Total Defense Global Security Advisor
Power To Learn
Free Internet Protection With Your Optimum Online Subscription
They paralize computers, steal confidential information, and wreak havoc on your computer's performance. Constantly changing into more dangerous forms, these routine online offenders make the top 10 list for Worst Internet Nightmares.
Viruses

These dreaded programs manifest themselves in many forms and have the ability to spread, via executable code, from one computer to another, debilitating productivity and compromising your data.


Trojans

Coded to trick users, Trojans invade computers in the guise of legitimate applications. Once inside, Trojans unleash a range of annoying and malicious behaviors, deleting confidential files, changing network settings etc.,


Worms

Designed to self-replicate, Worms can cause significant slowdowns in networks by consuming bandwidth. The result: a slower, less efficient business.


Bots

Programmed to perform simple and structurally repetitive tasks online, Bots scour websites, posting messages on open forums and increasing the load on computers.


Session Hijackers

Hackers use specific programs to look for networks and computers that aren't secured, so they can exploit a valid computer session - also called a session key - to gain unauthorized access to information or services in a computer system.


Adware

Supported by advertising, these productivity killers display and download unsolicited advertising content on affected computers.


Spyware

As the name suggests, these privacy-invasive programs monitor users' online activities and collect various types of confidential information, such as Internet surfing habits and sites that have been visited.


Code Injections

The smallest dose of malicious code can have disastrous consequences. Attackers use code injections to exploit computer bugs and change the course of a program's execution. These injections are a must-keep-out for businesses.


Phishing Attacks

One of the top online threats, phishing, relies on a 1-2 combination of online trickery to get users to submit sensitive information such as, usernames and passwords. Phishing attacks utilize email or instant messaging to direct users to fake sites, which are designed to mimic reputable sites.


Rootkits

These programs or set of coordinated programs let hackers gain complete control of a system and launch a full-on assault of malicious activity - without being detected.


Download Our Free Internet Security Package
Join Our Customer Panel
Do you use your Optimum services for...?
Please choose one:


QuickLinks
Add Services
More Links