Cyber Security and personal Identity theft Safety Tips...
Have you ever sat and wondered how your passwords, Bank accounts,emails and social network accounts are hacked? Answer is very Simple, You unknowingly expose your device to intrusions from malicious cyber criminals via web links that installs key-loggers and other spy-ware softwares sent to you in the guise of financial institutions, social network site administrators and so many other ways they device to make sure the ,malicious software is installed on your PC remotely or on site.
How Does that Happen?
Your Bank will never ask you to verify your Bank Verification Number(B.V.N), input your credit card information or change/verify your passwords on-line so when you see any message you suspect to be from your bank but is asking for private informations to give you access to certain features or cancel certain loans you never applied for, please do not even think of clicking the link cos it might be a monitor software written to monitor keystrokes of your keyboard and hence expose your system to attack.
Whatever be the case if you are using a computer having key-logger installed, you are at serious risk of loosing sensitive information which can lead to financial loss also. Even if its your computer, it may have been used by some creepy friend of yours who have wrong intentions to steal your data.
What is a Key-logger:
A key-logger is a piece of generally-malicious software or hardware installed on your computer that logs what you type, including your passwords; many key-logger programs also do other forms of surveillance on you. While they may be legitimately used in rare circumstances, they can also be used by cyber criminals to steal the personal information and passwords of unknowing Internet users. Key-loggers breach your privacy, allow your passwords to be stolen, and cause your computer to slow down. Thus, if you believe you are being illicitly monitored by someone else using a key-logger, you may want to try to detect and remove it.
Preparing Against Malicious Key-logger Attacks:
1. Ensure the system is fully protected from any known vulnerabilities. Update your operating system as well as your applications. Outdated software may have exposed security holes that can open your computer up to infection.
2. Make sure that all users of the computer know not to click freely on the internet, especially pop-ups, and avoiding freebies at all costs.
3. Install reputable security software on your computer. Install both an on-demand anti- malware and an always-on anti-virus. Free options include "Malwarebytes (for malware)" and "Avast" or "Panda" (for anti-virus). Keep your security software updated.
Detecting Key-loggers:
1. Open the Task Manager by pressing "Ctrl+Alt+Delete" and selecting "Open Task Manager". Check the task manager window for suspicious processes; search the names of unknown processes on the Internet to see if they might be malicious. If there is a suspicious process in your computer, then it might be a key-logger or some other type of virus.
2. In the Start menu's search bar, type in "msconfig" and press enter. Go to "Startup", and see if there are any suspicious programs that are configured to start up when the computer boots. If you are suspicious about a program, search for its name on the Internet to see if it might be malicious.
3. Do a double check. Many key-loggers hide themselves from both msconfig and the Task Manager. Use your reputable anti-malware to check for key-loggers on your computer.
4. If you have a desktop computer, it may also have a hardware key-logger on it. Look at where your keyboard cable connects to your tower. If there is a device plugged in between the keyboard cable and the tower, it might be a hardware key-logger. Please note, however, that it may also be a legitimate converter or device.
Removing Keylogger:
1. If the keylogger detected is visible as an entry on the list of programs in the Control Panel, then it might be a legitimate keylogger program with an uninstaller. Uninstall the program, and use an anti-malware to remove any remnants.
2. Try an uninstaller. With some keylogger programs, such as Logixoft's Revealer Keylogger, the installer can be used to uninstall the keylogger. Download the installer, and use that to uninstall the keylogger. Remove remnants of the keylogger using a reputable anti-malware scanner.
3. Search for specific advice for different programs, by name. Some keylogger programs, such as Refog, actively prevent uninstallation. Check on internet forums such as "BleepingComputer" to see how you can remove the program without breaking your computer.
4. Consider reinstalling your computer's operating system.
Many keylogger programs hook deep into your operating system, meaning that attempts at removing them might break your computer or cause instabilities. In these cases, a reinstall might be easier and cause fewer headaches.
Sometimes, it can be hard to remove a keylogger program using antimalware alone. A reinstall would take care of the keylogger without you needing to put in as much effort.
You should reinstall your operating system if you have detected a keylogger on a computer that you plan to use for bank transactions or dealing with trade secrets, because the keylogger might not have been completely removed.
More Tips:
If you have used your computer to do bank transactions, your passwords may have been compromised. Immediately, change your passwords using a computer known to be safe. Contact your bank if you see any suspicious transactions done using your account.
Warnings:
Certain key-logger programs are invisible to anti-spy-ware and firewall programs.
No comments:
Post a Comment