In this day and age, Dothan PC owner Mike McArdle said there?s only one type of computer that?s safe.
And that?s the one that?s not hooked to the Internet.
Hacking efforts and widespread computer viruses are continuing to expand both locally and internationally for a variety of reasons, including hackers illegally cracking into private computer systems to corrupt or steal valuable personal information, according to authorities. Houston County?s website was down for about a week after it was hacked on Feb. 21 and indecent content was posted.
Incidents in which other government websites and those of private companies have surfaced over the last few years as well. In January, the Federal Bureau of Investigation reported an Atlanta man was sentenced to a year and a month in prison after he hacked into a protected computer of a competing medical practice in order to gain the personal information of patients for marketing reasons.
Last month, a Hungarian man charged in the U.S. with the hacking of Marriott International Corp. computers in order to extort employment was sentenced to 30 months in prison, according to the U.S. Department of Justice.
McArdle said several hacking attempts and viruses can corrupt Microsoft operating systems as well as the Android system for cell phones. Several indicators, such as slow-moving computer programs or the inability to access files, could show a computer has been hacked, he said.
McArdle said hacking often takes place after a person has clicked on fraudulent advertisements or attachments in an email, which can grant access to a hacker.
?The bottom line is that if a real hacker wants to get in, they?re getting in. Personally I don?t believe any website is 100-percent hacker proof. On a bigger scale with corporate intranets, you have an internet use policy that an employee violates and clicks on a link and opens the computers up to a hacker,? McArdle said between repairing computers.
?Most of the time the goal of something like a ?rootkit? is to make a zombie out of a computer or use it to send spam. No one?s really safe from it unless there?s no Internet access at all.?
Computer intrusion is handled by both local authorities and federal authorities, and jail sentences and restitution after conviction vary significantly based on the charges.
According to Ozark Police Chief Tony Spivey, most local computer intrusion cases involve identity theft, where someone?s credit card information has been used for online purchases.
He advised residents to be cautious of any emails from people or entities seeking funds, as a majority of the emails could be spam.
McArdle agreed. He said in addition to maintaining up-to-date antivirus software and anti-spyware to help prevent hacking and viruses, the simplest and greatest protection relies in not clicking on random advertisements and emails.
?Right now one that?s going around is an email that claims it?s an invoice. If you know you didn?t order anything, it?s not something you should click on. One of the first things you want to look for before entering personal information on a website is whether or not the website is spelled correctly and there is an ?s? after the ?http,?? he said.
?
Tips on protection from computer intrusion
Keep Your Firewall Turned On: A firewall helps protect your computer from hackers who might try to gain access to crash it, delete information, or even steal passwords or other sensitive information.
Install or Update Your Antivirus Software: Antivirus software is designed to prevent malicious software programs from embedding on your computer.
Install or Update Your Antispyware Technology: Spyware is just what it sounds like ? software that is surreptitiously installed on your computer to let others peer into your activities on the computer. Some spyware collects information about you without your consent or produces unwanted pop-up ads on your web browser.
Keep Your Operating System Up to Date: Computer operating systems are periodically updated to stay in tune with technology requirements and to fix security holes. Be sure to install the updates to ensure your computer has the latest protection.
Be Careful What You Download: Carelessly downloading e-mail attachments can circumvent even the most vigilant anti-virus software. Never open an e-mail attachment from someone you don?t know, and be wary of forwarded attachments from people you do know. They may have unwittingly advanced malicious code.
Turn Off Your Computer: With the growth of high-speed Internet connections, many opt to leave their computers on and ready for action. The downside is that being ?always on? renders computers more susceptible. Beyond firewall protection, which is designed to fend off unwanted attacks, turning the computer off effectively severs an attacker?s connection ? be it spyware or a botnet that employs your computer?s resources to reach out to other unwitting users.
Source: Federal Bureau of Investigation
Article source: http://www2.dothaneagle.com/news/2012/mar/03/computer-hacking-not-going-away-ar-3345195/
Source: http://www.best-anti-spyware.com/anti-spyware/computer-hacking-not-going-away/
cbsnews ufc on fox fight card florida marlins boise state football boise state football jack and jill uss carl vinson
No comments:
Post a Comment