Step 6: Update and Patch

With your machine disinfected, take a few moments to update your operating system software and any third party applications to their latest (and most secure) version. Rogue antivirus and scareware programs are usually delivered as drive by downloads spawned by malicious Web sites. These leverage holes in Windows, common Web browsers or browser plugins, or common applications like Adobe Acrobat to bypass your computer’s security systems. Updating the software on your system can close that avenue of attack.

With your machine disinfected, take a few moments to update your operating system software and any third party applications to their latest (and most secure) version. Rogue antivirus and scareware programs are usually delivered as drive by downloads spawned by malicious Web sites. These leverage holes in Windows, common Web browsers or browser plugins, or common applications like Adobe Acrobat to bypass your computer’s security systems. Updating the software on your system can close that avenue of attack.

BACK | NEXT

Suggested articles

2020 Cybersecurity Trends to Watch

Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise.

Top Mobile Security Stories of 2019

Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. Here are Threatpost’s Top 10 mobile security stories of 2019.