Select Page

May 2015: What is malware?

In this Secure UD Newsletter, we’ll explore the kinds and distribution of malware, as well as how to protect devices from malware.

What are the kinds of malware?

There are many variants of malware, each with a different attack pattern. Three of the most common kinds of malware are described below. Viruses Computer viruses are one of the most well-known forms of malware, and they derive their name from their similarities to...

How is malware distributed?

Most malware requires user action--or a negligent user’s inaction--to make it onto a host system. Usually, scammers use a variety of tricks to get victims to download, install, and run malware on their computers or devices. Malware distribution is largely dependent on...

What can I do to keep my devices safe?

Download, install, and use anti-virus software The UD community can download and install the University-licensed copy of McAfee VirusScan for any employee-, student-, or University-owned computers. Regularly update your virus definitions and scan your computer to...

Secure shopping sites

When it comes to picking an online retailer, you’ve got plenty of options. Often, shoppers choose recognizable retailers like Walmart or Amazon. These sites tend to be safe since they have more resources dedicated to securing their online transactions. But sometimes...

Online payment options

After you identify some stores of interest (or perhaps as part of the process of deciding where to shop), you’ll need to consider payment options. Most online retailers accept all major credit cards as well as other options, such as PayPal. These are by far the most...

Things to consider while shopping online

While you’re going about your holiday shopping, keep a few things in mind. If you give a store a cookie, it might start invading your personal space. Disable or clear cookies to prevent stores and advertisers from tracking your browsing history and habits, and from...

Has your credit card information been stolen?

Surprisingly, credit card compromises may be the easiest type of hack to deal with. You’re not responsible for any fraudulent charges in excess of $50, and once you’re issued a new card, the problem has been solved, save for some changes to your personal habits....

Has your email account been stolen?

Being swift to take action following the theft of one of your online accounts is vital. Not only will you need to reclaim control over the affected account, you’ll need to take steps to protect your other accounts, too. How will you know? Hackers use compromised email...

You are a target. Information security is everyone’s responsibility.