{"id":1332,"date":"2020-08-18T09:34:36","date_gmt":"2020-08-18T09:34:36","guid":{"rendered":"http:\/\/gocstg2020.govmu.org\/maucors\/?page_id=1332"},"modified":"2025-02-13T17:13:12","modified_gmt":"2025-02-13T13:13:12","slug":"malware","status":"publish","type":"page","link":"https:\/\/maucors.govmu.org\/maucors\/?page_id=1332","title":{"rendered":"Malware"},"content":{"rendered":"<p>[vc_row][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1614676914320{padding-top: 60px !important;}&#8221;][vc_column_text css_animation=&#8221;slideInLeft&#8221;]<\/p>\n<h3 style=\"text-align: center;\"><strong>Malware<\/strong><\/h3>\n<h5 style=\"text-align: center;\">Cybercriminals use a variety of methods to spread malicious software on social networks. Since users control the content of their own profile they can add malicious content to the pages.<\/h5>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;1699&#8243; img_size=&#8221;580&#215;250&#8243; style=&#8221;vc_box_shadow_border&#8221; onclick=&#8221;zoom&#8221; css_animation=&#8221;slideInRight&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1614676969022{padding-top: 15px !important;}&#8221;][vc_column][vc_column_text css_animation=&#8221;slideInRight&#8221;]Cybercriminals use a variety of methods to spread malicious software on social networks. Since users control the content of their own profile they can add malicious content to the pages. One of the most obvious attacks is to redirect the user to an external malicious site which is fully controlled by the attacker. Cybercriminals use fake accounts to post malicious links and users are tricked through embedded active contents such as JavaScript, Flash videos and iframe tags that redirect the user automatically to malicious websites or install malicious software.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css_animation=&#8221;slideInLeft&#8221;]<\/p>\n<h3 style=\"margin-top: 30px;\">I am victim of malware attack \u2013 what to do?<\/h3>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css_animation=&#8221;slideInRight&#8221; css=&#8221;.vc_custom_1739452359846{padding-left: 50px !important;}&#8221;]<\/p>\n<ul style=\"margin-top: 20px;\">\n<li>Log out from your social media account<\/li>\n<li>Disconnect from the Internet<\/li>\n<li>Scan your computer<\/li>\n<li>Change your password on the social media.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css_animation=&#8221;slideInLeft&#8221;]<\/p>\n<h3 style=\"margin-top: 30px;\">How can I prevent malware attacks?<\/h3>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css_animation=&#8221;slideInRight&#8221; css=&#8221;.vc_custom_1739452389412{padding-left: 50px !important;}&#8221;]<\/p>\n<ul style=\"margin-top: 20px;\">\n<li>Keep your computer or mobile device accessing social media secure<\/li>\n<li>Keep your operating system and applications patched<\/li>\n<li>Use an updated browser<\/li>\n<li>Use a password that it is difficult to crack<\/li>\n<li>Install an up-to-date anti-virus software on the computer<\/li>\n<li>Adjust Privacy settings<\/li>\n<li>Read the social media guide to Privacy<\/li>\n<li>Think carefully about choosing your friends<\/li>\n<li>Show \u201climited friends\u201d a cut-down version of your profile<\/li>\n<li>Disable options, then open them one by on<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1614676914320{padding-top: 60px !important;}&#8221;][vc_column_text css_animation=&#8221;slideInLeft&#8221;] Malware Cybercriminals use a variety of methods to spread malicious software on social networks. Since users control the content of their own profile they can add malicious content to the pages. [\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;1699&#8243; img_size=&#8221;580&#215;250&#8243; style=&#8221;vc_box_shadow_border&#8221; onclick=&#8221;zoom&#8221; css_animation=&#8221;slideInRight&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1614676969022{padding-top: 15px !important;}&#8221;][vc_column][vc_column_text css_animation=&#8221;slideInRight&#8221;]Cybercriminals use a variety of methods to spread [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1332","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/maucors.govmu.org\/maucors\/index.php?rest_route=\/wp\/v2\/pages\/1332","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/maucors.govmu.org\/maucors\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/maucors.govmu.org\/maucors\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/maucors.govmu.org\/maucors\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/maucors.govmu.org\/maucors\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1332"}],"version-history":[{"count":5,"href":"https:\/\/maucors.govmu.org\/maucors\/index.php?rest_route=\/wp\/v2\/pages\/1332\/revisions"}],"predecessor-version":[{"id":1812,"href":"https:\/\/maucors.govmu.org\/maucors\/index.php?rest_route=\/wp\/v2\/pages\/1332\/revisions\/1812"}],"wp:attachment":[{"href":"https:\/\/maucors.govmu.org\/maucors\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}