Hackers can do the unthinkable. Just when you thought you are safe behind your computer someone else holds you hostage. They seek out your weaknesses and ensure that they use them to their advantage. It is therefore important to do all you can to keep yourself safe.
Update your OS and other software frequently, if not automatically. This keeps hackers from accessing your computer through vulnerabilities in outdated programs. For extra protection, enable Microsoft product updates so that the Office Suite will be updated at the same time. Consider retiring particularly susceptible software such as Java or Flash.
Download up-to-date security programs, including antivirus and anti-malware software, anti-spyware, and a firewall (if your OS didn’t come pre-packaged with it). To trick even the most villainous hackers, consider investing in anti-exploit technology, such as Malwarebytes Anti-Exploit, so you can stop attacks before they happen.
Destroy all traces of your personal info on hardware you plan on selling. Consider using d-ban to erase your hard drive. For those looking to pillage your recycled devices, this makes information much more difficult to recover. If the information you’d like to protect is critical enough, the best tool for the job is a chainsaw.
No one should assume that they are safe from hackers. Hackers keep on improving their tactics hence they need to improve security measures for your computer. Do not disable updates on your computer. Ensure that you are using the latest browser.
Use the latest version of your web browser
Web browsers are vital applications, but just like other software, they can contain bugs. Hackers are quick to capitalise on these and create bogus (or infect genuine) web sites with data designed to exploit them. Once a web browser has been compromised in this way, a hacker can monitor everything you type, including passwords to credit card numbers. That’s why it’s vital to use the latest version of your web browser – anything other than this may be a security risk.
Google Chrome and Mozilla Firefox will also update themselves automatically, but don’t ignore their requests to restart the browser when such an update has been downloaded and is ready to be installed.
Don’t fall for phishing emails
Emails that appear to be from a recognisable online service asking you to log into a site to confirm some personal details are always fake.
These emails are usually caught by your email application’s spam filter, but if one does slip through and you click its link, your web browser should detect and block the site it takes you to.
Most of the times computer users believe that having an antivirus is enough but unfortunately an antivirus is not enough. You need to find out how authentic a malware is.
Fake antivirus messages
In slight decline these days, fake antivirus warning messages are among the surest signs that your system has been compromised. What most people don’t realize is that by the time they see the fake antivirus warning, the damage has been done. Clicking No or Cancel to stop the fake virus scan is too little, too late. The malicious software has already made use of unpatched software, often the Java Runtime Environment or an Adobe product, to completely exploit your system.
Unwanted browser toolbars
This is probably the second most common sign of exploitation: Your browser has multiple new toolbars with names that seem to indicate the toolbar is supposed to help you. Unless you recognize the toolbar as coming from a very well-known vendor, it’s time to dump the bogus toolbar.