Malware programs that can do damage to you or your computer (Phishing…
programs that can do damage to you or your computer
: The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
How to Avoid Phising
Be careful about responding to Emails that ask you for sensitive information
Go to the site yourself, rather then clicking on suspicious links in suspicious email
If you are on sites that ask you to enter sensitive info check for signs of anything suspicious
Be wary of "Fabulous Offers" and "Fantastic Prizes" that you will sometimes cross on web
The phishing scam masquerades as a legitimate website or link to a site, but what it’s really trying to do is “fish” for information
By fooling you into thinking that you’re visiting your bank or a shopping or government website, the scam gets you to divulge personal or financial information, which the Bad Guys then exploit.
Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
Tips to Avoid Spy Ware
Don't click on links within pop-up windows
Choose "no" when asked unexpected questions
Be wary of free downloadable software
Don't download programs from sites you don't trust, and realize that you may be exposing your computer to spyware by downloading some of these programs.
Don't follow email links claiming to offer anti-spyware software
spyware monitors your movements on the Internet, sending information back to a central computer that then targets you with advertising
category has broadened to include programs you download to your computer that monitor your activities to the point that your computer slows down to a useless state
: a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
Tips To Avoid Viruses
Is this a site you’ve used before?
Do you trust it?
Have you checked the browser status bar to confirm the link destination?
Does the button text and font match the rest of the site?
a computer virus infects your computer, taking control over some or all of its functions
The virus destroys data or looks for things like passwords, credit card numbers, or other sensitive data. This information is often sent to another computer
A virus can also use your computer to relay spam email or pornography or to coordinate attacks against websites on the Internet.
- any malicious computer program which misleads users of its true intent
How to Avoid The Trojan Horse
Do not execute any program in your computer unless you believe it is from a trusted source.
Never open emails from unknown senders especially having attachments with the extensions .exe, .vbs.
Regularly update the anti-virus, anti-spyware on your computer on regular basis.
When you download any program from Internet websites always scan them first before you use.
masquerades as a legitimate program. The program may have a legitimate function, but it carries ulterior motives
Trojans can delete data, compromise security, relay spam or porn, and otherwise infect your computer.
computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.
replicates itself over a network. Worms often arrive via email, peruse your address book, and then send a copy of themselves to others in your address book, masquerading the message as though it’s from you
Worms are used to deliver viruses, or the worm itself might be a virus, because the terms are interchangeable
Tips to Avoid Worms
Beware of misleading popups
Be selective with your downloads
Download from trusted locations only
Don't open anything you don't trust completely