ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Internet Security: Issues and Solutions on The Internet

Updated on June 8, 2022
Miebakagh57 profile image

I study humanities and computer programming at the university. I am a science nerd.

Introduction

Weekly, malicious software or malware enter the market. But what is malware? Malware is a computer program that tries to hijack your computer. Hijack, that you pay a ransom for its release. The computer will not be liberated! At times, it will be completely destroyed like the last episode in the movie, 'Air force one.'

They come in the form of a virus, worms, spyware, rootkits, and trojans. Ransom worm, adware, and scareware are common. How do you know malware? Updated virus or spyware definitions can detect them on your computer.

Microsoft and other vendors have sites on which to download genuine virus definitions. You go to the original Microsoft center to download a free version. Never download a virus or spyware definition of Microsoft from an independent vendor. Why I am writing this article is for online visitors not to be a target for online scammers.

Malware Target Your Computer and Operating System

An HP mobile computer
An HP mobile computer | Source

5 Brief Characteristics of Malware

  • A Malware is used by government and corporate entity to spy or gather military, scientific and technical information.
  • A Malware spies on your computer and operating system, stealing your password and personal information.
  • They can take control over and damage your computer systems.
  • Malware slows down your machine so that you are unable to load a file or page.
  • They can reset the system to your dislike.

Malware like Trojan Takes Over Your Computer System and Destroy it

Inside the Trojan are hidden intelligent "chips"  that spIes on your computer
Inside the Trojan are hidden intelligent "chips" that spIes on your computer

Install Antivirus Software on Your Computer

You turn on your computer to start Windows. What anti-malware software should you install to protect your computer? I install the latest Window's Security (Window's Defender), and SuperAntiSpyware (SAS), on my Window's 10 devices. A quick scan takes less than 10 minutes.

This short scan with Windows Security is followed by another short scan via, SuperAntiSpyware. The later, detected some Potential Unwanted Programs, and 124 adware tracking cookies. Furthermore, I turn on the Microsoft Malicious Software removal tool for a quick scan to safeguard my machine.

Then, a full scan with SuperAntiSpyware follows without any issues. Whenever you encounter a minor or major detection, go for the full scan.

This unconventional method of scanning a computer with two antivirus tools is okay, provide they are compatible with your system. But you cannot take on Windows Security and SAS, run them at a time. Your computer will clash.

Free Antivirus Against Paid Antivirus

Is there a difference between free and paid antivirus? Yes. Paid antivirus offer more protection, for example, in Panda antivirus one gets:

  • Web protection.
  • Covers your Android device.
  • Free VPN.
  • Wifi protection.
  • Scans USB devices.
  • Exploit protection.
  • Ransomware protection.
  • Shields vulnerability in software.
  • Blocks bad websites.
  • And, more.

All these are typical of paid antivirus. But some antivirus software can offer further protective device at a higher cost. You can install a paid-promotional antivirus for less than $20.

Sub-Standard Malicious Software

Is your computer being infiltrated? Be aware that certain antivirus software vendors have sub-standard malicious software that enables virus, spyware, and malware to infiltrates your computer.

These malicious viruses are chameleon-and-hydra-like. They can evade the latest anti-malware definitions unless you update your virus definition weekly and regularly. Malicious software may contain code or trojan embodied in a downloadable e-book, VCD or DVD disc purchased.

That said, you should always update your free or paid antivirus gears, and scan you computer whenever your surf the web or playing a DVD disc, or downloading a web gear.

Computer Codes can Contain Malware

Source

Microsoft Security Essential can Detect Malicious Malware

Microsoft Security Essential is a free antivirus from Microsoft Window. It is free to use against virus, spyware and other malicious malware. It is limited comprehensive protection against viruses, worms, and Trojans. If your computer is Windows 7, download and installs it at Microsoft's security center.

Microsoft Security Essential Scan Completed

Antivirus Software that Fight Malware: Product Feature and Prices

Product
Features
Price
Vendor
Windows Defender Offline (WDO), now Window's Security.
Works offline, 'removes viruses, spyware, and other malicious software'. Enhanced protection against rootkit and boot kit, cleanse PC when online.
Free ware
Microsoft
Malwarebyte
Scan and removes all sorts of malware. Yu can get the paid version on trial only for 30 days period.
Premium edition $39.90
Malwarebyte Organization
Microsoft Security Essential
Detects virus, worms, trojan and malicious software.
Free ware
Microsoft

Antivirus softwares that detect malwares

Browser

When you bought a new laptop/computer, what browser is identify with it?

1. My browser is Internet Explorer IE (Edge) But I prefer and installed Google Chrome as my search and homepage due to its latest security patches.

2. The world's first web browser is Netscape Navigator or Communicator. Google Chrome is now the most popular web browser.

3. Google Chrome, Microsoft’s Internet Explorer or Microsoft's Edge, and Mozilla Firefox are the most used web browsers. Apple’s Safari seems to take fourth place.

