SlideShare a Scribd company logo
1 of 11
• Fake ads
• Browsing too deep in search engine results
• Impersonating websites
• Social media scams
• “Scareware” pop-up windows
• E-mail attachments/scams
• YouTube Scams
• Outdated AV (Antivirus) software/Windows Updates
Malware – (short for malicious software) is software, script, or code designed to
disrupt computer operation, gather sensitive information, or gain unauthorized access
to computer systems.
Beware of fake ads! There are a multitude of these ads that trick you into doing something
not related to what you originally intended to do.
This ad wants you to run a scan for
“Windows errors” before you continue.
These ads want to trick you to download
their product instead of the one you
originally intended.
There are also fake ads on Google! While searching CCleaner, a free product, an
ad comes up on the right-hand side that wants you to pay $30 for it’s product.
Oh, they’re not just on Google
search, they’re everywhere!
When you search a subject, do you go on-and-on through pages of search results to find
answers? Well, that may not be a good thing! The deeper you go, the more you’ll find
pages un-related to your initial result, making a higher risk of accessing an infected
website. They are easy to detect as most of the time they do not make sense and it’s title
and description is entirely unrelated to your initial search. Use common sense!
Here’s some deep search results for
“Lactose Intolerance”
Note: Nothing about this result
makes any sense! Should you
click on it? NO
“By Newton who discovered that an apple
will had read The Exile but.”
Keep a look-out for websites that impersonate legitimate websites. They are fraudulent.
Normally it’s easy to notice the poor grammar, certificate warnings, and broken links.
Most common ways of stumbling on an impersonating website is falling for a scam, either
on Facebook or in an e-mail. It’s also common to find them in a deep search listing.
Here’s a common scam that impersonates
Southwest Airlines, generously giving out free
tickets. By entering your e-mail you’ll quickly
realize there’s no free tickets but an inbox full of
spam e-mail instead. Sweet!
TIP: Always pay attention to the URL in the
address bar! If it doesn’t relate to domain of the
website, in this case, southwestairlines.com, it’s
highly likely that it’s an impersonation!
Everyone uses social media today, even your grandma, making it a play ground for scammers.
These scams can lead to anything! Compromised accounts, malware, fraud, or e-mail spam.
1. Don’t trust a post, message, or invite just because it comes from a friend. Their
account could have been compromised, or they were tricked into clicking on a scam.
2. Your like and share are a valuable personal recommendation to your friends and
family. Please use them cautiously. Do a search to check out whether if something is
valid before sharing it.
3. Be very suspicious of offers for free stuff, especially ones that start with you having
to like or share something.
4. Don’t follow links that accompany some hysterical or generic text such as “OMG!!
CAN YOU BELIEVE THIS?”
5. Avoid links that promise some current event “scoop” such as “Whale on a house” or
“Osama Bin Laden death video”
6. There is no application that allows you to see who has been viewing your page.
Never click on a link to an app that promises that functionality. You’ll regret it.
7. Don’t fall for chain “sharing”. No hospital will donate a dollar towards every share of
a child in a hospital bed.
The most common way that a virus gets installed onto a system is by scaring you that
something is wrong with your computer, tricking you to download or buy its product to “fix it”.
Popular ways to avoid this:
Nothing can detect that you have a
virus on your system EXCEPT for the
antivirus software running on your
computer! If anything else does, it
should be avoided by all costs!
If you ever encounter this “Scareware”, do not interact with the window. Even
clicking the “X”! Just by doing that, it is coded to silently install it’s malware on
your computer. To avoid this, shut down your computer instead.
Do not scan your computer for
registry errors. It will not improve
system performance or make it
faster. This is a very popular tactic
to install malware on your
computer by the large volume of
fake software available.
Quick tip: Windows Security Center is not an antivirus and will not
tell you that there are errors with your computer or a malware
infection. It is actually a management tool of your computer’s
security software. If you get a “virus” notification from it, don’t
interact and do a virus scan immediately with your antivirus!
This is a very popular, yet annoying tactic for oversea agencies to install malware on your
computer or commit fraud.
However, it’s easy to avoid. If an e-mail
comes in with no subject and a single
link, it’s spam. If an e-mail comes in
with poor grammar that you have
an inheritance from a Nigerian prince,
it’s a scam. Simply delete and forget!
But what if it comes from a friend?
How do you know if it’s legitimate?
Call them and ask!
It’s common to click on a video on YouTube claiming to be a full movie or your favorite show
but only plays a still image, asking you to refer to the link in the description to see the full
thing, only to find a website full of surveys to fill out. By the end of it, your inbox is full of
spam and your computer is full of malware. A lose/lose situation!
How to avoid this?
Don’t search for free movies or full TV episodes
on YouTube! You simply won’t find them! Not
only is it illegal without discretion for them to be
uploaded, it’s also against YouTube’s ToS. They
are usually removed as soon as they are
uploaded.
It doesn’t just happen with searching for
movies, it can also be breaking news stories or
just about anything that will get a lot attention.
Always look at the ratings before you click on
the video. Normally the fake videos are rated
very low.

