SlideShare a Scribd company logo
GenericVirusTraining
• Fake ads 
• Browsing too deep in search engine results 
• Impersonating websites 
• Social media scams 
• “Scareware” pop-up windows 
• E-mail attachments/scams 
• YouTube Scams 
• Outdated AV (Antivirus) software/Windows Updates
Malware – (short for malicious software) is software, script, or code designed to 
disrupt computer operation, gather sensitive information, or gain unauthorized access 
to computer systems.
Beware of fake ads! There are a multitude of these ads that trick you into doing something 
not related to what you originally intended to do. 
This ad wants you to run a scan for 
“Windows errors” before you continue. 
These ads want to trick you to download 
their product instead of the one you 
originally intended. 
There are also fake ads on Google! While searching CCleaner, a free product, an 
ad comes up on the right-hand side that wants you to pay $30 for it’s product. 
Oh, they’re not just on Google 
search, they’re everywhere!
When you search a subject, do you go on-and-on through pages of search results to find 
answers? Well, that may not be a good thing! The deeper you go, the more you’ll find 
pages un-related to your initial result, making a higher risk of accessing an infected 
website. They are easy to detect as most of the time they do not make sense and it’s title 
and description is entirely unrelated to your initial search. Use common sense! 
Here’s some deep search results for 
“Lactose Intolerance” 
Note: Nothing about this result 
makes any sense! Should you 
click on it? NO 
“By Newton who discovered that an apple 
will had read The Exile but.”
Keep a look-out for websites that impersonate legitimate websites. They are fraudulent. 
Normally it’s easy to notice the poor grammar, certificate warnings, and broken links. 
Most common ways of stumbling on an impersonating website is falling for a scam, either 
on Facebook or in an e-mail. It’s also common to find them in a deep search listing. 
Here’s a common scam that impersonates 
Southwest Airlines, generously giving out free 
tickets. By entering your e-mail you’ll quickly 
realize there’s no free tickets but an inbox full of 
spam e-mail instead. Sweet! 
TIP: Always pay attention to the URL in the 
address bar! If it doesn’t relate to domain of the 
website, in this case, southwestairlines.com, it’s 
highly likely that it’s an impersonation!
Everyone uses social media today, even your grandma, making it a play ground for scammers. 
These scams can lead to anything! Compromised accounts, malware, fraud, or e-mail spam.
1. Don’t trust a post, message, or invite just because it comes from a friend. Their 
account could have been compromised, or they were tricked into clicking on a scam. 
2. Your like and share are a valuable personal recommendation to your friends and 
family. Please use them cautiously. Do a search to check out whether if something is 
valid before sharing it. 
3. Be very suspicious of offers for free stuff, especially ones that start with you having 
to like or share something. 
4. Don’t follow links that accompany some hysterical or generic text such as “OMG!! 
CAN YOU BELIEVE THIS?” 
5. Avoid links that promise some current event “scoop” such as “Whale on a house” or 
“Osama Bin Laden death video” 
6. There is no application that allows you to see who has been viewing your page. 
Never click on a link to an app that promises that functionality. You’ll regret it. 
7. Don’t fall for chain “sharing”. No hospital will donate a dollar towards every share of 
a child in a hospital bed.
Keeping your antivirus and operating system up-to-date should be a top priority. You should 
download updates as soon as you are notified of them or set your computer to automatically 
do this for you. 
Why is this so important? 
• There are literally thousands of new internet threats released in the “wild” 
every week. Your antivirus database need to be updated in order to keep on 
top of these new risks. 
• Hackers get smarter each and every day, discovering new ways to gain 
access to your computer. Windows recognizes these security breaches and 
immediately releases a patch to prevent this from happening to you. Failure to 
update keeps your precious data vulnerable. 
Don’t stop there! You should always update any software on your computer that prompts you. Whether 
it’s your Adobe Flash Player or Java Applet, you’ll be amazed how easily hackers can get access to your 
system through security breaches of these tools.
The most common way that a virus gets installed onto a system is by scaring you that 
something is wrong with your computer, tricking you to download or buy its product to “fix it”. 
Popular ways to avoid this: 
Nothing can detect that you have a 
virus on your system EXCEPT for the 
antivirus software running on your 
computer! If anything else does, it 
should be avoided by all costs! 
If you ever encounter this “Scareware”, do not interact with the window. Even 
clicking the “X”! Just by doing that, it is coded to silently install it’s malware on 
your computer. To avoid this, shut down your computer instead. 
Do not scan your computer for 
registry errors. It will not improve 
system performance or make it 
faster. This is a very popular tactic 
to install malware on your 
computer by the large volume of 
fake software available. 
Quick tip: Windows Security Center is not an antivirus and will not 
tell you that there are errors with your computer or a malware 
infection. It is actually a management tool of your computer’s 
security software. If you get a “virus” notification from it, don’t 
interact and do a virus scan immediately with your antivirus!
This is a very popular, yet annoying tactic for oversea agencies to install malware on your 
computer or commit fraud. 
However, it’s easy to avoid. If an e-mail 
comes in with no subject and a single 
link, it’s spam. If an e-mail comes in 
with poor grammar that you have 
an inheritance from a Nigerian prince, 
it’s a scam. Simply delete and forget! 
But what if it comes from a friend? 
How do you know if it’s legitimate? 
Call them and ask!
It’s common to click on a video on YouTube claiming to be a full movie or your favorite show 
but only plays a still image, asking you to refer to the link in the description to see the full 
thing, only to find a website full of surveys to fill out. By the end of it, your inbox is full of 
spam and your computer is full of malware. A lose/lose situation! 
How to avoid this? 
Don’t search for free movies or full TV episodes 
on YouTube! You simply won’t find them! Not 
only is it illegal without discretion for them to be 
uploaded, it’s also against YouTube’s ToS. They 
are usually removed as soon as they are 
uploaded. 
It doesn’t just happen with searching for 
movies, it can also be breaking news stories or 
just about anything that will get a lot attention. 
Always look at the ratings before you click on 
the video. Normally the fake videos are rated 
very low.

