Chapter 3

Viruses, Spyware, and Scams — Oh My!

images

In This Chapter

  • Uninviting hackers to your Internet party
  • Protecting yourself from viruses
  • Identifying scams

images

It doesn't matter how you do it; from the minute you connect your computer to the Internet, you've hung a giant neon welcome sign in front of your humble little cyber-abode.

Software companies have gotten better over the years when it comes to security, but they're still not perfect. Programs and operating systems still ship with security flaws. Why? Because security features cause operating systems to become complicated, and in the battle between high security and user friendliness, guess which one usually wins? Unfortunately, many of the holes are extremely difficult — if not impossible — for most users to find and turn off. On top of that, lots of popular Internet programs find their way into your device's information. It doesn't matter if it's a home computer or a mobile device — everything has some kind of hole in it.

Some of the scariest horror movies begin at home. Bad situations just seem a little more horrifying when they happen close to you. This chapter looks at some of the more common troubles you can encounter online and what you can do to avoid these terrors.

Investigating the Common Ways Your Information Can Be ...

Get Passwords & Internet Addresses Journal For Dummies now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.