More Related Content

What's hot

Safety&Ethics
Safety&EthicsSafety&Ethics
Safety&EthicsCompApps
 
Final paper
Final paperFinal paper
Final paperJDonpfd3
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009Symantec
 
#KCSafeOnline: A free forum about online safety for parents
#KCSafeOnline: A free forum about online safety for parents#KCSafeOnline: A free forum about online safety for parents
#KCSafeOnline: A free forum about online safety for parentsKSHB
 
Justice for Mms sex scandal victims
Justice for Mms sex scandal victimsJustice for Mms sex scandal victims
Justice for Mms sex scandal victimsBlackprism
 
Jessica guevara
Jessica guevaraJessica guevara
Jessica guevarajessica97
 
Internet safety
Internet safetyInternet safety
Internet safetyBOAMEDIA
 
Teen safe2017appblacklist slideshare
Teen safe2017appblacklist   slideshareTeen safe2017appblacklist   slideshare
Teen safe2017appblacklist slideshareTeenSafe
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devicesErnest Staats
 

What's hot (11)

Safety&Ethics
Safety&EthicsSafety&Ethics
Safety&Ethics
 
Final paper
Final paperFinal paper
Final paper
 
Spam!
Spam!Spam!
Spam!
 
How to remove fanli90.cn
How to remove fanli90.cnHow to remove fanli90.cn
How to remove fanli90.cn
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009
 
#KCSafeOnline: A free forum about online safety for parents
#KCSafeOnline: A free forum about online safety for parents#KCSafeOnline: A free forum about online safety for parents
#KCSafeOnline: A free forum about online safety for parents
 
Justice for Mms sex scandal victims
Justice for Mms sex scandal victimsJustice for Mms sex scandal victims
Justice for Mms sex scandal victims
 
Jessica guevara
Jessica guevaraJessica guevara
Jessica guevara
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Teen safe2017appblacklist slideshare
Teen safe2017appblacklist   slideshareTeen safe2017appblacklist   slideshare
Teen safe2017appblacklist slideshare
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devices
 

Viewers also liked

Introducing Packaging Textile Controller MAXVU
Introducing Packaging Textile Controller MAXVUIntroducing Packaging Textile Controller MAXVU
Introducing Packaging Textile Controller MAXVUKevin Anderson
 
Prototyping for Business Outcomes at ModevUX
Prototyping for Business Outcomes at ModevUXPrototyping for Business Outcomes at ModevUX
Prototyping for Business Outcomes at ModevUX3Pillar Global
 
Patrick Seguin Experience
Patrick Seguin ExperiencePatrick Seguin Experience
Patrick Seguin ExperiencePatrickSeguin
 
Psychological Issues and the law
Psychological Issues and the lawPsychological Issues and the law
Psychological Issues and the lawDoug Aaron
 
All-in-one monitoring solution for DevOps & IT
All-in-one monitoring solution for DevOps & ITAll-in-one monitoring solution for DevOps & IT
All-in-one monitoring solution for DevOps & ITRex Antony Peter
 
El software y el hardware bb
El software y el  hardware bbEl software y el  hardware bb
El software y el hardware bbJhonatan Henao
 
