My partner used a free anti-virus software program on his PC and experienced three occasions where his computer was overtaken and he had to take it to a technician to clean it out. I have always used Norton and have had zero problems. I convinced him to take my disc and load it into his PC he has had zero problems since then.
Yesterday while WordPress.com was experiencing some difficulties I downloaded a file containing all the intrusion attempts made on my computer. I was astonished to see how much work my Norton Internet Security has done to protect my computer from invasion.
My surfing habits are safer than most. I don’t visit movie, music or porno download sites. I don’t shop online and I’m not a gamer. Where are these attacks coming from?
Well I read the Internet Security reports linked to below and I found the answer. United States, China, Brazil, Germany, India, United Kingdom, Russia, Poland, Italy and Spain.
In 2009 a shift in malicious activity to emerging countries became more pronounced. For example, for the first time since Symantec began examining malicious activity by country in 2006, a country other than the United States, China, or Germany has ranked in the top three, as Brazil ranked third in malicious activity in 2009, behind the United States and China, respectively.
Below is a brief summary from Symantec of the ten latest security threats and how to protect your computer.
- Is your Web browser the latest open door for computer viruses? Learn how to protect your computer. Web Browsers and Computer Security Risks
- If you blog, you know how easy it is to get your message broadcast to friends, family and the world but blogs have security risks too. Learn about blogging risks and how to protect your work and your reputation. Is Your Blog Secure?
- Baby boomers joining social networks like Facebook and MySpace in unprecedented numbers makes them the new targets for online scams. Social Networking Safety for Baby Boomers
- People tend to place more trust in their “friends” on social networks. Yet, more online users are finding that those connections make them more vulnerable. Not Deserving of Trust
- As more people sign up to micro-blog on Twitter, security is becoming an increasingly important issue. Learn to protect yourself from phishing, spam and hackers on Twitter. Tweet Safely: Twitter Scams to Dodge
- Electronic signatures, or e-signatures, are also being used in more complex transactions, like signing legally binding contracts. Here’s what to check for before you sign. What to Know About E-signatures
- Work-at-home scams turn job seekers into criminal accomplices, known as “money mules.” Hired for Crime
- If your child has an iPhone, then she’s probably connected to the Internet 24/7. Here’s how to ensure safety and security for any iPhone-obsessed child. iPhones, Kids and Security
- Smartphones are just as vulnerable to hackers as computers are. Learn about the various risks and how to keep your smartphone protected. Protect Your Smartphone From Hackers
- New technologies let you search for nearby gas stations or restaurants from the app on your iPhone or other mobile device, but also let thieves know you’re not at home. Here’s how to stay safe when using location-based technologies. Stay Safe Using Location-based Services
Which internet security program do you use and are you happy with the protection you are getting?
Do you have any internet security advice and/or experiences you want to share?