1 00:00:00,480 --> 00:00:08,340 Now, let's talk about malware attacks, if you have ever seen antivirus alerts pop up on your computer 2 00:00:08,340 --> 00:00:15,300 screen or if you have mistakenly clipped a malicious e-mail attachment, then you have had a close call 3 00:00:15,300 --> 00:00:16,080 with malware. 4 00:00:16,350 --> 00:00:23,890 Attackers slow to use malware to gain a foothold in user's computer and consequently the office they 5 00:00:23,910 --> 00:00:31,230 work working because it can be very effective malware, their first to various forms of harmful software 6 00:00:31,350 --> 00:00:32,610 such as virus. 7 00:00:32,730 --> 00:00:41,460 Then somewhere and Trojans once malware in your computer, it can break all sorts of havoc from taking 8 00:00:41,460 --> 00:00:48,510 control of your machine to monitoring your actions and keystrokes to silently send all sorts of confidential 9 00:00:48,510 --> 00:00:51,780 data from your computer or network to attackers. 10 00:00:51,780 --> 00:00:58,950 Computer network attackers will use a variety of methods to get a malware into your computer, but at 11 00:00:58,950 --> 00:01:03,970 some stage it often require user to take an action to install the malware. 12 00:01:04,470 --> 00:01:11,200 This action can include clicking a link to download a file or opening an attachment that may look no 13 00:01:11,220 --> 00:01:14,700 harmless, like a word document or PDA for attachment. 14 00:01:14,880 --> 00:01:18,570 But actually it has a malware install hidden.