PDA

View Full Version : Computer Malware Scams



FraudNews
06-21-2010, 10:53 AM
Computer malware, often referred to as keylogging or Trojan horse software, are programs used by scammers which are installed on victims’ computers. In the majority of instances the main aim of these programs are to monitor all activities on a computer and logging it. At specified time periods the logged information will be sent to scammers.

Other programs may be used to hijack the users’ browser and send users to unwanted websites every time the browser is opened. Some programs may even be used to delete information of programs from users’ computers, simply causing damage.

What information can be logged?

Scammers often log anything typed on a computer. This information is stored in a text file and transmitted to fraudsters. Any website visited and accessed, usernames, passwords, credit card information, etc. is transmitted to scammers.

Some programs can also take screenshots of the computer at set intervals and transmit the images back to scammers.

How malware is installed on computers

Malware are often installed on computers by means of infected e-mails. Once such email is opened, attachments downloaded and read, the software will be installed. In few instances this software is downloaded onto computers directly from certain malicious websites when visited.

How can I protect myself?

The best recommendation is to ensure that proper anti-virus programs are installed on computers and updated on a daily basis.

Secondly, make use of firewall software, such as ZoneAlarm. Not only does this software prevent access to computers, but it also prevents information from being transmitted from a computer. Users can decide which information they want transmitted.

For the more professional PC users, make use of a small program called HijackThis. This software can be used to identify all installed programs. This program is useful in identifying and removing browser hijackers, etc.