More Related Content

PPSX
How to Avoid Getting Malware on Your Computer
PPTX
The Facebook Facts : Things Every User MUST Know
PPT
Ciejkalab4b
PDF
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
PPTX
How to remove nuesearch.com completely
PPT
Techniques For Making 21st Century Learning Tools Safer
PPTX
Staying safe online
PPT
Quick Steps to Remove only-search-com
How to Avoid Getting Malware on Your Computer
The Facebook Facts : Things Every User MUST Know
Ciejkalab4b
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
How to remove nuesearch.com completely
Techniques For Making 21st Century Learning Tools Safer
Staying safe online
Quick Steps to Remove only-search-com

What's hot (8)

PPT
Infosec 4 The Home
PDF
Empathy through evil thinking - World Interaction Design Day 2018 - Leeds
PDF
14 tips to increase cybersecurity awareness
ZIP
Seven Deadly Sins: Lessons for Avoiding Social Media Disasters
PPTX
Cybersecurity Awareness
PPTX
Using the Internet Safely
PDF
Security gap in Internet Explorer
PDF
Malwarebytes Installation
Infosec 4 The Home
Empathy through evil thinking - World Interaction Design Day 2018 - Leeds
14 tips to increase cybersecurity awareness
Seven Deadly Sins: Lessons for Avoiding Social Media Disasters
Cybersecurity Awareness
Using the Internet Safely
Security gap in Internet Explorer
Malwarebytes Installation
Ad

Viewers also liked (17)

PPT
Socorro pesadilla
PPTX
Lincoln park
PPT
Halloween
PDF
Modèles macroéconomiques et transition énergétique
PDF
Component based Progress Programming
PDF
Quinze ans de politiques d'innovation en France
PDF
L'effet de l'automatisation sur l'emploi : ce qu'on sait et ce qu'on ignore
PDF
ODP
Halloween Tips
PPTX
Infoplease.com User Reference Guide
PPTX
Sequência didática brincadeiras infantis
PPTX
Explorando protocolos de serialização de alto desempenho
PDF
Concertation en faveur de l'insertion des jeunes - Séance 1
PDF
Plugging the Skills Gap
PDF
Networking 101 Guide
PDF
East meets West on Education Style
PDF
Management
Socorro pesadilla
Lincoln park
Halloween
Modèles macroéconomiques et transition énergétique
Component based Progress Programming
Quinze ans de politiques d'innovation en France
L'effet de l'automatisation sur l'emploi : ce qu'on sait et ce qu'on ignore
Halloween Tips
Infoplease.com User Reference Guide
Sequência didática brincadeiras infantis
Explorando protocolos de serialização de alto desempenho
Concertation en faveur de l'insertion des jeunes - Séance 1
Plugging the Skills Gap
Networking 101 Guide
East meets West on Education Style
Management
Ad

Similar to GenericVirusTraining (20)

