How to Protect your Computer from Corrupted Software Files
Attackers
can insert malicious code into any file, including common file types that you
would normally consider safe such as documents created with word processing
software, spreadsheets, or image files. Depending on the type of code, you may
infect your computer just by opening a file.
When corrupting files, attackers often take advantage of vulnerabilities they discover in the software that is used to create or open the file. These vulnerabilities can allow attackers to insert and execute malicious and hidden code.
Malicious code may do one or more of the following:
When corrupting files, attackers often take advantage of vulnerabilities they discover in the software that is used to create or open the file. These vulnerabilities can allow attackers to insert and execute malicious and hidden code.
Malicious code may do one or more of the following:
- interfere with your computer's ability
to process information by consuming memory or bandwidth (causing your
computer to become significantly slower or even "freeze")
- install, alter, or delete files on
your computer
- give the attacker access to your
computer
- using your computer to attack other
computers.
What You Can Do
·
Use and maintain
anti-virus software. Anti-virus software can often recognize and protect your
computer against most known viruses, so you may be able to detect and remove
the virus before it can do any damage.
·
Use caution with
email attachments. Do not open email attachments that you were not expecting,
especially if they are from people you do not know.
·
Be wary of
downloadable files on websites. Avoid downloading files from sites you do not
trust. If you are getting the files from a supposedly secure site, look for a
website certificate. If you do download a file, consider saving it to your
computer and manually scanning it for viruses before opening it.
·
Keep software
up-to-date. Install software patches so that attackers cannot take advantage of
known problems or vulnerabilities.
Take advantage of security
settings. Check the security settings of your email client and your web browser
for more information. Apply the highest level of security available that still
gives you the functionality you need.
No comments:
Post a Comment