At the present time the main types of threats for the information on your computer are internet and e-mail. Great number of Malware includes viruses, Trojans, worms, that can penetrate your computer while you read an email message or an article on the Internet, search the information, open web-sites, download, and install software on your computer.
Malware spreads flash-like and harms your computer within a second so that it is very costly to restore your computer. The matter is not only in damaging the data, but in unauthorized access to the system, breaking its integrity, information leakage.
Spam – another important source of “troubles” – should not be forgotten about. Unrequired mail correspondence (spam) cam harm more than some Malware. Not being a source of direct threat, spam leads to waste of working time and can cause unjustified financial losses, these losses increase hundred and thousand times when it refers to a corporative computer network.
Each user who widely deploys modern informational resources should know what threats him/her and what consequences this or that malicious impact may cause. The most malicious sources of threats penetration are:
- Internet – global information net is the main source of spreading any type of Malware. As a rule viruses and other malicious programs are located on popular web-sites in Internet, “disguising” as useful and free software. Abound of scripts that run automatically when opening a web-site may also contain Malware.
- Email – mails received by the user stored in the mail bases, may contain viruses as well. Malware can be either in attachment or in the body of a message. As a rule mails contain viruses and mail worms. You can infect the data on your PC either when opening the massage or when saving on a disc a file attached to the message. Mail can also be the source of two other threats: spam and phishing. If spam causes mainly waste of time, then the aim of phishing is your confidential information (e.g. number of your credit card).
- Vulnerabilities in software – so called “holes” in software are the main source of hacker attacks. Vulnerabilities grant hacker remote access to your PC, and correspondingly to your personal data, to the LAN/Ethernet resources available to you, and other sources of information.
- Removable data carriers – removable drives and memory expansion cards (flash-cards) are still widely used to transfer information. By running a file saved on a removable carrier, you can harm the data on your computer with a virus and then involuntarily spread this virus onto other drives of your computer.
If you suspect that your computer is infected with viruses, we recommend you, then install a trial version of Kaspersky Internet Security 2014, update databases and run full computer scan. You can also download and install a free utility Kaspersky Virus Removal Tool 2011.