Computer Security Resources

  • NATIONAL CYBER SECURITY AWARENESS
                      Resources and publications from the Department of Homeland Security
  • E-mail Security 
Most users get viruses from opening and running unknown e-mail attachments. Remember:
- Never open anything that is attached to an e-mail message unless you know the contents of the file.
- If you receive an attachment from a familiar e-mail address, but were not expecting anything, you should   contact the sender before opening the attachment.
- If you receive a message with an attachment and you do not recognize the sender, you should delete the message.
- Check this Social Engineering quick glance graphical chart on "red flags" in e-mails. 

If you have any questions about an e-mail, please contact helpdesk .
  • Potentially Unwanted Programs (PUPs) / Malware
Why do I need anti-virus and anti-spyware software?

It is critical to ensure that your computer is running software that protects to against malicious software (malware) or potentially unwanted programs (PUPs) infections. This malicious software can try to install itself on your computer any time you visit a dubious site or click a link on an unsolicited e-mail.

Latest Threats

Ransomware:

Type of malware that attempts to extort money from a computer user by infecting or taking control of a victim’s machine or the files or documents stored on it.Typically, ransomware will:
- Lock the computer to prevent normal usage or encrypt the documents and files to prevent access to the saved data.
- Prevents you from accessing Windows and other devices.
- Encrypts files so you can not use them.
- Stops certain applications or programs from running.

Click here for more information on ransomware and ways to protect yourself.

Browser Hijacking:

A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user to websites the user had not intended to visit. Often called a browser redirect virus because it redirects the browser to other, usually malicious, websites, a browser hijacker enables browser hijacking. 
An example of browser hijacking is the bogus " Windows Security Alert "
 error message stating that the computer has been infected and that private details (e.g. email logins, banking details, etc.) are at risk. It is emphasised that the 'problem' must be solved immediately by calling the toll-free telephone number ("1-844-826-1198") provided. Victims then supposedly receive help in removing the malware. Be aware, however, that "Windows Security Alert" is fake. None of the listed viruses exist. Cyber criminals merely attempt to scare and trick victims into calling and paying for services that are not needed. Therefore, you should ignore this pop-up, never call the number, and close your browser (end-task if needed). Here are some additional steps to further address this type of attack.

  • Free Anti-virus / Anti-malware software (use at your discretion)
Important note: Windows 10 comes with Microsoft's Windows Defender installed. This software helps identify and remove viruses, spyware, and other malicious software and notifies you when you need to take specific action. You can also use it anytime to scan for malware if your computer is not working properly or if you clicked a suspicious link online or in an e-mail message. However, Defender will disable itself when/if you install other antivirus software.

                   Panda Anti-virus 
   
          Bit Defender Anti-virus

          MalwareBytes Anti-Rootkit 

          Junkware Removal Tool  

          ADWCleaner  

          Hitman Pro  


  • Social Networks Security
 
  • Blogs


         
          
        
Comments