This illustrated book was designed for HTML5-compliant browsers and will not work with your current browser.
For the best viewing experience, please upgrade to the latest version of your browser or download a modern browser and try launching this site again.

Search Book


KEYWORDS


No results found.

What’s a cookie? How do I protect myself on the web? And most importantly: What happens if a truck runs over my laptop?

For things you’ve always wanted to know about the web but were afraid to ask, read on.

OPEN BOOK

THING

SHARE THING



What exactly are phishing and malware attacks?

Phishing takes place when someone masquerades as someone else, often with a fake website, to trick you into sharing personal information. (It’s called “phishing” because the bad guys throw out electronic bait and wait for someone to bite.) In a typical phishing scam, the attacker sends an email that looks like it’s from a bank or familiar web service you use. The subject line might say, “Please update your information at your bank!” The email contains phishing links that look like they go to your bank’s website, but really take you to an impostor website. There you’re asked to log in, and inadvertently reveal your bank account number, credit card numbers, passwords, or other sensitive information to the bad guys.

Malware, on the other hand, is malicious software installed on your machine, usually without your knowledge. You may be asked to download an anti-virus software that is actually a virus itself. Or you may visit a page that installs software on your computer without even asking. The software is really designed to steal credit card numbers or passwords from your computer, or in some cases, harm your computer. Once the malware is on your computer, it’s not only difficult to remove, but it’s also free to access all the data and files it finds, send that information elsewhere, and generally wreak havoc on your computer.

CLOSE

RESUME READING?

You can pick up from where you left off the last time, or start at the beginning. Do you want to:

RESUME
READING
GO TO THE
BEGINNING
CLOSE

Print Book

Print the book (in Letter or A4 size only)

Download PDF

Download the book in PDF. Size: 3.3MB

CREDITS


Very Special Thanks To

Brian Rakowski, Ian Fette, Chris DiBona, Alex Russell, Erik Kay, Jim Roskind, Mike Belshe, Dimitri Glazkov, Henry Bridge, Gregor Hochmuth, Jeffrey Chang, Mark Larson, Aaron Boodman, Wieland Holfelder, Jochen Eisinger, Bernhard Bauer, Adam Barth, Cory Ferreria, Erik Arvidsson, John Abd-Malek, Carlos Pizano, Justin Schuh, Wan-Teh Chang, Vangelis Kokkevis, Mike Jazayeri, Brad Chen, Darin Fisher, Johanna Wittig, Maxim Lobanov, Marion Fabing Nicolas, Jana Vorechovska, Daniele De Santis, Laura van Nigtevegt, Wojtek Cyprys, Dudley Carr, Richard Rabbat, Ji Lee, Glen Murphy, Valdean Klump, Aaron Koblin, Paul Irish, John Fu, Chris Wright, Sarah Nahm, Christos Apartoglou, Meredith Papp, Eric Antonow, Eitan Bencuya, Jay Nancarrow, Ben Lee, Gina Weakley, Linus Upson, Sundar Pichai & The Google Chrome Team


Share this book and what you've learned with friends and family; www.20thingsilearned.com

malware
2
LOCALE_PREVIOUS_PAGE
LOCALE_NEXT_PAGE
Go Back

Table of Things