SlideShare a Scribd company logo
1 of 11
• Fake ads
• Browsing too deep in search engine results
• Impersonating websites
• Social media scams
• “Scareware” pop-up windows
• E-mail attachments/scams
• YouTube Scams
• Outdated AV (Antivirus) software/Windows Updates
Malware – (short for malicious software) is software, script, or code designed to
disrupt computer operation, gather sensitive information, or gain unauthorized access
to computer systems.
Beware of fake ads! There are a multitude of these ads that trick you into doing something
not related to what you originally intended to do.
This ad wants you to run a scan for
“Windows errors” before you continue.
These ads want to trick you to download
their product instead of the one you
originally intended.
There are also fake ads on Google! While searching CCleaner, a free product, an
ad comes up on the right-hand side that wants you to pay $30 for it’s product.
Oh, they’re not just on Google
search, they’re everywhere!
When you search a subject, do you go on-and-on through pages of search results to find
answers? Well, that may not be a good thing! The deeper you go, the more you’ll find
pages un-related to your initial result, making a higher risk of accessing an infected
website. They are easy to detect as most of the time they do not make sense and it’s title
and description is entirely unrelated to your initial search. Use common sense!
Here’s some deep search results for
“Lactose Intolerance”
Note: Nothing about this result
makes any sense! Should you
click on it? NO
“By Newton who discovered that an apple
will had read The Exile but.”
Keep a look-out for websites that impersonate legitimate websites. They are fraudulent.
Normally it’s easy to notice the poor grammar, certificate warnings, and broken links.
Most common ways of stumbling on an impersonating website is falling for a scam, either
on Facebook or in an e-mail. It’s also common to find them in a deep search listing.
Here’s a common scam that impersonates
Southwest Airlines, generously giving out free
tickets. By entering your e-mail you’ll quickly
realize there’s no free tickets but an inbox full of
spam e-mail instead. Sweet!
TIP: Always pay attention to the URL in the
address bar! If it doesn’t relate to domain of the
website, in this case, southwestairlines.com, it’s
highly likely that it’s an impersonation!
Everyone uses social media today, even your grandma, making it a play ground for scammers.
These scams can lead to anything! Compromised accounts, malware, fraud, or e-mail spam.
1. Don’t trust a post, message, or invite just because it comes from a friend. Their
account could have been compromised, or they were tricked into clicking on a scam.
2. Your like and share are a valuable personal recommendation to your friends and
family. Please use them cautiously. Do a search to check out whether if something is
valid before sharing it.
3. Be very suspicious of offers for free stuff, especially ones that start with you having
to like or share something.
4. Don’t follow links that accompany some hysterical or generic text such as “OMG!!
CAN YOU BELIEVE THIS?”
5. Avoid links that promise some current event “scoop” such as “Whale on a house” or
“Osama Bin Laden death video”
6. There is no application that allows you to see who has been viewing your page.
Never click on a link to an app that promises that functionality. You’ll regret it.
7. Don’t fall for chain “sharing”. No hospital will donate a dollar towards every share of
a child in a hospital bed.
The most common way that a virus gets installed onto a system is by scaring you that
something is wrong with your computer, tricking you to download or buy its product to “fix it”.
Popular ways to avoid this:
Nothing can detect that you have a
virus on your system EXCEPT for the
antivirus software running on your
computer! If anything else does, it
should be avoided by all costs!
If you ever encounter this “Scareware”, do not interact with the window. Even
clicking the “X”! Just by doing that, it is coded to silently install it’s malware on
your computer. To avoid this, shut down your computer instead.
Do not scan your computer for
registry errors. It will not improve
system performance or make it
faster. This is a very popular tactic
to install malware on your
computer by the large volume of
fake software available.
Quick tip: Windows Security Center is not an antivirus and will not
tell you that there are errors with your computer or a malware
infection. It is actually a management tool of your computer’s
security software. If you get a “virus” notification from it, don’t
interact and do a virus scan immediately with your antivirus!
This is a very popular, yet annoying tactic for oversea agencies to install malware on your
computer or commit fraud.
However, it’s easy to avoid. If an e-mail
comes in with no subject and a single
link, it’s spam. If an e-mail comes in
with poor grammar that you have
an inheritance from a Nigerian prince,
it’s a scam. Simply delete and forget!
But what if it comes from a friend?
How do you know if it’s legitimate?
Call them and ask!
It’s common to click on a video on YouTube claiming to be a full movie or your favorite show
but only plays a still image, asking you to refer to the link in the description to see the full
thing, only to find a website full of surveys to fill out. By the end of it, your inbox is full of
spam and your computer is full of malware. A lose/lose situation!
How to avoid this?
Don’t search for free movies or full TV episodes
on YouTube! You simply won’t find them! Not
only is it illegal without discretion for them to be
uploaded, it’s also against YouTube’s ToS. They
are usually removed as soon as they are
uploaded.
It doesn’t just happen with searching for
movies, it can also be breaking news stories or
just about anything that will get a lot attention.
Always look at the ratings before you click on
the video. Normally the fake videos are rated
very low.

