Translate

Wednesday, August 24, 2011

IS YOUR COMPUTER UNDER THREAT?



The language used to describe the types of threats that your computer may be vulnerable to can often get confusing. Here's a quick list of the types of threats that you'll find.
Drive-by Downloads
A drive-by download is computer code that takes advantage of a software bug in a Web browser to make it do something that the attacker wants—such as run malicious code, crash the browser, or read data from the computer. Software bugs that are open to browser attacks are also known as vulnerabilities.
Phishing Attacks
A phishing attack occurs when an attacker displays Web pages or sends emails that claim to be from a trusted company. These pages or emails solicit sensitive information from an unwitting customer.
Spyware
Spyware is any software package that tracks and sends personally identifiable information or confidential information to third parties.
Viruses
Viruses are a type of malicious code, or malware, typically spread by other computers through email, downloads, and Web sites that are not safe.
Heuristically-Detected Virus
A heuristically-detected virus is found based on the malicious behaviors that it exhibits. These behaviors may include attempts to steal a person's sensitive information such as passwords or credit card numbers
Worms
A worm is another type of malicious code, or malware, that focuses primarily on spreading to other vulnerable computer systems. It typically spreads by sending out copies of itself to other computers, either via email, instant messages, or some other service.
Unsolicited Browser Changes
An unsolicited browser change occurs when a Web site or program changes the behavior or settings of the Web browser without the user's consent. This may result in the home page or search page changing to another Web site, often one that is designed to serve ads or other unwanted content to the user.
Suspicious Browser Changes
A suspicious browser change occurs when a Web site attempts to modify the list of trusted Web sites. A Web site may be trying to get your Web browser to automatically download and install suspicious applications without your consent.
Dialers
A dialer is any software package that changes modem settings in order to dial a high cost toll number, or requests payment for access to particular content. The result of this attack is that the owner of the phone line is charged for services were never authorized.
Trackware
Trackware is any software package that tracks system activity, gathers system information, or tracks customer habits and relays this information to third-party organizations. The information gathered by such programs is neither personally identifiable nor confidential.
Hacking Tools
Hacking tools are programs used by a hacker or unauthorized user to attack, gain unwelcome access to, or perform identification or fingerprinting of your PC. Some hacking tools are used by system or network administrators for legitimate purposes, but the power they provide can also be misused by unauthorized users.
Joke Programs
A joke program is one that alters or interrupts the normal behavior of your computer, creating a general distraction or nuisance. Joke programs are programmed to perform various actions like causing the CD or DVD drive of your PC to open at random.
Security Risk
A security risk is a condition in which a computer is more vulnerable to an attack. This condition can be created when an otherwise innocent program contains an error that reduces the security of your computer. These errors are usually unintentional. Using such a program could increase the risk that your PC will be attacked.
Suspicious Application
A suspicious application is one with behavior that represents a potential risk to a computer. The behavior of such a program has been examined and determined to be unwanted and malicious.
Cybersquatting
Cybersquatting is the practice of acquiring a site name to attempt to deceive people about the identity of the organization running the site. Cybersquatting makes use of deceptive practices to mimic trusted brands or otherwise confuse users. Typosquatting is one form of cybersquatting in which name spelling variants are used.
Hard to Uninstall
These programs are difficult to uninstall. When they are uninstalled, they may leave behind files along with registry keys that cause the files to be run even after uninstallation.
Computer threats
Items such as viruses and worms that load directly on your computer, with the potential to do harm to your computer.
Identity threats
Items such as spyware or keyloggers that attempt to steal personal information from your computer.
Ecommerce safety threats
Suspicious ecommerce activities, such as selling counterfeit goods.
Annoyance factors
Items that don't necessarily do harm, but are a nuisance, such as joke programs or a site that isn't what it seems.
Pay per Click site
This indicates a Web site that includes the brand name in the Web site name, but is not affiliated with the brand owner and contains mostly advertisements or links to pages containing advertisements.