The Five Stages of Accepting Negative Customer Feedback - Jessica Hall's Pres...
The Five Stages of Accepting Negative Customer Feedback - Jessica Hall's Pres...The Five Stages of Accepting Negative Customer Feedback - Jessica Hall's Pres...
The Five Stages of Accepting Negative Customer Feedback - Jessica Hall's Pres...3Pillar Global
 
Kroskulturalno istraživanje: odnos kvantiteta porodičnih interakcija i zadovo...
Kroskulturalno istraživanje: odnos kvantiteta porodičnih interakcija i zadovo...Kroskulturalno istraživanje: odnos kvantiteta porodičnih interakcija i zadovo...
Kroskulturalno istraživanje: odnos kvantiteta porodičnih interakcija i zadovo...Dijana Sulejmanović
 
Managing change in today's ever changing world of work
Managing change in today's ever changing world of workManaging change in today's ever changing world of work
Managing change in today's ever changing world of workCaleb Stick
 
Top 10 reasons to switch to the Nokia Lumia 1520
Top 10 reasons to switch to the Nokia Lumia 1520Top 10 reasons to switch to the Nokia Lumia 1520
Top 10 reasons to switch to the Nokia Lumia 1520Antony Worsley
 
Psychological Issues Within Law Enforcement
Psychological Issues Within Law EnforcementPsychological Issues Within Law Enforcement
Psychological Issues Within Law EnforcementDoug Aaron
 
How to Avoid Getting Malware on your Computer
How to Avoid Getting Malware on your ComputerHow to Avoid Getting Malware on your Computer
How to Avoid Getting Malware on your ComputerJillian Stone
 
DigitalRiverBrandsReport
DigitalRiverBrandsReportDigitalRiverBrandsReport
DigitalRiverBrandsReportKate Roe
 
Automated Performance Testing for Desktop Applications by Ciprian Balea
Automated Performance Testing for Desktop Applications by Ciprian BaleaAutomated Performance Testing for Desktop Applications by Ciprian Balea
Automated Performance Testing for Desktop Applications by Ciprian Balea3Pillar Global
 

Viewers also liked (20)

Introducing Packaging Textile Controller MAXVU
Introducing Packaging Textile Controller MAXVUIntroducing Packaging Textile Controller MAXVU
Introducing Packaging Textile Controller MAXVU
 
Prototyping for Business Outcomes at ModevUX
Prototyping for Business Outcomes at ModevUXPrototyping for Business Outcomes at ModevUX
Prototyping for Business Outcomes at ModevUX
 
Cv 201503 eng_short
Cv 201503 eng_shortCv 201503 eng_short
Cv 201503 eng_short
 
Patrick Seguin Experience
Patrick Seguin ExperiencePatrick Seguin Experience
Patrick Seguin Experience
 
Psychological Issues and the law
Psychological Issues and the lawPsychological Issues and the law
Psychological Issues and the law
 
All-in-one monitoring solution for DevOps & IT
All-in-one monitoring solution for DevOps & ITAll-in-one monitoring solution for DevOps & IT
All-in-one monitoring solution for DevOps & IT
 
El software y el hardware bb
El software y el  hardware bbEl software y el  hardware bb
El software y el hardware bb
 
Content is King
Content is KingContent is King
Content is King
 
Presentation1 1
Presentation1 1Presentation1 1
Presentation1 1
 
The Five Stages of Accepting Negative Customer Feedback - Jessica Hall's Pres...
The Five Stages of Accepting Negative Customer Feedback - Jessica Hall's Pres...The Five Stages of Accepting Negative Customer Feedback - Jessica Hall's Pres...
The Five Stages of Accepting Negative Customer Feedback - Jessica Hall's Pres...
 
KONSTANTINOS' EXPERIENCE
KONSTANTINOS' EXPERIENCEKONSTANTINOS' EXPERIENCE
KONSTANTINOS' EXPERIENCE
 
Kroskulturalno istraživanje: odnos kvantiteta porodičnih interakcija i zadovo...
Kroskulturalno istraživanje: odnos kvantiteta porodičnih interakcija i zadovo...Kroskulturalno istraživanje: odnos kvantiteta porodičnih interakcija i zadovo...
Kroskulturalno istraživanje: odnos kvantiteta porodičnih interakcija i zadovo...
 