More Related Content

What's hot

Safety&Ethics
Safety&EthicsSafety&Ethics
Safety&EthicsCompApps
 
Final paper
Final paperFinal paper
Final paperJDonpfd3
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009Symantec
 
#KCSafeOnline: A free forum about online safety for parents
#KCSafeOnline: A free forum about online safety for parents#KCSafeOnline: A free forum about online safety for parents
#KCSafeOnline: A free forum about online safety for parentsKSHB
 
Justice for Mms sex scandal victims
Justice for Mms sex scandal victimsJustice for Mms sex scandal victims
Justice for Mms sex scandal victimsBlackprism
 
Jessica guevara
Jessica guevaraJessica guevara
Jessica guevarajessica97
 
Internet safety
Internet safetyInternet safety
Internet safetyBOAMEDIA
 
Teen safe2017appblacklist slideshare
Teen safe2017appblacklist   slideshareTeen safe2017appblacklist   slideshare
Teen safe2017appblacklist slideshareTeenSafe
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devicesErnest Staats
 

What's hot (11)

Safety&Ethics
Safety&EthicsSafety&Ethics
Safety&Ethics
 
Final paper
Final paperFinal paper
Final paper
 
Spam!
Spam!Spam!
Spam!
 
How to remove fanli90.cn
How to remove fanli90.cnHow to remove fanli90.cn
How to remove fanli90.cn
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009
 
#KCSafeOnline: A free forum about online safety for parents
#KCSafeOnline: A free forum about online safety for parents#KCSafeOnline: A free forum about online safety for parents
#KCSafeOnline: A free forum about online safety for parents
 
Justice for Mms sex scandal victims
Justice for Mms sex scandal victimsJustice for Mms sex scandal victims
Justice for Mms sex scandal victims
 
Jessica guevara
Jessica guevaraJessica guevara
Jessica guevara
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Teen safe2017appblacklist slideshare
Teen safe2017appblacklist   slideshareTeen safe2017appblacklist   slideshare
Teen safe2017appblacklist slideshare
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devices
 

Viewers also liked

Introducing Packaging Textile Controller MAXVU
Introducing Packaging Textile Controller MAXVUIntroducing Packaging Textile Controller MAXVU
Introducing Packaging Textile Controller MAXVUKevin Anderson
 
Prototyping for Business Outcomes at ModevUX
Prototyping for Business Outcomes at ModevUXPrototyping for Business Outcomes at ModevUX
Prototyping for Business Outcomes at ModevUX3Pillar Global
 
Patrick Seguin Experience
Patrick Seguin ExperiencePatrick Seguin Experience
Patrick Seguin ExperiencePatrickSeguin
 
Psychological Issues and the law
Psychological Issues and the lawPsychological Issues and the law
Psychological Issues and the lawDoug Aaron
 
All-in-one monitoring solution for DevOps & IT
All-in-one monitoring solution for DevOps & ITAll-in-one monitoring solution for DevOps & IT
All-in-one monitoring solution for DevOps & ITRex Antony Peter
 
El software y el hardware bb
El software y el  hardware bbEl software y el  hardware bb
El software y el hardware bbJhonatan Henao
 
