You and Your CourseOpportunities
Research and Teaching
Our ResearchResearch Degrees
Partners and Community
Partner with JCU
- Careers and Employability
- Open Day
- Australian Institute of Tropical Health & Medicine
Help and Support
- Choosing a strong Password
- Data Protection
- Device Security
- Email Safety
- Online Security at Home
- Web Safety
- Malware and Virus Protection
- Keep a clean device
- Protect myself from phishing
- Recover a hacked or compromised account
- Protect your digital reputation
- Report a cybersecurity incident
- Password Manager
- ICT Service Catalog
Keep a clean device
As internet users, we are continually bombarded with request to install *free* applications, web browsers or things that will speed up our computer. All promising to deliver an enhanced user experience.
Some of these applications are legitimate and do enhance our computing experience. However, a majority are malicious and while offering some functionality, also have a malicious intent and install second and third party components.
Here are some applications to look out for:
If your computer is infected with botnet malware, it communicates and receives instructions about what it’s supposed to do from “command and control” computers located anywhere around the globe. What your computer does depends on what the cybercriminals are trying to accomplish.
Many botnets are designed to harvest data, such as passwords, social security numbers, credit card numbers, addresses, telephone numbers, and other personal information. The data is then used for nefarious purposes, such as identity theft, credit card fraud, spamming (sending junk email), website attacks, and malware distribution.
+ If you didn’t go looking for the application, don’t install it.|
+ Regularly update your applications
+ Uninstall applications you no longer need.
+ Run and anti-malware tool
|- Install software through web popups or via other advertising.|