How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer

If you use the internet, you have probably been infected with a virus, trojan or spyware. According to the SANS Internet Storm Center, the average unprotected PC is infected within 20 minutes of normal internet usage. Many people want to know what they did to get infected. Unfortunately, usually it was just one wrong click.

Here are the top reasons people get infected and how to prevent these common internet security threats.

10. Exchanging files in chat rooms.
You should never download files from sources you don't trust. Viruses and other internet security threats can look like valid files or photos. Always scan files with a virus scanner before opening them.

9. Clicking on popup ads.
If you're like most people, you probably don't like popup ads. But whether you like them or not, you should never click on them. Popup ads can take you to a website that secretly downloads adware onto your computer. Enabling a popup blocker on your computer can help protect you. Some popups come from adware programs that have downloaded onto your computer, so if you still see popups after installing a popup blocker, scan your computer for spyware or adware.

8. Email attachments.
Viruses can be sent out as email attachments to infect your computer if you open them. If you download your email into an email program, scan all email attachments with a virus scanner. Most major webmail programs scan attachments before you download them, but you should still not download files from unknown sources. "Phishing" email, claiming to be from your bank or other financial institution which asks you to provide personal information or download something to your computer is another common email threat.

7. Instant messaging.
Because people are cautious with email attachments, new viruses are spreading through instant messaging programs. Infections look like valid files or photos, so always be careful accepting file transfers, even from sources you trust.

6. Downloading music.
Many websites that advertise free music downloads are loaded with spyware. You can even get spyware from these websites without manually starting a download. Other sites make you accept a spyware download to get the music you want.

5. Browsing websites.
Some websites use "drive-by downloads" ? misleading dialogue boxes to secretly install spyware programs. Sometimes spyware can install even if you do not choose "yes" or "accept". Keep your browser security settings on default to protect yourself against these infections.

4. Installing free programs or screen savers.
Check the license agreement of any program you install to confirm it does not come bundled with other programs. License agreements are supposed to explain if the software you are downloading will cause advertisements or other downloads. These programs may have long or confusing license agreements where they have buried this information. Always carefully read what you agree to before you download free software.

3. Adult-related websites.
Many of these sites make a profit by forcing viewers to download spyware and adware to access their site. You may not be able to view these sites if you are using a secure browser or have your security settings too high.

2. P2P programs like Kazaa or Limewire.
If you share music using peer-to-peer networks, you may be forced to download advertising software onto your computer. This software can generate popups from within your computer. In these cases, you may see popups even if you are not online.

1. Gaming websites.
It may seem that viewing spoilers for online games will let you win faster, but it can slow down your computer with spyware. Mick Lathrop, part of StopSign's Spyware Research team says, "I get most of my spyware samples from gaming-related websites." Avoid any site that requires a software download to access information.

Even if you have an anti-virus product on your computer, confirm that it protects against the growing threat of spyware. Enable a popup blocker and firewall for further protection. Using safe browsing habits and good security software can keep you safe on the internet.

Marla Porter is part of the Product Development Team at eAcceleration Corp., the makers of StopSign anti-virus and spyware remover. StopSign detects and removes viruses, trojans, spyware, worms, keyloggers and browser hijackers. Learn more about StopSign at http://www.stopsign.com. StopSign is a product of eAcceleration Corp: http://www.eacceleration.com.

In The News:


pen paper and inkwell


cat break through


How Can Someone Get Private Information From My Computer?

From the "Ask Booster" column in the June 17, 2005... Read More

Whats All This I Hear About Firewalls?

At this point, if you've got the whole "turning the... Read More

From Spyware with Love!

It's late. You've been scouring the web for that perfect... Read More

Identity Theft Article ? A Phisher Is Trying To Steal Your Identity!

Sooner or later everyone with an email account will receive... Read More

Watch Out For That Scam

The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More

Free Spyware Removal - Its Not As Easy As It Sounds

Nobody wants to pay to remove spyware. At the very... Read More

Internet Small Business and Fraud

Be careful of sites that promise to send you "instant... Read More

The Attack of the Advertiser - Spy Mother Spy

The menacing campaigns that drive the corporate spyware and adware... Read More

Virus and Adware - Fix them Both!

We all get the odd virus now and then, but... Read More

How to Protect Your Child from the Internet

When the Internet first came about, it was realized it... Read More

Is Shopping Online For Your Horse Gifts Safe?

Shopping for horse gifts or other gift items on the... Read More

New Mass Mailing Spamming Internet Trojan for the Windows Platform

May. 16th 2005 - MicroWorld has reported the discovery of... Read More

Web Browsing - Collected Information

You may not realize it, but as you are surfing... Read More

A New Era of Computer Security

Computer security for most can be described in 2 words,... Read More

All About Computer Viruses

Your computer is as slow as molasses. Your mouse freezes... Read More

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

The Important Steps To Protect Your Kids on the Internet

Internet is the ocean of knowledge. In this ocean you... Read More

Three-pronged Trojan Attack Threatens Security on the Internet

Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More

How to Protect Yourself Against Online Criminals

Credit card fraud is a growing problem for online businesses... Read More

Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk

The trash folder in my main inbox hit 4000 today.... Read More

Computer Viruses, Worms, and Hoaxes

In recent days, I was one of the unfortunate persons... Read More

Fishing for Fortunes. Scam!

Spelt phishing, but pronounced as above, this despicable act is... Read More

Hacking the Body Via PDA Wireless Device

First I would like to stress I am condoning the... Read More

Steganography ? The Art Of Deception & Concealment

The Message Must Get Through The year is 300A.D.,... Read More

Check Out That Privacy Policy

Before you enter your name, address or any other data... Read More

Is Your Music Player Spying On You?

In today's times spyware is a very serious issue and... Read More

Password Security and Safety

There is nothing more important that password security in world... Read More

Cyber Crooks Go Phishing

"Phishing," the latest craze among online evil-doers, has nothing to... Read More

Phishing ? Its Signs and Your Options

Phishing is the act of some individual sending an email... Read More

An Open Letter From a So-called Stupid

Someone recently told me, "You would have to be a... Read More

Social Engineering: You Have Been A Victim

Monday morning, 6am; the electric rooster is telling you it's... Read More

How to Get Rid of New Sobig.F Virus?

As you know, this time the virus under the name... Read More

HackAttack

P C. owners are constantly at risk from attacks by... Read More