Tips to Avoid Malware

 Tony Dumas, April 2014

Certain websites and programs should be avoided when online. Given the prevalence of malware, advertising and marketing software and other malicious programs, this list can serve as a guide to what types of websites and programs can pose a risk to your computer and information. Please be aware that even legitimate, well-maintained business and institutional websites can occasionally be infected so no list can guarantee that you will never encounter a virus or other malware while Internet browsing.

There are additional protections you can use, such as browsing the web only when using a non-administrative computer account. For more information on protecting yourself while online, go to it.unh.edu/bestpractices or contact your departmental IT Support or UNH Information Security Services.

Dangerous Websites: 

  • Pornographic sites
  •  “Free Service” third-party sites
  • Music/Video/Software piracy sites offering “free” or “cracked” downloads, “Warez” etc.
  • Peer-to-Peer (P2P) sites
  • Obscure search sites. Use mainstream search engines such as Google, Yahoo or Bing.
  • Websites that require a download to access or use, or which try to force a software installation
  • Web-based Flash or Java games
  • Pay-To-Click services
  • Coupon or “Deal” sites
  • Third-party fee-based sites offering services that are often obtainable without cost from the original source. These include but are not limited to credit report sites, government information, and public databases, texts of state and federal laws, travel information, maps and directions.  Free Online Quizzes
  • Free People Search Sites More site-specific information can be found here: http://websitestoavoid.blogspot.com/

Risky Software

Free software downloads should be avoided as much as possible, as many applications are embedded with undesirable or malicious software of some kind. The quality of the software varies widely and may cause computer problems in addition to the effect of the embedded malware. Software downloads to avoid include the following:

  • Toolbars
  • Icons
  • Screen savers
  • Mouse pointers
  • Wallpapers (static or automatically rotating)
  •  “Exclusive” offerings
  • Downloaders for music, movies & hacked programs
  • Fake antivirus and security programs
  • Registry Cleaners
  • Computer Optimizers
  • Internet “Speed-ups”
  • Search Engine Settings “Protectors”
  • Coupon generators
  • Product Key Generators
  • Electronic Greeting Cards
  • Animated desktop characters or animals (“eSheep”)
  • Spying tools
  • Malware generators and toolkits
Custom Fields
  • Department: Information Security Services
Attached Files
There are no attachments for this article.
Related Articles RSS Feed
ESI: Electronically Stored Information Procedures
Viewed 963 times since Wed, Apr 29, 2015
System Center 2012 Endpoint Protection for Mac Installation
Viewed 2531 times since Wed, Aug 12, 2015
Using Facebook, Google or other Social Login Services
Viewed 434 times since Fri, Aug 26, 2016
Phishing and Spam
Viewed 1649 times since Wed, Apr 29, 2015
How to Subscribe to the Information Security Services Blog
Viewed 41 times since Fri, Aug 11, 2017
System Center 2012 Endpoint Protection Windows Installation
Viewed 4794 times since Wed, Aug 12, 2015
PCI DSS - Payment Card Security
Viewed 818 times since Thu, May 7, 2015
System Center 2012 Endpoint Protection for Mac Usage Instructions
Viewed 1429 times since Wed, Aug 12, 2015
Red Flag Rule - Identity Theft Prevention
Viewed 1035 times since Thu, May 7, 2015
Vendor Contracts: Privacy Considerations, Security Review, and NDA
Viewed 1445 times since Mon, May 4, 2015
MENU