Here are some answers to the most common questions about virus protection:
Q1. What is the difference between Anti-virus software, Anti-Spyware Software and Security Suite Software?
Security Suite software will include a firewall, spam filter, anti-virus and anti-spyware software all in one. Some Security Suite programs also have added items like browser protection to block known malicious websites, and may even include data backup software. While this may seem like a better way to go, some users just don't need a spam filter, or already have a firewall installed on their computer.
Anti-virus Clients: normally,just for viruses, as it will not come with a firewall or spam filter. However, most anti-virus clients will also include anti-spyware software to protect you against both threats.
Anti-spyware clients: Very few programs out there have just spyware protection. In many cases it will actually be a combined package to protect against viruses and spyware. This is not always the case, but our reviews let you know EXACTLY WHAT you are buying.
Q1. If you do not purchase goods or services on the Internet, can you become a victim of cybercrime?
While secure connections are certainly an encouraging sign, it may only be indicating that the communications between you and the Web site are protected. It does not always mean that you are at the Web site you think you are! Online fraudsters have become increasingly sophisticated and sometimes leverage secure connections to lull the victim into a false sense of security, because the padlock icon is illuminated in the browser. A secure connection to a fraudulent Web site still results in your data falling in the hands of the cybercriminal.
Virus Protection Tip: Practice safe online shopping. Know your sellers and use only secure sites.
Q2. Is purchasing goods or services on the Internet safe as long as you are connected to a Web site that supports secure transactions?
Even people who do not shop or bank online can be affected by cybercrime. All it takes is one visit to a hostile website, or even a benign website with an infected advertisement, and a machine can be infected with a crimeware program, such as a bot or Trojan horse.
Virus Protection Tip: Use secure transactions when transferring sensitive information and make sure you are dealing with a reputable company.
Q3. I don't use the net much, am I safe?
Automated bot programs are constantly scouring the Internet looking for fresh victims to infect. Even if you keep a low profile, the security of your computer will be tested by this relentless breed of crimeware. Moreover, the sheer volume of fraudulent "phishing" emails means that you are likely to receive a phony message sooner or later. While heavy Internet users may have more opportunities to become a victim, everyone using the Internet is exposed to the threat.
Virus Protection Tip: Read up on Cybercrime stories to learn more about how real people are affected by online fraud.
Q4. Are they just bored hacker kids?
While spyware is driven by a company`s desire to make money, so is the rest of crimeware, including bots, Trojan horses and even some worms. Malicious bot and Trojan horse authors are professional criminals, rather than playful adolescents, creating their ill-intentioned programs to sell on the black market for a profit. They run promotions, offer trial versions of their programs, and provide customer support to the thieves who purchase their crimeware.
Virus Protection Tip: Download the latest antivirus software to avoid becoming a victim of online fraud.
Q5. Bots (short for "robot") are all over the Internet. Some are good, some are bad, but are they here to stay?
While the multi-purpose bots used in crimeware attacks are certainly malicious, bots are used across the Internet for performing many automated tasks, such as assisting with shopping, managing Web sites, and searching for news group articles of interest to the user. Bot software, both good and bad, is often powerful, sophisticated, and easy to use; all reasons that bot programs, both helpful and harmful, will be with us for a long time.
Virus Protection Tip: Learn more about bots and how to protect yourself.
Q6. Are you protected against identity theft on the Internet if you have a firewall to keep out intruders, hackers and criminals?
Firewall software is an excellent first step towards securing your computer, but it is only the first line of defense. In fact, software alone cannot completely protect you from online identity theft – today’s attacks can be psychological in nature, luring the victim into providing confidential information, rather than exploiting a software flaw.
Virus Protection Tip: Learn more about phishing and pharming, and how you can avoid these online scams.
Q7. There’s little risk involved in letting other people use your computer, correct?
Anyone can be attacked on the Internet. Cybercriminals use automated tools to send millions of fraudulent emails in the hopes of finding a small number of vulnerable victims. They don't care who provides the hole they need to infect a machine, be it a spouse or a child, anyone is capability of being duped into making a mistake. Cybercriminals work quickly – a moment of bad judgment is all that is needed to open Pandora's Box.
Virus Protection Tip: Choose strong passwords and keep them safe.
Q8. Can photos and images be harmful?
Many recent software problems involve attackers sending attack code embedded in image files, such as photographs, to victims. The attack takes place when the victim is surfing the Web or reading an email and they encounter a Web page or message containing the contaminated photograph. When the photo is displayed, the attack code is triggered, infecting the victim's computer with crimeware.
Virus Protection Tip: Make sure to verify the authenticity of an attachment before you open it.
Q9. People who don’t use Microsoft Windows are safe, right?
The bad guys take advantage of Windows users because it is easy and leave Linux and Macintosh users alone. While Microsoft Windows users are certainly the most targeted population of Internet users, people using other operating systems and software are not immune to software flaws and fraud attacks. For example, the Firefox web browser had more confirmed vulnerabilities (25) than Internet Explorer (13) for the first half of 2005. This demonstrates that computer users cannot expect to eliminate their risk of attack online simply by choosing different software. Many of today's attacks such as phishing work independent of whatever software package you happen to be using.
Virus Protection Tip: Know what to do if you are targeted by cybercrimals
Q10. Will a legitimate company ask for personal information in an email message?
Even though it may look convincing, messages that urgently request personal information are likely bogus. Even before phishing messages became as prevalent as they are today, it was uncommon practice to request confidential information using email.
Virus Protection Tip: Never send your personal information (credit card numbers, passwords, etc.) in an email.
Reduce your chances of becoming a future victim of cybercrime by using latest antivirus softwrae.