Overview
Harmful Email Attachments
Every day you receive email messages with attached documents, photos, or other electronic files.
Sometimes these attachments contain destructive viruses, Trojan horses, or spyware, sent intentionally by someone who intends to cause harm or steal sensitive personal information.
Harmful Software (Malware)
Malware is a shortened term for "malicious software." Malware is software designed to infiltrate or damage a computer without the owner's consent or knowledge.
There are many types of malware, including:
- Viruses:malware that spreads from computer disks, CD-ROMs, and other storage media.
- Worms:malware that spreads through network connections.
- Rootkits:tools used by hackers that are hidden on a computer and used to maintain remote access and control of the computer.
- Trojan horses:malware disguised as a normal computer file or program, such as an image, music file, spreadsheet or word document. When a user opens the file, the malware is launched and infects the computer.
- Botnet:malware that uses a computer for inappropriate purposes, turning the compromised computer into a "zombie computer." Botnet can be used for activities such assending out spam emails and launching denial of service attacks against other computers.
- Spyware:malware used to capture user IDs, passwords, and other sensitive information typed from your keyboard.
Detail
Protect yourself from harmful email attachments by taking the following steps:
- Follow the steps in theSafe Computing for StudentsandSafe Computing for Faculty and Staffsections of this website.
- Never open email attachments from people you don't know.
- Always run antivirus software.Antivirus softwareis available at no cost for Windows andMacintosh computers.
Hackers
Hackers take advantage of vulnerabilities in computer software and operating systems. Theyuse computers for illegal purposes, to vandalize systems, or to gain unauthorized access to resources.
The best defense against hackers is to:
- Ensure that your workstations and servers are behind anEnterprise Network Firewall.
- Keep software and operating systems up-to-date with the most current security patches.
- Use strongpasswordsthat can't be easily guessed.
- Nevershare your computer user ID or your password.
- Use security tools that can detect or block hacker utilities.
If you believe your computer may have been compromised by a hacker, contact theTechnology Help Deskat 412-624-HELP(4357) for assistance.