Threats

There are very real dangers facing your computer. People can steal information, corrupt files, and even affect your computer’s overall performance. Knowledge about these threats is the key to preventing and/or fixing problems that you may encounter on the internet. Here are some of the predators that lurk in the shadows of the internet:


Command-and-Control

The command-and-control approach is used malware and/or compromised systems to stealthily communicate with an attacker’s remote server to receive malicious commands or export data.


Malware

Programs that seem innocent—screen-savers, shopping helpers, and toolbar add-ons—will sometimes be bundled with software known as malware. These unwanted programs can do things like hijack your web browser, add unknown software, launch pop-up ads, secretly track what websites you visit, record passwords, and slow down your computer.

Malware hides behind programs that usually provide you with some sort of service. Problems will begin cropping up after the malware is installed and can cause your computer to become unstable, thus putting the integrity of your data at risk if your hard drive should crash.

In the end, you and your department lose productivity and possibly expose sensitive information to unknown people. Is it worth the risk?


Phishing

Phishing (pronounced “fishing”) is the act of baiting users into providing sensitive information such as usernames, passwords, or credit card information by impersonating a trustworthy entity such as a bank, social media site, IT administrators, etc.

Emails and messages often direct to a fake websites whose look and feel are identical to the real one or to sites infected with malware. If the link’s URL is misspelled, if the messages comes from a public internet account or if it prompts you for banking information, close the window and go back following a previously bookmarked safe path. Google Support provides ways to recognize and protect yourself from suspicious messages that may attempt to compromise your safety.

If you receive a suspicious mail message on your UA Little Rock mail account, check our suspicious email alerts tool to see if the message is widespread or report the message to our assistance center.


Spam

Electronic junk mail, called spam, can be a major nuisance to anyone who receives it. Spam can eat up a lot of space on your email account or your computer’s hard drive. It can also create a lot of network traffic that slows net speeds for everyone.

The Report Spam button is in Google Mail along with the Archive and Trash commands.

Report Spam button

If the company sending you junk mail is not trustworthy, do not reply or try to unsubscribe. Any communication from you tells the sender that it is an active email address, encouraging them to send more. Instead, use the Report Spam feature within Google Mail’s web interface. This will help Google to improve their spam filter for everyone.


Viruses

There are dozens of ways that viruses are spread these days, including

  • opening unexpected email attachments
  • surfing unsafe websites
  • not performing security updates or virus scans regularly
  • downloading infected software

Using anti-virus software will greatly reduce your chance of infecting your computer with a virus and possibly spreading the virus software to others.

To learn about other types of malware, visit antivirus.comodo.com