Combat The Top 5 Hidden Computer Security Threats !!

I am sure every one of you must be aware of the constant threat presented by IT Insects (Computer Malware) these days. But tell me honestly have you ever fear that one day your computer system will be compromised or attacked by malware or malicious hackers because you have never took any precautionary measures to stop hidden computer security threats?

By the way do you know that due to lack of knowledge, thousands of computer users, i must say millions of computer users are becoming the victims of hacking attacks and are getting exposed to possible identity theft every year. According to a survey released by Javelin Strategy & Research on Feb 2010, there’s over 11.1 million cases of online identity theft registered in the U.S. last year. And the amount of money potentially affected by these frauds is about $54 billion. Shocking, isn’t it? This the one of the first and foremost reason to take computer security seriously.

Don’t let it happen to you. There are many ways to protect yourself from the most recent and most malignant security threats. The following are a few best practice guidelines to follow which can help you avoid becoming the next victim of these heinous crimes by halting them in their tracks that could be lurking around waiting for your next wrong move.

Top Hidden Security Threats

Social Networking

One of the most recent security threats including phising, scams initiated on popular social networking websites. These threats can be a real disaster waiting to happen to you. If you have connected with someone on social networking websites like Facebook, Orkut, Twitter, LinkedIn, Hyves or another social network website, it’s probably because you know and trust them. But still you should take a few important steps to protect yourself from being attacked. I am sure you must be wondering WHY? Reason is because Attackers, can take control of your friend’s online persona and then exploit that trust. But you can take few precautionary measures to protect yourself from being attacked. One step you can take is check your privacy settings  within Facebook, Orkut and Twitter. These settings allow others users to view your personal details that you may have forgot that you provided, which in-turns open the floodgates and permit everyone to see your information . By locking down the privacy settings you can block an authorized person to dig your information that could give away a password to an online account. In addition to that don’t accept any friend requests from people that you do not know because this can easily give an outside attacker access to additional information that you block for others. So if you’re damn serious about protecting your personal details then you shouldn’t accept such requests.

Not to mention, a Facebook “friend” or Twitter “follower” can send also send you malicious messages as because they himself chances get compromised because malware infection or clickjacking attack. So you should be cautious every time.

Computer Snooping

If you use a public computer to access any of your personal information or banking websites, then it is highly recommended to erase your tracks, as because at the end of every browsing session, there is considerable amount of tidbits information gets stored in Internet TEMPORARY Files. This can be done by erasing the history in the web browser that you used and choosing the option to NOT save passwords.

It is never suggested that you use a public computer to access any of your personal or confidential information. Even using your own personal computer can be a risk as well if you allow others to access to the same account or profile. If you use a personal desktop or laptop computer then always ensure that you use best password to protect it to keep others from accessing personal data.


Scareware  is a class of software designed only to cause anxiety in the unsuspecting user. One of the best example is  rogue anti-malware program that puts up a dialogue box saying “Attention !! Dangerous Threats Found On Your System” with two  buttons labeled OK (To download the anti-spyware) and CANCEL. Regardless which button is chosen you would be either taken to fake website or will be compromised by getting rogue software installed in your system.

The use of scareware aka extortionware is a growing problem that the normal computer user might not be aware of. Popular rogue anti-spyware program such as AntiVirus 2010 are used to initiate scareware tactics on the affected system without any end-user intervention. Once  the malware is installed onto a user’s computer, it opens up numerous possibilities on how the malware can take advantage of the end user.

Sometimes these attacks are presented in the form of alert messages that pop-up on the computer screen or an email message that appears to be from a legitimate banking or financial institution. Being in-the-know of these types of hidden threats can greatly reduce the risks/chances of your computer system being compromised or even being damaged by malicious scareware aka extortionware methods. Another and most foolproof way to protect yourself from these hidden threats is by installing and running an updated Anti-Malware software.

Wi-Fi Network Security/Rogue Wi-Fi Networks

Today, one of the most popular hidden threats that exist literally in thin air is a rogue Wi-Fi access points or malicious Wi-Fi network. If you connect to the internet at your local coffee shop, shopping mall or even at the airport, chances are there is a cyber-spy who can capture your PC’s traffic and can assemble all the insightful information such as your user name & password, banking information and other confidential information. Any unsecured wireless network can be hacked into to monitor and view every communication you make over the internet.

This kind of hidden threat can be avoided by simply finding out the SSID of that center’s network. Security Set Identifier (SSID) is the name of the wireless network which is relayed over the airwaves and your computer receives this networks signal as a result of which the name appears in the list of all the existing networks. Connecting to only a secured Wi-Fi network is always advisable and also a good step to take. Just because a Wi-Fi network appears in your list of available networks doesn’t mean that it is safe to connect to.

Outdated Software

Do you know that Microsoft and Adobe products  are one of the most leading and favorite targets for cyber criminals? It is not just Windows operating systems that hackers only target. Attackers usually target many Microsoft and Adobe applications too that are out dated or left un-patched. That simply means if you are running an outdated software application that had a vulnerability discovered, then a hacker can use those vulnerabilities and weakness of that specific program to attack your system. These are the main reasons why companies such as Microsoft and Adobe keep rolling out security patches within the application updates. The same thing also applies to security applications such as Anti-Virus or Anti-Spyware programs. The main purpose for downloading and installing latest virus definitions is to keep your Anti-Malware application updated so that it can able to recognize a new threat that was recently released into the wild. If a program is left out-dated by you, then there is a high chance that your machine could be at risk of being getting compromised or attacked. The best way to guard you self from this type of attack is to keep all your software applications updated.

You can also use a program such as the Secunia Personal Software Inspector a FREE security tool which is designed to detect known vulnerabilities and out-dated programs and plug-ins which expose your PC to attacks and install the necessary updates.

Keep in your mind that “You are the ONLY one who can protect yourself from being getting compromised” … Stay Safe, Stay Secured !!

If you know more hidden security threats that you have discovered recently, then do share it with me… 🙂



4 responses

  1. like

    October 13, 2010 at 20:12

  2. Robert

    Such a big and useful article.. Thank you.

    October 13, 2010 at 21:36

  3. Megha

    Interesting and informative.

    October 24, 2010 at 11:35

  4. Antaya

    Gorgeous Stuff! Appreciate your sharing a very effective piece of writing.

    December 3, 2010 at 12:46

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s