Tampa Bay News and Lifestyles. Trinity Magazine. Vol. 17, Issue 5, May 2021

Page 12

Tech Talk with Bob: Malware Basics

Malware stands for malicious software. It is designed to break into and possibly harm your computer system, or even your online identity, without you knowing. Malware almost always hides itself. Some will even take control of your computer. There are many different types of malware which includes: viruses, Trojans, logic bombs, adware, spyware, rootkits, worms, etc. These terms can sometimes be confusing. So, let’s discuss a few. Viruses can be difficult to identify. They are sneaky and come in many different forms. A macro virus will exploit applications. When activated, it can cause significant damage and spread itself to other computers. For example, it can send itself as an attachment to all e-mail addresses in your address book. Sometimes a virus can be nothing more than an annoying pop-up on your computer screen. Other times its malicious code can be extremely dangerous because it can also purposely delete files from your computer’s hard drive. A Trojan is named after the Greek Trojan horse. A Trojan can be innocently mistaken to be an application like a screensaver or a game that you may unknowingly download and run because it looks cool or is fun to play. This type of malware is usually a free program you see on a website or

12 MAY 2021

is often recommended via email from a well-intentioned friend who is obviously ignorant of the threat it presents. Trojans do not typically harm your computer’s operation. They create a backdoor into your system giving an attacker access and complete remote control of your computer, without you ever knowing. Spyware is any application which sends private information about you without your consent or knowledge. Spyware tracks and reports back to its attacker data about your online digital activities. Information such as which websites you visit and for how long. They can even record your keystrokes to steal your login credentials (username & password). In addition to building a digital profile on you, spyware can steal your entire list of contacts (with all your friends’ & families’ personal information) and serve them up on a silver platter to the attackers, courtesy of an unprotected computer. Creating a malware defense strategy is the first step in protecting yourself. Second, do not rely solely on new out-ofthe-box anti-malware software. All anti-malware software needs to have its settings properly configured to provide you with the highest level of protection possible. It is best to have a certified professional configure

this software as soon as it is installed. And of course, it is best to install this software before your computer contracts a malware infection. Third, keep the software up to date. Be Safer My Friend. It is your responsibility to protect your personal network, your computer’s operation, and your data. Whether you are a

business or non-profit, even a home user, who keeps records about clients, customers, clubmembers, prospects, employees, vendors, sales, budgets, inventories, taxes… you get the idea; cyber criminals will exploit any easy, unprotected system. How safe is your system? My staff and I are here to keep your computer safer and keep you up and running. If you question your computer’s safety or performance, please have a professionally certified computer technician check it. Should you need a certified professional, call us now at 727-534-4000. We’ve been helping folks restore their peace of mind, and sanity, with their technology for decades. We Keep You Safer In Your Digital World!

For Advertising Info 727-943-0551 I info@nnlflorida.com or visit tbnewsandlifestyles.com


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.