Computer Security

Types of Security Threats and Leprechaun Countermeasures:


  • Software designed to infiltrate a computer system without the owners informed consent
  • Malware includes computer viruses, worms, Trojan horses, spyware, crimeware and other malicious and unwanted software


  • A computer program that can copy itself and infect a computer
  • Some viruses try to avoid detection by killing the tasks associated with antivirus software before it can detect them


  • Type of malware that is installed on computers and collects little bits of information at a time about users without their knowledge
  • The presence of spyware is typically hidden from the user and can be difficult to detect
  • It can install additional software, redirect web browsers, change computer settings, set different home pages, and/or result in loss of internet

Rogue Software/Scareware

  • Form of malware that deceives of misleads users into paying for the fake or simulated removal of malware
  • Mainly relies on social engineering in order to defeat the security software
  • Most have a Trojan horse component, which users are misled into installing
  • Browser plug-in (typically toolbar)
  •    Image, screensaver or ZIP file attached to an email
  •    Software shared on peer-to-peer networks
  •    A free online malware scanning service

Ransom Virus

  • Comprises a class of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator of the malware in order for the restriction to be removed.


  • Criminally fraudulent process of attempting to acquire sensitive information (usernames, passwords, credit card details) by masquerading as a trustworthy entity in an electronic communication
  • Commonly used means: social websites, auction sites, online payment processors, IT administrators

Email Usage

  • The fastest most-effective method of spreading malicious code to the largest number of users

IN OTHER WORDS: Be aware of where you go on the internet, what you click on to open, what you are agreeing to when you install something. Never install an exe file unless you trust the source. Never click on a link in an email to update your information. Be on alert!

Use a cache cleaning service, install a real-time anti-virus and anti-spyware program and implement a firewall. Allow for automatic updates and scheduled scans.  Leprechaun Technical Services can help.