Winter Of Our Discontent Made Glorious' and you have a password of "nitwoodmg". You could even change the I's and O's to digits.
10. Phishing - Emails purporting to come from reliable sources such as Paypal, Ebay or your bank. Often wanting you to verify your account details, they can look very realistic but are generally scams to harvest usernames and passwords. Always open a new browser winder and type the address there, rather than clicking on the link provided.
11. Hoaxes - Chain letters, scams, false alarms. At best they take up time and bandwidth but at worst vulnerable can be victims of fraud. Pass it on!
12. Stranger-danger ? For those of us with children - do you know what they actually do when they are online? Are they working on homework tasks, downloading illegal music or pornography? Or are they chatting to strangers in chat rooms? You should consider blocking access to undesirable sites and logging their activity with a surveillance tool. Oh, and don't forget that where children are concerned, computers should always be kept in a family room and never in their bedroom.
Three Step Action Plan
There are three basic, essential steps that should be taken to ensure your PC is kept threat-free.
Firstly , be sensible when opening attachments or following email instructions from apparently reputable sites.
Secondly , make sure you are using the latest service pack of Windows as Microsoft is continually closing loopholes to tighten up security.
Finally, there's a range of low cost tools such as firewalls, antivirus, spam blockers and spyware killers available. Like everything else they vary in quality and you tend to get what you pay for so always do your research first and perhaps try a free trial before getting your credit card out.
The author, Kai Chandler, edits http://www.surfcontrols.com which specializes in providing reviews and recommendations of top-rated tools to help protect your online experience.
These six ways to prevent identity theft offer you valuable... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
Someone recently told me, "You would have to be a... Read More
Identity Theft is one of the most serious problems facing... Read More
First off I should explain what phishing is. Phishing is... Read More
Recently I have received email from my bank/credit Card Company,... Read More
Phishing is a relatively new form of online fraud that... Read More
Security leaks can be a big problem for any site... Read More
You are at your computer, checking out software on EBay.... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
Imagine my surprise when I received a phone call from... Read More
In today's times spyware is a very serious issue and... Read More
Phishing is the act of some individual sending an email... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
You'd better learn news from media, not from emails, security... Read More
At this point, if you've got the whole "turning the... Read More
Much has been said on the theory of password protection... Read More
P C. owners are constantly at risk from attacks by... Read More
Well, this is an article I never thought I would... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
A little bit of time invested into learning about internet... Read More
In the past I've never really paid much attention to... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
Well, if that would have been said to me by... Read More
Before you enter your name, address or any other data... Read More
If you have used a Windows machine for a while,... Read More
This really chapped my lips...I recently bought a new computer.... Read More
There is no doubt that "how-to articles" have become a... Read More
Do you sometimes notice your computer running slower. Is your... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
They're out there. Individuals trying to make a quick buck... Read More
You can detect spyware online using free spyware cleaners and... Read More
First, let's do a little recap'. As I stated in... Read More
This is the second in a series of articles highlighting... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
Ebay is a great site and is used by many... Read More
The Internet is a vast International Network of people and... Read More
Have you ever got an email asking you to confirm... Read More
Have you ever bought a product or service from the... Read More
Do you sometimes notice your computer running slower. Is your... Read More
Is your data secure? Think again. Securing data is unlike... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
Spyware protection software is the easiest way of removing spyware... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
So called phishers try to catch the information about the... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
My first experience with a spyware BHO based infection was... Read More
Some months ago, before there was much publicity regarding phishing... Read More
Spyware symptoms happen when your computer gets bogged down with... Read More
Over £5 billion pounds was spent on online shopping in... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
If you are a parent, as am I, I think... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
As soon as almost all computer users already got used... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
A little bit of time invested into learning about internet... Read More
The average computer is packed with hidden software that can... Read More
Someone recently told me, "You would have to be a... Read More
This is not some new fangled techno-speak, it is a... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
Internet Security |