Unfortunately, safety and security is something we need to worry about when we use the Internet. Every day, there are newer and more advanced malicious threats lurking on the Web. WebShields stays abreast of these threats and keeps you protected at all times.
WebShields compiles a blacklist of dangerous threats from multiple sources daily. Currently, we have over 46,000 threats cataloged on that list.
What Are Common Threats On The Blacklist
- Virus—A computer program capable of attaching to disks or other files and replicating itself repeatedly, typically without user knowledge or permission. Some viruses attach to files so when the infected file runs, the virus also launches in your system. Other viruses sit in a computer’s memory and infect files as the computer opens, modifies, or creates the files. Some viruses display symptoms, and others damage files and computer systems, but neither is essential in the definition of a virus.
- Malware—A generic term used to describe malicious software such as viruses, Trojan horses, spyware, and malicious active content.
- Spyware—A wide range of unwanted programs that exploit infected computers for commercial gain. They can deliver unsolicited pop-up advertisements, steal personal information, monitor web-browsing activity for marketing purposes, or route HTTP requests to advertising sites.
- Adware—A legitimate, non-replicating program designed to display ads to the end user, often based on the monitoring of browsing habits, and often in exchange for the right to use a program without paying for it.
- EXE File—A EXE is an executable file. Usually it is executed by double-clicking its icon or a shortcut on the desktop, or by entering the name of the program at a command prompt. Executable files can also be executed from other programs, batch files, or various script files. The vast majority of known viruses infect executable files. Also called program files.
- Browser hijackers—A script or program that modifies a web browser’s settings without the user’s permission. A browser hijacker may replace the existing homepage, error page, or search page with its own. These are generally used to force visits to a particular website, increasing its advertising revenue.
- Keyloggers—Malicious programs that record the key strokes a user types on their PC, including instant message and email text, email addresses, web sites visited, passwords, credit card and account numbers, and other private data.
- Worms—Parasitic computer programs that replicate, but unlike viruses, do not infect other computer program files. Worms can create copies on the same computer, or can send the copies to other computers via a network.
- Spam—Unsolicited or undesired bulk electronic messages. There is email spam, instant message spam, Usenet newsgroup spam, web search-engine spam, and mobile phone messaging spam. Spam includes legitimate advertisements, misleading advertisements, and phishing messages designed to trick recipients into giving up personal and financial information.
- Trojan Horse—A malicious program that pretends to be a benign application. It purposefully does something the user does not expect. Trojans are not viruses since they do not replicate, but they can be just as destructive.