How I Met Your Motherboard

[mk_page_section]

Malware

Viruses and spyware can enter a computer through emails, through downloads when visiting malware-infested websites and when clicking on malicious links. Dealing with the presence of malicious code on a computer can be a frustrating experience that can cost time, money, and the risk of loss of sensitive information.

Viruses enable hackers with the ability to steal valuable corporate, customer or employee information, distribute spam, delete files or even crash an entire computer system.

  • Learn how spyware programs allow hackers to monitor online activity, steal passwords, records, intellectual property and other valuable data.
  • Learn about the delivery of malware in files attachments, drive-by downloads on websites, watering hole attacks and links in email messages.
  • Learn what to do if you believe a computer is infected and the difference between viruses, Trojan horses, key loggers.
  • Learn how botnet infections work, how they acquire banking credentials to steal money from the victims, how malware operates in cyber warfare and cyber espionage operations and how sophisticated malware has been designed with specific intent to steal sensitive information and intellectual property.
  • Learn how to recognize if a computer has been infected with malicious code and get a general overview on the economy of scareware, creepware, crimeware, describing what these threats are and the implications for both the victims and the perpetrators of malware.
  • Learn practices that make it difficult for attackers to guess or defeat our passwords on website and on personal and public Wi-Fi networks. Learn about digital inheritance as it pertains to our passwords and website use.

[mk_image src=”http://gcsc.ca/wp-content/uploads/2013/12/15668391_s.jpg” image_width=”800″ image_height=”350″ crop=”true” lightbox=”false” frame_style=”simple” target=”_self” caption_location=”inside-image” align=”left” margin_bottom=”10″]
[/mk_page_section]