Computer Security Resources


Resources from the Department of Homeland Security.

  • E-mail Security

Most users get viruses from opening and running unknown e-mail attachments. Remember:

- Never open anything that is attached to an e-mail message unless you know the contents of the file.

- If you receive an attachment from a familiar e-mail address, but were not expecting anything, you should contact the sender before opening the attachment.

- If you receive a message with an attachment and you do not recognize the sender, you should delete the message.

- Check this Social Engineering quick glance graphical chart on "red flags" in e-mails.

- Watch a 3-minute informational video on e-mail "phishing" attempts and ways to protect yourself.

If you have any questions about an e-mail security, please contact helpdesk .

  • Potentially Unwanted Programs (PUPs) / Malware

Why do I need anti-virus and anti-spyware software?

It is critical to ensure that your computer is running software that protects to against malicious software (malware) or potentially unwanted programs (PUPs) infections. This malicious software can try to install itself on your computer any time you visit a dubious site or click a link on an unsolicited e-mail.

Latest Threats


Type of malware that attempts to extort money from a computer user by infecting or taking control of a victim’s machine or the files or documents stored on it.Typically, ransomware will:

- Lock the computer to prevent normal usage or encrypt the documents and files to prevent access to the saved data.

- Prevents you from accessing Windows and other devices.

- Encrypts files so you can not use them.

- Stops certain applications or programs from running.

Click here for more information on ransomware and ways to protect yourself.

Browser Hijacking:

A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user to websites the user had not intended to visit. Often called a browser redirect virus because it redirects the browser to other, usually malicious, websites, a browser hijacker enables browser hijacking.

An example of browser hijacking is the bogus " Windows Security Alert " error message stating that the computer has been infected and that private details (e.g. email logins, banking details, etc.) are at risk. It is emphasised that the 'problem' must be solved immediately by calling the toll-free telephone number ("1-844-826-1198") provided. Victims then supposedly receive help in removing the malware. Be aware, however, that "Windows Security Alert" is fake. None of the listed viruses exist. Cyber criminals merely attempt to scare and trick victims into calling and paying for services that are not needed. Therefore, you should ignore this pop-up, never call the number, and close your browser (end-task if needed). Here are some additional steps to further address this type of attack.

  • Free Anti-virus / Anti-malware software (use at your discretion)

Important note: Windows 10 comes with Microsoft's Windows Defender installed. This software helps identify and remove viruses, spyware, and other malicious software and notifies you when you need to take specific action. You can also use it anytime to scan for malware if your computer is not working properly or if you clicked a suspicious link online or in an e-mail message. However, Defender will disable itself when/if you install other antivirus software.

AVG Anti-virus

Avira Anti-virus Suite

Panda Anti-virus

Bit Defender Anti-virus

MalwareBytes Anti-Rootkit

Junkware Removal Tool


Hitman Pro

Virus Total (Online File Virus analizer)

  • Social Networks Security

Socializing Securely: Using Social Networks

Tips on staying safe on Social Networking Sites

Online Safety

  • Blogs

US-CERT (United States Computer Emergency Readiness Team)

Tech Republic

Techworld Security