Regularly update your browsers to the latest update. This is one sure and safe way to stay secure online.

Web Browsers can Install Malware on Your Computer

A web browser is an electronic software application that you can use to source, receive and retrieve information online.

  • You can use it to receive emails, files, videos, photos, and images; and electronic devices in downloadable e-books and software.
  • Additionally, all these items can be upload by the same browser.
  • Malware can be download or upload via, a browser without your knowledge!
  • It comes offline in VCD or DVD disc.
  • E-mails significantly carried viruses.
  • A browser like Babylon or Ask ToolBar is a malware.
  • Some web browsers are paid versions and potentially carried malware that load codes on your computer.
  • Settled with one or two of the traditional five web browsers.

A web-browser has no limit to communicate online.

The Five Most Trusted Web Browsers

Brief History of Web Browser

With the development of the internet, the web-browser comes into prominence. The first web browser is the mosaic worldwide web WWW. The www was later developed and released for all future browsers. The mosaic became the only framework on which web browsers were innovated. Thus, 'a model of the world’s first popular web browser was born'.

What do You Think

The world's first web browser is:

See results

Netscape Navigator

Browser War and Anti-Malware Patches

Netscape Navigator results first from the mosaic. It soon became very popular and was even regarded as the world’s most popular web browser, like its parent mosaic.

Then enter Internet Explorer (IE). The browser war or market competition between browsers has begun. Internet Explorer which was also molded after the mosaic was soon to overtake the Navigator! Opera had to join the competitive war but failed woefully. It made a market share of at least 1%! an insignificant figure compares to Navigator 90% and IE 95% respectively.

Enter Google Chrome with Unique Anti-Malware Patches

The entry of Chrome into the browser war in September 2008 is commendable. Having overtaken IE and all the other browsers combined, it reaches a market high by April 2014.

Chrome by Google is now the most popular and the most used web browser, helping 1.1 billion people to surf safely. Popular because many prefer its security and safety features that act as an anti-malware device. Presently, Google Chrome has the highest market share of all web browsers 60% and followed by Firefox 11%, Edge 4%, and Safari 3%.

Chrome By Google

Google chrome ha unique safety patches
Google chrome ha unique safety patches

Cloud-Based Browser

Maxthon is a relatively new web browser. It uses cloud-based technology. It is foremost in using cloud technology and set the pace for 'cloud-based' browsers.

Cloud-based browsers have secured security features that 'prevent malware from interacting with your computer' while online. Maxthon has three search engines, including Chrome my default. This gives it an edge over the others.

Maxthon Fights Malware in the Cloud Before They Attack Your Computer

Browser-Extension and Malware Attack

The online world is dangerous. A guy goes surfing the web. He uses a Firefox browser and installs Avira adds-on on Firefox. But when he attempts to download a program, he is directed to Avira website. While others who use chrome will receive a warning before landing on Avira.

Does this mean Firefox is unsafe? Negative. I have experienced the same issue with Ask ToolBar. I once enable the ask toolbar. I try to visit my affiliate site, but it sent me to upgrade its toolbar on Ask site. I uninstalled it.

All this shows that many legitimate websites and browsers are at times compromised. In such a case, the best browser could not help. So you should not add any extension on your browser without a better understanding of its functions.

Google Chrome, Microsoft Edge, and Mozilla Firefox are safe browsers. But you can render them useless by adding unreliable toolbars, and extensions.

Malware and Phishing Sites

How many websites do you think is out there on the internet? 500,000? 100,000,000? Apart from this, what about the many corporate and private blogs?

There are billions of websites on the internet. Some sites real and lawful, are compromised daily. By virtue of some of these sites being via media, they become unsafe are like to the man in the middle attack.

Visiting these unsafe sites online also means compromising your computer, site, and browser to malware and phishing. These threaten your privacy and security. These sites on which you are directed will install malware on your computer and at the same time will also trick you into sharing “your username and password or sharing other private information."

Malware can Include Man in the Middle Attack

Man in the middle attack
Man in the middle attack

Safety of Your Browser

Malware Infection Vectors

Malware is any software application trying to download unwanted software and take control of your computer. But what is a malware site? 'Mal' means bad and site is a location or address. So, a malware site could mean a bad location address or URL on the internet.

You want to visit the Microsoft Download Center, but it took you to another counterfeit center with a Microsoft Logo. It can even take you to the genuine site but gathered your login information and password. What do those sites aim for? They seek private information on billion dollar corporations and individuals.

Another is identity theft and attacking of computers and cyberspace. 'If your site has been infected', inferring that these malware sites not only gathered private information but also compromised your blog or website personal and corporate as a malware entity, 'it is generally because some vulnerability has allowed a hacker to take control over your site' Google opined.

Surprisingly, the malware will at the same time installed and run automatically. Once, your computer, browser, site or blog has been fully compromised with malicious contents, they are as good as 'one potential vector of malicious content' or 'malware infection vectors', Said Google. You can take care of all these by installing malicious software removal tool from trusted vendors. Download and scan your computer with the Microsoft malicious software removal tool.