No comments:

Post a Comment

Please be considerate of others, and please do not post any comment that has profane language. Please Do Not post Spam. Thank you.

Powered By Blogger

Labels

Abduction (2) Abuse (3) Advertisement (1) Agency By City (1) Agency Service Provided Beyond Survival Sexual Assault (1) Aggressive Driving (1) Alcohol (1) ALZHEIMER'S DISEASE (2) Anti-Fraud (2) Aspartame (1) Assault (1) Auto Theft Prevention (9) Better Life (1) Books (1) Bribery (1) Bullying (1) Burglary (30) Car Theft (8) Carjackng (2) Child Molestation (5) Child Sexual Abuse (1) Child Abuse (2) Child Kidnapping (3) Child Porn (1) Child Rape (3) Child Safety (18) Child Sexual Abuse (9) Child Violence (1) Classification of Crime (1) Club Drugs (1) College (1) Computer (4) Computer Criime (4) Computer Crime (8) Confessions (2) CONFESSIONS (7) Cons (2) Credit Card Scams (2) Crime (11) Crime Index (3) Crime Prevention Tips (14) Crime Tips (31) Criminal Activity (1) Criminal Behavior (3) Crimm (1) Cyber-Stalking (2) Dating Violence (1) Deviant Behavior (6) Domestic Violence (7) E-Scams And Warnings (1) Elder Abuse (9) Elder Scams (1) Empathy (1) Extortion (1) Eyeballing a Shopping Center (1) Facebook (9) Fakes (1) Family Security (1) Fat People (1) FBI (1) Federal Law (1) Financial (2) Fire (1) Fraud (9) FREE (4) Fun and Games (1) Global Crime on World Wide Net (1) Golden Rules (1) Government (1) Guilt (2) Hackers (1) Harassment (1) Help (2) Help Needed (1) Home Invasion (2) How to Prevent Rape (1) ID Theft (96) Info. (1) Intent (1) Internet Crime (6) Internet Fraud (1) Internet Fraud and Scams (7) Internet Predators (1) Internet Security (30) Jobs (1) Kidnapping (1) Larceny (2) Laughs (3) Law (1) Medician and Law (1) Megans Law (1) Mental Health (1) Mental Health Sexual (1) Misc. (11) Missing Cash (5) Missing Money (1) Moner Matters (1) Money Matters (1) Money Saving Tips (11) Motive (1) Murder (1) Note from Birdy (1) Older Adults (1) Opinion (1) Opinions about this article are Welcome. (1) Personal Note (2) Personal Security and Safety (12) Porn (1) Prevention (2) Price of Crime (1) Private Life (1) Protect Our Kids (1) Protect Yourself (1) Protection Order (1) Psychopath (1) Psychopathy (1) Psychosis (1) PTSD (2) Punishment (1) Quoted Text (1) Rape (66) Ravishment (4) Read Me (1) Recovery (1) Regret (1) Religious Rape (1) Remorse (1) Road Rage (1) Robbery (5) Safety (2) SCAM (19) Scams (62) Schemes (1) Secrets (2) Security Threats (1) Serial Killer (2) Serial Killer/Rapist (4) Serial Killers (2) Sexual Assault (16) Sexual Assault - Spanish Version (3) Sexual Assault against Females (5) Sexual Education (1) Sexual Harassment (1) Sexual Trauma. (4) Shame (1) Sociopath (2) Sociopathy (1) Spam (6) Spyware (1) SSN's (4) Stalking (1) State Law (1) Stress (1) Survival (2) Sympathy (1) Tax Evasion (1) Theft (13) this Eve (1) Tips (13) Tips on Prevention (14) Travel (5) Tricks (1) Twitter (1) Unemployment (1) Victim (1) Victim Rights (9) Victimization (1) Violence against Women (1) Violence. (3) vs. (1) Vulnerable Victims (1) What Not To Buy (2)