Archives - Malicious Software


Don’t install anything you didn’t specifically go looking for

During the course of web browsing, you may find yourself implored by a popup ad to install something, often a piece of security software. A good rule of thumb here is to just avoid installing anything you didn’t go looking for. That will save you the trouble of downloading potentially risky software that won’t provide […]

Be wary of third-party applications on social platforms

Third-party applications may provide entertainment or functionality, but use caution when deciding which applications to enable. Avoid applications that seem suspicious, and modify your settings to limit the amount of information the applications can access.

Be wary of publicly accessible computers

Cybercriminals may have infected these computers with viruses or install malicious software One example is keylogger malware which, when installed, captures the keystrokes of the computer’s users and sending this information to criminals via email. Through this malware, criminals are able to receive users’ personal information, such as name, credit card numbers, birthdates, and passwords.

Avoid pirating software

Software piracy can often seem like a convenient way to get an application you need without having to pay for it. In addition to being unethical, it’s risky – there are no assurances that pirated software contains what it says it does or that it’s free from malware.

Never press an ‘Install’ button on the web

A lot of websites contain large “Install” buttons all but begging you to click them. You shouldn’t. They will usually give you adware or spyware instead of what you wanted or, worse, they’ll redirect you to a compromised website.

Beware of publicly accessible computers.

Hotel business centers, libraries, and cyber cafes provide computers that anyone can use. However, travelers cannot trust that these computers are secure. They may not be running the latest operating systems or have updated anti-virus software. Cyber criminals may have infected these machines with malicious viruses or install malicious software.