Managing change in today's ever changing world of work
Managing change in today's ever changing world of workManaging change in today's ever changing world of work
Managing change in today's ever changing world of work
 
Top 10 reasons to switch to the Nokia Lumia 1520
Top 10 reasons to switch to the Nokia Lumia 1520Top 10 reasons to switch to the Nokia Lumia 1520
Top 10 reasons to switch to the Nokia Lumia 1520
 
Psychological Issues Within Law Enforcement
Psychological Issues Within Law EnforcementPsychological Issues Within Law Enforcement
Psychological Issues Within Law Enforcement
 
How to Avoid Getting Malware on your Computer
How to Avoid Getting Malware on your ComputerHow to Avoid Getting Malware on your Computer
How to Avoid Getting Malware on your Computer
 
Humor u rebt u
Humor u rebt uHumor u rebt u
Humor u rebt u
 
DigitalRiverBrandsReport
DigitalRiverBrandsReportDigitalRiverBrandsReport
DigitalRiverBrandsReport
 
Automated Performance Testing for Desktop Applications by Ciprian Balea
Automated Performance Testing for Desktop Applications by Ciprian BaleaAutomated Performance Testing for Desktop Applications by Ciprian Balea
Automated Performance Testing for Desktop Applications by Ciprian Balea
 
Kbt u radu sa prasuicidantima
Kbt u radu sa prasuicidantimaKbt u radu sa prasuicidantima
Kbt u radu sa prasuicidantima
 

Similar to How to Avoid Getting Malware on Your Computer

CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptJOHN BABATUNDE LEE
 
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Celia Bandelier
 
Protecting your pc in the new year
Protecting your pc in the new yearProtecting your pc in the new year
Protecting your pc in the new yearMichael Wells
 
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...John Bambenek
 
Week 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threatsWeek 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threatsRay Brannon
 
Marti digital citizen presentation
Marti digital citizen presentationMarti digital citizen presentation
Marti digital citizen presentationRay Brannon
 
Week 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threatsWeek 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threatsRay Brannon
 
Internet issues
Internet issuesInternet issues
Internet issuesCJ900
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
Protecting Yourself from Cyber Threats
Protecting Yourself from Cyber ThreatsProtecting Yourself from Cyber Threats
Protecting Yourself from Cyber ThreatsRay Brannon
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSedrianrheine
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-securityrobert mota
 
Living in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxLiving in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxFroilan Cantillo
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook securityErnest Staats
 
Becybersmart
BecybersmartBecybersmart
BecybersmartVelma
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 

Similar to How to Avoid Getting Malware on Your Computer (20)

CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
 
Protecting your pc in the new year
Protecting your pc in the new yearProtecting your pc in the new year
Protecting your pc in the new year
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Week 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threatsWeek 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threats
 
Marti digital citizen presentation
Marti digital citizen presentationMarti digital citizen presentation
Marti digital citizen presentation
 
Week 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threatsWeek 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threats
 
Internet issues
Internet issuesInternet issues
Internet issues
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Major Computer Virus Types to Watch Out
Major Computer Virus Types to Watch OutMajor Computer Virus Types to Watch Out
Major Computer Virus Types to Watch Out
 
Protecting Yourself from Cyber Threats
Protecting Yourself from Cyber ThreatsProtecting Yourself from Cyber Threats
Protecting Yourself from Cyber Threats
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-security
 
Living in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxLiving in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptx
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
Becybersmart
BecybersmartBecybersmart
Becybersmart
 
School presentation
School presentationSchool presentation
School presentation
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 

Recently uploaded

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 

Recently uploaded (20)

