Tips to Avoid Malware

 Tony Dumas, April 2014

Certain websites and programs should be avoided when online. Given the prevalence of malware, advertising and marketing software and other malicious programs, this list can serve as a guide to what types of websites and programs can pose a risk to your computer and information. Please be aware that even legitimate, well-maintained business and institutional websites can occasionally be infected so no list can guarantee that you will never encounter a virus or other malware while Internet browsing.

There are additional protections you can use, such as browsing the web only when using a non-administrative computer account. For more information on protecting yourself while online, go to or contact your departmental IT Support or UNH Information Security Services.

Dangerous Websites: 

  • Pornographic sites
  •  “Free Service” third-party sites
  • Music/Video/Software piracy sites offering “free” or “cracked” downloads, “Warez” etc.
  • Peer-to-Peer (P2P) sites
  • Obscure search sites. Use mainstream search engines such as Google, Yahoo or Bing.
  • Websites that require a download to access or use, or which try to force a software installation
  • Web-based Flash or Java games
  • Pay-To-Click services
  • Coupon or “Deal” sites
  • Third-party fee-based sites offering services that are often obtainable without cost from the original source. These include but are not limited to credit report sites, government information, and public databases, texts of state and federal laws, travel information, maps and directions.  Free Online Quizzes
  • Free People Search Sites More site-specific information can be found here:

Risky Software

Free software downloads should be avoided as much as possible, as many applications are embedded with undesirable or malicious software of some kind. The quality of the software varies widely and may cause computer problems in addition to the effect of the embedded malware. Software downloads to avoid include the following:

  • Toolbars
  • Icons
  • Screen savers
  • Mouse pointers
  • Wallpapers (static or automatically rotating)
  •  “Exclusive” offerings
  • Downloaders for music, movies & hacked programs
  • Fake antivirus and security programs
  • Registry Cleaners
  • Computer Optimizers
  • Internet “Speed-ups”
  • Search Engine Settings “Protectors”
  • Coupon generators
  • Product Key Generators
  • Electronic Greeting Cards
  • Animated desktop characters or animals (“eSheep”)
  • Spying tools
  • Malware generators and toolkits
Custom Fields
  • Department: Information Security Services
Attached Files
There are no attachments for this article.
Related Articles RSS Feed
What’s the Deal with Publicly Posted Credentials?
Viewed 598 times since Thu, Jun 29, 2017
Storing Restricted and Sensitive Data in Box @ UNH
Viewed 1289 times since Thu, May 28, 2015
PCI DSS - Payment Card Security
Viewed 1600 times since Thu, May 7, 2015
Good Security Practices to Adopt at Work/School, and at Home
Viewed 549 times since Fri, Jul 14, 2017
Red Flag Rule - Identity Theft Prevention
Viewed 1617 times since Thu, May 7, 2015
Signs Your Account is Compromised
Viewed 498 times since Wed, Aug 16, 2017
UNH Server Best Practices
Viewed 1313 times since Fri, Jun 12, 2015
Policies on IT resources
Viewed 2511 times since Wed, Mar 25, 2015
Antivirus Software for Mac
Viewed 6139 times since Wed, Aug 12, 2015
Using Facebook, Google or other Social Login Services
Viewed 865 times since Fri, Aug 26, 2016