Some online shopping websites, like eBay, as they own antivirus patches. I install Trusteer Rapport and it automatically detects any suspicious application and website visits. eBay maintains Trusteer Rapport. But you should not compromise your password with it.

Software System Vulnerabilities and Malware

A vulnerability in computing is any defect, flaw, and weakness. It is open for detection and attack by a hacker. The attack is an exploit in part or the whole system when compromise. A denial of service then results. Your machine meanwhile becomes under the control of another power.

The defect arises mostly in the architecture of the software. Your software is as good as the makers made it be. It is not 100% perfect. It comes into the market in very good condition, but misuse by you or a third party can open a hole in it for an attacker to work exploit.

A Design Fault can Cause Vulnerability in Browser for Exploit

Browser Vulnerability Compromised with Malware

The issue of vulnerability is very important here. Your browser Chrome, IE, Firefox or Edge has a weakness. The defect is not realized when it was released into the market. It was tested and retested because anything can happen when you go online with the software.

Let’s take chrome as an example. It is an open source browser in that it is still subjected to development. It is expected that user experience with the software can help bring in more issues and hence, a nice way to make it better.

How many of us are aware that Google does subject its chrome browser to trusted software vendors that will detect any vulnerability in the software and get paid for it?

Within twelve hours or so of the detection, Google will update chrome to a more secure level than ever. We, the users of chrome are required to submit any issues we found while using the software. I had uninstalled my chrome browser at most seven times within three years. Each time, I was asked why I uninstalled it. My feedback like yours help Google to make Chrome secured

Your browser whether Chrome, IE, Firefox, etc is a vulnerable software. Google latest update now is 72.0.3626.119 (32- bit), March 3, 2019.

Coupled with vulnerability is browser exploit. If you experience signs of change on the homepage, search page, any changes in your favorites and your settings of internet opinion, etc there is no question that your browser has been compromised with malware.

Windows Firewall

Windows firewall can prevent hackers from gaining access to your computer operating systems.

Check your firewall setting and turn on the Windows firewall.

  • Click the start menu button on your computer.
  • Type firewall.
  • In the new window, click 'Windows Firewall'.
  • Click 'Turn Windows Fire Wall On'.
  • Close window.

Tip: do not uninstall Windows firewall in preference to other superior fire-wall settings. These may contain malware codes. Whatever firewall setting your PC comes with Window's or Mac, retained it.

Fire Wall

Zero-Day Exploits Links

A few years ago, there was this relative 'Zero Day' vulnerability that attacked IE browsers. It is a 'limited targeted attacks' on IE 7-10.

The attack will direct you to visit a malicious website. 'This would typically occur', said Microsoft 'by an attacker convincing someone to click on a link in an email or instant message'.

Consequently, Microsoft's Edge ME, a new browser replaced IE in Windows 10 and promised to protect your system from 'phishing attacks and social engineered malware' while online. Microsoft advises that you update your systems regularly.

Lately, malware vendors noted IE is not a frequently used browser. They recently employ a new trick in tricking online visitors to click a link in a word document. This enables the attackers to executed 'malicious shellcodes' and then load malware.

Password Protection

An untrustworthy third party can gain access to your computer without a password. This is an invitation to insert malware codes on your system. You can create a strong password for your computer.

A strong password depends on the combination of the different characters and symbols used on your computer keyboard, and the length of the characters.

  • Choice two letters from the upper case alphabets A to Z.
  • Choice two letters from the lower case alphabet a to z.
  • Choice two characters from the Arabic numerals 0, 1, 2, 3, 4, 5, 6, 7, 8, 9.
  • Choice two special characters from any of # ^ $ % ( _ * + : < ? > ! / { [ : ] } etc but do not use the @ sign.

If we choose two characters each from the four categories, the password will be strong. Passwords are created by easy to remember sentences, and by substituting words, letters, numerals and so on. For example, 'my exam will start on 9 September 2014'. will become MXwso9014 I test this with a password checker and it is strong.

A strong password even depends on how long it takes an attacker to crack it. Will it take minutes, hours, days, a week or a month or years? Test your password strength here:https://howsecureismypassword.net/

Conclusion

Protect your computer against malicious software by:

  1. Installing internet security software.
  2. Keep all antivirus software up-to-date.
  3. Delete all suspicious emails, whether spammy or not.
  4. Don't click on any email links. Copy and paste the link into your browser.
  5. Don't install flash players, codes, allow certain cookies on your browsers.
  6. Use only the best open source browsers.

References

1. Wikipedia malware.

2. What is malware?

3. Safe browsing.

4. Zero-day exploit.

5. Malware sites.

6. Microsoft security analysis.

7. Microsoft download center.

8. Download confirmation of software's.

9. Test your strong password.

This content is accurate and true to the best of the author’s knowledge and is not meant to substitute for formal and individualized advice from a qualified professional.

© 2014 Miebakagh Fiberesima

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)