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 

How to Avoid Getting Malware on Your Computer

  • 1.
  • 2. • Fake ads • Browsing too deep in search engine results • Impersonating websites • Social media scams • “Scareware” pop-up windows • E-mail attachments/scams • YouTube Scams • Outdated AV (Antivirus) software/Windows Updates
  • 3. Malware – (short for malicious software) is software, script, or code designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems.
  • 4. Beware of fake ads! There are a multitude of these ads that trick you into doing something not related to what you originally intended to do. This ad wants you to run a scan for “Windows errors” before you continue. These ads want to trick you to download their product instead of the one you originally intended. There are also fake ads on Google! While searching CCleaner, a free product, an ad comes up on the right-hand side that wants you to pay $30 for it’s product. Oh, they’re not just on Google search, they’re everywhere!
  • 5. When you search a subject, do you go on-and-on through pages of search results to find answers? Well, that may not be a good thing! The deeper you go, the more you’ll find pages un-related to your initial result, making a higher risk of accessing an infected website. They are easy to detect as most of the time they do not make sense and it’s title and description is entirely unrelated to your initial search. Use common sense! Here’s some deep search results for “Lactose Intolerance” Note: Nothing about this result makes any sense! Should you click on it? NO “By Newton who discovered that an apple will had read The Exile but.”
  • 6. Keep a look-out for websites that impersonate legitimate websites. They are fraudulent. Normally it’s easy to notice the poor grammar, certificate warnings, and broken links. Most common ways of stumbling on an impersonating website is falling for a scam, either on Facebook or in an e-mail. It’s also common to find them in a deep search listing. Here’s a common scam that impersonates Southwest Airlines, generously giving out free tickets. By entering your e-mail you’ll quickly realize there’s no free tickets but an inbox full of spam e-mail instead. Sweet! TIP: Always pay attention to the URL in the address bar! If it doesn’t relate to domain of the website, in this case, southwestairlines.com, it’s highly likely that it’s an impersonation!
  • 7. Everyone uses social media today, even your grandma, making it a play ground for scammers. These scams can lead to anything! Compromised accounts, malware, fraud, or e-mail spam.
  • 8. 1. Don’t trust a post, message, or invite just because it comes from a friend. Their account could have been compromised, or they were tricked into clicking on a scam. 2. Your like and share are a valuable personal recommendation to your friends and family. Please use them cautiously. Do a search to check out whether if something is valid before sharing it. 3. Be very suspicious of offers for free stuff, especially ones that start with you having to like or share something. 4. Don’t follow links that accompany some hysterical or generic text such as “OMG!! CAN YOU BELIEVE THIS?” 5. Avoid links that promise some current event “scoop” such as “Whale on a house” or “Osama Bin Laden death video” 6. There is no application that allows you to see who has been viewing your page. Never click on a link to an app that promises that functionality. You’ll regret it. 7. Don’t fall for chain “sharing”. No hospital will donate a dollar towards every share of a child in a hospital bed.
  • 9. The most common way that a virus gets installed onto a system is by scaring you that something is wrong with your computer, tricking you to download or buy its product to “fix it”. Popular ways to avoid this: Nothing can detect that you have a virus on your system EXCEPT for the antivirus software running on your computer! If anything else does, it should be avoided by all costs! If you ever encounter this “Scareware”, do not interact with the window. Even clicking the “X”! Just by doing that, it is coded to silently install it’s malware on your computer. To avoid this, shut down your computer instead. Do not scan your computer for registry errors. It will not improve system performance or make it faster. This is a very popular tactic to install malware on your computer by the large volume of fake software available. Quick tip: Windows Security Center is not an antivirus and will not tell you that there are errors with your computer or a malware infection. It is actually a management tool of your computer’s security software. If you get a “virus” notification from it, don’t interact and do a virus scan immediately with your antivirus!
  • 10. This is a very popular, yet annoying tactic for oversea agencies to install malware on your computer or commit fraud. However, it’s easy to avoid. If an e-mail comes in with no subject and a single link, it’s spam. If an e-mail comes in with poor grammar that you have an inheritance from a Nigerian prince, it’s a scam. Simply delete and forget! But what if it comes from a friend? How do you know if it’s legitimate? Call them and ask!
  • 11. It’s common to click on a video on YouTube claiming to be a full movie or your favorite show but only plays a still image, asking you to refer to the link in the description to see the full thing, only to find a website full of surveys to fill out. By the end of it, your inbox is full of spam and your computer is full of malware. A lose/lose situation! How to avoid this? Don’t search for free movies or full TV episodes on YouTube! You simply won’t find them! Not only is it illegal without discretion for them to be uploaded, it’s also against YouTube’s ToS. They are usually removed as soon as they are uploaded. It doesn’t just happen with searching for movies, it can also be breaking news stories or just about anything that will get a lot attention. Always look at the ratings before you click on the video. Normally the fake videos are rated very low.