The IndUS Network e-magazine

 

How well are you protected on the internet?

Check how many myths you believe in ...


Internet has not only made it easy to network with your friends and families, but it has also made it easier for the harmful elements to intrude into your private life.

In earlier years, you were infected with spywares which corrupted your files and made your system non-functional. But today's malwares like Scareware, Ransomware and Identity theft bots are much advanced and can cause havoc to your day to day life. The Scareware (which really scares you) makes you believe that you are infected with virus and you have to clean it immediately with the software ready to be downloaded. Once downloaded, you are at their mercy. On the other hand, Ransomware (which really wants a ransom from you) makes you believe that you have broken a Government law and you need to pay a penalty within 72 hours or face a jail term. The penalty can be anywhere from $200 and upwards and has to be paid online immediately. Identify theft bots (automated programs) are not that scary like Scareware or Ransomware. But it resides stealthily on your computer waiting for you to disclose your bank pin or debit/credit card details. Once it captures the data it sends it to the Identify thieves network who use this data to withdraw your money or shop away with your credit card information at remote locations.

Now, how well are you protected against these threats on the internet? Do you believe in the following myths?
Time to know it!

Also, get familiarized with some of the Scareware pop-up images and Ransomware pop-up images you may encounter if you are attacked.


Image credit:drtech.bangordaily.com


Image credit: www.everyday-wisdom.com

"There is nothing on my computer which any one would want."

a. Yes, I believe this.
b. No, I don't believe this.
c. I don't have a strong opinion on this.

Answer: [b]
Don't think there is always a human behind a hacking. Internet is infested with millions of automated programs (also known as bots) which polls (looks) for vulnerable systems on the network. Studies have reported that it takes just 7 minutes for a new unprotected computer installed on internet to get compromised. So, your unprotected computer gets compromised whether you have important information or not! With more and more business transactions occurring over web (like web store, online tickets, bank payments) you are worth more than what you think!

There are tools available on internet to find your black market value and insurance available to protect you from any identity breach. Take a look!


Image credit: www.techietake.com

"It is very easy to know whether my computer has an infection; It will become slow and behave strangely. Moreover I have a free anti-virus software on my machine which can protect my computer"

a. Yes, I believe this.
b. No, I don't believe this.
c. I don't have a strong opinion on this.

Answer: [b]
Sorry, the infection techniques have evolved further. Today's malware (bad software) can stay dormant on your system for months or years before attacking you. For example, you can be infected with a keylogging malware (a software which can capture your keystrokes) which can stay dormant until you type your bank pin or you make a credit card purchase. All this thing can occur in the background without any noticeable impact to the performance (without taking CPU cycles).

There are 2 types of anti-virus softwares. One that protects you real time (when the attack is occurring) and One that helps to clean after the attack. It is preferable to get the first one as it saves lot of time cleaning. Check which family of free software you have. Additionally, your free anti-virus software may or may not be up to date with all virus signatures. So relying on free anti-virus software can make you vulnerable to malware attack. Believe us, this information is not provided to support any anti-virus software vendors but to educate you about the threat around you.


Image credit: nakedsecurity.sophos.com

"Malware comes from email attachment. If I don't open the attachment I am completely safe. Also, any link posted by my friends on social network (Facebook, Twitter) is safe."

Malware: Computer Virus, Worms, Trojan Horses and other software which are harmful to your system.

a. Yes, I believe this.
b. No, I don't believe this.
c. I don't have a strong opinion on this.

Answer: [a, b]
Even though the technique of sending malwares through attachment still exists, it is not your only threat. Today's threats come through URLs, Facebook links, Twitter links under your friends name. The simple technique is do not open an attachment or click on an URL unless you are sure about the orginiator. If you want to really check the safety of the URL, you can use this tool provided by Symantec.

Additionally, be informed that the malware problems are not extending into your smart phone, tablets and other hand held gadget world. It is now very important to be aware of other "nodes of vulnerability".


Image credit: readanddigest.com

"If my browser displays a locked padlock then the web site is safe."

a. Yes, I believe this.
b. No, I don't believe this.
c. I don't have a strong opinion on this.


Answer: [a, b]
This is the impression every one had until the heartbleed defect came to limelight. This highlighted the false security we are faced in this internet world. Always keep in mind that you are vulnerable to sniffing unless you are connected through a peer-to-peer, dedicated and encrypted connection.


Image credit:blog.getcertifiedgetahead.com

"My firewall can protect my system from drive-by attacks such as Scareware, Ransomware, Trojan Horses, Viruses and Worms."

a. Yes, I believe this.
b. No, I don't believe this.
c. I don't have a strong opinion on this.

Answer: [b]
Unfortunately, at this point, your firewalls are not fool-proofed to identify "drive-by" attacks which poses a regular traffic. This exposes you to Scareware (A malware which warns repeatedly that your computer is infected even though it is not infected), Ransomware (A malware which will not allow you to login to your computer until you call a number to pay to clean up), Trojan Horses (A malware which disguises behind a valid software), Viruses and Worms.

 

Bottomline, don't fall prey to common computer myths!

 

Bottomline, Don't fall prey for common computer myths!