{"id":8741,"date":"2014-12-08T20:15:39","date_gmt":"2014-12-09T01:15:39","guid":{"rendered":"http:\/\/thundercloud.net\/infoave\/new\/?p=8741"},"modified":"2014-12-08T20:15:39","modified_gmt":"2014-12-09T01:15:39","slug":"40-reasons-why-you-dont-need-an-antivirus","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/40-reasons-why-you-dont-need-an-antivirus\/","title":{"rendered":"40 Reasons Why You DON\u2019T Need An Antivirus"},"content":{"rendered":"<p><span style=\"color: #000080;\">When Emsisoft blogs something we think is important and\/or interesting, we like to share it with you. And today&#8217;s Emsisoft blog is important and interesting &#8211; even if a little sarcasm seeps through. It&#8217;s pointed stuff we think you should read so we&#8217;re passing it on to you. \u00a0Good read! Darcy &amp; TC\u00a0<\/span><\/p>\n<blockquote>\n<h2>40 Reasons Why You DON\u2019T Need An Antivirus<\/h2>\n<div class=\"post_info\">There is no way around it: viruses do exist, trojans do infiltrate your PC, and\u00a0most users\u00a0will act to guard against them.\u00a0With\u00a0software, but also with sensible behavior online. Malware relies partly on users doing the hard work for them. Most of the time you know when you are straying into the murkier waters of the internet.\u00a0Do you ever think that your good behavior is enough to protect you from attacks, and that antivirus software is not necessary?<\/div>\n<p>You may be right. Here are\u00a040 reasons why you don\u2019t need an antivirus:<\/p>\n<p>1. You don\u2019t share files and links with your co-workers.<\/p>\n<p>2.\u00a0You don\u2019t do your <a href=\"http:\/\/blog.emsisoft.com\/2012\/12\/13\/tec121213\/\" target=\"_blank\">banking online<\/a>.<\/p>\n<p>3. You never use the Internet for adult entertainment, shopping or online games.<\/p>\n<p>4.\u00a0You\u00a0never use public WIFI\u00a0at your local coffee shop, library, on the plane \u2013 or any other public place.<\/p>\n<p><a class=\"fancybox\" href=\"http:\/\/blog.emsisoft.com\/wp-content\/uploads\/2014\/12\/14768273_s.jpg\" rel=\"fancybox\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-10849 \" src=\"http:\/\/blog.emsisoft.com\/wp-content\/uploads\/2014\/12\/14768273_s-300x300.jpg\" alt=\"14768273_s\" width=\"226\" height=\"226\" \/><\/a>5. You believe the government would never spy on its citizens.<\/p>\n<p>6. You can spot a <a title=\"phishing\" href=\"http:\/\/blog.emsisoft.com\/2011\/11\/18\/tec111118\/\" target=\"_blank\">phishing<\/a>\u00a0scam\u00a0when you see one.<\/p>\n<p>7. You don\u2019t share your computer with anyone, not even your family members.\u00a0So you know exactly what\u2019s going on.<\/p>\n<p>8.\u00a0You\u00a0trust your\u00a0grand-ma\u2019s home made thyme sirup to protect you\u00a0against all kinds of infections<\/p>\n<p>9. You don\u2019t share your <a href=\"http:\/\/blog.emsisoft.com\/2012\/08\/22\/tec120822\/\" target=\"_blank\">secure wifi-connection<\/a> with anyone. Not even with your family members.<\/p>\n<p>10. You work at a security company.<\/p>\n<p>11.\u00a0You never click on links that your friends or family send you (we are glad you clicked on this article, though!).<\/p>\n<p>12.\u00a0You and all the people you know are <a href=\"http:\/\/blog.emsisoft.com\/2014\/05\/02\/hack-your-facebook-friends-more-like-hack-yourself\/\" target=\"_blank\">immune to social engineering<\/a> tactics and would never share personal information like birthday, address or similar.<\/p>\n<p>13. You use a firewall, which\u00a0protects against all malware, right?<\/p>\n<p>14. You don\u2019t click on ads, or any other link on a website for that matter.<\/p>\n<p>15. You only use trusted email providers such as Yahoo, Outlook and Gmail. <a href=\"http:\/\/blog.emsisoft.com\/2014\/09\/11\/5-million-gmail-usernames-and-passwords-compromised\/\" target=\"_blank\">Those are safe, right?<\/a><\/p>\n<p>16. You have extensive knowledge of every single file residing on your computer and run an hourly backup stored on an external device.<\/p>\n<p>17. You don\u2019t believe in <a href=\"http:\/\/blog.emsisoft.com\/2014\/06\/06\/alert-ads-on-disney-facebook-guardian-lead-to-ransomware\/\" target=\"_blank\">ransomware<\/a>.