Phishing scams appear to originate from a trusted source to trick a user into providing information. The attacker can then use this information to access your accounts, gather additional private information about you, and make purchases or apply for credit in your name.
Tip of the Week:
Hackers Can Take Control of a Computer and Use It for Their Own Purposes. Keep Your Computer Secured and Learn to Recognize the Signs of Infection.
A virus or malicious program may not directly damage your computer but may instead turn it into a zombie. A zombie computer is a computer that a hacker can direct to complete certain tasks, such as attacking another target. Always keep your computer secured with antivirus protection to avoid this and complete a full system scan if you suspect your computer has been compromised. A compromised computer may begin running sluggishly, start crashing or begin performing tasks on its own such as sending out emails through your email account.