What’s out there?
Viruses, hackers, malware, and identity theft are just a few of the dangers. Understand that these threats exist, they are real, and everyone is vulnerable. Something as simple as surfing the web can put you in danger from these threats.
What is malware?
Malware is the general term used to describe a piece of software or some type of computer application that is designed to disrupt, stop, or otherwise hinder computer operations. Malware covers viruses, Trojans, worms, spyware and other threats. Some of these threats, such as viruses, are especially dangerous due to their ability to replicate themselves and require little knowledge or skill to design, increasing the rate of viruses in circulation. Even though classifications like Trojans and worms technically aren’t viruses, they are still classified as malware and harmful to your computer. Even viruses that do nothing more than slow down your computer can occupy your computer’s resources until there is nothing left and the computer stops.
The Do’s and Don’ts
- Don’t click on links you’re unsure of, visit peculiar websites, or click links located within popup ads.
- Don’t download anything that you are unsure of.
- Make sure that your security software and operating system are up to date.
- Make sure whatever security application(s) you use are configured correctly.
- Monitor your system carefully for abhorrent behavior. Run scans immediately if the computer is acting oddly.
- Run your anti-malware/antivirus scan at least once a week.
Please do not hesitate to contact us at 800.936.7730 (U.S.) or 00800.4728.2000 (Int’l). You may also use the report fraud link to report any suspicious activity.
Risks of Social Media
- Accountability – You are legally liable for anything you post on social media sites.
- Identity theft – A very common risk associated with social media as people often post confidential information about themselves such as full name, birth date, address, etc. which can be used to gain access to even more sensitive information such as bank records and accounts.
- Computer Hackers – Computer savvy individuals who use social media as an outlet to place unwanted or intrusive programs on your computer.
- Social hackers – Individuals who exploit personal connections for their own gain and benefit.
- Privacy – Once you’ve posted something on a social media site, it is no longer private.
- Personal attacks – Personal information you share can be used against you or your friends/company etc.
Tips to avoid becoming the victim of a counterfeit check scam:
- Resist the urge to enter foreign lotteries. It’s illegal to play a foreign lottery through the mail or the telephone, and most foreign lottery solicitations are phony.
- Do your own research before getting involved with an employment opportunity too good to be true.
- Do not send money to someone you don’t know.
- Do not agree to deposit a check from someone you don’t know and do not wire or Western Union the money back. If an individual or company insists that you wire or Western Union funds, end the transaction immediately.
- Do not accept a check issued for more than your selling price. Ask the buyer to write the check for the correct amount. If the buyer refuses to send the correct amount, return the check. Don’t send the merchandise.
- Do not respond to offers that ask you to pay for a prize or gifts.
- Do not deposit a check if you do not know why you are receiving it or where it came from.
- Check references of the sellers for online auctions, almost all good auction sites have buyer and seller rating systems.
- Resist pressure to act now. If the buyer’s offer is good now, it should be good when the check clears.