Common online threats

Common online threats

Criminals are skilled at using online methods to obtain your personal information and use it to commit fraud against you or others.

It's a common misconception that only careless people become the victims of fraud. As the sophistication of fraud increases, it's becoming harder for potential victims to spot when they are being targeted.

Your first step is to be aware of the common online threats and how they operate.


A keylogger records all the keystrokes made by a computer user: everything they type, including user codes and passwords for all online services. Keylogger software can be found in:

Once the file is executed, it starts to record keystrokes and emails the data to its author.

How can I protect myself?

Avoid accessing your online bank account or investment information from public computers where you can't be sure of the level of protection.

On your home computer, install:


Spyware is software that records your actions and movements on the internet. Although some spyware is aimed at obtaining confidential information (such as your credit card number or your passwords), most is used for advertising purposes.

Once spyware is installed, every site that you visit and every link that you click is spied on in order to display advertising that is targeted according to your interests. Also known as adware, this spy software uses your system resources and slows down your computer. Even worse, when it comes from adult content sites, it may display images that are unsuitable for children.

How can I protect myself?

To avoid this malicious software (malware), the golden rules are to:

Wi-Fi eavesdropping

The radio signals of wireless networks (Wi-Fi) can be intercepted by others, including those with criminal intent. This means that your personal and financial information could be at risk.

As well as eavesdropping on your network traffic and subsequently hacking into your PC, criminals can use your connection without your consent.

Criminals may also set up Wi-Fi networks that use the same name as legitimate networks, such as those found in coffee shops, tricking you into entering your personal information on what you think is a safe network but where they can view your actions.

How can I protect myself?

Modern network routers incorporate several security features but these must be set correctly to be effective:

Contact your Internet Service Provider for further guidance on the above.

Take extra care when using public access points and ensure that you trust the Wi-Fi network you are connecting to. Consider disabling the auto connect feature of your laptop or portable device so that you only connect to networks when you want to.


Typosquatting relies on the typing of a website address (URL) with a minor typing error. For example, instead of typing www.mandg.co.uk, you might accidentally type www.mandf.co.uk. This simple mistake could see you diverted to a spoof website set up to look like the genuine website where your personal details can be obtained without your knowledge.

How can I protect myself?

To avoid being caught out by these scams, always type the right website address into the address bar and double check it before you enter your personal details.

At M&G, we use brand protection measures to monitor sites on the internet that register and use similar URLs and content as our own. We take appropriate steps to ensure the early detection and immediate takedown of malicious sites which can be used for phishing and similar scams.

Viruses, trojan horses and worms

Viruses (including trojan horses and worms) are not just designed to cause harm to a computer or to launch a denial of service attack on a computer network. They're increasingly used for fraudulent online activity aimed at parting you from your personal data and your money.

Viruses are contagion methods that can be used to:


A virus is a programme with the specific aim of replicating itself by infecting other files. The prime objective of any virus is to multiply and spread as far as possible.

Trojan horses

A trojan horse differs from viruses and worms in the way that it spreads. It hides itself in a seemingly useful program of some kind (such as a screensaver or game) but does not attempt to duplicate or spread itself.


Different to the computer viruses that multiply within the system and spread by contact, worms are malicious programs designed to disrupt computer operation or gather sensitive information by spreading from one machine to another via a local network or the internet. Some worms can also spread as email attachments; other types of virus-worms spread by exploiting weaknesses in software and need no help from the user.

How can I protect myself?

Avoiding free software and installing good antivirus software, a firewall and spyware application will go a long way towards preventing viruses, trojan horses and worms from infecting your PC.

It's important that you also ensure that you always keep up with your software updates, especially those of your operating system and web browser.

If you use a mobile device to access the internet, protect it by installing antivirus software.


This is a type of spyware that tricks users into purchasing fake anti-spyware and antivirus programs. Users may not even have any infections on their system, other than the SmitFraud program itself.

How can I protect myself?

Ensure that all antivirus and security software is from a trusted, well known source. If you are advised of a virus at any time from a source other than your own software, it's more than likely to be an attempt to defraud you. However, to be sure, run your own software to see if there is an issue showing, this will ensure you are treating your computer from a source you know to be safe.