Welcome to Washburn University's Cybersecurity blog. Visit often to get cybersecurity-related news items and tips. If you have any questions, feel free to contact User Services at support@washburn.edu or 785-670-3000.

 Latest Post: Navigating the Digital Landscape: Understanding the Risks of Freeware and the Importance of Trusted Software

One of the better things that have come with the invention of the internet are amazing collaborative and free open-source projects. Whether it's a handy utility for your computer, a fun app for your smartphone, or a powerful tool for your business, there are a plethora of convenient tools to use. However, this convenience often comes with hidden risks. Understanding these dangers and knowing how to choose trusted software can help protect your data, privacy, and overall digital security. 

The Hidden Dangers of Freeware 

Malware and Viruses: One of the most significant risks associated with freeware is the potential for malware and viruses. Cybercriminals often use free software as a Trojan horse to distribute malicious programs. Once installed, these can compromise your system, steal sensitive information, and even render your device unusable. 

Adware and Spyware: Freeware can also come bundled with adware and spyware. Adware bombards you with unwanted advertisements, often slowing down your device. Spyware, on the other hand, secretly monitors your activities, collecting personal information without your consent. This data can then be sold to third parties or used to launch more targeted attacks against you. 

Unwanted Software Bundles: Many freeware applications come with additional software that you did not intend to install. These bundles can clutter your system with unnecessary programs that consume resources and may introduce vulnerabilities. 

Lack of Support and Updates: Freeware often lacks the regular updates and customer support that come with paid software. This means that security vulnerabilities may not be promptly addressed, leaving your system exposed to potential threats. 

The Benefits of Using Paid Software 

Enhanced Security: Trusted software from reputable sources is less likely to contain malicious code. Established companies have reputations to maintain and are therefore more diligent in ensuring their software is secure. They also provide regular updates to patch security vulnerabilities. 

Better Privacy Protection: When you use trusted software, you have more assurance that your privacy will be respected. Reputable developers are transparent about the data they collect and how it is used, and they comply with privacy regulations to protect your information. 

Reliable Support: Paid software from trustworthy companies usually comes with customer support. If you encounter any issues or have questions, you can reach out to a support team for assistance. This can be invaluable in resolving problems quickly and effectively. 

Regular Updates: Trusted software providers regularly update their products to fix bugs, add new features, and address security vulnerabilities. This ensures that your software remains secure and functional over time. 

Tips for Choosing Reliable Software 

Research Before You Download: Before downloading any software, take the time to research it. Read reviews from other users, check ratings, and look for any red flags that might indicate the software is unsafe. 

Use Official Sources: Download software directly from the developer's official website or a trusted app store. Avoid third-party download sites that may host compromised versions of the software. 

Verify the Developer: Ensure that the software is developed by a reputable company or group. Look for information about the developer on their website, including contact information and a physical address. 

Read Permissions Carefully: When installing software, pay attention to the permissions it requests. If an application asks for access to data that seems unnecessary for its functionality, reconsider installing it. 

Keep Software Updated: Regularly update all the software on your devices. Updates often include important security patches that protect against newly discovered vulnerabilities. 

Conclusion 

While freeware can be enticing, the risks associated with it can far outweigh the benefits. By understanding these dangers and choosing only reliable software, you can protect your devices, data, and privacy. Always do your research, use official sources, and be cautious about the permissions you grant to software. By following these guidelines, you can enjoy the benefits of digital tools without compromising your security. 

Stay vigilant! 

www.washburn.edu/cybersecurity 

 

Previous Posts:
Aug 20

Strengthen Your Online Security: The Importance of Regular Password Changes and Unique Passphrases

Read the full post →

By: WU ITS Information Security

Category: security

Apr 19

What’s the harm in a thumb drive?

Read the full post →

By: WU ITS Information Security

Category: security

Mar 29

Phishing, what is it and what does it mean for you?

Read the full post →

By: WU ITS Information Security

Category: security

Mar 22

Have you been pwned, Ichabod?

Read the full post →

By: WU ITS Information Security

Category: security

Mar 01

Stay up to date!

Read the full post →

By: WU ITS Information Security

Category: security

Feb 23

Multifactor Authentication, what is it and why should I use it?

Read the full post →

By: WU ITS Information Security

Category: security

Feb 16

Love in the Air, but mind the Phish

Read the full post →

By: WU ITS Information Security

Category: security

Jan 29

Breaking the Loop: Avoiding Shadows

Read the full post →

By: WU ITS Information Security

Category: security

Jan 17

New Contacts; New Friends?

Read the full post →

By: WU ITS Information Security

Category: security

Dec 18

Gift Card Scams

Read the full post →

By: WU ITS Information Security

Category: security

Dec 05

Getting Phishy

Read the full post →

By: WU ITS Information Security

Category: security

Nov 13

Everybody loves free stuff

Read the full post →

By: WU ITS Information Security

Category: security

Nov 08

The Various Biologics of Phish

Read the full post →

By: WU ITS Information Security

Category: security

Oct 23

The many sided world of scamming

Read the full post →

By: WU ITS Information Security

Category: security

Oct 16

Social Media, Where Anything is Possible

Read the full post →

By: WU ITS Information Security

Category: security

Oct 04

Stay Up To Date!

Read the full post →

By: WU ITS Information Security

Category: security

Sep 25

Beware Freeware!

Read the full post →

By: WU ITS Information Security

Category: security

Sep 18

Password Tips

Read the full post →

By: WU ITS Information Security

Category: security

Sep 12

Social Media; Harmless Fun?

Read the full post →

By: WU ITS Information Security

Category: security

Aug 31

Job Scam

Read the full post →

By: ITS Information Security

Category: security

Aug 25

Gift Card Scams

Read the full post →

By: Homer Manila

Category: security

Aug 08

An important update about old Google accounts

Read the full post →

By: AU Information Security

Category: security

Jul 10

Prime Day Scams

Read the full post →

By: ITS Information Security

Category: security

Jun 09

Summer Scams and Shenanigans

Read the full post →

By: Homer Manila

Category: security

Jan 12

Protect Against Smishing Attacks

SMS Attacks and How to Report Protect Against Smishing Attacks

Read the full post →

By: Homer Manila

Category: security

Jan 04

Protect Yourself from Identity Fraud

If you’ve not done it before, freezing your credit is actually very simple to do (and easy to thaw as needed).

Read the full post →

By: Homer Manila

Category: security

Nov 11

Shop Smart and Stay Safe This Holiday Season

Our lovely friends at the Center for Internet Security have some holiday advice on how to keep safe, but the tips are apropos any time of year! Come see what they have to say.

Read the full post →

By: Homer Manila

Category: security, General


Archives

2024 2023 2022