We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,259 News Articles

11 hidden security threats and how to stop them

How to foil the latest crop of sneaky security attacks

Antivirus software and a firewall alone can't guarantee your safety. Here's how to foil the latest crop of sneaky attacks and nefarious attempts to steal your data.

Web snooping

Now that so much entertainment, shopping, and socialising has shifted online, every internet user leaves a rich digital trail of preferences.

The books you read, the movies you rent, the people you interact with, the items you buy, and other details constitute a gold mine of demographic data for search engines, advertisers, and anyone who might want to snoop around your computer.

Do business with companies you trust
Stay aware of the privacy policies of the websites and services you interact with, and restrict your dealings to those that you believe you can trust to guard your sensitive information.

Use private browsing
The current versions of Internet Explorer, Firefox, Safari and Chrome include private-browsing modes.

These features, such as IE 8's InPrivate Browsing and Firefox 3.5's Private Browsing, ensure that the site history, form data, searches, passwords, and other details of the current internet session don't remain in your browser's cache or password manager once you shut the browser down.

By protecting such information on the computer you do your surfing on, these features help you foil nosy co-workers or relatives.


You're probably familiar with the garden-variety phishing attack.

Like a weekend angler, a phisher uses bait, such as an email message designed to look as if it came from a bank or financial institution, to hook a victim.

Scareware is a twist on the standard phishing attack that tricks you into installing rogue antivirus software by ‘alerting' you that your PC may be infected.

Don't take the bait
Stop and think. If, for instance, you don't have any security software installed on your PC, how did the ‘alert' magically appear?

If you do have a security utility that identifies and blocks malicious software, why would it tell you to buy or download more software to clean the alleged infection?

Become familiar with what your security software's alerts look like so that you can recognise fake pop-ups.

Don't panic
You should already have antimalware protection.

If you don't, and you're concerned that your PC may in fact be infected (not an unreasonable concern, given the existence of a rogue 'alert' on your screen), scan your system with Trend Micro's free online malware scanner, HouseCall, or try running Microsoft's Malicious Software Removal Tool.

Once you complete that scan, whether it discovers anything or not, find yourself a reputable antimalware app and install it to protect your PC in the future.

Update your browser
Such fake messages will prompt you to visit the scammer's website, which may infect your system further.

Current versions of most web browsers and many internet security suites have built-in phishing protection to alert you to sketchy sites.

It's important to note that while the databases these filters use are updated frequently to identify rogue sites, they aren't fail-safe, so you should still pay attention to any URL that you consider visiting.

To make this easier, both Internet Explorer 8.0 and Google Chrome highlight the real, or root, domain of the URL in bold so that you can easily tell whether you're visiting a genuine or spoofed site.

NEXT PAGE: Trojan horse texts

  1. We show how to foil the latest crop of sneaky security attacks
  2. Data harvesting from your profile
  3. Web snooping
  4. Trojan horse texts
  5. More tips for avoiding exposing your data if a laptop is lost
  6. Rogue Wi-Fi hotspots
  7. Endangered data backups
  8. Five security myths
  9. Additional security resources

IDG UK Sites

How to get free Office 2016 today: Download the new Microsoft Office 2016 Public Preview - how to...

IDG UK Sites

Why Scottish Tablet is better than the iPad mini

IDG UK Sites

How to develop for Microsoft's HoloLens

IDG UK Sites

Apple MacBook 1.1 GHz review (Retina, 12-inch, Early 2015): The future of Apple laptops