Page 7 - security threats new-1
P. 7
you’ve been fooled. The email is from a cybercriminal, and the
file you clicked on — and downloaded and opened — has gone
on to install malware on your device.
❖ When you execute the program, the malware can spread to
other files and damage your computer.
❖ How? It varies. Trojans are designed to do different things. But
you’ll probably wish they weren’t doing any of them on your
device.
Examples of Trojan malware attacks
Rakhni Trojan.
ZeuS/Zbot
How to help protect against Trojans
• Don’t visit unsafe websites. Some internet security software
will alert you that you’re about to visit an unsafe site, such as Norton
Safe Web.
• Don’t open a link in an email unless you’re confident it comes
from a legitimate source. In general, avoid opening unsolicited
emails from senders you don’t know.
• Don’t download or install programs if you don’t have complete
trust in the publisher.
• Don’t click on pop-up windows that promise free programs
that perform useful tasks.