X

Top Ten Most Dangerous Online Activities

  1. OPEN ATTACHMENTS FROM UNKNOWN SENDERS Research shows that email attachments remain the number one means by which worms and viruses propagate.
  2. INSTALL UNAUTHORIZED APPLICATIONS such as file-sharing tools (Limewire, Azureus, and other Bit Torrent clients) - Illegal downloads are against university policy and they, like email attachments, are simply another means by which "bad" files get on your computer.
  3. DISABLE SECURITY TOOLS While trouble-shooting slow applications, many users will turn off their anti-virus and/or firewall. The problem is they forget to turn them back on!
  4. OPEN UNSOLICITED OR SUSPICIOUS EMAIL While most people may know not to open email attachments, many don't realize that dangers can lie in the body of an email too. HTML mail or mails that contain embedded photos are just as dangerous. Embedded images and PDFs can contain malicious code that is harmful.  
  5. SURF QUESTIONABLE SITES You will find, more times than not, that porn, gambling and sites that host illegal content are the same sites that install malicious software on your computer.
  6. GIVE OR LEND OUT YOUR PASSWORDS Don't be too trusting of fellow students and colleagues.  Keep your UUID and Password to yourself.  Exposing it means you're exposing salary, banking, class registration information, etc.! 
  7. SURF SITES THAT YOU DON'T ALREADY KNOW Browsers are quickly becoming some of the larger vulnerabilities in computing. Adware and spyware are written specifically to exploit Internet Explorer and Firefox. Stick with the sites you trust.
  8. USE WIRELESS NETWORKS Wireless networks are a huge risk because they are shared. The guy sitting across from you could be a hacker, stealing your password. Make sure you leave the firewall turned on and avoid sending passwords through the air. Try to use encrypted wireless networks as they offer higher levels of protection.
  9. FILL IN WEB FORMS AND REGISTRATION PAGES There may be nobody behind you watching you as you type. But that doesn't stop a keylogger (a program or device that logs all your key-strokes) from collecting your information. Try to keep all sensitive material on your own machine (the one that you maintain and protect), and keep it off those public computers.
  10. USE SOCIAL NETWORKING SITES Sites like MySpace and Facebook are a dream for thieves and stalkers. They allow anyone the ability to gather information about you that may aid them in stealing your identity. Think twice before you post any sensitive or damaging information on these sites.

FOR MORE INFORMATION
download this pdf. Right click and select "Save Target As".