How to Protect Yourself on the Modern Internet
There is a secret war inside the computer, and the prize is your bank account. It did not start that way. Many viruses were originally little more than jokes. One of the first virus, Elk Cloner oddly named, simply displayed a poem written by its creator. Unfortunately, the current virus and other attacks - collectively known as malware - clearly answer the portfolio, said Brendan Ziolo, vice president of marketing at Kindsight, a security company Ottawa, Ontario-based. "What has changed is that the entire market threatens the computer has really become a big business for hackers". In the year ending July 2012, the security firm Symantec estimates that malware and other Internet users Cybercrime to cost over $ 110 million worldwide.
What is malware and how I can stop it? "It 's good for everyone to have at least a basic understanding of the threats and problems that can be found online," says Ryan Naraine, an enthusiast of social media, and journalist who specializes in security issues Internet and computers. In other words, know your enemy.
VirusWhat it is: The term "virus" is often used as a catch, but Symantec says that a true virus infects documents and applications.What it does: When infected files are shared, the virus comes along for the ride. When the file is opened, the virus infects other files on the host computer.Why it's bad: The infected file may become unusable. The virus can also infect system files or install malware. "If your computer has a virus, not feeling well, and not working properly," says Ziolo.
WormsWhat it is: if a virus needs human assistance in kind to spread, the worm spreads by itself - and can so quickly. In 2001, a worm called Code Red infected more than 250,000 computers in nine hours.What it does: Think of a worm as a messenger: the worm is "payload" that causes chaos.Why it's bad: This payload can be anything from a virus that damages the system keyloggers that steal passwords as you type.
TrojanWhat it is: As the name suggests, a Trojan poses as an application or website you want, hiding their true intentions.What it does: when the program is run, the Trojan starts playing his secret plan to infect your computer or steal data.Why It's Bad: Trojan port virtually any type of malware you can imagine, from keyloggers botnet infections. An infamous Trojan called Zeus gave multiple lots, including botnets and bank information stealing programs.
BotnetWhat it is: A botnet is a network of computers controlled remotely, sometimes numbering in the millions.What it does: The botnet infection turns your computer into a zombie, which allows a hacker to control it without your knowledge.Why it's bad: A botnet is created a virtual army of zombies capable of causing serious damage. "Every team is sending a lot of e-mails, but if there are millions of computers in the botnet, which is a lot of spam," says Ziolo. "Millions of computers that perform click fraud announcement could mean millions of dollars."
RootkitWhat it is: A rootkit is named taormina gives a "root access" to a hacker - in other words, total control.What it does: While a botnet infection gives a hacker some control over his team, a rootkit allows total control, like hackers properties.Why it's bad: Difficult to detect or remove a rootkit thief gives free access to install other malicious programs or recover important files. Most people get to know when Sony rootkit hidden including one on music CDs that installed security software on your PC.
Adware and SpywareWhat is often downloaded as part of the free software or a toolbar for your web browser, adware displays advertisements on spyware application or a browser and monitor their behavior.What it does: adware that can display advertisements in an application or cover competing ads on a website with it. Spyware usually track Web browsing, but can also store personal information.Why it's bad: What makes these malware is its lack of consent. "What defines the spyware or adware is that you're doing something you did not know," said Ziolo.
Scareware and ransomwareWhat is sometimes the threat of damage to your computer is what it takes for an unscrupulous person to make money, and that's exactly what these programs are about.What it does: Scareware displays a pop-up warning of a malicious virus running rampant in the system, offers to save the day - if you buy this antivirus application at this time. Ransomware is darker - you can encrypt files or block access to the system by demanding payment in exchange for the transfer of full use of your computer.Why it's bad: you really need to tell you what's wrong?
ProtectThese threats are no longer limited to your computer. Anti-malware protection is important for mobile devices as it is for your laptop. "The smartphone, tablet, gaming system - we are all vulnerable," says Ziolo. Each device connected to the Internet is in danger. 'The solution? Armed with the knowledge to begin with. This is a multi-layered approach to security that includes knowledge, running security software, and then, the best practices to avoid malware. Sharing is sexy
0 comments for this post
Leave a reply