PPSX
How to Avoid Getting Malware on your Computer
PPT
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
PPSX
Protecting your pc in the new year
PDF
Securityguide
PPTX
ONLINE SAFETY-online Etiquette ETEC.pptx
PPTX
ONLINE SAFETY empowerment technolog.pptx
PPTX
The Nasty of Computers
PPTX
The Computer Virus-Interactive
PPTX
Living in the IT Era - Lesson 6.pptx
PPT
Staying safe on_the_internet_presentation (2)
PPT
Topic 12 internet security
PPTX
Empowerment TECHONOLOGY 12- FIRST SEMESTER
PPT
Protect Yourself From Internet Pests
PPTX
Spyware
PDF
Empowerment Technologies - Module 2
PPTX
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
PDF
Cybersecurity Awareness Infographics
PPT
Viruses Spyware and Spam, Oh My!
PPTX
e-Security and malwares(virus, trojan and adware)
PPTX
EMPOWERMENT TECHNOLOGIES LESSON 2 - NETIQUETTE
How to Avoid Getting Malware on your Computer
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
Protecting your pc in the new year
Securityguide
ONLINE SAFETY-online Etiquette ETEC.pptx
ONLINE SAFETY empowerment technolog.pptx
The Nasty of Computers
The Computer Virus-Interactive
Living in the IT Era - Lesson 6.pptx
Staying safe on_the_internet_presentation (2)
Topic 12 internet security
Empowerment TECHONOLOGY 12- FIRST SEMESTER
Protect Yourself From Internet Pests
Spyware
Empowerment Technologies - Module 2
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
Cybersecurity Awareness Infographics
Viruses Spyware and Spam, Oh My!
e-Security and malwares(virus, trojan and adware)
EMPOWERMENT TECHNOLOGIES LESSON 2 - NETIQUETTE

Recently uploaded (20)

DOCX
fsdffdghjjgfxfdghjvhjvgfdfcbchghgghgcbjghf
PPTX
DEATH AUDIT MAY 2025.pptxurjrjejektjtjyjjy
PPTX
Embedded for Artificial Intelligence 2.pptx
PPTX
Presentation 1.pptxnshshdhhdhdhdhdhhdhdhdhd
PPTX
Wireless and Mobile Backhaul Market.pptx
PDF
Dozuki_Solution-hardware minimalization.
PPTX
unit1d-communitypharmacy-240815170017-d032dce8.pptx
PPT
chapter_1_a.ppthduushshwhwbshshshsbbsbsbsbsh
DOCX
A PROPOSAL ON IoT climate sensor 2.docx
PPTX
Operating System Processes_Scheduler OSS
PDF
Tcl Scripting for EDA.pdf
PPTX
Prograce_Present.....ggation_Simple.pptx
PPTX
Computers and mobile device: Evaluating options for home and work
PPTX
New professional education PROF-ED-7_103359.pptx
PPTX
5. MEASURE OF INTERIOR AND EXTERIOR- MATATAG CURRICULUM.pptx
PPTX
02fdgfhfhfhghghhhhhhhhhhhhhhhhhhhhh.pptx
PPTX
Embedded for Artificial Intelligence 1.pptx
PPTX
Entre CHtzyshshshshshshshzhhzzhhz 4MSt.pptx
PPTX
Fundamentals of Computer.pptx Computer BSC
PDF
Maxon CINEMA 4D 2025 Crack Free Download Latest Version
fsdffdghjjgfxfdghjvhjvgfdfcbchghgghgcbjghf
DEATH AUDIT MAY 2025.pptxurjrjejektjtjyjjy
Embedded for Artificial Intelligence 2.pptx
Presentation 1.pptxnshshdhhdhdhdhdhhdhdhdhd
Wireless and Mobile Backhaul Market.pptx
Dozuki_Solution-hardware minimalization.
unit1d-communitypharmacy-240815170017-d032dce8.pptx
chapter_1_a.ppthduushshwhwbshshshsbbsbsbsbsh
A PROPOSAL ON IoT climate sensor 2.docx
Operating System Processes_Scheduler OSS
Tcl Scripting for EDA.pdf
Prograce_Present.....ggation_Simple.pptx
Computers and mobile device: Evaluating options for home and work
New professional education PROF-ED-7_103359.pptx
5. MEASURE OF INTERIOR AND EXTERIOR- MATATAG CURRICULUM.pptx
02fdgfhfhfhghghhhhhhhhhhhhhhhhhhhhh.pptx
Embedded for Artificial Intelligence 1.pptx
Entre CHtzyshshshshshshshzhhzzhhz 4MSt.pptx
Fundamentals of Computer.pptx Computer BSC
Maxon CINEMA 4D 2025 Crack Free Download Latest Version

