|
Programs that are
installed on your computer with or without
your knowledge, intending to deliver
adverts to your desktop. More» |
|
|
|
Malware that covertly
installs itself onto your system and
changes your web browser settings.
You aquire a new StartPage or HomePage
that seems impossible to get rid of. More» |
|
|
|
Cookies are small
text files that some web sites place
in your computer to remind your browser
of specific information. For example,
they might store your preferences for
content so pages can be personalised
for you. Have you ever gone back to an
online store and found a couple of items
that you chose, still at the check out,
well that's achieved by a cookie. The
vast amount of cookies are designed to
enhance your visit to a site. Some sites
use session cookies that are
deleted when you exit your browser, while
others place persistent cookies,
which stay on your hard drive for long
periods. All good sites outline their
policy on cookies, usually within their
privacy statement. |
|
|
|
Malware that covertly
installs itself onto your system and
changes your internet dial-up settings
to a Premium Rate number. You may not
discover the breach until you query your
excessive phone bill. Dialers are NOT
a problem if you have a broadband connection. |
|
|
|
Designed to prevent
unauthorised access to or from a computer
or a network. Usually software based
but can be hardware based within a network
router or a Broadband modem. More» |
|
|
|
Users that spend
time attempting to breach online security
systems. Some do it just for the devilment
whilst others have pure criminal intent.
A Firewall helps to stop Hackers entering
your system when you are online. |
|
|
|
Malware
that captures all keystrokes made by
you and monitors for your bank and card
details. It usually has the
ability to transmit the captured information
to interested parties either via a network
connection or email. Your
personal data is then used in fraudulent
activity. More» |
|
|
|
A generic term
becoming popular to describe any form
of malicious software. Sometimes referred
to as rogue programs, they're the bad
side of Spyware. More» |
|
|
|
A term that covers
all the issues on this list. Whether
it's the theft of your personal details,
virus riddled emails or invading your
privacy. |
|
|
|
Pronounced 'fishing'.
Not Spyware or a Virus but a type of
scam. It's when fraudsters attempt to
obtain your personal information, usually
your bank details by duping you into
entering your details into either a dummy
web site, replying to a false email or
even by a phone call to your home. The
sites and emails are very convincing
and appear genuine, even to the trained
eye but give themselves away by the very
nature of what they are requesting you
to do. |
|
|
|
A new browser window
that appears on top of your current window,
smaller than normal and containing either
information or an advert.
You really need to take the time to know
how useful and how dangerous they can
be. More» |
|
|
|
Remote Access Trojans.
See Trojans below. |
|
|
|
A generic term
for programs that are installed on your
computer without your knowledge with
the intent of gathering information about
you, whether for commercial or criminal
reasons. More» |
|
|
|
Also known as Trojan
Horses or RATs (Remote Access Trojans)
it's a way of delivering Spyware onto
your system. The malicious code is hidden
within a seemingly harmless program.
Trojans are often used to infect you
with Keyloggers or Dialers. A favourite
with Hackers to allow them to open a
backdoor to your system. More» |
|
|
|
A small program
designed to make copies of itself over
and over again. The effects of a virus
can range from harmless messages to the
destruction of data and can be exucuted
at any given time and date. More» |
|
|
|
Very similar to
viruses in their replication but exploit
a users email system to send themselves
around the world. |
|
|
|
|