{"id":85,"date":"2012-03-20T10:06:52","date_gmt":"2012-03-20T14:06:52","guid":{"rendered":"http:\/\/blog.computerworksmi.com\/?p=85"},"modified":"2012-03-13T10:08:47","modified_gmt":"2012-03-13T14:08:47","slug":"infections-in-the-real-world-part-5","status":"publish","type":"post","link":"https:\/\/blog.computerworksmi.com\/?p=85","title":{"rendered":"Infections in the Real World, Part 5"},"content":{"rendered":"<p>We\u2019ve talked about infections many times, at our location, in our newsletters, and here on this blog. But you might be asking yourself, just how do real infections act in the real world, without being filtered through a maze of possibilities and opinions that each infection seems to have.<\/p>\n<p><em>Part 5: The World Wide Web<\/em><\/p>\n<p><strong>What Is the World Wide Web?<\/strong><\/p>\n<p>In a word, the world wide web is the internet. Whenever you click on your web browser to open the internet, you are accessing the world wide web. The internet contains webpages that can provide information and entertainment, or it can contain pages that were created just as a means to distribute malicious software. In a similar vein, websites that are normally safe can be poisoned with malware by unauthorized individuals to infect innocent visitors.<\/p>\n<p><strong>The Real Life Example<\/strong><\/p>\n<p>Black hat SEO (Search Engine Optimization) techniques are the fastest growing threat on the world wide web. Individuals have automated programs that check the news headlines \u2013 particularly disasters, scandals, and deaths \u2013 and create extremely basic websites that redirect visitors to other websites that are hosting those fake antivirus programs called scareware. Some of these websites are legitimate pages that have been compromised, some of them are small, quick websites put together in a matter of minutes used for nothing more than drive-by downloading the scareware.<\/p>\n<p><strong>How Do I Protect Myself?<\/strong><\/p>\n<p>Be very careful what you click on, particularly if you are looking for information regarding a breaking news story. Remember, you are the first line of defense when it comes to computer infections! With all major browsers, you can hover your mouse over a link without clicking on it, and near the bottom of the screen, you can see the exact website address it will take you to. If you\u2019re not 100% sure the website is safe, don\u2019t click!<\/p>\n<p>Also, you can fight against redirecting by changing a setting in your browser that will prompt you when a website wants to redirect you to another website. While this may be cumbersome with certain websites, in the long run, it\u2019s best for your protection.<\/p>\n<h6>Computer Works would like to thank Sophos for information used to write this article.<\/h6>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019ve talked about infections many times, at our location, in our newsletters, and here on this blog. But you might be asking yourself, just how do real infections act in the real world, without being filtered through a maze of &hellip; <a href=\"https:\/\/blog.computerworksmi.com\/?p=85\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,13],"tags":[8,5,12,9],"class_list":["post-85","post","type-post","status-publish","format-standard","hentry","category-onlinesafety","category-tipsandtricks","tag-emailsafety","tag-kidsandcomputers","tag-socialnetworkingsafety","tag-virusesmalwarespyware"],"_links":{"self":[{"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=\/wp\/v2\/posts\/85","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=85"}],"version-history":[{"count":1,"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=\/wp\/v2\/posts\/85\/revisions"}],"predecessor-version":[{"id":86,"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=\/wp\/v2\/posts\/85\/revisions\/86"}],"wp:attachment":[{"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=85"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=85"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=85"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}