1) MALWARE
MALWARE - programs designed to harm the user, among other things, by damaging the system, destabilizing the operation of the computer, intercepting data.
Malware includes:
COMPUTER VIRUS
A program running without the user's knowledge, hindering or even preventing the proper work of the operating system. Viruses are transmitted through infected files that need to be delivered to the target computer in some way in order for the computer to become infected. Such a file can be transferred using a data carrier (floppy disk, CD/DVD, USB stick) or transmitted over the Internet. The effects of a virus infection on your computer include, but are not limited to:
WORM
It is very similar to a virus in the manner it affects the computer, but it is spread by the network in which the computer is located.
TROJAN HORSE
A program that disguises as a program known to the user, but is in fact malicious software. You can run it, for example, by opening an e-mail attachment, running a file downloaded from the network, or visiting an infected page.
SPYWARE
Spyware performs specific actions without the user's knowledge. The purpose of the application is to collect information about users (how they use the network, which pages they visit), as well as to steal confidential data such as logins, access passwords to online shops, bank accounts, auction services, etc.
ROOTKIT
Software that changes the work of the operating system by hiding certain events, elements (processes, files, network connections) from the user. Rootkits allow third parties to take over the machine, which can then use it for illegal activities such as spamming or hacking attacks.
ADWARE
These are programs distributed free of charge. In exchange for free use, the software displays advertisements usually in the form of graphics. Adware programs are an element of the so-called malware, which installs additional, difficult to remove modules in the operating system. Malicious Adware is often used in conjunction with spyware. The purpose of these programs is to display advertisements unwanted by the recipient.
BOTNET
A network of workstations with hidden malware. Computers operating in this network work remain idle until the hacker who controls them launches a special program and uses them for illegal activities. Nowadays, botnet networks are one of the biggest Internet threats. They are very often used to send unsolicited mail.
2) SPAM
SPAM - unwanted and unnecessary e-mails sent to users.
Such messages are sent via e-mail, instant messaging and are posted on discussion forums or social networking sites. They are mass-sent. SPAM messages are sent to many randomly selected users. Usually, the spammer is not known to the user and the content of the message is not of interest to the recipient.
3) PHISHING
PHISHING is a form of attack based on social engineering aimed at obtaining a login, password or other user data. The attacker impersonates a known victim as a person or institution/company and asks to provide information or perform a specific action, such as logging in to an infected website or visiting a web address. Phishing is used to obtain data that can be used to gain financial benefits - personal data, logins and passwords to bank accounts, credit card numbers, one-time passwords.
4) CYBERBULLYING
CYBERBULLYING is the exercise of influence through electronic media. Internet, mobile phones or other devices are used to transmit content that is intended, among other things, to cause injury, ridicule, humiliation or intimidation to another person. The results of the research indicate a high level of mental violence in the Internet among children and adolescents.
Security measures
Nowadays, the use of computer security software is essential for the safe use of the network. Every day around 17,000 applications that pose a threat to our computers appear on the Internet. To protect yourself during everyday use of the Internet, you should use commercially available security software.
Antivirus
Antivirus software is used to protect your computer against malicious software. Antivirus prevents and prevents infections of viruses, worms, trojans, etc. In addition to diagnostic functions, antivirus programs also allow you to remove malware from your system. In order for the antivirus programs to perform its role, it is necessary to update the virus definition database and perform a regular scan of the system. Most antivirus programs can be configured to do this automatically.
Firewall
A firewall is a separate device or program designed to monitor the traffic passing through it and, depending on the settings, to block or pass the traffic through. A firewall is usually located between two areas of a network, e.g., between a secure area - the user's computer and an external network - the Internet. In this way, all attempts to connect to a computer and a computer with an external network will have to go through the firewall. A number of settings and rules will detect and block unwanted network traffic.
Parental control
Parental control is the software or features that enable parents to decide how a child uses the computer and the Internet. Parental control allows, among other things, to limit the time in which a child uses a computer and to decide which websites the child can visit.
Antispam
Antispam is a program that monitors incoming emails and catches those that are spam. Such messages shall be appropriately marked so that the user knows that he is dealing with unwanted mail without opening it. Messages detected by antispam are deleted or moved to the appropriate disk space.
Updates
Malicious software takes advantage of vulnerabilities in the system and the software installed on your computer, so it is important to check regularly for updates to fix bugs. It is equally important to update your computer's security software. Most software has automatic update functions that allow the user to streamline the above process.
