Archives - Malicious Software


If someone is offering a game for free on a forum, it could contain malware

A general rule of thumb is: “If it’s free, it’s probably too good to be true.” Hackers have been lacing game files with cryptomining malware that could steal your information and affect your computer’s performance. Be sure to only download files like games from reliable sources.

Use discretion when installing third party apps

When you download a new app onto your phone, that program often requests access to the information on your device. If you deny access, you might be limited in what you can do on the app, or you might not even be able to use it at all. For this reason, you should use discretion […]

Be cautious when public charging mobile devices

Avoid connecting your smartphone to any computer or charging station that you do not control, such as a charging station at an airport terminal or a shared computer at a library. Connecting a mobile device to a computer using a USB cable can allow software running on that computer to interact with the phone in […]

Don’t install anything you didn’t specifically go looking for

During the course of web browsing, you may find yourself implored by a popup ad to install something, often a piece of security software. A good rule of thumb here is to just avoid installing anything you didn’t go looking for. That will save you the trouble of downloading potentially risky software that won’t provide […]

Be wary of third-party applications on social platforms

Third-party applications may provide entertainment or functionality, but use caution when deciding which applications to enable. Avoid applications that seem suspicious, and modify your settings to limit the amount of information the applications can access.

Be wary of publicly accessible computers

Cybercriminals may have infected these computers with viruses or install malicious software One example is keylogger malware which, when installed, captures the keystrokes of the computer’s users and sending this information to criminals via email. Through this malware, criminals are able to receive users’ personal information, such as name, credit card numbers, birthdates, and passwords.