Christopher L. Smith, Gleaner Online Writer
Being completely secure and anonymous on the internet is highly improbable. The 'catalogue' of threats one is exposed to when browsing can be daunting.
To put things into perspective, there are malware such as viruses and worms that take on seemingly innocuous forms such as trojans and rootkits.
A few others worth mentioning are adware, loggers and dialers, and spyware, which are highly surreptitious, can be very invasive and are often used as tools for identity theft. Though spyware is often seen as malware, merely secretly monitoring user behaviour, its functions can extend well beyond simple spying.
Spyware is capable of collecting various types of personal information, as well as redirecting Web browser activity and even diverting online advertising revenue to a third party.
Another personal security threat is the practice of phishing. It is an attempt to fraudulently obtain information by posing as a trustworthy entity in an electronic communication such as emails.
Usually, the phisher will act as a financial institution requesting personal data for account-verification purposes. The aim is to acquire personal or sensitive information, including credit-card details and passwords. This form of identity theft is commonly practised, helped by the astonishing willingness with which unwary individuals divulge personal information on the web.
Dodgy malware creators
Though it may seem the odds are in favour of dodgy malware creators on the web, there are precautions one can take to be somewhat safe while browsing.
Installing anti-virus and anti-spyware tools is a good start. It is also a good idea to install a software firewall, which works really well for intrusion detection. There are applications out there that integrate these features - that is, combat virus and spyware.
A couple of options to consider are ZoneAlarm Internet Security Suite and AVG Anti-Virus plus firewall.
Avoiding phishing nets requires more direct and personal diligence. It would be prudent to do some research on the topic in order to be better capable of recognising phishing attempts, and to deal with them. When contacted about account verification, or other personal information, it is a sensible precaution to personally contact the entity from which the email apparently originates to determine whether or not it is in fact legitimate.
Browsing with protection should put you more at ease.
christopher.smith@gleanerjm.com