{"id":166,"date":"2016-06-27T23:26:15","date_gmt":"2016-06-28T06:26:15","guid":{"rendered":"http:\/\/csispecialist.com\/?p=166"},"modified":"2016-06-28T00:58:20","modified_gmt":"2016-06-28T07:58:20","slug":"viruses-trojans-and-malware-oh-my","status":"publish","type":"post","link":"https:\/\/csispecialist.com\/index.php\/2016\/06\/27\/viruses-trojans-and-malware-oh-my\/","title":{"rendered":"Viruses, Trojans and Malware, oh my!"},"content":{"rendered":"<p style=\"margin-top: 0pt; margin-bottom: 8pt; font-family: Calibri; font-size: 11.0pt;\">There are a lot of rumors about ransom-ware out there that many of you may not believe.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>Something like it won\u2019t happen to me.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>Well, it is out there and it can happen, even to you.<span style=\"mso-spacerun: yes;\">\u00a0\u00a0\u00a0 <\/span>There are many ways of distributing ransomware and other threats to your computer that you will not even see until it\u2019s too late.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>Ransomware is delivered through Viruses, Trojans, and Malware.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>Yes, all of these are delivery methods.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>The most common form of delivery is self-inflicted.<span style=\"mso-spacerun: yes;\">\u00a0\u00a0 <\/span><\/p>\n<p style=\"margin-top: 0pt; margin-bottom: 8pt; font-family: Calibri; font-size: 11.0pt;\">Self-inflicted delivery is not new. You have probably seen it on websites and in your email (mostly as spam).<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>As an email, it is usually an attachment and can be opened by easily clicking on it.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>On web pages, it is in the form of a click-through ad or article which by coincidence is also easily clickable.<span style=\"mso-spacerun: yes;\">\u00a0\u00a0 <\/span>When you click on this email or ad or whatever else is lurking out there you are inviting it to install itself and\/or activate it.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>This, unfortunately, bypasses the base defenses of most all anti-virus programs protecting you from just this sort of thing happening in the first place.<\/p>\n<p style=\"margin-top: 0pt; margin-bottom: 8pt; font-family: Calibri; font-size: 11.0pt;\">The unfortunate part is that because you load initiate the loading of the program your virus program does not do as thorough a job of checking out its validity.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>This often causes the evil\/insidious program to be able to install itself when it would normally be blocked.<\/p>\n<p style=\"margin-top: 0pt; margin-bottom: 8pt; font-family: Calibri; font-size: 11.0pt;\">I have found that the most common delivery is through email.<span style=\"mso-spacerun: yes;\">\u00a0\u00a0 <\/span>This is because with the right wording most people will open anything.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>Don\u2019t be most people!<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>Email can be spoofed to make it look like it came from someone or someplace you think you know.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>The best rule here is if you are not expecting an attachment from an email you know, don\u2019t open it even if it looks ok.<span style=\"mso-spacerun: yes;\">\u00a0\u00a0 <\/span>Treat ALL attachments like they will destroy your computer.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>If necessary, email or call the person sending the attachment and ask if it\u2019s legitimate.<\/p>\n<p style=\"margin-top: 0pt; margin-bottom: 8pt; font-family: Calibri; font-size: 11.0pt;\">With websites, you need to be cautious too.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>Don\u2019t click on banners or other ads.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>There are more and more every day that is coming up as malicious software installers.<span style=\"mso-spacerun: yes;\">\u00a0\u00a0 <\/span>If you are downloading something make sure you download the right object.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>A lot of free software sites make it difficult to tell which button is the actual download button.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>Try avoiding free stuff as much as possible.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>And if you do download something run it through your virus program before you do anything.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>This is usually as simple as right-clicking on the file and choosing the virus program from the pop-up menu.<\/p>\n<p style=\"margin-top: 0pt; margin-bottom: 8pt; font-family: Calibri; font-size: 11.0pt;\">Remember, only YOU can prevent cyber fires.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are a lot of rumors about ransom-ware out there that many of you may not believe.&nbsp; Something like it won&rsquo;t happen to me.&nbsp; Well, it is out there and it can happen, even to you.&nbsp;&nbsp;&nbsp; There are many ways of distributing ransomware and other threats to your computer that you will not even see &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/csispecialist.com\/index.php\/2016\/06\/27\/viruses-trojans-and-malware-oh-my\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Viruses, Trojans and Malware, oh my!&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[49,50,48,47],"class_list":["post-166","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-malware","tag-ransomware","tag-trojan","tag-virus"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/csispecialist.com\/index.php\/wp-json\/wp\/v2\/posts\/166","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/csispecialist.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/csispecialist.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/csispecialist.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/csispecialist.com\/index.php\/wp-json\/wp\/v2\/comments?post=166"}],"version-history":[{"count":0,"href":"https:\/\/csispecialist.com\/index.php\/wp-json\/wp\/v2\/posts\/166\/revisions"}],"wp:attachment":[{"href":"https:\/\/csispecialist.com\/index.php\/wp-json\/wp\/v2\/media?parent=166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/csispecialist.com\/index.php\/wp-json\/wp\/v2\/categories?post=166"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/csispecialist.com\/index.php\/wp-json\/wp\/v2\/tags?post=166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}