Quick Facts

Malware

Malware, short for "malicious software," includes viruses and spyware to steal personal information, send spam, and commit fraud. Criminals create appealing websites, desirable downloads, and compelling stories to lure you to links that will download malware – especially on computers that don't use adequate security software. But you can minimize the havoc that malware can wreak and reclaim your computer and electronic information.

Computers may be infected with malware if they:

  • Slow down, malfunction, or display repeated error messages
  • Won't shut down or restart
  • Serve up a lot of pop-up ads, or display them when you're not surfing the web
  • Display web pages or programs you didn't intend to use, or send emails you didn't write.

If you suspect malware is lurking on your computer, stop shopping, banking, and other online activities that involve user names, passwords, or other sensitive information. Malware on your computer could be sending your personal information to identity thieves.

Spyware

Spyware is software installed on your computer without your consent to monitor or control your computer use. Clues that spyware is on a computer may include a barrage of pop-ups, a browser that takes you to sites you don't want, unexpected toolbars or icons on your computer screen, keys that don't work, random error messages, and sluggish performance when opening programs or saving files. In some cases, there may be no symptoms at all.

To lower your risk of spyware infections:

  • Update your operating system and Web browser software, and set your browser security high enough to detect unauthorized downloads.
  • Use anti-virus and anti-spyware software, as well as a firewall, and update them all regularly.
  • Download free software only from sites you know and trust. Enticing free software downloads frequently bundle other software, including spyware.
  • Don't click on links inside pop-ups.
  • Don't click on links in spam or pop-ups that claim to offer anti-spyware software; you may unintentionally be installing spyware.

The clues that spyware is on a computer include:

  • Barrage of pop-ups
  • Hijacked browser — that is, a browser that takes you to sites other than those you type into the address box
  • A sudden or repeated change in your computer's Internet home page
  • New and unexpected toolbars
  • New and unexpected icons on the system tray at the bottom of your computer screen or on your desktop
  • Keys that don't work (for example, the "Tab" key that might not work when you try to move to the next field in a Web form)
  • Random error messages
  • Sluggish or downright slow performance when opening programs or saving files

Identity Theft

It's important to protect your personal information, and to take certain steps quickly to minimize the potential damage from identity theft if your information is accidentally disclosed or deliberately stolen:

  • Place a "Fraud Alert" on your credit reports, and review those reports carefully. Notifying one of the three nationwide consumer reporting companies is sufficient.
  • Close any accounts that have been tampered with or established fraudulently.
  • File a police report with local law enforcement officials. This is an essential step in claiming your rights.
  • Report your theft to the Federal Trade Commission, online, by phone, or by mail.

Phishing

Phishing is a scam where Internet fraudsters send spam or pop-up messages to lure personal and financial information from unsuspecting victims. To avoid getting hooked:

  • Don't reply to email or pop-up messages that ask for personal or financial information, and don't click on links in the message. Don't cut and paste a link from the message into your Web browser — phishers can make links look like they go one place, but that actually send you to a different site.
  • Some scammers send an email that appears to be from a legitimate business and ask you to call a phone number to update your account or access a "refund." Because they use Voice over Internet Protocol technology, the area code you call does not reflect where the scammers really are. If you need to reach an organization you do business with, call the number on your financial statements or on the back of your credit card.
  • Use anti-virus and anti--spyware software, as well as a firewall, and update them all regularly.
  • Don't email personal or financial information.
  • Review credit card and bank account statements as soon as you receive them to check for unauthorized charges.
  • Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them.
  • Forward phishing emails to spam@uce.gov – and to the company, bank, or organization impersonated in the phishing email. You also may report phishing email to reportphishing@antiphishing.org. The Anti-Phishing Working Group, a consortium of ISPs, security vendors, financial institutions and law enforcement agencies, uses these reports to fight phishing.

Email Scams

Some email users have lost money to bogus offers that arrived as spam in their in-box. Con artists are very cunning; they know how to make their claims seem legitimate. Some spam messages ask for your business, others invite you to a website with a detailed pitch. Either way, these tips can help you avoid spam scams:

  • Protect your personal information. Share credit card or other personal information only when you're buying from a company you know and trust.
  • Know who you're dealing with. Don't do business with any company that won't provide its name, street address, and telephone number.
  • Take your time. Resist any urge to "act now" despite the offer and the terms. Once you turn over your money, you may never get it back.
  • Read the small print. Get all promises in writing and review them carefully before you make a payment or sign a contract.
  • Never pay for a "free" gift. Disregard any offer that asks you to pay for a gift or prize. If it's free or a gift, you shouldn't have to pay for it. Free means free.