Translate

Saturday, January 8, 2011

Viruses and other serious security threats -- and what to do if you've been infected

Most of the urgent emails you get about "deadly viruses" are just hoaxes. But there are a lot of very serious real ones out there as well.

How do you know the difference between real viruses and virus hoaxes?

  • What Are Computer Viruses?
  • What Kind of Damage Can Computer Viruses Do?
  • Your Computer May Have a Computer Virus If...
  • How Can Your Computer Catch a Virus?
  • When a Virus Isn't a Virus: Hoaxes and Chain Emails

Computer viruses aren't the only threat. In fact, the list of potential security issues gets longer each month! For example, in addition to computer viruses, there are worms, Trojan horses, spyware, adware, scumware, etc.

Let's briefly look at each of these threats:

Computer viruses are designed to spread from one computer to another quickly. Here's what Webopedia says about computer viruses:

"A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are man-made. A
simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems."

Some computer viruses don't do anything malicious -- others can wipe out everything on your hard drive.
Worms are self-propagating computer viruses. Webopedia defines a worm as:

"A program or algorithm that replicates itself over a
computer network and usually performs malicious actions, such as using up the computer's resources and possibly shutting the system down." Their impact is similar to computer viruses.
Trojan Horses are closely related to computer viruses, but they differ in that they do not attempt to replicate themselves. More specifically, a Trojan Horse performs some undesired -- yet intended -- action while, or in addition to, pretending to do something else. A common example is a fake login program, which collects account information and passwords by asking for this info just like a normal login program does.

Here's what Webopedia says about Trojan horses, including where the term comes from:

"A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

"The term comes from a story in Homer's Iliad, in which the Greeks give a giant wooden horse to their foes, the Trojans, ostensibly as a peace offering. But after the Trojans drag the horse inside their city walls, Greek soldiers sneak out of the horse's hollow belly and open the city gates, allowing their compatriots to pour in and capture Troy."

Spyware is software that tracks your actions and/or your Internet use. It can capture what you type on your keyword, including passwords, and send it to the spyware creator. Here's what Webopedia says about spyware:

"Any
software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet; however, it should be noted that the majority of shareware and freeware applications do not come with spyware. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers.
"Spyware is similar to a Trojan horse in that users unwittingly install the product when they install something else.

"Aside from the questions of ethics and privacy, spyware steals from the user by using the
computer's memory resources and also by eating bandwidth as it sends information back to the spyware's home base via the user's Internet connection. Because spyware is using memory and system resources, the applications running in the background can lead to system crashes or general system instability."
Adware is "a form of spyware that collects information about the user in order to display advertisements in the Web browser based on the information it collects from the user's browsing patterns."
Scumware changes how you view websites you visit. It replaces the actual content of sites with ads from scumware advertisers, and generates traffic for the scumware advertisers.
Note: Every single day we hear about viruses causing major PC crashes, PC's being hacked into, Spyware installed without their permission, and even private information stolen.
The inconvenience and cost of repairing this physical damage is considerable, but the psychological effect can be devastating.

Yet it's relatively simple to protect yourself! But if that's the case, why do millions of people never protect themselves as they should?

It's because installing security and safety precautions APPEARS to be costly, technical and intimidating. So the vast majority of people don't do it -- with devastating consequences!

I found a simple solution: It's called 'The 'PC & Internet Security Kit'.

For the first time, you can bullet proof your
PC and personal information without any technical knowledge and without spending an arm and a leg doing it.

My other favorite resources on computer viruses and hoaxes:

Symantec's [Norton] latest virus threats and security advisories
http://www.symantec.com
McAfee virus info and recent threats
http://us.mcafee.com/virusInfo/
List of the latest computer hoaxes
http://www.f-secure.com/hoaxes/hoax_new.shtml

-Birdy
Remember: When you and your information are safe, society is safe.

No comments:

Post a Comment

Please be considerate of others, and please do not post any comment that has profane language. Please Do Not post Spam. Thank you.

Powered By Blogger

Labels

Abduction (2) Abuse (3) Advertisement (1) Agency By City (1) Agency Service Provided Beyond Survival Sexual Assault (1) Aggressive Driving (1) Alcohol (1) ALZHEIMER'S DISEASE (2) Anti-Fraud (2) Aspartame (1) Assault (1) Auto Theft Prevention (9) Better Life (1) Books (1) Bribery (1) Bullying (1) Burglary (30) Car Theft (8) Carjackng (2) Child Molestation (5) Child Sexual Abuse (1) Child Abuse (2) Child Kidnapping (3) Child Porn (1) Child Rape (3) Child Safety (18) Child Sexual Abuse (9) Child Violence (1) Classification of Crime (1) Club Drugs (1) College (1) Computer (4) Computer Criime (4) Computer Crime (8) Confessions (2) CONFESSIONS (7) Cons (2) Credit Card Scams (2) Crime (11) Crime Index (3) Crime Prevention Tips (14) Crime Tips (31) Criminal Activity (1) Criminal Behavior (3) Crimm (1) Cyber-Stalking (2) Dating Violence (1) Deviant Behavior (6) Domestic Violence (7) E-Scams And Warnings (1) Elder Abuse (9) Elder Scams (1) Empathy (1) Extortion (1) Eyeballing a Shopping Center (1) Facebook (9) Fakes (1) Family Security (1) Fat People (1) FBI (1) Federal Law (1) Financial (2) Fire (1) Fraud (9) FREE (4) Fun and Games (1) Global Crime on World Wide Net (1) Golden Rules (1) Government (1) Guilt (2) Hackers (1) Harassment (1) Help (2) Help Needed (1) Home Invasion (2) How to Prevent Rape (1) ID Theft (96) Info. (1) Intent (1) Internet Crime (6) Internet Fraud (1) Internet Fraud and Scams (7) Internet Predators (1) Internet Security (30) Jobs (1) Kidnapping (1) Larceny (2) Laughs (3) Law (1) Medician and Law (1) Megans Law (1) Mental Health (1) Mental Health Sexual (1) Misc. (11) Missing Cash (5) Missing Money (1) Moner Matters (1) Money Matters (1) Money Saving Tips (11) Motive (1) Murder (1) Note from Birdy (1) Older Adults (1) Opinion (1) Opinions about this article are Welcome. (1) Personal Note (2) Personal Security and Safety (12) Porn (1) Prevention (2) Price of Crime (1) Private Life (1) Protect Our Kids (1) Protect Yourself (1) Protection Order (1) Psychopath (1) Psychopathy (1) Psychosis (1) PTSD (2) Punishment (1) Quoted Text (1) Rape (66) Ravishment (4) Read Me (1) Recovery (1) Regret (1) Religious Rape (1) Remorse (1) Road Rage (1) Robbery (5) Safety (2) SCAM (19) Scams (62) Schemes (1) Secrets (2) Security Threats (1) Serial Killer (2) Serial Killer/Rapist (4) Serial Killers (2) Sexual Assault (16) Sexual Assault - Spanish Version (3) Sexual Assault against Females (5) Sexual Education (1) Sexual Harassment (1) Sexual Trauma. (4) Shame (1) Sociopath (2) Sociopathy (1) Spam (6) Spyware (1) SSN's (4) Stalking (1) State Law (1) Stress (1) Survival (2) Sympathy (1) Tax Evasion (1) Theft (13) this Eve (1) Tips (13) Tips on Prevention (14) Travel (5) Tricks (1) Twitter (1) Unemployment (1) Victim (1) Victim Rights (9) Victimization (1) Violence against Women (1) Violence. (3) vs. (1) Vulnerable Victims (1) What Not To Buy (2)