Consumer Threat Center
Phishing threats lure unsuspecting email recipients into clicking a link in an email that looks like it’s from their bank to update their account information. However, these clever scams are simply trying to steal your personal information, credit card information, and more. Anonymous Surfing protects against phishing scams with a real-time anti-phishing feed that integrates into your Web browser to block you from clicking through to these fraudulent sites. Updated every fifteen minutes, this added protection automatically displays a warning page to notify you that you are being led to a known phishing site.
Learn more about phishing.
Learn more about phishing.
Pharming attacks are similar to phishing in nature but they don’t rely on you clicking on their fraudulent email. Pharming attacks are even more dangerous because they are able to redirect you to a fraudulent Web site even if you type the URL into your Internet browser. Anonymous Surfing protects against pharming threats by routing all of your Internet traffic through our hardened, secure servers. In addition, when you have Anonymous Surfing activated, your Host file is never accessed so even if it’s corrupted, you will still arrive at your intended destination safely.
Learn more about pharming.
Learn more about pharming.
Evil twins trick wireless users into connecting a laptop or PDA to a tainted hotspot by posing as a legitimate wi-fi provider. Once you connect to their wireless network, the evil twins can watch your online activities and steal your confidential information. Anonymous Surfing protects against evil twins by routing all of your Internet traffic through our secure servers, thus bypassing the fraudulent hotspot.
Learn more about evil twins.
Learn more about evil twins.
Spyware is any software that covertly gathers user information through the user’s Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications can get onto your computer by hiding behind freeware or shareware programs that can be downloaded from the Internet, or spyware can attach itself to a variety of Web sites. Once the spyware is installed on your computer, it begins to monitor your activity on the Internet (keystrokes, chat activity, Web site visits) and sends that information to someone else.
Learn more about spyware.
Learn more about spyware.
Viruses, which also can be referred to as a worm, are programs that are unknowingly loaded onto your computer, runs against your wishes, and can also replicate themselves. For example, a virus might attach itself to a program such as a spreadsheet program or an email attachment you receive. Each time the spreadsheet program runs or you open the attachment, the virus runs too, and it has the chance to reproduce (by attaching to other programs) thus causing more problems.
Learn more about viruses.
Learn more about viruses.