- MALWARE VS. VIRUS: The first thing you need to know is that malware is a generic term used to describe any malicious program. If it's unwanted and insidious, it's malware. Even though they're often confused, malware is not the same as a virus, though a virus is a common form of malware. Viruses are pieces of unwanted code that latch on to legitimate programs and can self-replicate. They're often unwittingly spread though email attachments, USB thumb drives, and file sharing.
- WORMS: Like a virus, a worm self-replicates, but it doesn't need to attach itself to a host file. Worms burrow into your network looking for vulnerabilities to exploit and spread to other systems.
- TROJAN: Like the horse of Greek mythology, a trojan masquerades as something awesome—a psychedelic screensaver or card game, for instance—but hides a terrible surprise. In other words, it appears to be something that it's not. Trojans can't replicate themselves like a virus, but once you run or install a trojan, it gets to work opening back doors or whatever evil deed the author intended it to do.
- SPYWARE: Just what it sounds like, spyware is any unwanted program designed to spy on your activities. It might be a program that logs your keystrokes (keylogger) or tracking software that gather information about you without your knowledge or consent.
- ADWARE: To keep it short and simple, adware bombards you with ads. Some examples include random pop-ups, unwanted banner ads, and browser redirects.
Now that you know the difference between the different things that can take over your computer, here is how you avoid getting them in the first place.
The best protection against malware isn’t security software, it’s you, the user. You should consider antivirus software as your last line of defense, and if you really want to avoid malware—you should steer clear of high-risk situations altogether. Here are some tips:
- Above all else, keep your software up to date. It starts with Windows but extends to all of your system software, especially programs that connect to the Internet. If you have a lot of programs installed, Secunia PSI (free, bit.ly/DW9u) will sift through them and let you know which ones are out of date. It will even fetch updates for you.
- Be extra cautious when connecting to open Wi-Fi networks like the ones you find at coffee shops, airports, and other public places. It doesn’t take much effort for a hacker to set up a fake free Wi-Fi hotspot in hopes that you’ll connect to his laptop instead of the real hotspot.
- Whenever possible, try to avoid using someone else’s computer to check your webmail. Can you really trust that their system isn’t infected with a keylogger or a screen‑capture utility? It just isn’t worth the risk. If you simply must, don’t forget to log out.
- Finally, check the file extension before you open what you think is a JPEG or some other picture format. We’ve seen dirty executables hide behind picture icons. Right-click and select Properties, or configure Windows to “Show hidden files, folders, and drives” by opening a folder and going to Tools > Folder Options > View.
0 comments:
Post a Comment