Amazon.com Product DescriptionInternet Threats.Today, the biggest threat faced by computers is crimeware. This malicious software is written by cybercriminals with the purpose of illegally making money. Crimeware may take the form of viruses, worms, Trojans or other malicious programs. Cyber threats are not just getting more sophisticated, the volume is growing: Kaspersky Lab currently receives around 30,000 unique samples every day.
 Crimeware
|
Crimeware
Be it Trojans, keyloggers or spyware, ‘Crimeware’ represents a new type of threat to our security Crimeware is malicious software that is secretly installed on computers. Most crimeware progams are in fact Trojans. There are many types of Trojans designed to do different things. For example, some are used to log every key you type (keyloggers), some capture screenshots when you are using banking websites, some download other malicious code, and others let a remote hacker access your system. What they each have in common is the ability to ‘steal’ your confidential information – such as passwords and PINs – and send it back to the criminal. Armed with this information, the cybercriminal is then able to steal your money.
Hackers
|
HackersJust like burglars break into houses, hackers break into computers. The term hacker was once used to describe a clever programmer. Today, it’s applied to those who exploit security vulnerabilities to break into a computer system. You can think of it as electronic burglary. Hackers regularly break into both individual computers and large networks. Once they have access, they may install malicious programs, steal confidential data, or perhaps use compromised computers to distribute spam.
 Phishing Scams
|
PhishingCybercriminals steal by tricking internet and email users into disclosing their personal details. A phishing attack is a specific form of cyber crime. The criminal creates an almost 100 percent perfect replica of a chosen financial institution’s website, then attempts to trick the user into disclosing their personal details – username, password, PIN etc – via a form on the fake website, allowing the criminal to use the details to obtain money.
 Spamming
|
SpamSpam is anonymous, unsolicited bulk email. It is sent out in mass quantities by spammers who make money from the small percentage of recipients that actually respond. Spam is also used for phishing and to spread malicious code. In the coming years, high-speed Internet connections allowed spammers to send out mass mailings inexpensively and quickly, as did the discovery that individual users' modems could be accessed by anyone from anywhere in the world since they had no protection at all. In other words, unsuspecting internet users' connections could be used to send their spam in much higher volume. The result is an ongoing battle between spammers and those working to prevent them, constantly trying to stay one step ahead in the fight to keep spam from clogging the information superhighway.
 Protecting Children Online
|
Online Child Protection
Talk to them about the potential dangers, Keep the computer in a family room, Encourage your children to talk to you about their online experience, Provide them with guidelines for online activity, Use your programs' settings to restrict content that your children can access online, Follow the advice above on how to protect from malicious code and hacker attacks
Minimum System Requirements
- Operating System: Microsoft Windows XP Home Edition, Professional and XP Professional (Service Pack 2 + all hot fixes + x64 Edition), Microsoft Windows Vista Home Basic, Home Premium,Business,Enterprise, Ultimate (All 32/64 bit)
- Intel Pentium 300 MHz or higher (or equivalent) 256 MB available RAM
- Intel Pentium 800 MHz 32 bit (x86) / 64 bit (x64) or higher (or equivalent) 512 MB available RAM
- Please Note: Safe Run Mode doesn’t work with Microsoft Windows XP x64, and works with limitations on Microsoft Windows Vista x64
- CD-ROM (for installation of the program from CD)
- User guide on disc as PDF file
- Computer mouse
- Internet connection (for product activation)
- Microsoft Internet Explorer 6 or higher (for downloading updates)
- Microsoft Windows Installer 2.0 or higher
- Hard Disk Space:300 MB free space on the hard drive (the exact number depends on antivirus database size)