While not self-replicating, a “Trojan Horse” is a software program that appears to be normal/harmless, but also contains hidden code that performs evil deeds in the background. Trojans are designed to allow a hacker remote access to the computer system that has been targeted, granting that party control over: online data transmission in both directions; modification or deletion of files; display of the user’s screen; and more. They are transmitted as harmless looking email attachments, downloads from filesharing networks, or auto-loading executables that exploit browser vulnerabilities.
“Spyware” collects information without the user’s knowledge. It can take several forms: simple keyloggers that enable one person to monitor another’s online behavior; disruptors that change application settings; and comprehensive programs which collect the user’s personal information for transmission to dangerous parties. When others have access to your personal information, account numbers and passwords, there can be no end to the financial havoc that they can wreak before they are apprehended. So far, the FTC has documented 27.3 million cases of Identity Theft.
There have been countless computer viruses and other malware spread over the years. And, though Windows Vista offers a great number of security improvements over earlier Windows operating systems, some vulnerabilities do remain.
Comprehensive virus-protection programs such as McAfee Internet Security Suite and Norton AntiVirus offer wide coverage, and there are several other PC software packages available.
As a quick reference, Wikipedia has simple chart of available anti-virus software, listed by platform and basic features.
Note: The largest Windows anti-virus software developers, such as McAfee and Symantec, have added anti-spyware capabilities to their comprehensive anti-virus packages, so be sure to check specific product features before purchasing separate programs.
The BSD Open Source platform, particularly Mac OS X (which is based on Berkley Software Distribution’s Darwin kernel), has proven to be a very secure computing environment. Apple also provides “Security Configuration Guides” for Mac users. At present, a hacker’s ability to infect a Mac hinges on the individual user’s willingness to download and open a file that contains dangerous hidden code, so avoiding files sent by strangers and never downloading files from unfamiliar websites often stand as adequate protection. As the platform continues to gain popularity, however, hackers may become more determined to pave malware inroads for themselves.
Mac users who run Windows software on their Macs and/or share files with friends or colleagues who use Windows-based PCs are wise to have some virus protection onboard. Commercial packages such as VirusBarrier and Norton AntiVirus are available; and ClamXav is an excellent, free alternative.
Today’s World Wide Web offers both a wealth of opportunities and a plethora of perils. These days, there is no such thing as being TOO SAFE. A small investment in your business’s online security is the digital equivalent of having a fence around your yard – to stand as a barrier against an unknown “something” that might happen “someday.” It just makes sense.