Some Common Internet Security Terms Explained
Phishing: This is a scam where the criminal poses as someone else in order to steal information from the victim. The most common is in the form of a email sent to the victim(s) asking to 'confirm your bank details by clicking the link'. The link will usually direct the victim to a fake site similar where they will enter personal information. The criminal will then use this information to commit some other fraud like steal you money and even your identity. Genuine companies will never ask for any personal information so never give your details in this form. It is very easy to copy a genuine website and make it appear exactly like the site you would expect. Always enter the web address manually into the address bar, or call the company to check and report the scam.
Pharming: This is similar to phishing but more dangerous because the criminal is able to redirect you from a legitimate website to their fake site without you knowing, even if you type the address manually. It is done through a process called 'DNS cache poisoning where the criminal is able to trick the local servers into providing you with a different website to the one you asked for. It is like changing the street signs to send traffic down the wrong street. Most websites that ask for personal information will have a small padlock in the lower right corner. You can check if the site is real by clicking the padlock to view the sites security certificate.
Joe- job: This is a type of spam where the sender poses as someone else in order to damage their reputation. It is usually done by a business to a competitor in order to damage their reputation and steal their customers. For example Yahoo could pose as Google and send out billions of unsolicited email saying 'We will now be charging to use our search engine" or something similar. The receiver would assume this has originated from Google and probably stop using the product. They may also report Google as a spammer which would result in further damage and possible fines. The same can be done by posing as someone else on forums and even the phone. Unfortunately it is currently very hard to pick a Joe- job but steps are being taken to help identify the sender of any email which will make it easier to track.
Evil Twin: Criminals set up a wireless network posing as a legitimate network. The idea is to trick users into thinking it is a trusted network and connecting. Once connected the criminal can track online activity and possibly steal files.
Spyware: This is a piece of software that secretly gathers information about the user. Spyware can track the websites you visit and even the keystrokes you make. This information can be used for advertising and marketing purposes but can also be used for criminal purposes. Spyware can be part of another program you buy or download, but can also come from email attachments and websites you visit. Luckily there are a range of products available to find and remove spyware,
Adware: This is a piece of software on your computer that automatically displays advertising material. Some adware is straight forward about what it is, such as a free file sharing programs that displays ads while you use it. Others are more like a virus and will open at unexpected times and are hard to remove. Adware may also work with spyware and send you targeted ads based on the information the spyware is collecting.
Viruses: Viruses or worms are software that generally has not purpose except to cause damage. Some viruses attack files while others will replicate to use up memory and other resources. Some viruses can even send emails without you knowing so they can infect other computers. Viruses are very hard to identify but most are controlled with anti virus software. It is usually the newest viruses that are most damaging because there is no cure. To help protect yourself you should never open email attachments without knowing what they are.
Related Tags: seo, spyware, adware, hosting, spam, security, host, viruses, phishing, safe, pharming
Dave is part of the research and development team for http://spamsafesites.com - a network of websites that are certified not to send spam or sell their customer's personal information. http://spamsafesites.com helps websites build trust with their visitors and boost sales.
Your Article Search Directory : Find in ArticlesRecent articles in this category:
- Free Internet Security Software from Google
Selecting the internet security software for your computer can be a daunting task for most home user - Home Key Logger - Track Computer Activity
What goes through your mind when you think about a home key logger? Do you think about a rogue progr - Computers and Electronics Have Changed The Way We Live
You push the on button and your monitor screen springs to life. Next, you use your mouse to bring up - What PacketShaper Can Do For You?
What is PacketShaper?It is an application-intelligent traffic management system which delivers predi - Key Logger Software for Your Computer
One thing that many of us are concerned about is the safety of our children and what happens when th - Keep Your PC Healthy With Computer Tips & Tricks
Everybody just has to have a computer these days. Life without a computer is unimaginable. I am sure - Antivirus - What is a Computer Virus?
Before understanding what a computer virus is, it is necessary to understand what a virus in when it - Gibberish Spam Email - Why Do Spammers Send It?
We have all seen many spam emails that just make no sense. They contain pure gibberish in the subjec - Your Children And The Internet - 5 Tips To Keep Your Children Safe While They Are Online
If your children are on the Internet you may be concerned about their safety. We hear stories regula - How To Compare Residential VOIP Offerings
Many people are turning to VOIP phone for several different reasons, the biggest reason being cost.
Most viewed articles in this category:
- Experience the new Microsoft Zune and Future Technology with Bill Gates at CES Keynote
After the demonstration of Windows Vista by Bill Gates at the CES keynote, Robbie Bach, President of - Internet Connection Sharing in Windows XP
This articles explains in detail how to set up a small network at home so you can share your Interne - Nortel VPN Client Overview
The Nortel VPN Client creates the secure connection for VPN users into a private network. Once you l - Computer Phobias
Years ago around the end of January I would develop Chinophobia (fear of snow). Maybe it was becaus - CCTV: the story continues
CCTV – Closed Circuit Television – for some time at least has been used by various gover - iPod Stuff: How To Set Your iPod's Alarm Clock
The good thing about the iPod alarm clock feature is that you can wake up with the tune of your favo - Why Someone Stole My Mobile Phone
Not so long ago my mobile phone was stolen. I kept asking why I was the one who got targeted, especi - Computer hardware simplified
Computer Hardware is a comprehensive term which refers to all the physical parts of a computer inclu - Office printers: introduction to technology and types
With every bit of information transfer and manipulation going digital these days, almost the entire - Cordless phone technology: a brief history
Cordless Phones – as the term suggests – is a phone sans any cord. Instead the handset c