Lets think viruses and how to avoid them.

Posted on by Mandy Posted in

think_social_bluecomputerSocial media allows us to connect on a personal level to the entire world, unfortunately,it also opens us up to a whole new world of potential viruses.

While there are many similarities between spyware, ad-ware and viruses, the biggest difference is the purpose.Until recently, money seemed to be the main motivator for individuals to target innocent people online.Hackers comb social media networking platforms looking for people who are lackadaisical about their Internet security and who openly provide personal information.

With viruses money can always be a factor, but it is not always the only reason.

A major reason why someone would want to create a virus is to increase their own computing power.

This is how it works. A computer programmer (to use the term loosely) somewhere in the world decides to attack a large company in an attempt to cause a disruption of service or to steal information. In order to do this, he or she would need a huge amount of computing power.To get this computing power,they create a virus that “hijacks” infected computers giving the programmer complete control of the “droned” computers. They use the droned computers for their own purposes, stealing the infected computers power.

Sometimes simple ego is a major motivator.Rouge programmers have been known to create and distribute disruptive viruses for no other reason than gaining bragging rights. Imagine loosing years of files and documents so some “hacker” can obtain a thumbs up reputation from their internet friends – friends they probably do not even know or have never met.

Does not seem like a good reason, now does it?

The truth is, there is just as many reasons for hackers to create viruses as there are actual viruses.It does not really matter what the reasons are, any virus will have adverse and potentially unsafe effects on your ability to do what you want with your own computer.

Like a bad flu bug, when your computer is infected, you risk infecting others and no one wants to be around you when your “sick”.It is the same on the Internet, if your computer is infected, no one wants to friend you in fear of becoming infected themselves.

The golden rule of viruses: ‘Do not install what you do not trust and never open email from someone you do not know’, but remember the bad guys are tricky and very good at what they do so you must be vigilant.

The good news is,the “good guys” are more concerned with combating these viruses then the cause of them. To this end, anti virus software and spyware provide excellent protection against the threat of viruses.

Most can detect and remove viruses that already have infected your computer.

A computer is a costly investment,often it is your only social connection to friends and family, it just makes sense to protect it.

Who needs an expensive paper weight?

If you do not protect you computer properly, that is what it just may become; one gigantic paperweight.

Think social wishes to remind you to play on line, just make sure to play safe when you do. If you have installed a firewall, anti virus software and anti spyware software you should be well protected, but you still need to proceed with caution when dealing with others online.

  • Do not give your passwords to strangers.
  • Do not provide too much personal information.
  • Do not use a credit card or pay pal on an unsecured website.

Remember when you join a social media group, your are opening yourself up to a multitude of strangers.Albeit, it is nice to be able to communicate with others this way ,you must always be vigilant about providing too much personal information.

You do not have to give any other information than an email address to join most places. You can easily use a yahoo or other provider email and not your home or business email.   If you want to be extra safe, you can make a pen name or ghost personality.

Whatever you choose to do, we hope you remember one simple rule “Think Social,” be safe and have fun.

 

 

Think Socially and Share!
Comments:   0

 

 

 

*

*

Post a Comment

Required fields are marked *