The Five Stages of Accepting Negative Customer Feedback - Jessica Hall's Pres...
The Five Stages of Accepting Negative Customer Feedback - Jessica Hall's Pres...The Five Stages of Accepting Negative Customer Feedback - Jessica Hall's Pres...
The Five Stages of Accepting Negative Customer Feedback - Jessica Hall's Pres...3Pillar Global
 
Kroskulturalno istraživanje: odnos kvantiteta porodičnih interakcija i zadovo...
Kroskulturalno istraživanje: odnos kvantiteta porodičnih interakcija i zadovo...Kroskulturalno istraživanje: odnos kvantiteta porodičnih interakcija i zadovo...
Kroskulturalno istraživanje: odnos kvantiteta porodičnih interakcija i zadovo...Dijana Sulejmanović
 
Managing change in today's ever changing world of work
Managing change in today's ever changing world of workManaging change in today's ever changing world of work
Managing change in today's ever changing world of workCaleb Stick
 
Top 10 reasons to switch to the Nokia Lumia 1520
Top 10 reasons to switch to the Nokia Lumia 1520Top 10 reasons to switch to the Nokia Lumia 1520
Top 10 reasons to switch to the Nokia Lumia 1520Antony Worsley
 
Psychological Issues Within Law Enforcement
Psychological Issues Within Law EnforcementPsychological Issues Within Law Enforcement
Psychological Issues Within Law EnforcementDoug Aaron
 
How to Avoid Getting Malware on your Computer
How to Avoid Getting Malware on your ComputerHow to Avoid Getting Malware on your Computer
How to Avoid Getting Malware on your ComputerJillian Stone
 
DigitalRiverBrandsReport
DigitalRiverBrandsReportDigitalRiverBrandsReport
DigitalRiverBrandsReportKate Roe
 
Automated Performance Testing for Desktop Applications by Ciprian Balea
Automated Performance Testing for Desktop Applications by Ciprian BaleaAutomated Performance Testing for Desktop Applications by Ciprian Balea
Automated Performance Testing for Desktop Applications by Ciprian Balea3Pillar Global
 

Viewers also liked (20)

Introducing Packaging Textile Controller MAXVU
Introducing Packaging Textile Controller MAXVUIntroducing Packaging Textile Controller MAXVU
Introducing Packaging Textile Controller MAXVU
 
Prototyping for Business Outcomes at ModevUX
Prototyping for Business Outcomes at ModevUXPrototyping for Business Outcomes at ModevUX
Prototyping for Business Outcomes at ModevUX
 
Cv 201503 eng_short
Cv 201503 eng_shortCv 201503 eng_short
Cv 201503 eng_short
 
Patrick Seguin Experience
Patrick Seguin ExperiencePatrick Seguin Experience
Patrick Seguin Experience
 
Psychological Issues and the law
Psychological Issues and the lawPsychological Issues and the law
Psychological Issues and the law
 
All-in-one monitoring solution for DevOps & IT
All-in-one monitoring solution for DevOps & ITAll-in-one monitoring solution for DevOps & IT
All-in-one monitoring solution for DevOps & IT
 
El software y el hardware bb
El software y el  hardware bbEl software y el  hardware bb
El software y el hardware bb
 
Content is King
Content is KingContent is King
Content is King
 
Presentation1 1
Presentation1 1Presentation1 1
Presentation1 1
 
The Five Stages of Accepting Negative Customer Feedback - Jessica Hall's Pres...
The Five Stages of Accepting Negative Customer Feedback - Jessica Hall's Pres...The Five Stages of Accepting Negative Customer Feedback - Jessica Hall's Pres...
The Five Stages of Accepting Negative Customer Feedback - Jessica Hall's Pres...
 
KONSTANTINOS' EXPERIENCE
KONSTANTINOS' EXPERIENCEKONSTANTINOS' EXPERIENCE
KONSTANTINOS' EXPERIENCE
 
Kroskulturalno istraživanje: odnos kvantiteta porodičnih interakcija i zadovo...
Kroskulturalno istraživanje: odnos kvantiteta porodičnih interakcija i zadovo...Kroskulturalno istraživanje: odnos kvantiteta porodičnih interakcija i zadovo...
Kroskulturalno istraživanje: odnos kvantiteta porodičnih interakcija i zadovo...
 
