Archives - Malicious Code


Beware of malicious code sent through external media

Malicious code, also called SQL injection, is a type of attack that places unwanted files on your computer. They may automatically install themselves into your device without your explicit permission. One good way to avoid these attacks is by disabling AutoRun or AutoPlay for external media sources. This prevents external media infected with malicious code […]

Be on the lookout for shortened URLs

Hackers will often use shortened URLs in messages or posts to disguise malicious links. It can even have a misleading path accompanying it to make you believe it’s safe. There are several tools online where you can copy and paste the link, after which the tool will tell you where the link actually leads. If […]

Guard data entry points

With the advent of machine learning (ML), data-gathering and analysis is faster, easier and more scalable than ever. However, it also creates a new vulnerability. Malicious users can send bad data in through your collection system, in what is known as ML poisoning. Make sure your incoming data is isolated until it can be cleaned […]

Protect your computer – install or update your antivirus software

Antivirus software is designed to prevent malicious software programs from embedding on your computer. If it detects malicious code, like a virus or a worm, it works to disarm or remove it. Viruses can infect computers without users’ knowledge. Most types of antivirus software, including Total Defense, can be set up to update automatically.

Lookout for spoofed hyperlinks and websites

If you hover your cursor over any links in the body of the email, and the links do not match the text that appears when hovering over them, the link may be spoofed. Malicious websites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain […]

Enable an ad blocker on your browser

Many people use ad blockers simply to have a more pleasant browsing experience. As an added bonus, these applications limit the chance that you’ll encounter malicious ads, reducing the overall attack surface of your device. Search for trustworthy, well-reviewed plug-ins or add-ons through official browser stores.