<\/p>\n<p>18.\u00a0You always read a company\u2019s privacy policy in full.<\/p>\n<p><a class=\"fancybox\" href=\"http:\/\/blog.emsisoft.com\/wp-content\/uploads\/2014\/12\/18113431_s.jpg\" rel=\"fancybox\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-10850 size-medium\" src=\"http:\/\/blog.emsisoft.com\/wp-content\/uploads\/2014\/12\/18113431_s-300x200.jpg\" alt=\"18113431_s\" width=\"300\" height=\"200\" \/><\/a>19. You don\u2019t use\u00a0<a href=\"http:\/\/blog.emsisoft.com\/2012\/05\/15\/tec120515\/\" target=\"_blank\">Facebook<\/a>. Or any other <a href=\"http:\/\/blog.emsisoft.com\/2014\/04\/24\/warning-we-heart-it-spreads-diet-pill-twitter-spam\/\" target=\"_blank\">social media site<\/a>\u00a0for that matter\u2026<\/p>\n<p>20. No one ever took\u00a0any pictures of you or your beloved ones\u00a0(not even accidentally, e.g. when you are in public places) that could end up online.<\/p>\n<p>21. You only visit trusted, well-known websites. What can happen there?<\/p>\n<p>22.\u00a0You think people only steal <a href=\"http:\/\/blog.emsisoft.com\/2006\/05\/10\/tec060510\/\" target=\"_blank\">cookies <\/a>from the cookie jar.<\/p>\n<p>23.\u00a0You don\u2019t need an operating system such as Windows, as you are a Commodore 64 user.<\/p>\n<p>24. You rely on site or service encryption\u00a0(HTTPS or SSL), which\u00a0is <a title=\"Critical Bash Bug \u201cShellshock\u201d might be as big as Heartbleed\" href=\"http:\/\/blog.emsisoft.com\/2014\/09\/25\/critical-bash-bug-shellshock-might-be-as-big-as-heartbleed\/\" target=\"_blank\">bullet-proof<\/a> right?<\/p>\n<p>25. You don\u2019t have a computer and you don\u2019t need one, as you can check emails and your bank account in that\u00a0Internet coffee shop just around the corner. Any time you want. If you could only find that post-it with your credentials since the last time you had coffee over there\u2026.<\/p>\n<p>26. You don\u2019t have a smartphone.<\/p>\n<p>27. Your Windows\u00a0computer came fully equipped with complete protection, called Windows Defender.<\/p>\n<p>28. You only use <a href=\"http:\/\/blog.emsisoft.com\/2014\/01\/21\/emsisoft-explores-the-worst-passwords-of-2013\/\" target=\"_blank\">128 character-long passwords<\/a> with alphanumeric characters and special signs.<\/p>\n<p><a class=\"fancybox\" href=\"http:\/\/blog.emsisoft.com\/wp-content\/uploads\/2014\/12\/30402034_s.jpg\" rel=\"fancybox\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-10852 \" src=\"http:\/\/blog.emsisoft.com\/wp-content\/uploads\/2014\/12\/30402034_s-300x250.jpg\" alt=\"30402034_s\" width=\"283\" height=\"236\" \/><\/a>29. You change that password every month and\u00a0don\u2019t share it with anyone. So do all your friends, right?<\/p>\n<p>30. You don\u2019t use search engines, but always\u00a0type the target URL manually in your browser.<\/p>\n<p>31. You host your own mail-server that can\u2019t be accessed externally and own a\u00a0<a href=\"http:\/\/www.theglobeandmail.com\/technology\/the-paranoid-computer-users-guide-to-privacy\/article18928710\/\" target=\"_blank\">hack-proof computer.<\/a><\/p>\n<p>32. You know an e-mail is an abbreviation for electronic mail and thus the new catalogue from <a href=\"http:\/\/blog.emsisoft.com\/2013\/12\/19\/brick-and-mortar-identity-theft-targets-40-million-accounts\/\" target=\"_blank\">Target <\/a>or BestBuy that the postman just threw over the fence.<\/p>\n<p>33. You think a\u00a0<a href=\"http:\/\/blog.emsisoft.com\/2013\/12\/23\/what-is-a-pup\/\" target=\"_blank\">PUP<\/a>\u00a0only stands for a four legged pet.<\/p>\n<p>34. You don\u2019t download\u00a0<a href=\"http:\/\/blog.emsisoft.com\/2013\/12\/23\/what-is-a-pup\/\" target=\"_blank\">freeware,<\/a> ever.<\/p>\n<p>35. If you download something, you only download \u00a0from\u00a0<a href=\"http:\/\/blog.emsisoft.com\/2012\/03\/06\/secure-download-resources-or-a-malware-cesspool-how-trustworthy-are-download-portals-nowadays\/\" target=\"_blank\">large download portals<\/a>\u00a0or from trusted vendors, such as Netflix or\u00a0<a href=\"http:\/\/blog.emsisoft.com\/2014\/05\/12\/want-instagram-on-your-pc-watch-out-for-pups\/\" target=\"_blank\">Instagram for your PC<\/a>.<\/p>\n<p>36.