This category will explain some of the well known forms of attack (Virus, Worm, SpyWare and so on) as well as teach you how to protect the computer so it can avoid being attacked in the first place. Note well that this category does not suggest in any way, shape or form that the computer will be fully protected against an attack. Nor does it suggest in any way, shape or form that the computer will be cured of an existing attack. This category is here purely to make you aware that attacks do exist and what you can do to help prevent them and treat them.
NOTE: This article was created for Windows 7 and therefore its wordings and screenshots relate to the Windows 7 operating system. Where possible I have updated the wordings to relate to the Windows 10 operating system. Either way, the information is very relevant regardless of what Windows operating system you are using.
If you have not read this page before continue reading it, from top to bottom, as normal. Otherwise you can click on a subject below to get near/on the subject you was reading before. Windows Updates is the next section - It is also linked at the bottom of this page.
With the fact that tens of thousands of known Malwares have been programmed so far, and the fact that new Threats are programmed every day, are you protected? Use this section to educate yourself and become more security aware of computer dangers.
A virus is a file that is programmed to cause a lot of damage to the computer and the files stored on it. It gains access to the computer by either storing itself onto a floppy disk, as an e-mail attachment, as a file, inside another program or via a computer network (computers that are connected together, with/without an internet connection). Once on the computer the virus spreads itself by infecting other files on the computer.
A virus is activated when you use another program to open it. For example: If someone sends you an e-mail with an attachment that has a virus inside it the virus will activate (start spreading itself) as soon as you open the attachment using Windows Mail for example. If a virus infected file is on a floppy disk it can be activated by the floppy drive that is trying to open (read) the floppy disk's contents and/or by the program that is going to open the file. You can also, unknowingly, send a virus infected file over the internet as an e-mail attachment or by giving someone a virus infected floppy disk. I say unknowingly because of the sad fact that many people are usually unaware they have a virus in the first place. Especially when they have no Anti-Virus software installed or when it is not up-to-date.
The worm is more or less a Virus except that it can distribute itself as an e-mail by using e-mail addresses it finds on the computer. In other words: It can find your friend's e-mail address (on your computer) for example and then send them a virus infected e-mail when you are connected to the internet. A worm can also allow other people to remotely take control of your computer without you knowing about it.
A Trojan Horse is a program that masquerades as another common program in an attempt to receive information. An example of a Trojan Horse is a program that behaves like a Log-On program to retrieve your typed in User Name and Password information. You log-on as normal, because the Trojan Horse log-on screen looks the same as the real log-on screen, but later on the Trojan Horse sends your user name and password details down the internet to the trojan programmer's computer. They then break into your computer at a later date to steal your files/information.
Spyware is software that is downloaded onto the computer without your knowledge, usually when you are downloading some software you want. For example, you may go to a website to download a music program and as you are downloading the music program the spyware program is also being downloaded (without your knowledge and agreement). The spyware may be part of the music program, come from the website separately or both - normally it comes from the program.
Spyware normally has permission to be on the computer because you either agreed to a license agreement before the download (i.e a website download agreement) or to the software installation (I Agree) license agreement. Spyware can be given permission in other ways though, depending on your security settings and so on. Once installed and activated spyware takes control of the computer, in order to collect information about you and your computer activities whilst being as disruptive as possible - It normally bombards you with pop-up advertisements and slows down the computer or changes the computer's behaviour in odd ways. So always read license agreements and so on carefully. If you do not understand something do not agree to it - do not download or install the software.
Phishing is basically various methods of online fraud, with the most common method being actioned via an e-mail. It can start with an e-mail, which is fake, that is supposedly from your Bank for example "Due to a recent computer crash at Phisher Bank we have unfortunately lost your Records. We are asking all of our customers to complete a new Online Information Form. Please go to our sister company's Secure Banking website (link at the bottom of this e-mail) and fill out the Online Information Form. Alternatively. Please contact Phisher Bank on this national number 0207 1234567 or contact your local branch.". This kind of wording might convince you to visit the website, if you are a vulnerable person, especially as the phisher (fraudster) has given out a bank contact number as reassurance.