Managing change in today's ever changing world of work
Managing change in today's ever changing world of workManaging change in today's ever changing world of work
Managing change in today's ever changing world of work
 
Top 10 reasons to switch to the Nokia Lumia 1520
Top 10 reasons to switch to the Nokia Lumia 1520Top 10 reasons to switch to the Nokia Lumia 1520
Top 10 reasons to switch to the Nokia Lumia 1520
 
Psychological Issues Within Law Enforcement
Psychological Issues Within Law EnforcementPsychological Issues Within Law Enforcement
Psychological Issues Within Law Enforcement
 
How to Avoid Getting Malware on your Computer
How to Avoid Getting Malware on your ComputerHow to Avoid Getting Malware on your Computer
How to Avoid Getting Malware on your Computer
 
Humor u rebt u
Humor u rebt uHumor u rebt u
Humor u rebt u
 
DigitalRiverBrandsReport
DigitalRiverBrandsReportDigitalRiverBrandsReport
DigitalRiverBrandsReport
 
Automated Performance Testing for Desktop Applications by Ciprian Balea
Automated Performance Testing for Desktop Applications by Ciprian BaleaAutomated Performance Testing for Desktop Applications by Ciprian Balea
Automated Performance Testing for Desktop Applications by Ciprian Balea
 
Kbt u radu sa prasuicidantima
Kbt u radu sa prasuicidantimaKbt u radu sa prasuicidantima
Kbt u radu sa prasuicidantima
 

Similar to How to Avoid Getting Malware on Your Computer

CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptJOHN BABATUNDE LEE
 
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Celia Bandelier
 
Protecting your pc in the new year
Protecting your pc in the new yearProtecting your pc in the new year
Protecting your pc in the new yearMichael Wells
 
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...John Bambenek
 
Week 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threatsWeek 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threatsRay Brannon
 
Marti digital citizen presentation
Marti digital citizen presentationMarti digital citizen presentation
Marti digital citizen presentationRay Brannon
 
Week 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threatsWeek 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threatsRay Brannon
 
Internet issues
Internet issuesInternet issues
Internet issuesCJ900
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
Protecting Yourself from Cyber Threats
Protecting Yourself from Cyber ThreatsProtecting Yourself from Cyber Threats
Protecting Yourself from Cyber ThreatsRay Brannon
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSedrianrheine
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-securityrobert mota
 
Living in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxLiving in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxFroilan Cantillo
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook securityErnest Staats
 
Becybersmart
BecybersmartBecybersmart
BecybersmartVelma
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 

Similar to How to Avoid Getting Malware on Your Computer (20)

CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
 
Protecting your pc in the new year
Protecting your pc in the new yearProtecting your pc in the new year
Protecting your pc in the new year
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Week 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threatsWeek 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threats
 
Marti digital citizen presentation
Marti digital citizen presentationMarti digital citizen presentation
Marti digital citizen presentation
 
Week 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threatsWeek 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threats
 
Internet issues
Internet issuesInternet issues
Internet issues
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Major Computer Virus Types to Watch Out
Major Computer Virus Types to Watch OutMajor Computer Virus Types to Watch Out
Major Computer Virus Types to Watch Out
 
Protecting Yourself from Cyber Threats
Protecting Yourself from Cyber ThreatsProtecting Yourself from Cyber Threats
Protecting Yourself from Cyber Threats
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-security
 
Living in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxLiving in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptx
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
Becybersmart
BecybersmartBecybersmart
Becybersmart
 
School presentation
School presentationSchool presentation
School presentation
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

