Spreading Harmful InfectionsMany viruses and other harmful attacks spread through file downloads, attachments in e-mail messages, and data files that have macros, ActiveX controls, add-ins, or Visual Basic for Applications (VBA) code attached to them. Virus writers capitalize on people's curiosity and willingness to accept files from people they know or work with, in order to transmit malicious files disguised as or attached to benign files. When you start downloading files to your computer, you must be aware of the potential for catching a computer virus, worm, or Trojan Horse. Typically, you can't catch one from just reading a mail message or downloading a file, but you can catch one from installing, opening, or running an infected program or attached code. Understanding Harmful AttacksPhishing is a scam that tries to steal your identity by sending deceptive e-mail asking you for bank and credit card information online. Phishers spoof the domain names of banks and other companies in order to deceive consumers into thinking that they are visiting a familiar Web site. Phishers create a Web address that looks like a familiar Web address but is actually altered. This is known as a homograph. The domain name is created using alphabet characters from different languages, not just English. For example, the Web site address "www.microsoft.com" looks legitimate, but what you can't see is that the "i" is a Cyrillic character from the Russian alphabet. Don't be fooled by spoofed Web sites that look like the official site. Never respond to requests for personal information via e-mail; most companies have policies that do not ask for your personal information through e-mail. If you get a suspicious e-mail, call the institution to investigate and report it. Spam is unsolicited e-mail, which is often annoying and time-consuming to get rid of. Spammers harvest e-mail addresses from Web pages and unsolicited e-mail. To avoid spam, use multiple e-mail addresses (one for Web forms and another for private e-mail), opt-out and remove yourself from e-mail lists. See the Microsoft Windows and Microsoft Outlook Help system for specific details. Spyware is software that collects personal information without your knowledge or permission. Typically, spyware is downloaded and installed on your computer along with free software, such as freeware, games, or music file-sharing programs. Spyware is often associated with Adware software that displays advertisements, such as a pop-up ad. Examples of spyware and unauthorized adware include programs that change your home page or search page without your permission. To avoid spyware and adware, read the fine print in license agreements when you install software, scan your computer for spyware and adware with detection and removal software (such as Ad-aware from Lavasoft), and turn on Pop-up Blocker. See the Microsoft Windows Help system for specific details. Avoiding Harmful Attacks Using OfficeThere are a few things you can do within any Office 2007 program to keep your system safe from the infiltration of harmful attacks.
Avoiding Harmful Attacks Using WindowsThere are a few things you can do within Microsoft Windows to keep your system safe from the infiltration of harmful attacks.
|