Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

How not to get infected


  • Please log in to reply
5 replies to this topic

#1 Just_One_Question

Just_One_Question

  • Members
  • 1,400 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bulgaria
  • Local time:12:45 AM

Posted 06 April 2017 - 08:13 PM

Is there any other way of infecting your device remotely apart from installing and/or opening up a program? For example, opening a malicious e-mail attachment, installing or just opening a program which has a virus or downloading an infected torrent.
I ask this, because I haven't used any protection on my PC whatsoever in the past couple of years, yet I haven't had a single accident of malicious software. The only thing I do to protect my computer is not to open or install any suspicious files... and that's it!

Am I correct in saying that there is no way to get infected remotely, over the Internet, if you never download/install/open any suspicious stuff or was I just pretty lucky? :)

Edited by Just_One_Question, 06 April 2017 - 08:14 PM.


BC AdBot (Login to Remove)

 


#2 megakotaro

megakotaro

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Cyberspace
  • Local time:05:45 AM

Posted 06 April 2017 - 09:48 PM

quietman7's post may help you build up security knowledge.

 

Never download/install/open any suspicious stuff is not enough to protect yourself. Cybercriminal usually use zero day exploit or remote desktop protocol to hack or infect computers



#3 shelf life

shelf life

  • Malware Response Team
  • 2,657 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:@localhost
  • Local time:05:45 PM

Posted 07 April 2017 - 09:31 AM

A web page can be set up to exploit vulnerabilities in web browers and there add ons. No interaction needed on your part other than visiting the page. Malware can be installed in the background.


How Can I Reduce My Risk to Malware?


#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,597 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:45 PM

Posted 11 April 2017 - 06:06 AM

You may want to read through the following topics which explain the most common ways malware infection is delivered and propagated.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#5 Just_One_Question

Just_One_Question
  • Topic Starter

  • Members
  • 1,400 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bulgaria
  • Local time:12:45 AM

Posted 11 April 2017 - 07:18 AM

YMKpDJR_700wa_0.gif

#6 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,597 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:45 PM

Posted 11 April 2017 - 12:40 PM

You're welcome.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users