Countdown: 10 Things Cyber Crooks Could Do To Your Computer, Without Even Touching It

infiltration_advpc2012.jpg

Protect Your Computer With Security Software

Most computer viruses can be blocked simply by downloading, and updating, security software. You may not have symptoms, but you may still be infected. Check these out…

10. Have fun with your computer

If your CD tray has ever opened on its own or your mouse has suddenly become erratic this could be a sign of an infection. Some viruses allow criminals to ‘play about’ with your device including switching off your monitor and turning your text to speech. Download and update your security software.

9. Use your computer to force other websites to close down

Criminals can use your computer to attack other websites in what is described as a Distributed Denial of Service (DDoS), whereby websites are overloaded with unnecessary internet traffic. DDoS attacks can bring down small business or important public information websites. Download and update your security software.

8. Spreading infections

Cyber criminals want to get their viruses into as many devices as possible, and they don’t just use websites and emails to do it. Infected CDs and USB sticks, and your WiFi network, are among the other ways they spread malicious software. Download and update your security software.

7. Force your computer to click on websites you don’t want to visit

Some viruses can control which websites you visit; even if you think you’ve typed in a legitimate site it could redirect you to inappropriate material or more malicious software, which infects your device further. Download and update your security software.

6. Randomly chat to you

If you’re infected you could find yourself speaking directly to a criminal. Through a virus, cyber crooks can talk directly to you with a pop-up chat window. And via this chat, criminals may send you infected web links or even blackmail you into doing what they say. Download and update your security software.

5. Take control of your computer 

Some viruses allow criminals to take control of your computer without even touching it. This allows them to open files, folders and emails, and take pictures of what appears on your screen. Download and update your security software.

4. Hijack your personal files and make you pay to get them back

By using viruses crooks can access your personal documents, music and photos, and then hijack them by demanding ransoms from you to get access to them again. If you don’t pay they threaten to delete them forever. Download and update your security software.

3. Record every key you hit on your keyboard

Viruses allow crooks to record every button you strike on your keyboard, either live as you type it or stored on their hard drive to be used later to access your personal information and banking details. Download and update your security software.

2. Steal your passwords

It’s always worth creating complex passwords, but if you’re not protected then you risk cyber crooks using viruses to collect your usernames and passwords. Download and update your security software.

1. Hack your webcam

Some viruses allow criminals to remotely access your webcam and microphone, and in some cases they may take screen shots from your cam to later blackmail you. Download and update your security software.

Next steps:

Download security software to keep your devices secure. If you already have security software installed, make sure it’s kept up to date. Find out more https://www.cyberstreetwise.com/security-software
Buzzfeed:http://http://bzfd.it/1uDtWPT

 

« Hack on United Airlines Makes CIA's Job More Difficult
US Insurance Underwriters Launch Cyber Security Program »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Exclusive Networks

Exclusive Networks

Exclusive Networks accelerate market entry and growth for innovative cybersecurity, networking and infrastructure technologies.

SecureNow Insurance Broker

SecureNow Insurance Broker

SecureNow is a commercial insurance broker based in India. Services offered include Cyber Risk insurance.

IDnext

IDnext

IDnext is the open and independent platform to support innovative approaches in the world of the Digital identity.

NSHC

NSHC

NSHC is a provider of mobile security solutions, cyber security consulting and training, and offensive research.

MENAInfoSecurity

MENAInfoSecurity

MENAInfoSecurity is a regional leader in information security solutions, assurance services and managed services.

Keepnet Labs

Keepnet Labs

Keepnet Labs is a phishing defence platform that provides a holistic approach to people, processes and technology to reduce breaches and data loss and presents anti-phishing solutions.

TM One

TM One

TM One is the enterprise and public sector business solutions arm of Telekom Malaysia Berhad (TM) Group.

SecureStack

SecureStack

SecureStack helps software developers find security & scalability gaps in their web applications and offers ways to fix those gaps without forcing those developers to become security experts.

Pragma Strategy

Pragma Strategy

Pragma is a CREST approved global provider of cybersecurity solutions. We help organisations strengthen cyber resilience and safeguard valuable information assets with a pragmatic approach.

SessionGuardian

SessionGuardian

SessionGuardian (formerly SecureReview) is the world's first and only technology which ensures second-by-second biometric identity verification of your remote user, from log on to log off.

Capital Network Solutions

Capital Network Solutions

Capital Network Solutions are a highly accredited managed IT services and consultancy provider, specialising in cyber security, infrastructure and communications.

PKI Solutions

PKI Solutions

PKI Solutions offers Public Key Infrastructure (PKI) products, services, and training to help ensure the security of organizations now and in the future.

BlueSteel Cybersecurity

BlueSteel Cybersecurity

BlueSteel is a compliance consulting firm that leverages deep system, data and application expertise to build sustainable cybersecurity solutions.

CDS

CDS

CDS is a strategic change agency enabling organisations and businesses to create and build better services to meet the evolving needs of customers, employees and citizens.

Cybervergent

Cybervergent

Cybervergent (formerly Infoprive) are a leading cybersecurity technology company in Africa. We provide cybersecurity guidance and solutions that help protect your business.

InnovateHer

InnovateHer

At InnovateHer, our vision is to make the tech sector more equitable, by increasing diversity across the spectrum and creating more inclusive workplaces.