Countdown: 10 Things Cyber Crooks Could Do To Your Computer, Without Even Touching It

infiltration_advpc2012.jpg

Protect Your Computer With Security Software

Most computer viruses can be blocked simply by downloading, and updating, security software. You may not have symptoms, but you may still be infected. Check these out…

10. Have fun with your computer

If your CD tray has ever opened on its own or your mouse has suddenly become erratic this could be a sign of an infection. Some viruses allow criminals to ‘play about’ with your device including switching off your monitor and turning your text to speech. Download and update your security software.

9. Use your computer to force other websites to close down

Criminals can use your computer to attack other websites in what is described as a Distributed Denial of Service (DDoS), whereby websites are overloaded with unnecessary internet traffic. DDoS attacks can bring down small business or important public information websites. Download and update your security software.

8. Spreading infections

Cyber criminals want to get their viruses into as many devices as possible, and they don’t just use websites and emails to do it. Infected CDs and USB sticks, and your WiFi network, are among the other ways they spread malicious software. Download and update your security software.

7. Force your computer to click on websites you don’t want to visit

Some viruses can control which websites you visit; even if you think you’ve typed in a legitimate site it could redirect you to inappropriate material or more malicious software, which infects your device further. Download and update your security software.

6. Randomly chat to you

If you’re infected you could find yourself speaking directly to a criminal. Through a virus, cyber crooks can talk directly to you with a pop-up chat window. And via this chat, criminals may send you infected web links or even blackmail you into doing what they say. Download and update your security software.

5. Take control of your computer 

Some viruses allow criminals to take control of your computer without even touching it. This allows them to open files, folders and emails, and take pictures of what appears on your screen. Download and update your security software.

4. Hijack your personal files and make you pay to get them back

By using viruses crooks can access your personal documents, music and photos, and then hijack them by demanding ransoms from you to get access to them again. If you don’t pay they threaten to delete them forever. Download and update your security software.

3. Record every key you hit on your keyboard

Viruses allow crooks to record every button you strike on your keyboard, either live as you type it or stored on their hard drive to be used later to access your personal information and banking details. Download and update your security software.

2. Steal your passwords

It’s always worth creating complex passwords, but if you’re not protected then you risk cyber crooks using viruses to collect your usernames and passwords. Download and update your security software.

1. Hack your webcam

Some viruses allow criminals to remotely access your webcam and microphone, and in some cases they may take screen shots from your cam to later blackmail you. Download and update your security software.

Next steps:

Download security software to keep your devices secure. If you already have security software installed, make sure it’s kept up to date. Find out more https://www.cyberstreetwise.com/security-software
Buzzfeed:http://http://bzfd.it/1uDtWPT

 

« Hack on United Airlines Makes CIA's Job More Difficult
US Insurance Underwriters Launch Cyber Security Program »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cyberlytic

Cyberlytic

Cyberlytic applies artificial intelligence to combat the most sophisticated of web application threats, addressing the growing problem of high volumes of threat data.

Cybero

Cybero

Cybero offers professional corporate cybersecurity training tailored to your business requirements.

Samoby

Samoby

Samoby provide a subscription solution for Mobile Threat Protection and usage control on Android and iOS devices.

ODSC

ODSC

ODSC is a security systems integrator that provides services and expertise in identity management and access.

ReFirm Labs

ReFirm Labs

ReFirm Labs provides the tools you need for firmware security, vetting, analysis and continuous IoT security monitoring.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

AngelList

AngelList

AngelList champion startups and the people who empower them. Search tech & startup jobs, find new tech products, and invest in startups.

YesWeHack

YesWeHack

YesWeHack offers companies an innovative approach to cybersecurity with Bug Bounty (pay-per-vulnerability discovered) to identify and report vulnerabilities in their systems.

ditno

ditno

ditno uses machine learning to help you build a fully governed and micro-segmented network. Dramatically mitigate risk and prevent lateral movement across your organisation – all from one centralised

Cubro Network Visibility

Cubro Network Visibility

Cubro network visibility solutions remove network monitoring ‘blind spots’ to provide enhanced visibility and control of all data transiting a company’s network.

Critical Insight

Critical Insight

Critical Insight provide Managed Detection and Response, Vulnerability Detection, and Cyber Security Consulting Services to help you secure your mission-critical systems.

APCERT

APCERT

APCERT cooperates with CERTs and CSIRTs to ensure internet security in the Asia Pacific region, based around genuine information sharing, trust and cooperation.

Box

Box

Box is the Cloud Content Management company that empowers enterprises to revolutionize how they work by securely connecting their people, information and applications.

Mindcore Technologies

Mindcore Technologies

Mindcore provide cyber security services, managed IT services and IT consulting services to businesses in NJ, FL, and throughout the United States.

Longbow Security

Longbow Security

Longbow automates root cause for your application and cloud risks, enabling teams with intelligent remediation actions that reduce the most risk with the least effort.

Boldend

Boldend

Boldend offers leading-edge offensive and defensive cybersecurity solutions that empower government and commercial organizations to stay resilient in an evolving threat landscape.