Have you ever Googled a topic, and when you click on the information get a pop up screen stating a virus has just been downloaded in your computer? This has happen to me with the pop-up stating I need to call a 800-number to have the virus fixed.
I have dialed the number and allowed the Technician to electronically look at all the programs on my computer, and show me where the malware has been installed in my computer. Please, try not to make this mistake. I could have easily opened the door to them installing spyware on my computer right before my eyes watching them go through all my programs.
The Technician will tell you they can fix the virus at no cost, then hit you with some fear, only to try to charge you a fee to remove the virus.
A better way to handle this is to purchase a tech-maintenance plan for your computer, a trusted resource you can call to remove the virus at any time for a one time cost for the period of the tech-maintenance agreement.
I have learned no matter what anti-virus protection I have on my computer, it still can get hit with a virus, or some type of malware.
My respected Colleague below shares some very good tips to protect your computer.
Please join me in wishing for all the Hackers in the world, may the unexpected costly expense, frustration, fear, and inconvenience they cause others come back on them a thousand times fold.
The biggest mistake that you can make to threaten your online safety is to treat the online world different—as far as your private information—than you would treat the physical world. In other words, if someone walked up to you and said, “Hi, can you please provide me with your name, address, birth date, home phone, cell phone, email, usernames, passowords all your friends names and all their contact info?” I think not.
What sane person would pass out cards with their Social Security number, birth date, full name, home address and bank account information to every stranger they walk past on the street? But essentially, that’s what many people do online.
Here are seven risky online behaviors:
- Posting photos. As innocent as this sounds, photos of children have been known to get stolen and posted on child porn sites. Right click, save image as, then save to desktop; that’s all it takes. Does this mean never post photos of your kids? No. But save the picture of your naked two-year-old girl in the bathtub for your desktop. And don’t post vacation photos until after you return home.
- Another thing about photos: Don’t post pictures of yourself engaging in activities that could come back to haunt you in some way. For example, you post a picture of yourself smoking while at a picnic. You apply for new health insurance and say you’re a nonsmoker. The insurance company might decide to view your social media pictures to catch you in the act.
- Sounds innocent: You let your kids use your computer. But even if there are parental controls in place, your kids can still unknowingly let in a virus. Then you sit down to do some online banking…and the hacker whose virus is in your computer will then have your login credentials and bank account numbers, plus everything else. Ideally, you use a designated computer only for conducting sensitive online transactions.
- A hacker sends (via bot) out 10,000 e-mails that are made to look like they’re from UPS. Out of 10,000 random recipients, chances are that a good number of them are waiting any day for a UPS shipment. This could be you. Will you open the e-mail and click on the link inside it? If you do, you’ll likely download a virus. This is a phishing scam. Contact the company by phone to verify the e-mail’s legitimacy. Better yet, just never click on the doggone links.
- Do you know your apps? They most certainly know you—way too much, too. Applications for your phone can do the following: read your phone’s ID, continuously track your location, run your other applications, know your SIM card number and know your account number. Before downloading an app, find out what it can find out about you.
- Don’t take silly online quizzes. Whoever’s behind them might just want to get as much information on you as possible with the idea of committing identity theft. Got some extra time? Read a book or do a crossword puzzle.
- Never conduct business transactions using free Wi-Fi unless you have a virtual private network. Otherwise, anyone can cyber-see what you’re doing.
Robert Siciliano is an Identity Theft Expert to Hotspot Shield. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures.