The Love Bug Virus

Love Bug VirusSounding like a potentially wonderful thing, the “Love Bug” was a very destructive virus. Sometimes call the “ILove You” or “LoveLetter” virus, it was created by a young man in Manila and, in May 2000, shut down millions of computers in the United States, most of Europe and other parts of the world.

This type of virus, revolutionary at the time, comes to the user in the form of an e-mail with the subject “I Love You”. It was actually a macro the runs in Microsoft Outlook. These are technically called worms because along with infecting the host computer, they replicate themselves and continue to other systems.
Read the rest of this entry »

Spyware

spyware.jpgSpyware is software designed to monitor computer activities and makes use of personal information. At a minimum, this may be used to monitor browsing habits and tailor advertising delivered on pages; on the other hand it may also be used to gather private details which may be used for identity theft. Other names for spyware or related programs include; malware, crimeware, PUPs (Potentially Unwanted Programs) , adware, dialers, keyloggers, or spybots.

Read the rest of this entry »

Phishing

Proceed with caution.Phishing is a malicious activity performed by online criminals. They want to steal your personal information or your credit card number so that they can launder money through your account. They may want to steal your home billing address or get your passwords so that they can access your personal information and steal your identity. If you do not want phishing activities to bother you then you should be on guard all the time.

Read the rest of this entry »

Antivirus

One of the most dreaded things for computer users is a virus. A virus may attack your computer in numerous ways, such as through your email. When you open your email be cautious, sometimes certain attachments may be harmful to your computer. When you click on the attachment, a virus may launch an attack on your computer. A virus can also attack you through an infected disc or downloaded program. When you insert an infected disc into your computer, or run an executable file, a virus may copy itself to the hard drive and replace other files. In some cases a virus can even attack you while you are surfing the Internet innocently! While you go through several web pages, you might run into a site that contains malicious code. You should be careful when visiting unknown sites that request you install any form of software. If you would like to protect yourself from viruses then you should get antivirus software.

Read the rest of this entry »

Trojan horse programs

Trojan horses or Trojans are malware that are disguised so that you will not notice their harmful intentions. The origin of the term is based on the story of the ancient Greek story about the Trojan horse. The Trojans hid inside the horse and offered the horse to their enemies, the city of Troy, as a gift. When their enemies received the gift, the Trojans came out and attacked their enemies while they were sleeping. Trojans on computers act the same way. When Trojans enter your computer, you will think that they are completely harmless. Whilst in the background, these Trojans will launch various attacks and open backdoors to your system. They may erase your files and or corrupt your system.

Read the rest of this entry »

Rootkits

CPU chip and pinMany Internet users nowadays have experienced a virus or two in their lives. Sometimes a virus attack may be minimal. It can infect a file and you will catch it before it spreads. Some virus attacks are severe and can cause your whole computer to crash in an instant. Computer attacks can come in many forms. You can be attacked by a virus, a worm, a Trojan horse, or whatever malware under the sun. One of the most dangerous forms of malware attack are those of rootkits.

With rootkits, malware can hide from anti-virus programs, malware detectors and even the operating system. There are several types of rootkits. There are rootkits that activate themselves each time your computer starts or rootkits that live on your computer memory. There are even rootkits that can stay on your computer in different modes like the safe mode. With this malware assisting technology, how can you save yourself from such?

Read the rest of this entry »

Grooming

Watching eye.People will always long for affection. They will want someone to talk to or someone to share their lives with. Nobody ever wants to feel lonely. With the Internet, people can address this need. People are able to communicate through chatting, blogging, and emailing. With these possibilities, people can make friends and build relationships online. All this may sound great but not everyone considers this to be an innocent activity.

Read the rest of this entry »

Key loggers

Malicious computer people around the world come up with all sorts of things to take advantage of others. They come up with viruses that can hack your computer for important information. They invent programs that can spy on your computer activity. They have even gone to the extent of stealing money through fraudulent wire transfers. One of the inventions that these malicious people are taking advantage of nowadays is key loggers.

Key loggers were first used for security and measurement means. Companies use key loggers to measure the productivity of certain clerical employees. If a company wants to find out if a clerical employee is doing a good job then using key loggers would be a great way to determine it. Security agencies also use key loggers to find out valuable information from criminals. If the FBI or the CIA is trying to track down on some criminal then they can use key loggers to find out what the criminal was typing on a certain computer. They can find out valuable information such as passwords and malicious threats to public safety.

What are key loggers anyway? They basically try to hack your key strokes so that important information can be gathered through what you type. They can check what you type and find out passwords, credit card numbers, and all sorts of valuable information. They will use the information to hack your computer, steal money from you, and even threaten you and your loved ones. Key loggers can come in the form of software or hardware. Some malicious people install them onto your keyboard so that they can find out what you are typing. There are also key loggers in the form of software that trace what information you type on your keyboard.

There is actually no way of stopping key loggers once they operate without cleaning your operating system. Many keyloggers actively prevent their own removal. If you want to make sure that you are not victimized by malicious key loggers then you will have to take preventive measures. Installing anti-spyware is important. This will prevent spyware from installing itself on your computer. You can also use firewalls to prevent unauthorized access to your computer. You should keep your anti-spyware and your firewalls up to date so that you can continuously stop malicious attacks on your computer.