Phishing, Scams, Viruses and Trojan Horses – How to Protect Your Computer

July 22, 2014  - by 

With the proliferation of electronic devices that connect to the Internet, it becomes harder and harder to protect yourself and your computer from the possibility of dangerous or malicious programs destroying data or stealing personal private information. The problem is real, it is not an imaginary conspiracy theory made up by someone to sell you something. Businesses can receive hundreds or even thousands of malicious emails and other potential infections every day. Individuals, depending on the type of connection they have to the Internet, may see relatively few invasive attempts or as many as a business.

Genealogists may not be any smarter than the average computer user, but they have a lot more to lose. What would you do if your computer crashed right this instant?

To understand the problem, you first have to understand the terminology used to describe the problem, so some definitions are in order. Here are a few terms that are essential to understand:

Computer Virus: A computer virus is a program that can replicate (copy) itself inside one computer and also spread from computer to computer. The term is commonly used for all types of malicious and destructive computer programs, but technically the term only applies to programs that can spread by replication. Computer viruses work by attaching themselves to existing legitimate programs.

Malware: Short for “malicious software,” malware is a more general term than “computer virus” used to refer to all types of destructive or harmful programs and schemes.

Adware: Advertising-supported software or adware is any software package that automatically plays, displays or downloads advertisements to a computer. You may see these routinely as “pop-ups” or windows that pop-up when you go to a website. You can turn these off in your browser, but you may or may not determine that blocking pop-ups is more trouble than it is worth.

Spyware: Programs that appear to be innocuous, but are designed to gather personal, private information from your computer. If the program is designed to capture login and passwords, it is sometimes called a keylogger.

Keylogger: A program that is designed to log keystrokes on a computer in a manner that the user is unaware of the data capture, record them and transmit the information to another computer for use in a variety of ways. Some companies use this method to monitor their employees’ computer activities, but it can be used for illegal and malicious reasons.

Worms: Unlike computer viruses that use an existing program to spread, a computer worm can use a computer network to send copies of itself to other computers (nodes) on the network. Worms are always harmful even if they do nothing but copy themselves because they can ultimately use up all of the computer’s memory.

Trojan Horse: A program that seems desirable or even useful but is in reality designed to steal information or harm the computer system. The term comes from the Greek story of the Trojan War. Adware is a form of Trojan Horse program. The Trojan Horse often gets into your computer when you click on an unsolicited ad or email to download a “free” copy of a program.

Spyware: Also called privacy-invasive software, a type of malware that is installed on a computer to collect small pieces of information without the owner’s knowledge.

Scareware: A program designed to send you a message, typically that your computer is infected with various viruses or other problems. Never, never, never, respond to an unsolicited message about the status of your computer, your bank account, your Internet connection, or anything else about you or your computer. These messages are all scams.

Phishing: An unsolicited, fake message or email that appears to be legitimate asking you to send personal, private information such as credit card numbers, phone numbers, birth information (birth place, birth date), affiliation information (for example, when you graduated from high school), or any other type of information. These messages may have a genuine-looking logo or look like official letters. Again, never, never, never respond to an unsolicited message from anyone with any kind of information. Just clicking on the link may give the remote computer your personal information or, at least, tell the sender that they have a valid email address or that you are too naive to avoid their scam.

Crimeware: A more sophisticated system of stealing information from computer networks. Usually directed at businesses and larger networked organizations.

Rootkit: A program installed on your computer to allow someone remote access to your computer without your knowledge or permission. This can be as simple as a relative or member of your family that uses your computer without your permission by stealing your password and then using it to set up an account or user on your computer. Be aware of your computer’s use and activity.

This isn’t all the different problems but it will get you started with understanding the scope of the issues and problems with computer security.

Who are these people and what are they trying to accomplish? They are criminals, like vandals and graffiti artists, and they are doing one or more of the following:

  • Data Theft: Retrieving your computer passwords or credit card information.
  • Installing bad software on your computer.
  • Stealing files from your computer.
  • Random destruction, such as modification or deletion of files.
  • Crashing computers

There is no way to completely describe all of the variety of malware out there in the world today, but there are several simple rules you can observe to stop a great deal of the problem.

Rule #1: Have an up-to-date, reliable malware detection program on your computer. There are some programs that are provided by the operating system manufacturers, such as Microsoft, but there are also commercial programs commonly available.

Rule #2: Don’t be stupid. Use common sense. Don’t open unsolicited email, just delete it without opening. Don’t respond to pop-ups advertising programs you didn’t want. Never download a program without checking the reviews to see if it is a legitimate program or not.

Rule #3: Always have a more-than-adequate backup system for your files. Don’t routinely keep personal, private information, like credit card numbers, on your computer.

Rule#4: Don’t share your passwords. From time to time, change the standard passwords you use and make sure you record them off of your computer, on paper.

Rule#5: Keep your computer systems up-to-date and monitor their usage. Know who is using your computer, when it is being used, and how much.

You could go on and on with suggested rules, but fundamentally, you need to understand what you are doing when you go online.

Have a sense of balance about the whole problem of malware. Don’t get so caught up in worrying about computer security that you stop using your computer productively. Don’t burn down your house to stop the junk mail. Just learn to discern what is junk and what is not and take appropriate action. If you reply to unsolicited spam email, you are asking to be a victim.

This article is a re-post of an earlier blog post submitted by James Tanner on October 18, 2011.

 

Leave a Reply

Your email address will not be published. Required fields are marked *

Comments

    1. Actually, with the grade of password-guessing programs available, using passphrases is a much better option. You can achieve 30+ characters this way. There is also much less need to randomize things (like using numbers as letters), but a little is good.

  1. Es muy útil su comentario. Para tenerlo muy en cuenta, y todos los dias del año.Desde ya, muchas gracias.

    1. Translation of above comments: It is very useful to have your comments in mind every day of the year. Of course, thank you very much.

  2. Thank you for writing, I enjoyed you article because it’s very well explained. Few things want’s to share.

    An inexperienced user too had better keep the following in mind:
    1. Unhide file extension in Windows. To do so, open Folder Options, head to View tab, look into the “Hidden files and folders” section, enable the “Show hiden files…”.
    2. As for PUP/PUA (Potentially unwanted program) infection, scan the downloaded exe via an up-to-date virus protection or, Google’s Virustotal.com simply. Run the setup file on a VMware Station if one’s computer meets VM’s system requirements. Avoid unofficial even sponsored downware based search results from Yahoo & Bing.

  3. Rootkits are nasty. I remember this malware infected one of our PCs in the office. Then our IT manager installed couples of software including, scanners, antivirus (ESET Antivirus), even firewalls. So many software that he finally abled to remove it.

  4. Most of the users get tracked with the error code 0xc000000f it can be faced with the phishing attacks and similarly, all the trojan viruses can be attacked through the same process and with the help of antivirus, you can get rid of this problem.

  5. Above are the great ideas that have been suggested for protecting your computer or laptops, as these days pishing scams, viruses, malware, data breaches is all that we hear in the news.

  6. You shared very excellent information. It was a very helpful article for. Keep sharing more with us. I really told one thing you share regularly.

  7. I really said one thing is you share your personal and excellent knowledge with us that was the great thing. I really appreciate this thing.

  8. Points you raised very valid points in your post. It really happened some people do not have the right idea. But with your awesome tips, one can easily identify it. This post is discussing in an outstanding way. I like your way yo discussed your valid points and facts about this. I really said you share more and more articles.