Trusted sources
To reduce the risk of malware being installed on your computer, you should be particularly careful when downloading various types of software from the Internet. It is recommended to install software only from trusted and known sources, and not to install software that is referred to by links in emails sent from unknown senders.
Paid security packages available from some telecommunications operators
Some ISPs allow their customers to purchase a security package as an additional service to their Internet access offer. Please note that the security packages provided by operators are not their own solutions, but tools developed by security software companies. They are usually distinguished from commercial products by their name, graphics and added operator logos. These are full versions of the programs available in shops or via the Internet.
Paid security packages (from dealers)
There are security packages available on the market, created by companies with global reach, high reputation, specializing in IT security. Their purchase is associated is a one-time expense of up to several hundred zlotys for software that will protect the computer for a specified period of time, e.g. 1 year.
Free security packages
There are many free security packages available on the market. The most frequently used by Polish users are:
avast! Free Antivirus 2018
Kaspersky Free
Microsoft Security Essentials
Comodo AntiVirus
Avira Free Antivirus 2018
Bitdefender Antivirus Free Edition
AVG AntiVirus Free
Ad-Aware Antivirus Free
360 Total Security
SecureAPlus
Although free security packages are very popular, it should be remembered that these are "limited" versions of paid security packages, and this is associated with some limitations in the time of their use.
The most common limitations are:
Reporting of abuse by SNT users
The Abuse Team will intervene if an event (fraud) is initiated by a user of the SNT web service.
What should be reported?
Method of reporting
Reports of abuse should be sent to the Customer Service address: abuse@starnettelecom.pl. In order to enable us to intervene in your case, it is necessary to provide the following information in your report:
If you have any other questions about network security, please write to: bok@starnettelcom.pl.
Sanctions against abusive users
The following sanctions may be imposed on users who misuse our services in accordance with our terms and conditions:
Spam and phishing
SPAM
Pursuant to the Act of 18 July 2002 on the provision of electronic services (Journal of Laws No. 144 of 2002, item 1204, as amended), Art. 10.1: "Transmission of unsolicited commercial communications to a designated recipient by electronic means, in particular by electronic mail, is prohibited”, and Article 24.1: "Whoever sends unsolicited commercial communications by electronic means shall be liable to fines. (...)". Thus, spam is an unwanted, unsolicited electronic message, most often distributed in bulk, via e-mail, and its content and context are independent of the identity of the recipient.
The most common effects of spam:
PHISHING
Phishing is an attempt to persuade the user to disclose such data as access passwords, payment card numbers, etc., allowing the cybercriminal to steal the user’s identity. This is usually done by e-mail that:
A specific variant of phishing is pharming, which involves attacking a domain name server (DNS), "translating" domain names into IP addresses, which allows cybercriminals to create a fake website. As a result, the victim of pharming, despite entering a valid address, is redirected to a false page.
HOW TO VERIFY THE MESSAGE?
Gmail
Open the message in the Inbox folder. Click on the arrow in the top right corner. Select: Show original message. The headers will appear in a new window.
Outlook 2010
Right-click on the ribbon area of Main Tools -> Customize Ribbon -> Main Tabs/Tools -> New Group. Select the newly created group, rename it to Header, confirm. From the “Select Commands From:” list, select the |All Commands” category, select “Message Options...”, click “Add”, select the “Header” group, confirm. After selecting the message whose header you want to preview, click on the new icon on the ribbon.
Outlook 2013
Open the message. Click on the tab “File -> Properties” (in the bottom of the wider window). Web headlines will appear in a new window.
Outlook Express
Right-click on a message in your mailbox. Select Properties -> Details. The headers will appear in a new window.
Mozilla Thunderbird
Click on the message -> View menu -> Message Source.
How to defend yourself against malware?
The basic form of protection against malicious software is the use of antivirus protection, which should be enabled at all times. You should also scan your devices regularly. In addition you should:
Secure passwords
Your password is secure only if:
Secure password:
Remember!
Do not disclose your password.
Change your password periodically.
Avoid entering passwords on devices you do not have control over.
Do not write passwords on devices.
Do not use the same password in multiple locations.
Business Customer Service Desk
Open from Monday to Friday from 8 a.m. to 7 p.m.
Phone +48 22 656 21 21
Fax: +48 22 656 21 27
e-mail: bok@starnettelecom.pl