\u00a0You have in-house tech support. They love cleaning and re-installing your system every couple of days.<\/p>\n<p>37. You want to make it into the Guiness Book of World Records for having the highest amount of annoying\u00a0<a href=\"http:\/\/blog.emsisoft.com\/2012\/01\/10\/tec120110\/\" target=\"_blank\">browser toolbars<\/a>\u00a0installed while still being able to see (some) content of a web page.<\/p>\n<p>38.\u00a0You have no money that anyone could steal from you.<\/p>\n<p>39. You never heard about\u00a0identity fraud, social suicide and framing.<\/p>\n<p>40. You are a good and honest person, no one would want to do you any harm\u2026<a class=\"fancybox\" href=\"http:\/\/blog.emsisoft.com\/wp-content\/uploads\/2014\/12\/21886597_s.jpg\" rel=\"fancybox\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-10851 size-medium\" src=\"http:\/\/blog.emsisoft.com\/wp-content\/uploads\/2014\/12\/21886597_s-300x300.jpg\" alt=\"21886597_s\" width=\"300\" height=\"300\" \/><\/a><\/p>\n<p>All skepticism aside \u2013 even the most careful of users are vulnerable to viruses, spyware, adware, nagware, trojans, worms and other types of malware. Even if you think you browse carefully and only visit websites you trust, the website itself could be compromised. The people building malware\u00a0are <strong>motivated by profit<\/strong>, and if they can\u2019t steal from you directly, they\u2019ll look for <em>something<\/em> that they can turn around and sell. This might be processing or network resources in your computer, but it might also be your social security number. Bottom line is,\u00a0there is so much money involved in digital scams, identity theft, data breaches and other digital (or mobile!) fraud that creating and spreading malware is <strong>big business<\/strong> nowadays.\u00a0Much of it is sold to or created by organized crime to capture financial information and other sensitive data.<\/p>\n<p>Now, you may think: how many of these viruses are <strong>created by anti-virus companies<\/strong> to create a need for their products and drum up business? Well, you can\u00a0<a href=\"http:\/\/blog.emsisoft.com\/2011\/06\/01\/tec110601\/#sthash.PkaUL6v2.dpuf\" target=\"_blank\">read here<\/a>\u00a0that it is actually quite simple to prove\u00a0that it\u2019s <strong>technically impossible<\/strong> for anti-virus companies to manufacture the sheer volume of viruses produced. Good anti-malware software will simply create that <strong>extra layer of protection<\/strong> you need to stay safe in the digital world. As they say, prevention is better than treatment.\u00a0Thus it is best to stop viruses and malware in their tracks before they wreak havoc. For basically <a href=\"http:\/\/www.emsisoft.com\/en\/software\/antimalware\/\" target=\"_blank\">$0.11 a day<\/a> you can save\u00a0yourself a lot of headache.<\/p>\n<p>Have a (headache-free) day!<\/p><\/blockquote>\n<p>Source: <a href=\"http:\/\/goo.gl\/1L5fbW\" target=\"_blank\"><strong>Emsisoft Blog &#8211; read the original article here.<\/strong><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When Emsisoft blogs something we think is important and\/or interesting, we like to share it with you. And today&#8217;s Emsisoft blog is important and interesting &#8211; even if a little sarcasm seeps through. It&#8217;s pointed stuff we think you should read so we&#8217;re passing it on to you. \u00a0Good read! Darcy &amp; TC\u00a0 40 Reasons Why You DON\u2019T\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/40-reasons-why-you-dont-need-an-antivirus\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1655,1462,228,1433,1669,1426,1670,1656,1654,1674],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/8741"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=8741"}],"version-history":[{"count":1,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/8741\/revisions"}],"predecessor-version":[{"id":8742,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/8741\/revisions\/8742"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=8741"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=8741"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=8741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}