3. Boot Sector Viruses
Code executes before computer boots
Program Viruses
A program that runs in the background
Root Kits
tries to hide and use methods to avoid detection
Trojans
Steals info or allows remote access to your
computer
5. “A rootkit is a stealthy type of
software, typically malicious,
designed to hide the existence of
certain processes or programs from
normal methods of detection and
enable continued privileged
access to a computer” – Wikipedia
“Manual removal of a rootkit is often too
difficult for a typical computer user” –
Wikipedia
6.
7. “Hello I am from Microsoft, and we have
detected that your PC is causing errors on
our network. Can we call in remotely to your
computer and show you what is wrong?”
8. Avoid scams that use the Microsoft name fraudulently
Cybercriminals often use the names of well-known companies, like ours, in
their scams. They think it will convince you to give them money or your
personal information. While they usually use email to trick you, they
sometimes use the telephone, instead.
Common scams that use the Microsoft name
•Someone from "Microsoft Tech Support" calls to fix your computer
•"You have won the Microsoft Lottery"
•Microsoft "requires credit card information to validate your copy of Windows"
•"Microsoft" sends unsolicited email messages with attached security updates
Avoid these dangerous hoaxes
We do not send unsolicited email messages or make unsolicited phone calls to
request personal or financial information or fix your computer.
If you receive an unsolicited email message or phone call that purports to be
from Microsoft and requests that you send personal information or click
links, delete the message or hang up the phone.
Microsoft does not make unsolicited phone calls
to help you fix your computer!
9. You have not won the "Microsoft Lottery"
Microsoft customers are often targets of a scam that uses email messages to falsely promise money.
Victims receive messages claiming "You have won the Microsoft Lottery!" There is no Microsoft Lottery.
Delete the message.
If you have lost money to this scam, report it. You can also send the police report to Microsoft and we
will use it to help law enforcement catch the criminals who send out these e-mail messages.
To help protect yourself from these e-mail hoaxes, you can use the same general guidance that you use
to protect yourself from phishing scams.
Microsoft does not request credit card information to validate
your copy of Windows
We require that your copy of Windows is legitimate before you can obtain programs from the Microsoft
Download Center or receive software updates from Microsoft Update. Our online process that performs
this validation is called the Genuine Advantage Program. At no time during the validation process do
we request your credit card information.
In fact, we do not collect information that can be used to identify you such as your name, email
address, or other personal details.
To learn more, read the Genuine Microsoft software program privacy statement.
To learn more about the program in general, see Genuine Windows: frequently asked questions.
Microsoft does not send unsolicited communication about
security updates
When we release information about a security software update or a security incident, we send email
messages only to subscribers of our security communications program.
Unfortunately, cybercriminals have exploited this program by sending fake security communications that
appear to be from Microsoft. Some messages lure recipients to websites to download spyware or other
malicious software. Others include a file attachment that contains a virus. Delete the message. Do not
open the attachment.
11. Forwarded jokes, pictures, videos
May contain viruses and spyware
Links to viruses
Do not follow any links from emails from people
you know unless they explain exactly what it is.
Attachments with Viruses
Do not open any unknown attachment
“Phishing” emails
Fake emails from Banks, UPS, FedEx
14. Know your home page.
Google
MSN
Yahoo
Aol
Learn how to check for add-ons and plug-ins
Know your browser
Know your search engine
Scan often with UPDATED antispyware
31. I call it the “did I ask?” toolbar
Adds nothing to the search experience
Does not provide the “engine”
May allow adware in.
Comes bundled with Java update (uncheck!)
Uses many of the same sneaky techniques to
get installed.
REMEMBER: GOOGLE BING YAHOO AOL are the
only search engines that should be listed.
Uninstall from programs and features if listed
32. Free downloads contain harmful bundled
software
Ads are made to confuse you
You first need to make sure you are on the right
download link.
If you just check yes on every checkbox, you
can destroy your computer.
39. Install 2 antispyware programs
Superantispyware
Malwarebytes Antimalware
Run each one on alternating weeks
Always update first
SuperAntispyware
Download from Superantispyware.com
Decline the free trial
Malwarebytes
Download from download.com
Uncheck free trial
40. Know your home page.
Google
MSN
Yahoo
Aol
Learn how to check for add-ons and plug-ins
Know your browser
Know your search engine
Scan often with UPDATED antispyware
41. “Mountain View, California: The majority of
Android smartphone and tablet users do not
need to install anti-virus and other security
apps to protect them, despite dire warnings
from security companies selling such
products, Google’s head of Android security
says.” - Google 2015
43. “Malware has grown to be such a tremendous
problem that over 32 percent of the world’s
computers are infected with some type of
malware. With East Asian countries like China,
South Korea, and Taiwan having the most
infected computers.
Northwestern European countries such as
Norway, Switzerland, and Sweden all have the
lowest amount of computers infected with
malware.
The United States has the eleventh highest rate
of infection with just over 30 percent of
households being infected with malware.
