Archives - Malicious Code


Lookout for spoofed hyperlinks and websites

If you hover your cursor over any links in the body of the email, and the links do not match the text that appears when hovering over them, the link may be spoofed. Malicious websites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain […]

Enable an ad blocker on your browser

Many people use ad blockers simply to have a more pleasant browsing experience. As an added bonus, these applications limit the chance that you’ll encounter malicious ads, reducing the overall attack surface of your device. Search for trustworthy, well-reviewed plug-ins or add-ons through official browser stores.

Be very careful what you download

Carelessly downloading e-mail attachments can circumvent even the most vigilant anti-virus software. Never open an e-mail attachment from someone you don’t know and be wary of forwarded attachments from people you do know. They may have unwittingly advanced malicious code.

How is ransomware delivered?

Frequently ransomware is distributed through phishing emails or through drive-by downloads. Many times, phishing emails seem as though they have been sent from a genuine company or someone well-known to the victim and attract the user to click on a malicious link or open a malicious attachment. A drive-by download is a program that is […]

Disable external media AutoRun and AutoPlay features

Disabling AutoRun and AutoPlay features prevents external media infected with malicious code from automatically running on your computer.