
IT Services Secure IT Keep a clean device
Keep a clean device
- Courses
- Future Students
- Current Students
- Research and Teaching
- Partners and Community
- About JCU
- Celebrating 50 Years
- Anton Breinl Research Centre
- Agriculture Technology and Adoption Centre
- Living on Campus
- Advanced Prawn Breeding Research Hub
- Advanced Analytical Centre
- Applying to JCU
- Alumni
- AMHHEC
- Australian/NZ Students
- Australian Lions Stinger Research
- Boating and Diving
- Australian Tropical Herbarium
- ATSIP
- Careers at JCU
- Association of Australian University Secretaries
- Careers and Employability
- Australian Quantum & Classical Transport Physics Group
- CITBA
- Centre for Tropical Bioinformatics and Molecular Biology
- Chancellery
- CMT
- CASE
- College of Business, Law and Governance
- College of Healthcare Sciences
- College of Medicine and Dentistry
- College of Science and Engineering
- CPHMVS
- COVID-19 Advice
- CSTFA
- Centre for Disaster Solutions
- Daintree Rainforest Observatory
- Diploma of Higher Education
- Discover Nature at JCU
- Division of Research and Innovation
- Division of Tropical Environments and Societies
- Division of Tropical Health and Medicine
- Staff Intranet
- Economic Geology Research Centre
- Elite Athletes
- Estate
- Fletcherview
- Foundation for Australian Literary Studies
- Gender Equity Action and Research
- GetReady4Uni
- Give to JCU
- Information for JCU Cairns Graduates
- Graduate Research School
- Graduation
- JCU Ideas Lab
- Indigenous Education and Research Centre
- Indigenous Legal Needs Project
-
IT Services
- Student IT Essentials
- Staff IT Essentials
- Help and Support
- Stay Informed
-
Secure IT
- Choosing a strong Password
- Cybersecurity
- Data Protection
- Device Security
- Email Safety
- Online Security at Home
- Web Safety
- Malware and Virus Protection
- Keep a clean device
- Protect myself from phishing
- Recover a hacked or compromised account
- Protect your digital reputation
- Report a cybersecurity incident
- Password Manager
- IT Service Catalog
- About
- Information for Agents
- International Students
- JCU College
- JCU Contact Information
- JCU Eduquarium
- JCU Global Experience
- JCU Motorsports
- JCU Prizes
- JCU Sport
- Language and Culture Research Centre
- LTSE
- LearnJCU
- Library
- MARF
- Marine Geophysics Laboratory
- New Students
- Off-Campus Students
- Office of the Provost
- Office of the Vice Chancellor and President
- Open Day
- Orpheus
- Outstanding Alumni Awards
- Parents and Partners
- Pathways to University
- Planning and Performance
- Planning for your future
- Placements
- Policy
- PAHL
- Publications
- Professional Experience Placement
- Queensland Research Centre for Peripheral Vascular Disease
- Rapid Assessment Unit
- Researcher Development Portal
- JCU Connect
- Safety and Wellbeing
- Scholarships @ JCU
- SICEM
- Staff
- Student Equity and Wellbeing
- TESS
- TREAD
- TropEco
- TQ Maths Hub
- TUDLab
- Unicare Centre and Unicampus Kids
- UAV
- VAVS Home
- Work Health and Safety
- WHOCC for Vector-borne & NTDs
- Media
- Copyright and Terms of Use
- Australian Institute of Tropical Health & Medicine
As internet users, we are continually bombarded with request to install *free* applications, web browsers or things that will speed up our computer. All promising to deliver an enhanced user experience.
Some of these applications are legitimate and do enhance our computing experience. However, a majority are malicious and while offering some functionality, also have a malicious intent and install second and third party components.
Here are some applications to look out for:
Viruses |
Spyware
|
Botnets If your computer is infected with botnet malware, it communicates and receives instructions about what it’s supposed to do from “command and control” computers located anywhere around the globe. What your computer does depends on what the cybercriminals are trying to accomplish. Many botnets are designed to harvest data, such as passwords, social security numbers, credit card numbers, addresses, telephone numbers, and other personal information. The data is then used for nefarious purposes, such as identity theft, credit card fraud, spamming (sending junk email), website attacks, and malware distribution. |
Summary
DOs | DON'Ts |
---|---|
+ If you didn’t go looking for the application, don’t install it. + Regularly update your applications + Uninstall applications you no longer need. + Run and anti-malware tool | - Install software through web popups or via other advertising. |