As a vulnerable person you might be curious about the information on the online information form and/or think you will be helping the bank with their lost records problem. Curiosity and a willingness to help are some of the psychological methods used by phishers to draw you into their net. If you visit the fake website it will look more or less like the original (proper) bank website and the online information form might only be a Name and Address form. This is so you will not suspect any thing.
Once the form has been filled in the phisher will probably send you other cleverly disguised e-mails later, asking you for more information a little at a time Thank you for completing the Online Information Form. We will now process this information and e-mail you again if we need any further information. Your reference number is: R1D978J - Please quote this reference number in any future e-mails". This scenario goes on until the phisher has collected enough information to be able to impersonate you and apply for bank credit as you with your details (Name, Address, Age, Card Number and so on). All of which they have obtained from you by e-mail. So always ignore e-mails of this nature and go to your bank for confirmation that the e-mail is genuine and that the bank has indeed lost your records.
Fig 1.0 - This fake PayPal e-mail is asking me to fill out my personal details in the attached Restore Your Account application form
The above is an example of a Phishing Scam. It's an e-mail that claims to be from PayPal, stating that they have had a report about unauthorised access of my PayPal Account; to put me in a state of panic and knee-jerk reaction. Furthermore, they want me to fill out the attached application form (Restore Your Account), which requires my personal details, in order for me to have my PayPal Account restored. Here is the letter (e-mail message) itself.
Fig 1.1 - This e-mail message is meant to put me in a state of panic in order for me to action its request and give out my personal details
Remember: A company such as PayPal will never send such an e-mail and will never ask you for personal details via an e-mail. In this case Norton Internet Security marked this e-mail out as SPAM (Junk Mail / Phishing Scam) but if it hadn't of done I would of still questioned it - Why are they asking for my personal details? I would of also searched the internet to see if others are receiving the same e-mail - Put the e-mail's title into Google for example and see what comes up. You will probably find forums whereby other people have asked the same question as you - "Is this a scam?". Here is another example, supposedly from HMRC.
Fig 1.2 - Put the e-mail title and description into Google to see what other people have said about this Phishing Scam
Fig 1.3 - I have overpaid HMRC by J556.99 - WOW 556 J's? £ or J.....Hmm!!! Something not write with the spelling!
The above example has many grammar mistakes. Look at Line 3 for example. You would not use DUE twice like that. You would say - Due to the high volume of refunds, you must.... And the wording in some of this e-mail is made up of "broken English"! Something you would not, and should not, expect from real HMRC.
Saying the above; The way great phishers set up their websites and e-mails, together with their con-artist abilities, can fool even the sharpest of people. So don't think "It will never happen to me" because it could. So ALWAYS Remember - Legitimate businesses never ask you for personal details online.
A hacker is someone who uses specialist computer hardware and software to break into someone elses computer or computer network. They usually break into big company computers in order to expose their security weaknesses or to get files from those computers for criminal gain. There is also the software hacker who breaks into a piece of software in order to get its serial number and/or to disable part of the software in order to use that software for free. Basically they are creating free/pirated software for the mass market. Hackers are always targeting Microsoft, for some reason or another, to bring Windows crashing down. Hence why you always needs to keep Windows up-to-date.
Spam is basically a bombardment, over a daily or weekly period for example, of the same type of unwanted e-mail. They range from genuine offers for goods to unsolicited adult material. Spam is normally sent by a company who has obtained your e-mail address through abnormal means. If you sign up to a forum, newsletter or dating site for example a company simply visits those same forums, dating sites and so on to get e-mail addresses submitted publicly. If your e-mail address was submitted publicly by you or with your permission the company will be able to see it.
Although a lot of forums, dating sites and so on give you a nickname to use, instead of publicly displaying your e-mail address, it can be likely that they sell your private e-mail address to interested companies anyway. It is usually a scenario of you not reading the small print in the sign-up agreement. Once your e-mail is known it gets spread like wild fire. Hence the bombardment of spam (Junk E-mail).
TIP: Set up and use a bogus e-mail address for yourself - Never give out your proper e-mail address publicly.
