Difference between revisions of "Malware"
Bob Zenith (talk | contribs) m |
Bob Zenith (talk | contribs) |
||
Line 10: | Line 10: | ||
* Only transfer files from a trusted, secure source | * Only transfer files from a trusted, secure source | ||
* Keep security patches up-to-date; always update your software | * Keep security patches up-to-date; always update your software | ||
+ | |||
+ | |||
+ | == Popular Malware Removal Tools == | ||
+ | |||
+ | * Emsisoft Anti-Malware - [https://www.emsisoft.com/en/software/antimalware/ visit] | ||
+ | * MalwareBytes Anti-Malware - [https://malwarebytes.org/ visit] | ||
+ | * Microsoft Security Essentials - [https://www.microsoft.com/security_essentials/ visit] |
Revision as of 16:42, 24 July 2010
Malware is a category of malicious code that includes viruses, worms, spyware / adware programs, keyloggers, and Trojan Horses. Destructive malware will utilize popular communication tools to spread, including worms sent through email and instant messages, Trojan horses dropped from web sites, and virus-infected files downloaded from peer-to-peer connections. Malware will also seek to exploit existing vulnerabilities on systems making their entry quiet and easy. [1]
Protecting Yourself from Malware
- Only open emails, IMs, and attachments from trusted sources and/or when they are expected
- If possible, have emails and attachments scanned by an anti-virus or anti-malware software
- Delete all unwanted messages without opening them
- Do not click on any suspicious web links, or links from an unknown/suspicious sender
- Only transfer files from a trusted, secure source
- Keep security patches up-to-date; always update your software