Cybersecurity Threats: Adware, Phishing, Viruses, and Trojans
What is Adware?
Adware is a type of free software supported by advertisements that show up in pop-up windows or on a toolbar on your computer or browser. Most adware is annoying, but safe. However, some adware is used to gather your personal information, track the websites you visit, or even record your keystrokes.
Where Does Adware Come From?
Just like spyware, adware is most often built into free software, but can also be installed on your browser or operating system through a security hole.
How to Recognize Adware
Your device is probably infected with adware if you start seeing ads popping up in applications where you hadn’t seen them before. Pop-ups can also show up on your computer’s desktop even when you’re not browsing the Internet. Additionally, your browser’s homepage may have been changed.
How to Remove Adware
Before removing adware from your device, be sure to back up any important files that you want to keep safe. Then use antivirus or adware removal software to scan for and remove any adware that might be hiding on your device.
How to Prevent Adware
- Ensure that your browser, operating system, and software have the latest updates and security patches.
- Turn on a firewall when using the Internet.
What is Phishing?
Phishing is a deceptive approach that cybercriminals use to trick you into revealing personal information, such as passwords or credit card, social security, and bank account numbers. They do this by sending you fake emails or directing you to a fake website.
Where Does Phishing Come From?
Phishing messages seem to be from legitimate organizations like PayPal, UPS, a government agency, or your bank; however, these are in fact clever cons. The emails politely request updates, validation, or confirmation of account information, often suggesting that there is a problem. You’re then redirected to a fake site and tricked into entering account information, which can result in identity theft.
How to Recognize Phishing
You get messages asking you to reveal personal information, usually via email or via a website.
How to Remove Phishing
While phishing lures can’t be “removed,” they can definitely be detected. Monitor your website and be aware of what should and shouldn’t be there. If possible, change the core files of your website on a regular basis.
How to Prevent Phishing
- Have good habits and don’t respond to links in unsolicited emails or on Facebook.
- Don’t open attachments from unsolicited emails.
- Protect your passwords and don’t reveal them to anyone.
- Don’t give sensitive information to anyone—on the phone, in person, or through email.
- Look at a website’s URL (web address). In many phishing cases, the web address may look legitimate, but the URL may be misspelled or the domain may be different (.com when it should be .gov).
- Keep your browser up to date and apply security patches.
What is a Virus?
A computer virus is a program or piece of code that is loaded onto your computer without your knowledge or permission. Some viruses are merely annoying, but most viruses are destructive and designed to infect and gain control over vulnerable systems. A virus can spread across computers and networks by making copies of itself, just like a biological virus passes from person to person.
Where Does a PC Virus Come From?
Viruses are usually hidden in a commonly used program, such as a game or PDF viewer, or you may receive an infected file attached to an email or from another file you downloaded from the Internet. As soon as you interact with the file (run the program, click on an attachment, or open the file), the virus runs automatically. The code can then copy itself to other files and make changes on your computer.
How to Recognize a Virus
Your Internet connection might be slow or non-existent. It’s common for your antivirus and/or firewall protection to disappear or be disabled. Computers infected by viruses are even capable of acting on their own, executing actions without you knowing.
How to Remove a Virus
Remove all temporary files and run a virus scan using antivirus software. If any viruses are detected, delete them.
How to Prevent Viruses
- Avoid programs from unknown sources.
- Don’t open attachments from unsolicited email or in Facebook.
- Only download apps from Google’s official Android Market.
- Secure your phone with Avast Free Mobile Security.
What is a Trojan Horse?
A Trojan Horse is a type of virus that pretends to be something useful, helpful, or fun while actually causing harm or stealing data.
Where Does a Trojan Come From?
Trojans often are spread via an infected email attachment or a download that hides in free games, applications, movies, or greeting cards.
How to Recognize a Trojan
Your computer will often slow down because of the burden on the processor.
How to Remove a Trojan
It’s best to use a reliable antivirus solution that can detect and wipe out any Trojans on your device. When removing Trojans manually, be sure to remove any programs from your computer that are affiliated with the Trojan.
How to Prevent Trojans
- Avoid opening unknown files attached to email. These have extensions such as .exe, .vbs, and .bat.
- Maintain up-to-date antivirus protection, preferably with a firewall.