Updated Scams & Alerts

 

Install all recommended software and/or hardware to protect your information. To be protected against cyber criminals, you need current anti-virus, anti-spyware, anti-malware, and firewall programs.

STOP identity

  • Install reputable anti-spam software. Most reputable anti-spam software programs today are also programmed to identify known viruses, which could contain Trojan horses as well.
  • Keep all your security software and operating systems updated.
  • Verify BOTH the source AND content of each file you download! Don't download an executable program just to "check it out." If it's a Trojan, the first time you run it, you're already infected!
  • Use caution when dealing with pop-ups. This is a perfect place to plant a virus or Trojan programs.
  • Beware of hidden file extensions. Windows by default hides the last extension of a file, so that innocuous-looking picture "susie.jpg" might really be "susie.jpg.exe" - an executable Trojan! To avoid being tricked, unhide those pesky extensions. This is an option selected in Windows Explorer under Tools\Folder Options\View.
  • If you are an online multi-gamer type, do not publish your I.P. address on websites or newsgroups, unless you are very sure that you are fully protected. You would be much better off logging into others' game servers than inviting others to log onto your game server at a precise I.P. address.
  • Backup your system!
  • Turn off your computer when not in use. If you are not connected to the Internet, you cannot be infected, hacked or hijacked.
  • Reconsider storing personal information in your computer. Transfer it to a CD and use the CD when you need the information. This is especially true of passwords, SSNs, tax and financial records.

 

ITRC Sponsors and Supporters

 

 

 

 

Go to top