The Dialer is a piece of software that is downloaded on to the computer. Its job is to disconnect you from the internet, so that when you reconnect it uses its own software to reconnect you. You probably will not notice any change, as the dialer software does its best to emulate your real connection software, but you will notice when you get a big phone bill because The Dialer has been charging your reconnection (and any subsequent connections) at £1 a minute for example. Hence its name The Dialer - It dials (connects you to) the internet at a higher price. The Dialer normally affects Dial-Up (P.A.Y.G and Anytime) users.
A Key Logger is a program that, once downloaded, starts logging (writing in to a log file) all the keyboard keys you are pressing. Once your keys have been logged the log file is sent to a computer for analysing. Basically, the file is tested against your Personal Details with the hope of robbing you. The details could of been got earlier or are in the log file. For example. When you book a Flight you have to fill out a purchase form, stating Credit Card details, in order to buy the ticket. So suppose I put my Name, Address, Credit Card details and so on. The log file might look like this:
The analysing computer would know how to digest my information based on the fact it knows the www.StupidFlightBookers.com purchase form always asks for information in the above order. In other words, it would know that line 4 contains my credit card type and line 5 contains my credit card number for example. It is not long before the person(s) behind the scam have all my personal details and credit card details. From which they can get a New Bank Account, Mobile Phone and so on in my name.
Malware stands for MALicious softWARE. It is a generic term used to describe software programs that are designed to attack, degrade or prevent the normal (intended) use of a network. Types of malware can include Viruses, Worms, Trojans as well as software that intrudes on your privacy (usually for fraudulent purposes - Identity Theft and Spyware).
What is a Cookie you might ask! You would be forgiven for saying A Biscuit! A cookie, in computer terminology, is in fact a computer text file that stores information about you, your account, your password and so on. Up until a few years ago the cookie was a good thing, as the following scenario shows.
You go on the Internet and find a public forum you like, such as The Dogs And Cats public forum. It allows you to ask questions and answer questions about Dogs And Cats as long as you are a registered member. So you decide to become a register member by filling out their registration form, whereby they then e-mail you a Username and Password. Whenever you want to visit the forum you simply log-in with your username and password. When you have finished your visit you simply log-out. No problems with this scenario so far....is there? Well yes, there is.
The problem here is that you have to log-in each time by entering your username and password. Wouldn't it be better to be able to automatically log-in? Of course it would. And that is where the cookie comes into action. After registering and then logging-in for the first time a cookie file is created on your computer. It stores details like your username and password, so that when you visit the forum again it automatically checks your cookie for the username and password and then logs you in automatically.
What a great thing the cookie is....or should that be was. As time has gone by Spyware websites have been slowly abusing the cookie to extract information from you. For example. If you go to a travel agent website and buy a ticket to Rome, for example, the travel agent might create a cookie that stores your personal details and your travel details. And the next time you fly with them, say to Paris, they create a cookie called paris. And so on. The purpose of a cookie is to help.
So in this example the cookie might be fed into their website and then it either shows you a special offer to Rome or Paris (because it knows you went there before) or it suggests a different destination for you. That is a helpful cookie. However. Because the website is a spyware website it also sends your travelling habits to advertising companies, who in turn send you junk mail. Some to do with Holidays but other to do with Caravans, Tent Sales and so on. Other spyware websites can go further.
They can fraud you. It doesn't take much for them to make a fake travel website, with cookies that store your credit card details. If you think about it, you normally pay for a holiday months in advance - Plenty of time for them to be using your credit card details for other purposes.
If every time you use the computer it starts to slow down, freeze, crash and/or restart, or completely stop every few minutes you might have a Virus, Worm, Spyware or all three. They will not always show themselves by displaying obvious pop-up advertisements. It depends who the programmers are. Amateurs, Show-Offs or Criminals. Show-Offs might purposely advertise their work to gain recognition, whereas Criminals are the opposite. They try to disguise their work as not to leave a trace of it. The amateur on the other hand is trying to become either a Show-Off or a Criminal but has not got there yet. Their work tends to crash the computer and/or be a nuisance copier/deleter of files. Of course it could just be that the computer is naturally slow and/or does not have any adequate protection installed on it, but if the computer is not naturally slow and/or does have adequate protection installed on it then you must assume the computer has been attacked.
READ THE NEXT SECTIONS CAREFULLY - THEY GIVE INFORMATION ABOUT PROTECTION.