How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer

If you use the internet, you have probably been infected with a virus, trojan or spyware. According to the SANS Internet Storm Center, the average unprotected PC is infected within 20 minutes of normal internet usage. Many people want to know what they did to get infected. Unfortunately, usually it was just one wrong click.

Here are the top reasons people get infected and how to prevent these common internet security threats.

10. Exchanging files in chat rooms.
You should never download files from sources you don't trust. Viruses and other internet security threats can look like valid files or photos. Always scan files with a virus scanner before opening them.

9. Clicking on popup ads.
If you're like most people, you probably don't like popup ads. But whether you like them or not, you should never click on them. Popup ads can take you to a website that secretly downloads adware onto your computer. Enabling a popup blocker on your computer can help protect you. Some popups come from adware programs that have downloaded onto your computer, so if you still see popups after installing a popup blocker, scan your computer for spyware or adware.

8. Email attachments.
Viruses can be sent out as email attachments to infect your computer if you open them. If you download your email into an email program, scan all email attachments with a virus scanner. Most major webmail programs scan attachments before you download them, but you should still not download files from unknown sources. "Phishing" email, claiming to be from your bank or other financial institution which asks you to provide personal information or download something to your computer is another common email threat.

7. Instant messaging.
Because people are cautious with email attachments, new viruses are spreading through instant messaging programs. Infections look like valid files or photos, so always be careful accepting file transfers, even from sources you trust.

6. Downloading music.
Many websites that advertise free music downloads are loaded with spyware. You can even get spyware from these websites without manually starting a download. Other sites make you accept a spyware download to get the music you want.

5. Browsing websites.
Some websites use "drive-by downloads" ? misleading dialogue boxes to secretly install spyware programs. Sometimes spyware can install even if you do not choose "yes" or "accept". Keep your browser security settings on default to protect yourself against these infections.

4. Installing free programs or screen savers.
Check the license agreement of any program you install to confirm it does not come bundled with other programs. License agreements are supposed to explain if the software you are downloading will cause advertisements or other downloads. These programs may have long or confusing license agreements where they have buried this information. Always carefully read what you agree to before you download free software.

3. Adult-related websites.
Many of these sites make a profit by forcing viewers to download spyware and adware to access their site. You may not be able to view these sites if you are using a secure browser or have your security settings too high.

2. P2P programs like Kazaa or Limewire.
If you share music using peer-to-peer networks, you may be forced to download advertising software onto your computer. This software can generate popups from within your computer. In these cases, you may see popups even if you are not online.

1. Gaming websites.
It may seem that viewing spoilers for online games will let you win faster, but it can slow down your computer with spyware. Mick Lathrop, part of StopSign's Spyware Research team says, "I get most of my spyware samples from gaming-related websites." Avoid any site that requires a software download to access information.

Even if you have an anti-virus product on your computer, confirm that it protects against the growing threat of spyware. Enable a popup blocker and firewall for further protection. Using safe browsing habits and good security software can keep you safe on the internet.

Marla Porter is part of the Product Development Team at eAcceleration Corp., the makers of StopSign anti-virus and spyware remover. StopSign detects and removes viruses, trojans, spyware, worms, keyloggers and browser hijackers. Learn more about StopSign at http://www.stopsign.com. StopSign is a product of eAcceleration Corp: http://www.eacceleration.com.

Are You Surfing Safe?

Ok, you've got a computer, and you get online. You surf your favorite sites, Sports,... Read More

Web Browsing - Collected Information

You may not realize it, but as you are surfing the web all sorts of... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? --------------------------------------- Imagine you are the CIO... Read More

Can I Guess Your Password?

We all know that it's dangerous to use the same password for more than one... Read More

What to Look for before You Purchase Spyware Software

Huge number of spyware software applications are available in the market, some being offered as... Read More

7 Ways to Spot a PayPal Scam E-Mail

Paypal is a great site and is used by many to send and receive money.... Read More

Virus Nightmare..Lessons Learned

I got a virus the other day, Thursday I believe and since then I have... Read More

How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting with. Or if your spouse... Read More

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop up windows claiming that "You're... Read More

Technology and Techniques Used in Industrial Espionage

Industrial Espionage. These methodologies are being used on a daily basis by competitors maybe even... Read More

Be Aware of Phishing Scams!

If you use emails actively in your communication, you must have received various messages claiming... Read More

Three-pronged Trojan Attack Threatens Security on the Internet

Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names of a modern day version... Read More

Spyware Programs Are Out To Get You!

