Tips to Avoid Malware

 Tony Dumas, April 2014

Certain websites and programs should be avoided when online. Given the prevalence of malware, advertising and marketing software and other malicious programs, this list can serve as a guide to what types of websites and programs can pose a risk to your computer and information. Please be aware that even legitimate, well-maintained business and institutional websites can occasionally be infected so no list can guarantee that you will never encounter a virus or other malware while Internet browsing.

There are additional protections you can use, such as browsing the web only when using a non-administrative computer account. For more information on protecting yourself while online, go to or contact your departmental IT Support or UNH Information Security Services.

Dangerous Websites: 

  • Pornographic sites
  •  “Free Service” third-party sites
  • Music/Video/Software piracy sites offering “free” or “cracked” downloads, “Warez” etc.
  • Peer-to-Peer (P2P) sites
  • Obscure search sites. Use mainstream search engines such as Google, Yahoo or Bing.
  • Websites that require a download to access or use, or which try to force a software installation
  • Web-based Flash or Java games
  • Pay-To-Click services
  • Coupon or “Deal” sites
  • Third-party fee-based sites offering services that are often obtainable without cost from the original source. These include but are not limited to credit report sites, government information, and public databases, texts of state and federal laws, travel information, maps and directions.  Free Online Quizzes
  • Free People Search Sites More site-specific information can be found here:

Risky Software

Free software downloads should be avoided as much as possible, as many applications are embedded with undesirable or malicious software of some kind. The quality of the software varies widely and may cause computer problems in addition to the effect of the embedded malware. Software downloads to avoid include the following:

  • Toolbars
  • Icons
  • Screen savers
  • Mouse pointers
  • Wallpapers (static or automatically rotating)
  •  “Exclusive” offerings
  • Downloaders for music, movies & hacked programs
  • Fake antivirus and security programs
  • Registry Cleaners
  • Computer Optimizers
  • Internet “Speed-ups”
  • Search Engine Settings “Protectors”
  • Coupon generators
  • Product Key Generators
  • Electronic Greeting Cards
  • Animated desktop characters or animals (“eSheep”)
  • Spying tools
  • Malware generators and toolkits
Custom Fields
  • Department: Information Security Services
Attached Files
There are no attachments for this article.
Related Articles RSS Feed
System Center 2012 Endpoint Protection for Mac Usage Instructions
Viewed 2112 times since Wed, Aug 12, 2015
What’s the Deal with Publicly Posted Credentials?
Viewed 476 times since Thu, Jun 29, 2017
UNH Server Best Practices
Viewed 1149 times since Fri, Jun 12, 2015
SEED: Safe Electronic Equipment Disposal Instructions
Viewed 2050 times since Mon, Apr 27, 2015
Vendor Contracts: Privacy Considerations, Security Review, and NDA
Viewed 1807 times since Mon, May 4, 2015
Good Security Practices to Adopt at Work/School, and at Home
Viewed 426 times since Fri, Jul 14, 2017
Encryption & Virus Protection
Viewed 2081 times since Wed, Apr 29, 2015
Signs Your Account is Compromised
Viewed 394 times since Wed, Aug 16, 2017
System Center 2012 Endpoint Protection Windows Installation
Viewed 8854 times since Wed, Aug 12, 2015
Phishing and Spam
Viewed 3620 times since Wed, Apr 29, 2015