Fraud software

Trojans, keyloggers, spyware and other types of malware created new type of crime, which is very hard to solve.

What is a fraud software?

The majority of malware, which are used to commit a crime, are Trojans. Some of them register the sequence of pressed keyboard keys, others take snapshots of monitors during site session with bank services, and still others install to the computer other malicious code, give to hacker remote control on a computer and so on. These all programs join a thing which allows to fraudsters to collect confidential information and to use it for the theft.

How to protect computer from malicious code and hacker attacks?

You can protect your PC from malicious code and hacker attacks if you keep going the following rules:

· Install on your computer a solution to protect against information threats.

· Always install updates of Operating System and software, for elimination of security gaps. If you use Microsoft Windows you do not need to download updates every month, it is enough to set the automatic update mode – Start Start | Control Panel | Security Center . If you use Microsoft® Office suite of desktop applications do not forget to install its updates regularly.

· If you receive a message via email with attached file (Word document, Excel table, executable file with .exe extension and so on.), do not open this file, if the sender is unfamiliar person. Do not open attached file if you did not expect this kind of message. UNDER NO CIRCUMSTANCES do not open attached files, which are in unwanted email (spam).

· Install updates of programs, which provide the security of your computer.

· Use account with administrator rights only in cases when you need to install software or to change the settings of the system. For daily usage create a special account with restricted rights (for that you need to change settings User Account Control part). This is important, because in a case of attack malicious code gets the same privileges as you. If you registered in the system then the same level of rights will obtain the virus, worm, or Trojan, and malware will get access to the crucial data stored in the system.

· Save back-up copies regularly of your data to CD, DVD, or external USB drive. In a case of the damage or encryption of data on hard disk by malware you can restore it from back-up copy.