How to Avoid Internet Scams and Computer Viruses

Updated on February 23, 2018
Glenn Stok profile image

Mr Stok applies his professional insight to teach Internet related topics. He has a background in Computers with a Master of Science Degree.

Cyber thieves take advantage of those who tend to fall for scams. However, there are ways that you can be 100% safe. I'll show you how to recognize scam artists before becoming a victim.

Identity theft has been common long before the Internet:

  • Criminals steal paper bills and bank statements from the garbage, finding social security numbers and account numbers that can be used to buy products under someone else’s name?
  • Credit card numbers are even stolen at checkout counters in stores where the thief simply looks over the cardholder's shoulder and quickly jots down the number while they are holding the card waiting to pay.

This happens in the real world, but in cyber space we can protect ourselves a lot easier. The problem is that some people don’t know how they are deceived.

Source

How to Avoid Email Scams and Viruses

If you find yourself in a site that you're not sure about, checking the site carefully might show some red flags.

A spoof site copies a lot of the actual site, but it may miss a few things that can be detected with a little scrutiny. If you see any misspellings or poor grammar, let that be a warning sign.

Of course, the best protection is to avoid following links from an email or pop-up warning. Never log into an account via a link such as these. Always go directly to the site by entering the URL yourself. Make it easy by saving it in your bookmarks and click to it from there.

Be Causcious With Links From Other Sites

In addition, if another website talks about your bank, for instance, and they have a link to it, don’t follow that link. Once again, just go direct or via your saved bookmark.

If you allow yourself to fall for scams you can lose your hard-earned money for being hasty. It's easy to check things out by going to a site with a direct method rather than trusting a link from an unknown source.

How People Get Fooled by Phishing

Many people get fooled into giving away their username and password by a method called phishing:

  1. They receive an email stating that their account was compromised and that they should log in and change their password immediately.
  2. They click on the link in the email and go to their bank's site or broker's site, whatever it may be.
  3. The site looks like the actual site. However, it's a fake—a spoof of the real thing.
  4. In a hurry to change their password they no longer are thinking clearly. They enter their user ID and password to log in.
  5. Being in panic mode, they don’t even take the time to first check things out. They just quickly change their password.
  6. They just gave their logon information to the criminal by entering it on the spoof site.

Any User ID and password would have worked. The hacker is expecting that people will enter their true login information. Then they use this to log into the real site and transfer all the victim's money to an account of their own.

Example of a Phishing Email and How to Recognize It

I once received an email that looked like it came from the IRS, warning me that my recent bank transfer was rejected. See the image of that email below. It was not from the IRS, as it would seem.

Don't fall for email hoaxes. They attempt to get you to click to a site that plants a virus on your computer.

This is an email I had received in my inbox. It is not from the IRS, as it would seem.
This is an email I had received in my inbox. It is not from the IRS, as it would seem.

Notice the link to the word doc file for the tax report in the example above. That link actually goes to a website that plants a virus in your machine. It's not a doc file.

I knew that without clicking. I simply hovered my mouse over that link. By hovering over a link, most browsers will display the actual URL address that you'd go to if you click. This is usually displayed in the lower left or right of your window.

In this case, it showed me a strange-looking URL. So I knew it was fake. If it were really the IRS it would have been a ".gov" address. This one was not.

The fact that the link looks like a ".doc" word file is meaningless. Hackers can change what displays on your screen. The address can be easily forged. Don't fall for that game.

Now you know.

Why Is Phishing Successful?

The people who fall for these scams are not stupid. They just have not educated themselves with the proper safety methods in cyber space and they don't understand how hackers work.

They may be somewhat computer illiterate, but there is no excuse for that. Use your due diligence to check it out yourself, without panicking and without following dangerous links.

If everyone would just stop responding to these email scams, our inboxes wouldn’t be so cluttered with this garbage. The scammers would give up. They succeed because there are so many people who fall for it.

Never Use the Same Password on Multiple Sites

A friend of mine used the same password on her Facebook and Gmail accounts. Due to a security breach of her Facebook account, a major Nigerian hacker was able to access her Gmail account.

Some time later, she found her password had been changed on her Gmail account.

The hacker had taken over her account, sent out emails in her name to her contacts saying that she had lost her wallet on a business trip, and desperately needed a loan of a couple thousand bucks to get home.

You can see how easy it is for her good friends to fall for this, thinking it was really her, since it came from her email account. Good friends would respond and wire her the funds as described in the email. However, these funds would actually go to the hacker.

Remember, if you receive a fishy-sounding email from a friend, it's possible they've been hacked. Try to confirm it's really from them by some other means, not by replying to the email. If you reply, you'll give your email address to the hacker.

Two-Factor Authentication

Many companies are implementing this highly recommended procedure that adds a second layer of protection to your login process. In addition to entering your username and password, a unique one-time authorization code will be sent to your phone, either by text or by a voice call. You need to enter that code to complete the login process.1

An alternative to sending a code to your phone, that works just as well, is to use an Authenticator App that generates a unique code. It only works for your account and is only valid for a few seconds before it expires.

