Quantcast
Channel: CISA TIPS feed
Browsing all 124 articles
Browse latest View live

ST06-005: Dealing with Cyberbullies

Original release date: June 01, 2011 | Last revised: February 06, 2013 Bullies are taking advantage of technology to intimidate and harass their victims. Dealing with cyberbullying can be difficult,...

View Article



ST04-014: Avoiding Social Engineering and Phishing Attacks

Original release date: October 22, 2009 | Last revised: February 06, 2013 Do not give sensitive information to anyone unless you are sure that they are indeed who they claim to be and that they should...

View Article

ST06-004: Avoiding the Pitfalls of Online Trading

Original release date: April 07, 2011 | Last revised: February 06, 2013 Online trading can be an easy, cost-effective way to manage investments. However, online investors are often targets of scams,...

View Article

ST10-001: Recognizing Fake Antiviruses

Original release date: October 11, 2010 | Last revised: February 06, 2013 Fake antivirus is malicious software (malware) designed to steal information from unsuspecting users by mimicking legitimate...

View Article

ST06-001: Understanding Hidden Threats: Rootkits and Botnets

Original release date: August 24, 2011 | Last revised: February 06, 2013 Attackers are continually finding new ways to access computer systems. The use of hidden methods such as rootkits and botnets...

View Article


ST06-006: Understanding Hidden Threats: Corrupted Software Files

Original release date: March 09, 2011 | Last revised: February 06, 2013 Malicious code is not always hidden in web page scripts or unusual file formats. Attackers may corrupt types of files that you...

View Article

ST04-015: Understanding Denial-of-Service Attacks

Original release date: November 04, 2009 | Last revised: February 06, 2013 What is a denial-of-service (DoS) attack?In a denial-of-service (DoS) attack, an attacker attempts to prevent legitimate...

View Article

ST05-006: Recovering from Viruses, Worms, and Trojan Horses

Original release date: March 19, 2008 | Last revised: February 06, 2013 Unfortunately, many users are victims of viruses, worms, or Trojan horses. If your computer gets infected with malicious code,...

View Article


ST04-016: Recognizing and Avoiding Spyware

Original release date: November 19, 2009 | Last revised: February 06, 2013 Because of its popularity, the internet has become an ideal target for advertising. As a result, spyware, or adware, has...

View Article


ST05-019: Preventing and Responding to Identity Theft

Original release date: September 17, 2008 | Last revised: February 06, 2013 Identity theft, or identity fraud, is a crime that can have substantial financial and emotional consequences. Take...

View Article

ST04-009: Identifying Hoaxes and Urban Legends

Original release date: March 10, 2011 | Last revised: February 06, 2013 Chain letters are familiar to anyone with an email account, whether they are sent by strangers or well-intentioned friends or...

View Article

ST10-001: Recognizing Fake Antiviruses

Original release date: October 11, 2010 | Last revised: February 06, 2013 Fake antivirus is malicious software (malware) designed to steal information from unsuspecting users by mimicking legitimate...

View Article

ST05-006: Recovering from Viruses, Worms, and Trojan Horses

Original release date: March 19, 2008 | Last revised: February 06, 2013 Unfortunately, many users are victims of viruses, worms, or Trojan horses. If your computer gets infected with malicious code,...

View Article


ST06-006: Understanding Hidden Threats: Corrupted Software Files

Original release date: March 09, 2011 | Last revised: February 06, 2013 Malicious code is not always hidden in web page scripts or unusual file formats. Attackers may corrupt types of files that you...

View Article

ST04-009: Identifying Hoaxes and Urban Legends

Original release date: March 10, 2011 | Last revised: February 06, 2013 Chain letters are familiar to anyone with an email account, whether they are sent by strangers or well-intentioned friends or...

View Article


ST05-006: Recovering from Viruses, Worms, and Trojan Horses

Original release date: March 19, 2008 | Last revised: February 06, 2013 Unfortunately, many users are victims of viruses, worms, or Trojan horses. If your computer gets infected with malicious code,...

View Article

ST06-005: Dealing with Cyberbullies

Original release date: June 01, 2011 | Last revised: February 06, 2013 Bullies are taking advantage of technology to intimidate and harass their victims. Dealing with cyberbullying can be difficult,...

View Article


ST06-006: Understanding Hidden Threats: Corrupted Software Files

Original release date: March 09, 2011 | Last revised: February 06, 2013 Malicious code is not always hidden in web page scripts or unusual file formats. Attackers may corrupt types of files that you...

View Article

ST10-001: Recognizing Fake Antiviruses

Original release date: October 11, 2010 | Last revised: February 06, 2013 Fake antivirus is malicious software (malware) designed to steal information from unsuspecting users by mimicking legitimate...

View Article

ST05-006: Recovering from Viruses, Worms, and Trojan Horses

Original release date: March 19, 2008 | Last revised: February 06, 2013 Unfortunately, many users are victims of viruses, worms, or Trojan horses. If your computer gets infected with malicious code,...

View Article
Browsing all 124 articles
Browse latest View live




Latest Images