Computer viruses are always lurking in unprotected web pages that do not use a secure connection and email messages.    They spread by attaching to any document or when opening an email message that is in the form of a web page or by script when opening an email.  That’s why it’s wise to not open email messages that you don’t know who the sender is and especially ones that have attachments.

Set your email to only display who the sender is and the email preview pane off.   If you are using Google mail (Gmail), then you can click on the top right gear icon   and scroll down until you see “Reading pane” “No split” .   If you really prefer to have the message display in the reading preview pane, the best defense to stop a virus is to always set your mail to ask to display images.  This can be found by clicking on the gear icon and look down to see “See all settings”.  When you click on “See all settings” your mail program will open a settings page.  Look down until you see images and then click to the right on   when you  read your email and scan any documents you receive with a good antivirus program.


Malware is actually a program that gets installed on your computer by a USB drive, installed as part of a program usually pirated (stolen) by downloading it from a unknown website that usually has more pirated programs or a hacker installed it remotely through a backdoor on your computer and locks up your computer/s demanding “Ransom” to unlock your computer/s.  Your only choice is to hope you have a backup, reinstall  the operating system and lose all your documents, programs… you have installed or pay the ransom.

If you just stay clear of plugging in a USB drive from anyone you DO NOT know or a found one laying on the ground and not download a program you did not purchase, you should be OK if you have a firewall, antivirus and VPN installed.  All of these programs are available for the Microsoft, Linux and Apple computers.

The best defense to stop a antivirus and malware, is to use an antivirus program as stated in our “Online Computer Protection and Privacy” page.