I use Google's Authenticator App2 that I downloaded, free, from the App Store. I like how simple it is to use. You don’t need to wait for a code to be sent to your phone. Microsoft has their own Authenticator for access to their sites.3

I use these methods on every site that supports them and I highly recommend you do the same. You’ll be much safer for it.

What You Can Do to Help Others Avoid Scams

Whenever I get legitimate emails from my bank with links in the email to log in, I try to teach them. I send a report to management explaining how they are inadvertently teaching their customers to log in by clicking on links in emails.

I continue to explain that someday one of their customers will receive a phony email and will be scammed into giving their account information to a hacker of a phishing site.

If you get an email like that from your bank or financial institution, give them hell. Tell them they are creating a security breach. If enough of us show them that we are smarter than they are, they may get the message.

If you have kids using computers, educate them about these proper methods of safety.

And remember, never panic and get tricked into following dangerous links when you get a warning. Take your time to investigate and use your own saved links.

Questions & Answers

    © 2018 Glenn Stok

    Comments

      0 of 8192 characters used
      Post Comment

      • profile image

        readmikenow 2 months ago

        Very good article. I once lost a PC to a virus. My teenager clicked on an Email that turned out to be a big mistake. I enjoyed reading this.

      • Glenn Stok profile image
        Author

        Glenn Stok 2 months ago from Long Island, NY

        Denise, Best thing is to just ignore them. Any website that uses pop-ups doesn’t deserve your business anyway. They are intrusive.

      • denise.w.anderson profile image

        Denise W Anderson 2 months ago from Bismarck, North Dakota

        I clicked on a pop-up once at work that looked like it was from one of the programs that I use regularly and ended up crashing my entire computer! It is easy to fall for these things when they imitate programs and websites you are already using. I like your policy to check it out before clicking, just in case!

      • Glenn Stok profile image
        Author

        Glenn Stok 3 months ago from Long Island, NY

        Eric - I use gmail too in addition to a few other email accounts for various purposes. I’ve noticed how well they filter spam. But you’re right. We have to be alert to recognize phishing attempts that get through.

      • EricFarmer8x profile image

        Eric Farmer 3 months ago from Phoenix Arizona

        Very useful advice on avoiding Phishing. It is not something I think much about because of how Gmail tends to filter all of these right into junk but every once and while something gets through.

      • Glenn Stok profile image
        Author

        Glenn Stok 3 months ago from Long Island, NY

        Mary Wickison - You sure are doing your due diligence. Good for you! Logging into your bank and checking for communication there, is the safest way to do it.

      • Blond Logic profile image

        Mary Wickison 3 months ago from Brazil

        You're right about the banks, I had a similar email that didn't use my name, it just said, Mrs and then was blank.

        I didn't respond and contacted my bank and asked them if it was from them. They check their records and it had been.

        I explained that it looked like a scam because they didn't even use my name. In the future, if I receive a suspect email, I will just log in to my bank account and any kosher emails will be there in my messages.

        As internet users, we have to stay alert to potential dangers. The thieves and hackers will only get smarter.

        Great tips.

      • B. Leekley profile image

        Brian Leekley 3 months ago from Kalamazoo, Michigan, USA

        Thanks for the tips, Glenn. Some are new to me, such as the Authenticator app.

        I'm suspicious of some of the system warnings that a website may have been compromised. In some cases the real motive seems to be that a corporation, such as Google, doesn't like the politics of the site so falsely and baselessly expresses suspicion to frighten browsers away.

      • Natalie Frank profile image

        Natalie Frank 3 months ago from Chicago, IL

        Great article with lots of practical information. Thanks for writing it.

      working

      This website uses cookies

      As a user in the EEA, your approval is needed on a few things. To provide a better website experience, turbofuture.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

      For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: "https://turbofuture.com/privacy-policy#gdpr"

      Show Details
      Necessary
      HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
      LoginThis is necessary to sign in to the HubPages Service.
      Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
      AkismetThis is used to detect comment spam. (Privacy Policy)
      HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
      HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
      Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
      CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
      Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
      Features
      Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
      Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
      Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
      Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
      Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
      VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
      PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
      Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
      MavenThis supports the Maven widget and search functionality. (Privacy Policy)
      Marketing
      Google AdSenseThis is an ad network. (Privacy Policy)
      Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
      Index ExchangeThis is an ad network. (Privacy Policy)
      SovrnThis is an ad network. (Privacy Policy)
      Facebook AdsThis is an ad network. (Privacy Policy)
      Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
      AppNexusThis is an ad network. (Privacy Policy)
      OpenxThis is an ad network. (Privacy Policy)
      Rubicon ProjectThis is an ad network. (Privacy Policy)
      TripleLiftThis is an ad network. (Privacy Policy)
      Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
      Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
      Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
      Statistics
      Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
      ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
      Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)