44. On site visits and repairs. New
computers ordered and installed.
Remote computer help.
Hinweis der Redaktion
The best kind of protection is knowledge. As a Computer store owner for 20 years, I heard so many times, “but I have Norton!”. I will start by describing the many types of computer threats, and then I will show you how to “know” certain things like answers to these questions: What browser do you use? What is your home page? What search engines do you use?
This is why you should always have important files in 2 places. In many cases, you have no choice but to pay if your files are really important to you.
Microsoft Support does not cold-call people and tell them their computer has been hacked and give them instructions on how to fix it. If you require support, you have to call Microsoft support directly. They won’t call you unless you first call them with a problem.
This page from http://www.microsoft.com/security/online-privacy/msname.aspx
Which browser is better? I personally think that there is no “best” browser to use all the time. Some pages will simply not work in a certain browser. Updates are made that cause pages and websites to stop working. One thing you can do in that case is copy the link and try it in another browser.
Match the Logo to the Browser.
Here it shows how to open multiple tabs as a home page
Press alt to show the menu in firefox
Add-ons and options
REPEAT AFTER ME! GOOGLE BING YAHOO AOL GOOGLE BING YAHOO AOL GOOGLE BING YAHOO AOL GOOGLE BING YAHOO AOL GOOGLE BING YAHOO AOL GOOGLE BING YAHOO AOL GOOGLE BING YAHOO AOL GOOGLE BING YAHOO AOL GOOGLE BING YAHOO AOL
Free software? Yes, the internet today is an amazing place, and you can get workable versions of any type of software for free if you know what you are looking for. You can get an entire office suite compatible with Microsoft office files for free. You can get video editors, photoshop type programs, dvd players, and games for free. But that does not mean that it is easy.
Even on the most reputable free download site, advertisements are made to mimic the real download link. There are many times I was fooled by this. You really have to study the page and know where to click. They are out to get you even before you get to the program you are trying to download!
24x7 help? That nice friendly looking guy on the upper right of EVERY window? Well I would venture to say it is a scam. If you do call them, they are likely to find things that are not really wrong with your computer and charge you for it. Junkware is a group of programs that did not succeed in the marketplace, and so they went to the “dark side” . Many of them did not set out to be malicious and some of them like “My PC Backup”, actually work. But the actual crime is that companies like Conduit LTD, use trickery and deceit, and yes, illegal hacking to install way way too many of these at once!
Bleeping Computer: “The SweetPacks Toolbar and SweetIM Toolbar are adware programs that are commonly bundled with and installed by other free programs that you find on the Internet. Once installed, SweetPacks will install the SweetPacks or SweetIM Toolbar in your browser and change your home page and search defaults to use sweetim.com. Though SweetPacks is not a computer infection, a common complaint is that it is difficult to remove SweetPacks from your computer. Using this guide you will be able to easily and quickly remove all traces of the SweetPacks and SweetIM Toolbar from your computer and browser.”
One installation of sweetpacks can install ALL of these unwanted, un-asked for, unnecessary, bloatware products! I disagree with those who say that all of these programs come as a result of not opting out of bundled software. I am sure that sweetpacks and similar programs use illegal means to get onto your pc. From Wikipedia: “Conduit Search[edit]
Conduit toolbars have been identified as Potentially Unwanted Programs by Malwarebytes[4] and are typically bundled with other free downloads.[5][6] These toolbars modify the browser's default search engine, homepage, new tab page, and several other browser settings.[7]
A program called "Conduit Search Protect", better known as "Search Protect by conduit", can cause severe system errors upon uninstallation. It claims to protect browser settings but actually blocks all attempts to manipulate a browser through the settings page; in other words, it makes sure the malicious settings remain unchanged. The uninstall program for Search Protect can cause Windows to be unbootable because the uninstall file not only removes its own files, but also all the boot files in the root of the C: drive.[citation needed] Conduit is associated with malware,spyware, and adware, as victims of this hijacker have reported unwanted pop-up and in-text advertisements.[8]
Victims of unwanted redirections to conduit.com have also reported that they have been attacked by phishing attempts and have received unwanted email spam, junk mail, other messages, and telephone calls from telemarketers. Some victims claim that the people claimed to be Apple, Microsoft, or their ISP, that personal information was used in some phone calls, and that some of the calls concerned their browsing habits and recent browsing history. Personal information used in phishing attempts may be associated with spyware. This hijacker virus is currently added to the official PowerISO download, and the Vuze version 5.4.0.0 update, for example.[9]
“
With the knowledge given in this presentation, and the two antispyware programs on this page, it is all you need to keep your computer protected. Of course, there are new viruses everyday.
The most common types of malware are viruses, Trojan Horses, and unwanted software. The most common computer virus of all time is the Conficker worm. This worm targets Windows operating system flaws and spreads across networks forming a botnet of auto-acting malware. Conficker, also known as “Downup”, was first detected in late 2008 and spread to over 200 different countries making it the biggest, most widespread computer worm ever.