Fr?m
A? th? Internet becomes more ?nd more integrated ?nt? everyday lives, w? m??t learn h?w t? defend ourselves against n?w types ?f online attacks.
Wh?l? viruses remain a threat, today?s hackers commonly ??? vicious multi-layered attacks, such ?? a worm ?n a chat message th?t displays a link t? a Web page infected w?th a Trojan horse. ?Worms? h??? b??n found th?t tunnel though programs, uncovering n?w vulnerabilities ?nd reporting th?m back t? hackers. Th? hackers th?n quickly assemble malware (malicious software) fr?m pre-m?d? components, exploiting th? vulnerability before th? majority ?f people ??n download a fix.
Below ??? w?ll find th? best tips th?t ??? ??n ?m?l?? t? protect yourself against th??? emerging sophisticated, multi-faceted threats.
Wh?t C?n Malware D? t? M? PC?
Malware opens up backdoors ?n infected systems, giving hackers direct access t? th? hijacked PC. In th?? scenario, a hacker ??n ??? th? infected PC t? upload personal information t? a remote system, ?r t? turn th? PC ?nt? a remotely controlled ?bot used ?n criminal activity.
Hackers ?r? designing th??r attacks t? target specific high-value victims instead ?f simply launching mass-mailing worms ?nd viruses. Th??? programs ?r? being ?r??t?d specifically f?r data theft.
Wh?t Ab??t P2P?
Peer-t?-peer (P2P) networking h?? become a launching pad f?r viruses. Attackers incorporate spyware, viruses, Trojan horses, ?nd worms ?nt? th??r free downloads. One ?f th? m??t d?ng?r??? features ?f many P2P programs ?? th? ?browse host? feature th?t allows others t? directly connect t? ???r computer ?nd browse through file shares.
P2P ??n accidentally give access t? logins, user IDs ?nd passwords; Quicken files ?nd credit reports; personal information such ?? letters, chat logs, cookies, ?nd emails; ?nd medical records ??? accidentally house ?n accessible folders ?n ???r PC. A? w?th email ?nd instant messages, viruses ?n P2P files ?r? capable ?f weaving th??r way through ?? many users ?? th?? ??n, stealing information ?nd delivering ?t t? cybercriminals wh? forge identities ?nd commit fraud.
Best Tips t? Defend Against Viruses ?nd Worms.
Y?? m??t safeguard ???r PC. Following th??? basic rules w?ll h?l? ??? protect ??? ?nd ???r family whenever ??? g? online.
1.Protect ???r computer w?th strong security software ?nd keep ?t updated. McAfee Total Protection f?r Small Business provides proven PC protection fr?m Trojans, hackers, ?nd spyware. It? integrated anti-virus, anti-spyware, firewall, anti-spam, anti-phishing, ?nd backup technologies work together t? combat today?s advanced multi-faceted attacks. It scans disks, email attachments, files downloaded fr?m th? Web, ?nd documents generated b? word processing ?nd spreadsheet programs.
2.U?? a security-conscious Internet service provider (ISP) th?t implements strong anti-spam ?nd anti-phishing procedures.
3.Enable automatic Windows updates ?r download Microsoft updates regularly t? keep ???r operating system patched against known vulnerabilities. Install patches fr?m ?th?r software manufacturers ?? soon ?? th?? ?r? distributed. A fully patched computer behind a firewall ?? th? best defense against Trojan ?nd spyware installation.
4.U?? caution wh?n opening attachments. Configure ???r anti-virus software t? automatically scan ?ll email ?nd instant message attachments. M?k? sure ???r email program doesn?t automatically open attachments ?r automatically render graphics, ?nd ensure th?t th? preview pane ?? turned ?ff. Never open unsolicited emails, ?r attachments th?t ????re n?t expecting?"even fr?m people ??? know.
5.B? careful wh?n engaging ?n peer-t?-peer (P2P) file-sharing. Trojans h?d? within file-sharing programs waiting t? b? downloaded. U?? th? same precautions wh?n downloading shared files th?t ??? d? f?r email ?nd instant messaging. Avoid downloading files w?th th? extensions .exe, .scr, .lnk, .bat, .vbs, .dll, .bin, ?nd cmd.
6.U?? security precautions f?r ???r PDA, cell phone, ?nd Wi-Fi devices. Viruses ?nd Trojans arrive ?? ?n email/IM attachment, ?r? downloaded fr?m th? Internet, ?r ?r? uploaded along w?th ?th?r data fr?m a desktop. Cell phone viruses ?nd mobile phishing attacks ?r? ?n th? beginning stages, b?t w?ll become more common ?? more people access mobile multimedia services ?nd Internet content directly fr?m th??r phones. Always ??? a PIN code ?n ???r cell phone, ?nd never install ?r download mobile software fr?m ?n unknown source.
7.Configure ???r instant messaging application correctly. M?k? sure ?t d??? n?t open automatically wh?n ??? fire up ???r computer.
8.Beware ?f spam-based phishing schemes. Don?t click ?n links ?n emails ?r IM.
9.Back up ???r files regularly ?nd store th? backups somewhere besides ???r PC. If ??? fall victim t? a virus attack, ??? ??n recover photos, music, movies, ?nd personal information l?k? tax returns ?nd bank statements.
10.Stay aware ?f current virus news b? checking sites l?k? McAfee Avert Threat Center.
Related Posts:
from your own site.
emma stone texas longhorns texas longhorns francesca woodman kennedy center honors neil diamond danny gokey
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.