Protect your gadget: how not to get infected on the Internet
July 3, 2023
0
Malware can harm your computer by stealing information, corrupting files, slowing down your system and even taking control of your device. But such programs do not appear as
Malware can harm your computer by stealing information, corrupting files, slowing down your system and even taking control of your device. But such programs do not appear as they are on your computer. They are usually available online or elsewhere. 24 Channels explains how to take precautions to avoid becoming a victim of the virus.
Attachments in emails
One of the most common ways for malware to enter your computer is through email attachments. You may receive such mails from both known and unknown senders, some of which contain attachments that seem harmless at first glance.
But, be careful to open the content of emails from unknown or dubious sources. If you have doubts about a particular email, it is better to delete it or mark it as spam. Also, be wary of attachments with unusual extensions or filenames. For example, files with the extension “.exe” It is usually malware in disguise.
Update your antivirus softwarebecause it can scan your mail content for malware and block or remove all threats.
If your mail provider offers secure attachments feature, open it. This feature checks email attachments in a virtual environment before delivering them to your mailbox, ensuring that malicious attachments are detected and not landed on your computer.
fake websites
Fake Internet resources are another common source of threats. They act like legitimate sites you frequently visit, such as your bank’s site, social media platforms, or popular news sites. They often have domain names, logos, designs, or content that are very similar to resources you’ve been using for a long time.
Always to avoid falling for fake websites check the authenticity of the portalbefore entering any personal or financial information.
Check the URL and domain name carefully, as scammers can create slightly modified versions of well-known websites. For example, a fake site might use “www.faceb00k.com” or “www.facebook.net” instead of “www.facebook.com”.
When transferring sensitive information, look for secure connections and watch out for warning messages that the website is unsafe or has an invalid certificate.
Be careful when you come across offers for free downloads, coupons, rewards or surveys. Scammers often use this tactic to lure you into sources that distribute malware.
Use your common sense and be skeptical of anything that sounds too good to be true.
software is downloading
Downloading and installing programs from the Internet is one of the most common sources of malware. Even if you are looking for a specific program, there is a possibility that the file you downloaded contains a virus. Malware can even appear at the top of Google search results, making it difficult to distinguish between legitimate and malicious options.
To prevent your computer from getting a virus:
Download programs from known and verified sources.
Avoid dubious websites that offer free or cracked versions of the software, as they often contain viruses.
Always scan downloaded files with a reliable antivirus before opening them.
It is also important to read the terms of the software installation as some programs may try to install a number of additional unwanted applications, in which case they should be removed in the best case scenario.
Be careful during the installation process and refuse any unnecessary offers or features.
flood
Torrents are still a popular way to download files like games, movies, and music. However, due to their decentralized nature, they are not uncommon sources of malware.
To avoid viruses, download files only from trusted and well-known torrent sites with positive user reviews.
Be careful when you come across files with questionable extensions like “.exe”, as they often have a high risk of containing malware.
Always scan downloaded files with antivirus software before opening or running them.
Removable media (flash drives)
Removable media such as USB drives, external hard drives, CDs, and DVDs can infect your computer with malware. These devices may contain viruses collected from previously infected systems or intentionally downloaded by hackers.
To protect yourself from potential threats on removable media:
Avoid using devices from unknown sources.
Be careful when connecting any external media to your system, especially if it comes from someone you don’t trust.
Before accessing the contents of any external device, scan it with a reliable antivirus to detect and remove any threats.
Internal threats
Insider threats are people who have legitimate access to an organization’s network or data but use them for malicious purposes. These threats can come from employees, contractors, partners, or even former employees who still have access to the systems.
To prevent insider threats, user access controls should be enforced on sensitive data and systems. Monitor and review user activity regularly to detect any suspicious behavior. Educate employees about insider threats and develop a culture of security in your organization.
legacy software
One of the less obvious but dangerous threats is outdated programs on your computer. Today, developers are actively working on their own products and constantly updating them. In this way, programs gain new functionality and, most importantly, get rid of old threats that hackers can detect and exploit.
To protect yourself against threats from outdated software:
Update the programs you use on time.
It is also worth removing unnecessary applications that are not used and not updated.
Update your operating system regularly with the latest security patches.
Enable automatic updates to ensure fast installation of security patches.
Only download apps from verified stores.
Be alert to malware
By understanding common malware sources and taking proactive measures to protect yourself, you can greatly reduce your risk of falling victim to dangerous viruses. The combination of knowledge and vigilance will help you stay one step ahead of threats and protect your devices and personal information. Our advice is universal and applies to almost any device on which an app can be installed, such as a computer, smartphone or tablet.
John Wilkes is a seasoned journalist and author at Div Bracket. He specializes in covering trending news across a wide range of topics, from politics to entertainment and everything in between.