Computer scams and its many faces

Computer scams and its many faces

Computer Scams

How to tell if you are the next target of computer scams?

Computers is the main source of information nowadays. Computer scams is the use of information technology to commit fraud. The scammers want you to install a certain antivirus to take over your computers. Here are some tips you’ll need to know if your computer was infiltrated by scammers.

 

computer scams

Computer viruses

Computer viruses are small computer programs that are designed to try and infect other computers, tablets and smartphones. They break into your computer and spread  from one device to the next as you communicate with other people. They are also known as malware.

How computer viruses spread

Viruses can spread through:

  • computer programs or files that appear to be harmless but actually do damage. These are called trojan viruses. For example, you may download a file with a harmless looking picture of a celebrity, which is actually hiding the virus
  • email attachments. The virus then finds new people in your email address book to attack
  • programs you download from websites
  • documents. These are known as macro viruses
  • the internet. This is known as a worm. The worm scans for other computers that are vulnerable to attack and sends a copy of itself across networks. A worm can eat up memory or network bandwidth, which will make your computer slow down or stop responding.

 Video about Computer Scams

What viruses can do when they reach your computer

Viruses can leave unwanted software on your computer that:

  • secretly monitors your computer activity
  • scans for private information, such as passwords
  • gives scammers control of your computer
  • send out spam email
  • display unwanted advertising
  • hijack your web browser
  • use your computer to host illegal websites to con other people.

They can also switch off your computer’s security defences, leaving it vulnerable to more viruses. And they can track what information you put into your computer by monitoring your keyboard strokes.

 

To read the complete article go here

Image Souce: Vernon Chan