Page 7 - security threats new-1
P. 7

you’ve been fooled. The email is from a cybercriminal, and the
                       file you clicked on — and downloaded and opened — has gone

                       on to install malware on your device.




                   ❖ When you execute the program, the malware can spread to

                       other files and damage your computer.




                   ❖ How? It varies. Trojans are designed to do different things. But

                       you’ll probably wish they weren’t doing any of them on your
                       device.





               Examples of Trojan malware attacks


                       Rakhni Trojan.
                       ZeuS/Zbot


               How to help protect against Trojans





               •       Don’t visit unsafe websites. Some internet security software
               will alert you that you’re about to visit an unsafe site, such as Norton
               Safe Web.


               •       Don’t open a link in an email unless you’re confident it comes
               from a legitimate source. In general, avoid opening unsolicited

               emails from senders you don’t know.


               •       Don’t download or install programs if you don’t have complete
               trust in the publisher.


               •       Don’t click on pop-up windows that promise free programs
               that perform useful tasks.
   2   3   4   5   6   7   8   9   10   11   12