Today,
you need to worry about security for your PC in a whole different way.
Spyware, adware, viruses and trojans are lurking online, waiting to
infect your computer.
Here is a list of top 10 security threats that you should be aware of, for preventing any such attacks to your PC.
SOCIAL ENGINEERING The number one threat to your computers security is you! Use common sense.
Dont take programs from strangers, dont go to crackz and torrents web
sites, and if your security software pops up a warning, READ IT before
you click.
IDENTITY THEFT Its not just about your computer when they use your credit cards, divert your paycheck, and change your vehicle registration.
A full-powered security suite should block all computer-related avenues for identity theft.
SPYWARE/TROJANS Spyware spies on everything you do and steals private infor-mation.
Trojan horse programs pretend to be useful but can turn your computer into a spam-spewing zombie.
Antispyware plus anti-malware should keep out these threats.
VIRUSES A
computer virus is a dangerous computer program with the characteristic
feature of being able to generate copies of itself, and thereby
spreading.
Additionally most computer viruses have a destructive payload that is activated under certain conditions.
Modern antivirus programs like Kaspersky and NOD32 are quite good in preventing viruses.
ADWARE
Simple adware pops up ads that get in your face while browsing net can destroy your computer.
Most of the adwares records your online activity, phones numbers, contacts and produces ads for you when you go online.
Up-to-date antispyware is the solution.
WEB EXPLOITS Some Web sites include malicious code to exploit vulnerabilities in your browser or operating system.
Just visiting the site can infect or damage your system if the
vulnerability hasnt been patched, so keep Automatic Updates always on.
HACKER ATTACK A hacker is a person who accesses computer files without authorisation, often destroying vast amounts of data.
Expert hackers dont have times to attack each computers individually.
They might broadcast a network virus or release a Trojan, but a personal attack is highly unlikely.
Your security suites, firewall and malware protection should keep you
WIRELESS ATTACK These
attacks attempt to penetrate a network by using wireless or evading
WLAN access control measures, like AP MAC filters and 802.1X port
access controls.
If youre not careful, anybody in range can mooch
bandwidth from your wireless network and can rum-mage through your
files, because they are inside your network.
Your routers WPA/WEP encryption can stop the mooching but you have to use it.
PHISHING MAIL Phishing
attacks use both social engineering and technical subterfuge to steal
consumers' personal identity data and financial account credentials.
Phishing messages pretend to be from eBay, PayPal, your bank, or the like.
If you log in to their fake sites, they steal your username and
password and youre sunk. However, both IE7 and Firefox 2 have phishing
detection built in.
SPAM MAIL Spam
by e-mail is a type of spam that involves sending identical or nearly
identical messages to thousands (or millions) of recipients.
Addresses of recipients are often harvested from Usenet postings or web
pages, obtained from databases, or simply guessed by using common names
and domains.
By definition, spam is sent without the permission of the recipients.