How to Avoid Getting Malware on Your Computer

  • 1.
  • 2. • Fake ads • Browsing too deep in search engine results • Impersonating websites • Social media scams • “Scareware” pop-up windows • E-mail attachments/scams • YouTube Scams • Outdated AV (Antivirus) software/Windows Updates
  • 3. Malware – (short for malicious software) is software, script, or code designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems.
  • 4. Beware of fake ads! There are a multitude of these ads that trick you into doing something not related to what you originally intended to do. This ad wants you to run a scan for “Windows errors” before you continue. These ads want to trick you to download their product instead of the one you originally intended. There are also fake ads on Google! While searching CCleaner, a free product, an ad comes up on the right-hand side that wants you to pay $30 for it’s product. Oh, they’re not just on Google search, they’re everywhere!
  • 5. When you search a subject, do you go on-and-on through pages of search results to find answers? Well, that may not be a good thing! The deeper you go, the more you’ll find pages un-related to your initial result, making a higher risk of accessing an infected website. They are easy to detect as most of the time they do not make sense and it’s title and description is entirely unrelated to your initial search. Use common sense! Here’s some deep search results for “Lactose Intolerance” Note: Nothing about this result makes any sense! Should you click on it? NO “By Newton who discovered that an apple will had read The Exile but.”
  • 6. Keep a look-out for websites that impersonate legitimate websites. They are fraudulent. Normally it’s easy to notice the poor grammar, certificate warnings, and broken links. Most common ways of stumbling on an impersonating website is falling for a scam, either on Facebook or in an e-mail. It’s also common to find them in a deep search listing. Here’s a common scam that impersonates Southwest Airlines, generously giving out free tickets. By entering your e-mail you’ll quickly realize there’s no free tickets but an inbox full of spam e-mail instead. Sweet! TIP: Always pay attention to the URL in the address bar! If it doesn’t relate to domain of the website, in this case, southwestairlines.com, it’s highly likely that it’s an impersonation!
  • 7. Everyone uses social media today, even your grandma, making it a play ground for scammers. These scams can lead to anything! Compromised accounts, malware, fraud, or e-mail spam.
  • 8. 1. Don’t trust a post, message, or invite just because it comes from a friend. Their account could have been compromised, or they were tricked into clicking on a scam. 2. Your like and share are a valuable personal recommendation to your friends and family. Please use them cautiously. Do a search to check out whether if something is valid before sharing it. 3. Be very suspicious of offers for free stuff, especially ones that start with you having to like or share something. 4. Don’t follow links that accompany some hysterical or generic text such as “OMG!! CAN YOU BELIEVE THIS?” 5. Avoid links that promise some current event “scoop” such as “Whale on a house” or “Osama Bin Laden death video” 6. There is no application that allows you to see who has been viewing your page. Never click on a link to an app that promises that functionality. You’ll regret it. 7. Don’t fall for chain “sharing”. No hospital will donate a dollar towards every share of a child in a hospital bed.
  • 9. The most common way that a virus gets installed onto a system is by scaring you that something is wrong with your computer, tricking you to download or buy its product to “fix it”. Popular ways to avoid this: Nothing can detect that you have a virus on your system EXCEPT for the antivirus software running on your computer! If anything else does, it should be avoided by all costs! If you ever encounter this “Scareware”, do not interact with the window. Even clicking the “X”! Just by doing that, it is coded to silently install it’s malware on your computer. To avoid this, shut down your computer instead. Do not scan your computer for registry errors. It will not improve system performance or make it faster. This is a very popular tactic to install malware on your computer by the large volume of fake software available. Quick tip: Windows Security Center is not an antivirus and will not tell you that there are errors with your computer or a malware infection. It is actually a management tool of your computer’s security software. If you get a “virus” notification from it, don’t interact and do a virus scan immediately with your antivirus!
  • 10. This is a very popular, yet annoying tactic for oversea agencies to install malware on your computer or commit fraud. However, it’s easy to avoid. If an e-mail comes in with no subject and a single link, it’s spam. If an e-mail comes in with poor grammar that you have an inheritance from a Nigerian prince, it’s a scam. Simply delete and forget! But what if it comes from a friend? How do you know if it’s legitimate? Call them and ask!
  • 11. It’s common to click on a video on YouTube claiming to be a full movie or your favorite show but only plays a still image, asking you to refer to the link in the description to see the full thing, only to find a website full of surveys to fill out. By the end of it, your inbox is full of spam and your computer is full of malware. A lose/lose situation! How to avoid this? Don’t search for free movies or full TV episodes on YouTube! You simply won’t find them! Not only is it illegal without discretion for them to be uploaded, it’s also against YouTube’s ToS. They are usually removed as soon as they are uploaded. It doesn’t just happen with searching for movies, it can also be breaking news stories or just about anything that will get a lot attention. Always look at the ratings before you click on the video. Normally the fake videos are rated very low.