Navigation

Internet Threats

  Prevention
  Cheque Fraud
  Credit Card Fraud
  Scams
  ATM Fraud
  Identity Theft
  Internet Threats

 

Internet Threats, Irritations & Hoaxes

Links to other pages on this web site

Adware, Malware, Spyware & Spam

 

Hoaxes

Malware : viruses, worms, Trojan horses

More malware : adware, spyware, spam and spim

 

Viruses, Worms & Trojan Horses

 

Protecting yourself: Links to this website

 

The Basics: What is Encryption?

 

Protecting yourself: Links to external websites

Defend Yourself Against Viruses and Worms

Protect Your Privacy, Your Family, and Your PC

Reducing Spam

 

14 Tips for Using Email Safely

 

Tips for sending and receiving ecards safely

Malware : viruses, worms, Trojan horses

 

Malware refers to malicious software. Software is potentially malicious if it can be used to harm either the computer on which it is hosted or another computer. Software may also be considered malicious if it is designed to install itself on a computer without the permission of the owner of that computer, particularly if it does so in a way that may compromise the security of the computer. Malicious may be loosely interpreted. A piece of software may be considered malicious even though it may have been launched with the intention of providing an arguable benefit. For example, the Nachi worm was intended to install updates from Microsoft's website. A wider term is unwanted software which includes spyware and adware. (Read more...)

 

More malware : adware, spyware, spam and spim

 

Potentially damaging forms of malicious software (malware) such as viruses, worms and Trojans infect large numbers of computers around the world and interfere with internet-based telecommunications (High Tech Crime Brief no.10). Other forms of intrusive program, not necessarily as damaging as, but potentially hiding these more virulent types of malware, circulate as adware, spyware, spam and spim. Even where these forms of malware are free from code that can damage or interfere with computer functions, they can still be misused to promote unwanted products, disseminate offensive content, or provide unauthorised access to personal and financial information. (Read more...)

 

The Basics: What is Encryption?

 

Encryption in e-mail and other digital files can protect data from prying eyes.

 

The Internet has changed the way companies do business, allowing a growing number of small and medium-sized firms to pay bills, conduct financial transactions with partners and sell goods and services to customers online. But the Internet has also made it more possible for sensitive company information and private customer information to be tracked and gathered and stolen online, including credit card numbers, social security numbers, bank account data, and other sensitive information that could be exploited if it ends up in the wrong hands. (Read more...)