How They Attack
Malware is a category of malicious code that includes
viruses, worms, and Trojan horses. Destructive malware will utilize popular communication tools to spread, including worms sent through email and instant messages, Trojan horses dropped from websites, and virus-infected files downloaded from peer-to-peer connections. Malware will also seek to exploit existing vulnerabilities on systems making their entry quiet and easy.
How Do You Know
Malware works to remain unnoticed, either by actively hiding or by simply not making its presence on a system known to the userWhat To Do
Only open email or IM attachments that come from a trusted source and that are expectedHave email attachments scanned by Norton Internet Security prior to openingDelete all unwanted messages without openingDo not click on Web links sent by someone you do not knowIf a person on your Buddy list is sending strange messages, files, or web site links, terminate your IM sessionScan all files with an Internet Security solution before transferring them to your systemOnly transfer files from a well known sourceUse Norton Internet Security to block all unsolicited outbound communicationKeep security patches up to date
1 comment:
Recommend it to anyone.
Orbasoft Antispyware is the best scan that I have used to keep my PC clean and working like new. It’s a great scanner that finds all the same bugs that other scans such as Norton can find. What’s even better is that it cost less than many of the other options. I found the antispyware solution from Orbasoft at http://orbasoft.com and decided to give it a try. That was one of the best decisions I ever made. I’m very happy with this scanner and would recommend it to anyone that wants to protect and care for their PC so it will last as long as possible.
Post a Comment