As we learned in the first installment of this series, there are several attack vectors that spammers can use to compromise your system via email. Similarly, there are many types of computer programs that can infect your system via Web sites, social networks, software downloads, USB and optical drives, and peer-to-peer networks.
These programs include viruses, Trojans, worms, spyware, adware, and keyloggers. Collectively, these nefarious programs are called malware. Malware is software that compromises the operation of a system by performing an unauthorized function or process.
With so many different malware threats, how can you protect your system? Here is a list of seven things you can do right now to harden your defenses against the most common threats: