Internet Threats

  Cheque Fraud
  Credit Card Fraud
  ATM Fraud
  Identity Theft
  Internet Threats


Internet Threats, Irritations & Hoaxes

Links to other pages on this web site

Adware, Malware, Spyware & Spam



Malware : viruses, worms, Trojan horses

More malware : adware, spyware, spam and spim


Viruses, Worms & Trojan Horses


Protecting yourself: Links to this website


The Basics: What is Encryption?


Protecting yourself: Links to external websites

Defend Yourself Against Viruses and Worms

Protect Your Privacy, Your Family, and Your PC

Reducing Spam


14 Tips for Using Email Safely


Tips for sending and receiving ecards safely

Malware : viruses, worms, Trojan horses


Malware refers to malicious software. Software is potentially malicious if it can be used to harm either the computer on which it is hosted or another computer. Software may also be considered malicious if it is designed to install itself on a computer without the permission of the owner of that computer, particularly if it does so in a way that may compromise the security of the computer. Malicious may be loosely interpreted. A piece of software may be considered malicious even though it may have been launched with the intention of providing an arguable benefit. For example, the Nachi worm was intended to install updates from Microsoft's website. A wider term is unwanted software which includes spyware and adware. (Read more...)


More malware : adware, spyware, spam and spim


Potentially damaging forms of malicious software (malware) such as viruses, worms and Trojans infect large numbers of computers around the world and interfere with internet-based telecommunications (High Tech Crime Brief no.10). Other forms of intrusive program, not necessarily as damaging as, but potentially hiding these more virulent types of malware, circulate as adware, spyware, spam and spim. Even where these forms of malware are free from code that can damage or interfere with computer functions, they can still be misused to promote unwanted products, disseminate offensive content, or provide unauthorised access to personal and financial information. (Read more...)


The Basics: What is Encryption?


Encryption in e-mail and other digital files can protect data from prying eyes.


The Internet has changed the way companies do business, allowing a growing number of small and medium-sized firms to pay bills, conduct financial transactions with partners and sell goods and services to customers online. But the Internet has also made it more possible for sensitive company information and private customer information to be tracked and gathered and stolen online, including credit card numbers, social security numbers, bank account data, and other sensitive information that could be exploited if it ends up in the wrong hands. (Read more...)