GenericVirusTraining

  • 2. • Fake ads • Browsing too deep in search engine results • Impersonating websites • Social media scams • “Scareware” pop-up windows • E-mail attachments/scams • YouTube Scams • Outdated AV (Antivirus) software/Windows Updates
  • 3. Malware – (short for malicious software) is software, script, or code designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems.
  • 4. Beware of fake ads! There are a multitude of these ads that trick you into doing something not related to what you originally intended to do. This ad wants you to run a scan for “Windows errors” before you continue. These ads want to trick you to download their product instead of the one you originally intended. There are also fake ads on Google! While searching CCleaner, a free product, an ad comes up on the right-hand side that wants you to pay $30 for it’s product. Oh, they’re not just on Google search, they’re everywhere!
  • 5. When you search a subject, do you go on-and-on through pages of search results to find answers? Well, that may not be a good thing! The deeper you go, the more you’ll find pages un-related to your initial result, making a higher risk of accessing an infected website. They are easy to detect as most of the time they do not make sense and it’s title and description is entirely unrelated to your initial search. Use common sense! Here’s some deep search results for “Lactose Intolerance” Note: Nothing about this result makes any sense! Should you click on it? NO “By Newton who discovered that an apple will had read The Exile but.”
  • 6. Keep a look-out for websites that impersonate legitimate websites. They are fraudulent. Normally it’s easy to notice the poor grammar, certificate warnings, and broken links. Most common ways of stumbling on an impersonating website is falling for a scam, either on Facebook or in an e-mail. It’s also common to find them in a deep search listing. Here’s a common scam that impersonates Southwest Airlines, generously giving out free tickets. By entering your e-mail you’ll quickly realize there’s no free tickets but an inbox full of spam e-mail instead. Sweet! TIP: Always pay attention to the URL in the address bar! If it doesn’t relate to domain of the website, in this case, southwestairlines.com, it’s highly likely that it’s an impersonation!
  • 7. Everyone uses social media today, even your grandma, making it a play ground for scammers. These scams can lead to anything! Compromised accounts, malware, fraud, or e-mail spam.
  • 8. 1. Don’t trust a post, message, or invite just because it comes from a friend. Their account could have been compromised, or they were tricked into clicking on a scam. 2. Your like and share are a valuable personal recommendation to your friends and family. Please use them cautiously. Do a search to check out whether if something is valid before sharing it. 3. Be very suspicious of offers for free stuff, especially ones that start with you having to like or share something. 4. Don’t follow links that accompany some hysterical or generic text such as “OMG!! CAN YOU BELIEVE THIS?” 5. Avoid links that promise some current event “scoop” such as “Whale on a house” or “Osama Bin Laden death video” 6. There is no application that allows you to see who has been viewing your page. Never click on a link to an app that promises that functionality. You’ll regret it. 7. Don’t fall for chain “sharing”. No hospital will donate a dollar towards every share of a child in a hospital bed.
  • 9. Keeping your antivirus and operating system up-to-date should be a top priority. You should download updates as soon as you are notified of them or set your computer to automatically do this for you. Why is this so important? • There are literally thousands of new internet threats released in the “wild” every week. Your antivirus database need to be updated in order to keep on top of these new risks. • Hackers get smarter each and every day, discovering new ways to gain access to your computer. Windows recognizes these security breaches and immediately releases a patch to prevent this from happening to you. Failure to update keeps your precious data vulnerable. Don’t stop there! You should always update any software on your computer that prompts you. Whether it’s your Adobe Flash Player or Java Applet, you’ll be amazed how easily hackers can get access to your system through security breaches of these tools.
  • 10. The most common way that a virus gets installed onto a system is by scaring you that something is wrong with your computer, tricking you to download or buy its product to “fix it”. Popular ways to avoid this: Nothing can detect that you have a virus on your system EXCEPT for the antivirus software running on your computer! If anything else does, it should be avoided by all costs! If you ever encounter this “Scareware”, do not interact with the window. Even clicking the “X”! Just by doing that, it is coded to silently install it’s malware on your computer. To avoid this, shut down your computer instead. Do not scan your computer for registry errors. It will not improve system performance or make it faster. This is a very popular tactic to install malware on your computer by the large volume of fake software available. Quick tip: Windows Security Center is not an antivirus and will not tell you that there are errors with your computer or a malware infection. It is actually a management tool of your computer’s security software. If you get a “virus” notification from it, don’t interact and do a virus scan immediately with your antivirus!
  • 11. This is a very popular, yet annoying tactic for oversea agencies to install malware on your computer or commit fraud. However, it’s easy to avoid. If an e-mail comes in with no subject and a single link, it’s spam. If an e-mail comes in with poor grammar that you have an inheritance from a Nigerian prince, it’s a scam. Simply delete and forget! But what if it comes from a friend? How do you know if it’s legitimate? Call them and ask!
  • 12. It’s common to click on a video on YouTube claiming to be a full movie or your favorite show but only plays a still image, asking you to refer to the link in the description to see the full thing, only to find a website full of surveys to fill out. By the end of it, your inbox is full of spam and your computer is full of malware. A lose/lose situation! How to avoid this? Don’t search for free movies or full TV episodes on YouTube! You simply won’t find them! Not only is it illegal without discretion for them to be uploaded, it’s also against YouTube’s ToS. They are usually removed as soon as they are uploaded. It doesn’t just happen with searching for movies, it can also be breaking news stories or just about anything that will get a lot attention. Always look at the ratings before you click on the video. Normally the fake videos are rated very low.