Myth 1 :  

Viruses and other malicious software affect only computers and laptops .                                                                                    

Reality :


Mobile malware families which affect smartphones, tablets and other mobile  devices,increased by 58% last year. This malware can steal information such as phone numbers and email addresses (32% of the time), or use phone’s GPS to track user (19% of the time).




 Myth 2 :

I can’t get a virus or be attacked on popular social networking sites.  


Reality :    

Many well known networks including several of the new ones Are prime targets of scammers, with 56% of social media attacks involving gift cards and survey scams.


Myth 3:

Free antivirus software on my PC is good enough to protect my information.

 Reality :

‘Ransomware’ where criminals lock you out of your PC unless you pay their ransom is one example of the trend towards increasingly vicious malware, which is known for being harder to undo, more  aggressive and more professional than other malware. This malware requires protection beyond what basic antivirus software can offer.



Myth 4:

Apple products aren’t susceptible to viruses and online attacks.  


While hackers still primarily target PCs, more than 60k Mac computers were infected by one attack; just an example that no OS is safe from online threats.




Myth 5:

It’s easy to tell if a site is fake—typos or foreign characters are key indications.


Many spoofed sites today looks exactly like the websites of legitimate brands, down to the smallest details. Adding to that number of fake sites that imitated legitimate scial networks more than doubled since 2012.    


 Myth 6 :

My PC won’t get infected since I don’t visit risky sites.

Reality :

61% of malicious sites are actually legitimate websites that have been compromised and infected with malicious code. Bussiness, technology and and shopping websites are among the top five types of sites hosting infections.



 Myth 7 :

I’ll know right away if my computer is infected.

Reality :

Criminals today rely on stealth – the longer they are on your machine undetected, the more damage they can do. Your PC could even be even part of  ‘Botnet’- a network of remotely controlled computers that send spam emails or participate in widespread attacks and you might not even know it.



Tips :


     1. Use minimum password of 15


    2. Avoid “Remember Password”.

    3. Set up Log in alerts.

    4. Activate Log in approvals.

    5. Utilize browsers & apps.

    6. Be cautious with requests and offers.




            Please share your suggestions;

           Because here we aim to please  🙂








Categories: Uncategorized