News and reaction of the death of Osama bin Laden has flooded social networks, but now a warning: Be careful what you click on around the Internet.
Cybercriminals are exploiting bin Laden’s death to trick people into visiting malicious websites.
Search for “bin laden dead” on Google, and you will get more than 58 million results. But cybercriminals have been quick to pounce on users scouring Internet for more information about one of the biggest news events of the last decade.
According to the website Cyber Crimes Unit, experts stated within hours of the news late Sunday that U.S. forces had killed the al-Qaida leader in Pakistan, malware began popping up websites optimized to appear on web searchers related to bin Laden’s death.
Scammers took advantage of the phrase “osama bin laden dead” quickly becoming the most popular Google search, luring Internet users to links supposedly containing photos, videos and other information surrounding bin Laden’s death.
Here’s what you need to be careful of: Many links have been tainted with malware, infecting user’s computers when they are prompted to download a file or watch a video.
Spammers also targeted Facebook, circulating messages offering fake deals from Subway and Southwest Airlines. When the bogus link is clicked, users are redirected to pages and enticed to enter personal information and email addresses.
So how can you protect yourself?
Here are some steps you can take to keep your computer safe, straight from the FBI’s website:
A firewall helps protect your computer from hackers who might try to gain access to crash it, delete information, or even steal passwords or other sensitive information. Software firewalls are widely recommended for single computers. The software is prepackaged on some operating systems or can be bought for individual computers. For multiple networked computers, hardware routers typically provide firewall protection.
Install or update your antivirus software
Antivirus software is designed to prevent malicious software programs from embedding on your computer. If it detects malicious code, like a virus or a worm, it works to disarm or remove it. Viruses can infect computers without users’ knowledge. Most types of antivirus software can be set up to update automatically.
Install or update your antispyware technology
Spyware is just what it sounds like — software that is surreptitiously installed on your computer to let others peer into your activities on the computer. Some spyware collects information about you without your consent or produces unwanted pop-up ads on your web browser. Some operating systems offer free spyware protection, and affordable software is readily available for download on the Internet or at your local computer store. Be wary of ads on the Internet offering downloadable antispyware — in some cases these products may be fake and may actually contain spyware or other malicious code. It’s like buying groceries — shop where you trust.
Keep your operating system up to date
Computer operating systems are periodically updated to stay in tune with technology requirements and to fix security holes. Be sure to install the updates to ensure your computer has the latest protection.
Carelessly downloading email attachments can circumvent even the most vigilant antivirus software. Never open an email attachment from someone you do not know, and be wary of forwarded attachments from people you do know. They may have unwittingly advanced malicious code.
With the growth of high-speed Internet connections, many opt to leave their computers on and ready for action. The downside is that being “always on” renders computers more susceptible. Beyond firewall protection, which is designed to fend off unwanted attacks, turning the computer off effectively severs an attacker’s connection — be it spyware or a botnet that employs your computer’s resources to reach out to other unwitting users.
Osama bin Laden killed – Related Headlines
source : www.cfnews13.com
Submited at Tuesday, May 3rd, 2011 at 10:00 am on Uncategorized by Alina
Comment RSS 2.0 - leave a comment - trackback