The average computer is packed with hidden software that can secretly spy on online habits.The... Read More

Criminals are Fishing For Your Identity

What is Phishing? In a typical Phishing attack, a criminal will send you an email... Read More

5 Simple Steps to Protect your Digital Downloads

A couple of days ago, I was searching for a popular eBook online. Now... Read More

Is Your Music Player Spying On You?

In today's times spyware is a very serious issue and all computer users should be... Read More

Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers

I am the victim of an internet scam. It is very hard to write that... Read More

A Painless Plagiarism Solution

A crowded marketplace can lead to unethical webmasters using underhand techniques to get ahead of... Read More

Securing Your Accounts With Well-Crafted Passwords

In the past I've never really paid much attention to security issues when it comes... Read More

Preventing Online Identity Theft

Identity theft is one of the most common criminal acts in society today. Criminals will... Read More

Dont Allow Hackers to Take Out Money from Your Bank Account

If you know what is the 'Fishing' then it's very easy to understand the definition... Read More

3 Things You Must Know About Spyware

1)Spyware is on your system. Like it or not, statistically speaking, you probably have spyware... Read More

DOS Attacks: Instigation and Mitigation

During the release of a new software product specialized to track spam, ACME Software Inc... Read More

Firewalls: What They Are And Why You MUST Have One!

A firewall is a system or gateway that prevents unauthorized access to your computer or... Read More

Phishing - A High Tech Identity Theft With A Low Tech Solution

Have you ever got an email asking you to confirm your account information from a... Read More

Top Five Spyware Fighting Tips

Spyware and adware are becoming major problems for online surfers and PC owners. Some highly... Read More

Everything You Need To Know About Spyware and Malware

You are at your computer, checking out software on EBay. The computer is really sluggish,... Read More

Why Malicious Programs Spread So Quickly?

It seems that nowadays cybercriminals prefer cash to fun. That is why malicious programs of... Read More

Its War I Tell You!

There are ways to insure security though. You can get the Windows Update CD from... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories which are explained in detail... Read More

Phishing - Learn To Identify It

Phishing: (fish'ing) (n.)This is when someone sends you an email falsely claiming to be a... Read More

Instant Messaging ? Expressway for Identity Theft, Trojan Horses, Viruses, and Worms

Never before with Instant Messaging (IM) has a more vital warning been needed for current... Read More

IPv6 - Next Step In IP Security

IPv6, IntroductionThe high rate at wich the internet continualy evolves forced the Internet Engineering Task... Read More

What Every Internet Marketer Should Know About Spyware

If you run any type of Internet business, Adware and Spyware can be a very... Read More

Identity Theft Offline -- So Many Possibilities

Chris Simpson, head of Scotland Yard's computer crime unit was unpleasantly surprised to learn how... Read More

Website Security - Creating a Bulletproof Site in 5 Easy Steps

When it comes to a secure website and passwords it is all in your hands... Read More

Spyware Removal

Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing Your PC is Infected! "The... Read More

If You Steal It, They May Come!

Business on the internet is getting down right shameless. This week, my email box was... Read More

Web and Computer Security

Well, if that would have been said to me by my father when I was... Read More

Phishing - Identity Theft & Credit Card Fraud

What is Phishing? Phishing is a relatively newly coined term for a kind of method... Read More

The Never Ending Spyware Story

It's been with us since 1993, it's gotten more intrusive, more complicated.It's created a whole... Read More

A New Era of Computer Security

Computer security for most can be described in 2 words, firewall and antivirus.Until recently could... Read More

Traditional Antivirus Programs Useless Against New Unidentified Viruses!

Every now and then you can read about a new virus and the damage it... Read More

Spyware Attacks! Windows Safe Mode is No Longer Safe

Many of us have run into an annoying and time-consuming error. With your machine running... Read More

New Mass Mailing Spamming Internet Trojan for the Windows Platform

May. 16th 2005 - MicroWorld has reported the discovery of Troj/Sober-Q, which is a mass... Read More

Backup and Save your business!

There you are busily typing away on your PC or your Laptop, and all of... Read More

Protecting Your Home Both Inside and Out

If you are a parent, you have probably wondered at one time or another, what... Read More

With the Rise of Internet Crimes, Users are Turning to High-Tech ?PI?s? for Solutions

High-tech private investigators are becoming the answer for many Internet users who have been victimized... Read More

Online Shopping: 10 Tips For Safe Online Shopping

Have you ever bought a product or service from the internet?Yes? Me too. You're not... Read More

Social Engineering - The Real E-Terrorism?

One evening, during the graveyard shift, an AOL technical support operator took a call from... Read More