Malware
programs that can do damage to you or your computer
Phishing
Definition: The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- The phishing scam masquerades as a legitimate website or link to a site, but what it’s really trying to do is “fish” for information
- By fooling you into thinking that you’re visiting your bank or a shopping or government website, the scam gets you to divulge personal or financial information, which the Bad Guys then exploit.
How to Avoid Phising
- Be careful about responding to Emails that ask you for sensitive information
- Go to the site yourself, rather then clicking on suspicious links in suspicious email
- If you are on sites that ask you to enter sensitive info check for signs of anything suspicious
- Be wary of "Fabulous Offers" and "Fantastic Prizes" that you will sometimes cross on web
Spyware
Definition- Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- spyware monitors your movements on the Internet, sending information back to a central computer that then targets you with advertising
- category has broadened to include programs you download to your computer that monitor your activities to the point that your computer slows down to a useless state
Tips to Avoid Spy Ware
- Don't click on links within pop-up windows
- Choose "no" when asked unexpected questions
- Be wary of free downloadable software
- Don't download programs from sites you don't trust, and realize that you may be exposing your computer to spyware by downloading some of these programs.
- Don't follow email links claiming to offer anti-spyware software
Virus
Definition: a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- a computer virus infects your computer, taking control over some or all of its functions
- The virus destroys data or looks for things like passwords, credit card numbers, or other sensitive data. This information is often sent to another computer
- A virus can also use your computer to relay spam email or pornography or to coordinate attacks against websites on the Internet.
Tips To Avoid Viruses
- Is this a site you’ve used before?
- Do you trust it?
- Have you checked the browser status bar to confirm the link destination?
- Does the button text and font match the rest of the site?
Trojan Horse
Worm
Definition- any malicious computer program which misleads users of its true intent
How to Avoid The Trojan Horse
- Do not execute any program in your computer unless you believe it is from a trusted source.
- Never open emails from unknown senders especially having attachments with the extensions .exe, .vbs.
- Regularly update the anti-virus, anti-spyware on your computer on regular basis.
- When you download any program from Internet websites always scan them first before you use.
- masquerades as a legitimate program. The program may have a legitimate function, but it carries ulterior motives
- Trojans can delete data, compromise security, relay spam or porn, and otherwise infect your computer.
Definition- computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.
- replicates itself over a network. Worms often arrive via email, peruse your address book, and then send a copy of themselves to others in your address book, masquerading the message as though it’s from you
- Worms are used to deliver viruses, or the worm itself might be a virus, because the terms are interchangeable
Tips to Avoid Worms
- Beware of misleading popups
- Be selective with your downloads
- Download from trusted locations only
- Don't open anything you don't trust completely