Countdown: 10 Things Cyber Crooks Could Do To Your Computer, Without Even Touching It

infiltration_advpc2012.jpg

Protect Your Computer With Security Software

Most computer viruses can be blocked simply by downloading, and updating, security software. You may not have symptoms, but you may still be infected. Check these out…

10. Have fun with your computer

If your CD tray has ever opened on its own or your mouse has suddenly become erratic this could be a sign of an infection. Some viruses allow criminals to ‘play about’ with your device including switching off your monitor and turning your text to speech. Download and update your security software.

9. Use your computer to force other websites to close down

Criminals can use your computer to attack other websites in what is described as a Distributed Denial of Service (DDoS), whereby websites are overloaded with unnecessary internet traffic. DDoS attacks can bring down small business or important public information websites. Download and update your security software.

8. Spreading infections

Cyber criminals want to get their viruses into as many devices as possible, and they don’t just use websites and emails to do it. Infected CDs and USB sticks, and your WiFi network, are among the other ways they spread malicious software. Download and update your security software.

7. Force your computer to click on websites you don’t want to visit

Some viruses can control which websites you visit; even if you think you’ve typed in a legitimate site it could redirect you to inappropriate material or more malicious software, which infects your device further. Download and update your security software.

6. Randomly chat to you

If you’re infected you could find yourself speaking directly to a criminal. Through a virus, cyber crooks can talk directly to you with a pop-up chat window. And via this chat, criminals may send you infected web links or even blackmail you into doing what they say. Download and update your security software.

5. Take control of your computer 

Some viruses allow criminals to take control of your computer without even touching it. This allows them to open files, folders and emails, and take pictures of what appears on your screen. Download and update your security software.

4. Hijack your personal files and make you pay to get them back

By using viruses crooks can access your personal documents, music and photos, and then hijack them by demanding ransoms from you to get access to them again. If you don’t pay they threaten to delete them forever. Download and update your security software.

3. Record every key you hit on your keyboard

Viruses allow crooks to record every button you strike on your keyboard, either live as you type it or stored on their hard drive to be used later to access your personal information and banking details. Download and update your security software.

2. Steal your passwords

It’s always worth creating complex passwords, but if you’re not protected then you risk cyber crooks using viruses to collect your usernames and passwords. Download and update your security software.

1. Hack your webcam

Some viruses allow criminals to remotely access your webcam and microphone, and in some cases they may take screen shots from your cam to later blackmail you. Download and update your security software.

Next steps:

Download security software to keep your devices secure. If you already have security software installed, make sure it’s kept up to date. Find out more https://www.cyberstreetwise.com/security-software
Buzzfeed:http://http://bzfd.it/1uDtWPT

 

« Hack on United Airlines Makes CIA's Job More Difficult
US Insurance Underwriters Launch Cyber Security Program »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MetaFlows

MetaFlows

MetaFlows’ SaaS malware detection & prevention software passively analyzes the behavior and the content of Internet traffic.

Privacy Analytics

Privacy Analytics

Privacy Analytics enables healthcare organizations to unleash the value of sensitive data for secondary purposes without compromising personal health information.

Stealthbits Technologies

Stealthbits Technologies

Stealthbits Technologies is a cybersecurity software company focused on protecting an organization's sensitive data and the credentials attackers use to steal that data.

Exatel

Exatel

Exatel is Poland’s leading provider of ICT security services.

Anect

Anect

Anect is a leading provider of ICT security and services for hybrid and cloud solutions.

ITRenew

ITRenew

ITRenew is a leading global IT lifecycle management solutions company, specializing in onsite data center decommissioning and data erasure services.

Beosin

Beosin

Beosin is a blockchain security company providing cybersecurity services including security audits, on-chain asset investigation, threat intelligence and wallet security.

LOGbinder

LOGbinder

LOGbinder eliminates blind spots in security intelligence for endpoints and applications.

Red River

Red River

Red River is a technology transformation company, bringing 25 years of experience and mission-critical expertise in analytics, cloud, collaboration, mobility, networking and security solutions.

Trapp Technology

Trapp Technology

Trapp Technology combines the very best cloud, Internet, IT managed services, and IT consulting to provide a true all-in-one IT solution for small to mid-sized businesses.

Accedian

Accedian

Accedian is a leader in performance analytics and end user experience solutions, dedicated to providing our customers with the ability to assure their digital infrastructure.

SecurityGen

SecurityGen

SecurityGen is a global cybersecurity start-up focused on telecom security, with a focus on 5G networks.

AnyTech365

AnyTech365

AnyTech365 is a leading European IT Security and Support company helping end users and small businesses have a worry-free experience with all things tech.

Conceal

Conceal

Conceal’s mission is to stop ransomware and credential theft for companies of all sizes by developing innovative solutions that provide social engineering protection in any browser.

Cyber Defense International (CDI)

Cyber Defense International (CDI)

At CDI, we utilize decades of experience in designing and building large-scale cybersecurity programs, creating tailored solutions and services that protect businesses from cyber threats.

appNovi

appNovi

appNovi inventories everything to map the attack surface, identify missing security agents, and prioritize vulnerabilities based on exposure.