Dodgy Downloads – What to Look Out For

Rengar

Level 17
Thread author
Verified
Top Poster
Well-known
Jan 6, 2017
835
Protect yourself from dubious downloads with our handy guide to staying safe online.
The internet’s great, isn’t it? Infinite variety and everything you want is just a click away – what’s not to love?! Well, as many of us have experience first hand, sadly all that glitters is not necessarily gold on the World Wide Web, so it pays to be cautious – especially if you’re looking to download software or any other type of file that’s easily available.

Free downloads are often used by cybercriminals as proverbial gingerbread houses to lure in unsuspecting internet users. However, once the files have been downloaded and executed, their insidious true nature as malware is revealed, and the security of the user’s computer is compromised.

The ability to assess the legitimacy of a source before you download software is a crucial skill to possess in the modern IT landscape.


Check and double check before you hit install.

Dig a Little Deeper
Many sites from which you can download software have a comments section. Previous users will often leave a comment to inform other users as to the quality of downloads. Take a moment to peruse the comments and see what the community is saying.

If there is no comments section, it’s usually very easy to find developer information. Have a little look around the site until you find the developer name and company details. You can then Google the company in question and see if they are reputable. If they are a regular proliferator of malware, they will likely be a topic of discussion on various IT forums.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top