Malwareaware

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 9 July 2013

Back To Basics.

Posted on 06:14 by Unknown
For this blog post, we will be going over 7 basic security tips to reduce the odds of your computer getting infected with malware.

This is a basic list, and it is easy for most computer users to read and follow.

1. Don't be click happy: When you are on the internet, you should not be clicking every link that you see. Proceed with caution when you are asked to click on a link such as those in an email. Even though the link looks harmless, you can be redirected to another website that will install malware on your computer.

I'm not saying don't click on anything, just be careful.

2. Passwords are meant to protect you: If you are using "password" as your password for anything, you might want to change that. Use long, complicated passwords that only you can remember, and change them often.

A good starting point is to change all your passwords once a year or whenever there is a security breach in one of the services or websites you use which requires a password.

3. Keep your security software on: Once you get online, it is not a time to be disabling your antivirus software. This is a tip that gamers in particular need reminding of. And me being a gamer myself, I know this quite well :D

Your security software is meant to remain on, it should not be bothering you when you are playing a game on your computer. The only time you should pay attention to your antivirus bugging you is if you have actually gotten onto a game which has malware.

4. Avoid P2P and Pirated software: P2P Stands for Person 2 Person, which in this case is file and program sharing. Pirated software is software that is obtained via illegal means such as getting a product key from someone else, or downloading and using product key generating software.

These software packages, while free, are often a surefire way to get infected. So take the hint, always obtain software legally and pay for it if it normally costs money.

5. Social Engineering Attacks are rampant: This somewhat ties in with tip #1. Popular Social networks such as Facebook and Twitter are being used to distribute malware via several means. These can include, but are not limited to: Infected websites, "videos" that you have to install an "update" to view, and in rare cases, malware that can fit in a twitter message without using any other means.

6. Not everyone is your friend: Just because there is a button that says something like "Click here to like me" does not mean that is something you should do. Your default answer should always be something such as "I do not even know you, why should I hit a button to like you?"

Because when you like somebody or something, you are also sharing information with them. So be careful what buttons you click.

7. Be cautious when using public Wi-Fi: Needless to say, McDonald's is not the place where you should be doing your online banking. Not only does such action make you look somewhat... odd, it also allows hackers with even inexpensive equipment to find out what you are doing, and if possible, steal info that can be used to steal your identity.

Thank You for reading. I invite users to comment with any questions or comments.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Passwords | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • How to remove System Doctor 2014
    There is a new rogue AV making the rounds on the web called System Doctor 2014. For those that have just started reading my blog or for thos...
  • What are Bitcoin Miners?
    For my first post about Bitcoins, and for what I wish to be my last about the subject, we are going to be talking about what Bitcoin miners ...
  • How to keep spies from monitoring you through your computer or your phone.
    Those of you in The United States of America have most likely heard about that whole IRS scandal and the accompanying scandals of wiretappin...
  • Spotlight on Malware: The Gruel Worm.
    It's been around since Windows 2000, but there still is not a way to remove this worm without formatting the hard drive. I speak of the ...
  • I am going to be a billionaire!
    For those of you that have been reading my blog for some time, you know I like to mess with scammers, fake tech support and the like. But th...
  • Use VBScript to pull a joke on your friends.
    Do you want to play a trick on your friends, family, or coworkers? Well this one's for you. You can make a fake piece of malware on your...
  • Spotlight on Malware: MyDoom
    The MyDoom Windows worm, also known as Novarg, and Shimgapi will be the subject of our focus for this post. The MyDoom worm was first discov...
  • CryptoLocker as of 11/3/2013
    If you have read my other posts on this, you know. But for those of you who do not, there is a piece of ransomware that has been making the ...
  • The Big Game: Who's on our side?
    I recently helped a friend of mine remove malware from their computer when she be one mused on how lonely my job must be. "It must be s...
  • Java: No more coffee for you.
    Odds are that every blogger that has a tight focus on computer security has authored a blog post about Java. So why am I wasting your time? ...

Categories

  • Android
  • History Of
  • iOS
  • Java
  • Macs
  • Passwords
  • Removal Guides
  • Spotlight On Malware
  • The CryptoLocker Saga
  • What Does It Mean?
  • What's in a name?
  • Windows

Blog Archive

  • ▼  2013 (151)
    • ►  November (10)
    • ►  October (5)
    • ►  September (15)
    • ►  August (22)
    • ▼  July (26)
      • Spotlight on Malware: ZeroAccess Rootkit.
      • Hitman Pro: What is it, and what does it do?
      • Posts of the Month: July 2013
      • To the spammers of my blog, past, present, and fut...
      • How to remove Attentive Antivirus (Rogue)
      • Explaining the fine line between Annoying Software...
      • Malware Now Taking Advantage of Royal Baby News.
      • How to remove the New Zealand E-Crime Lab Ransomware.
      • Mac OS X Ransomware going global.
      • How to remove the Ministry of Public Safety Canada...
      • How the web works: The Technology
      • How the web works: The History
      • How to remove the SweetPacks/SweetIM toolbar.
      • F.B.I. Ransomware now targeting Mac OS X
      • How to remove the Mandiant U.S.A. Cyber Security R...
      • How to remove Antivirus System (Rogue Antivirus)
      • First Q&A session details.
      • What to keep in mind when choosing your antivirus ...
      • My opinion of Data Dealer.
      • Spotlight On Malware: The Koobface Worm
      • Back To Basics.
      • Typosquatting: What it is and how to avoid it.
      • My opinion of Microsoft Windows Defender.
      • Spotlight on Malware: The Happy 99 worm.
      • Symbiosis in malware
      • Spotlight On Malware: Zeus
    • ►  June (17)
    • ►  May (25)
    • ►  April (15)
    • ►  March (7)
    • ►  February (6)
    • ►  January (3)
Powered by Blogger.

About Me

Unknown
View my complete profile