Saturday, March 7, 2015

Avoid Bad PC Software

How to Protect your Computer from Corrupted Software Files

Attackers can insert malicious code into any file, including common file types that you would normally consider safe such as documents created with word processing software, spreadsheets, or image files. Depending on the type of code, you may infect your computer just by opening a file.

When corrupting files, attackers often take advantage of vulnerabilities they discover in the software that is used to create or open the file. These vulnerabilities can allow attackers to insert and execute malicious and hidden code.

Malicious code may do one or more of the following:

  • interfere with your computer's ability to process information by consuming memory or bandwidth (causing your computer to become significantly slower or even "freeze")
  • install, alter, or delete files on your computer
  • give the attacker access to your computer
  • using your computer to attack other computers.

What You Can Do

·                          Use and maintain anti-virus software. Anti-virus software can often recognize and protect your computer against most known viruses, so you may be able to detect and remove the virus before it can do any damage.

·                          Use caution with email attachments. Do not open email attachments that you were not expecting, especially if they are from people you do not know.

·                          Be wary of downloadable files on websites. Avoid downloading files from sites you do not trust. If you are getting the files from a supposedly secure site, look for a website certificate. If you do download a file, consider saving it to your computer and manually scanning it for viruses before opening it.

·                          Keep software up-to-date. Install software patches so that attackers cannot take advantage of known problems or vulnerabilities.
 
Take advantage of security settings. Check the security settings of your email client and your web browser for more information. Apply the highest level of security available that still gives you the functionality you need.

No comments:

Post a Comment