Most common way to get a virus on your computer


















Spoofing consists of sending an email that appears to be from a reputable source such as a bank, popular shopping website, or even the IT department for your place of employment. Hackers know you are more likely to open an email that appears to be from a legitimate source. Never click on anything or download attachments unless you are absolutely sure you know who sent it. Companies will never send you unsolicited emails regarding recent purchases, your account, or your password.

These are common ploys used by hackers. The Internet has many dark corners filled with dangerous and malicious websites. Be cautious when browsing and be sure to keep your anti-virus software up to date. This is your first line of defense if you find yourself browsing a malicious website.

Also, keep in mind that a dangerous site may be linked to from some place that you know is safe. For example, just because a link is posted on Facebook or in the comments section of a reputable news website does not necessarily mean it is safe to click. Any disk , disc , or thumb drive connected or inserted into your computer can be infected with a virus.

As long as something is writable, a virus can move from a computer to that disk, disc, or drive. A common tactic used by hackers to gain access to a network is by leaving out a thumb drive with malicious code on it. Then, when a user puts the thumb drive into their computer, it becomes infected with a virus or trojan horse. This same rule applies to any networked drive or computer. If another computer has write access to a computer drive accessible by your computer, a virus can move between computers on a network.

Anyone, anywhere can create a website, which is great for humanity as an intelligent, creative, social species. But, it also means that any malicious person, anywhere, can create a website. Be aware of this when you visit a website for the first time, and you're not sure what it is. A malicious website may have the capability to read files on your computer, transfer malicious files to you, or access your sensitive information.

No legitimate company will ever make you open an Office file just to cancel a service. If one asks you to, just hang up on them.

It's a scam and there is no service you need to cancel. To learn more about controlling how macros run on your device see Enable or disable macros in Office files. Many worms spread by infecting removable drives such as USB flash drives or external hard drives. The malware can be automatically installed when you connect the infected drive to your PC. First and foremost, be very wary of any USB device that you don't own.

If you find a USB device that was apparently lost or discarded, be reluctant to plug it into a computer with data you care about. Sometimes attackers will deliberately leave infected USB devices laying around in popular areas in hopes that somebody will find them and plug them into their computer. If you don't plug it in, you can't get infected. If you find a USB drive just laying around, apparently lost, see if there is a nearby receptionist, or lost-and-found, that you can turn it in to.

Second, if you do plug an unknown removable device into your computer be sure to run a security scan of it immediately. Some malware can be installed at the same time as other programs that you download. This includes software from third-party websites or files shared through peer-to-peer networks. Some programs will also install other software that Microsoft detects as potentially unwanted software.

This can include toolbars or programs that show you extra ads as you browse the web. Usually you can opt out and not install this extra software by clearing a check box during the installation. Windows Security can help to protect you from potentially unwanted applications. But the bad guy has changed that to: www. And then you are not really where you are supposed to be. From now on, said Watchinski, advise users to look carefully the next time they see a bad SSL cert pop up.

It prompts you to download that app from that site. Microsoft cannot verify where this application came from or who made it. If you get a box that says the content is not signed, you should think about where you are installing that application from. Instead, advises Watchinski, ask users to head to downloads.

By now just about everyone has seen one of these come-ons. These scams are common, and have been around for years, on the Web. So, why are people still falling prey to them? Curiosity continues to get the best if us, said Watchinski.



0コメント

  • 1000 / 1000