Protect Your Devices
The following are antivirus software programs anyone can download on their personally-owned non-BYUH computers. These are not provided by BYU-Hawaii.
Two or more AV software programs installed on the same computer have been known to cause problems with authentication. Uninstall all but one to troubleshoot.
Important Note: Avoid buying or installing antivirus software through pop-ups or email links, unless you've recently ordered it and received an installation message. If you're interested in a vendor's product, always visit the official vendor site or a trusted distribution platform.
Why? Criminals frequently employ pop-ups or email links to deceive users into downloading software containing malware or attempting to steal financial information through fake purchasing procedures.
What is Malware? What Can It Do?
Malware, a shortened term for malicious software, is any and all programs designed to harm or perform undesirable actions on a computer system. This includes spyware, trojan horses, worms, viruses, and ransomware.
Spyware:
Spyware can download and install itself on your device without consent, often when visiting unsafe websites or through attachments. It can manipulate your computer to execute unwanted tasks, such as opening advertisements, and may track your online activities to steal passwords and compromise accounts.
Trojan Horses:
Trojan horses hide themselves as legitimate software and deceive users through social engineering tactics to execute them on their systems. They typically aim to steal personal information, create backdoors for hackers, or extort money by holding computer systems for ransom.
Worms:
Worms can spread through vulnerabilities or attachments in emails and messages. Once installed, they silently spread within the computer system, consuming resources by making copies of themselves. They may steal data or grant attackers access to the system.
Viruses:
Viruses are programs or malicious code designed to alter the functions of a computer by integrating themselves into legitimate programs or documents. They can corrupt or destroy data and remain dormant until activated. Viruses can steal data, log keystrokes, spam email contacts, or take control of the computer, spreading to other systems via attachments, links, or internet downloads.
Ransomware:
Ransomware encrypts a victim's computer data, demanding payment to restore access. It locks files, preventing access to photos, documents, and other information until the ransom is paid. Payment does not guarantee restoration of access.