Gabriela’s Tip — How to Protect Yourself from Viruses, Malware, and Digital Threats

Hi! I’m Gabriela — one of the Guardians of the Park of Codes and the one responsible for protecting computers, phones, and everything that connects to the internet.

Today, I’m going to show you how digital viruses and malware really work, how they get into your devices, what they can do once they’re inside, and how you can protect yourself the smart way.


What Is Malware?

Malware comes from malicious software.

It’s any type of program created to cause harm, steal information, spy on you, or take control of systems.

The worst part?

Most malware gets into your phone or computer without you even noticing.


Common Types of Malware

Virus

Spreads by infecting files and programs.

Example: You open a pirated file, and it installs something that damages your system.

Worm

Spreads automatically through networks, without user interaction.

Example: One computer at school gets infected, and soon others do too.

Trojan (Trojan Horse)

Looks harmless or useful, but hides something dangerous.

Example: A “free game” that secretly steals your data.

Spyware

Spies on your activity and steals passwords, messages, or banking data.

Example: Keyloggers that record everything you type.

Ransomware

Locks your device or files and demands payment to unlock them.

Example: A screen appears saying, “Your files have been encrypted. Pay to recover them.”

Adware

Fills your device with endless ads and pop-ups.

Example: One click opens dozens of fake promo tabs.

Rootkit

Hides malware deep inside the system so it’s hard to detect.

Example: You think your device is clean — but the attacker is still there.


How Does Malware Get In?

Malware usually enters through:

  • Pirated games, apps, or software
  • Fake emails with links or attachments
  • Unsafe websites
  • Fake browser extensions
  • Infected USB drives
  • Game mods and cheats

If something feels too good to be true, it probably is.


What Is an Endpoint?

An endpoint is any device that connects to a network or the internet:

  • Computers and laptops
  • Smartphones and tablets
  • Game consoles
  • Smart TVs
  • Network printers

Every endpoint can be a door into your digital life.


How to Protect Yourself — Gabriela’s Guide

Use a Reliable Antivirus

Detects and removes known threats.

Many offer real-time protection.

Always keep it updated.

Understand EDR and XDR

EDR (Endpoint Detection and Response):

  • Protects each device individually
  • Detects suspicious behavior, not just known viruses
  • Can isolate infected devices automatically

XDR (Extended Detection and Response):

  • Goes beyond devices
  • Connects alerts from email, network, servers, and cloud
  • Provides a full security view

Think of it like this:

Antivirus = basic detective

EDR = elite investigator per device

XDR = a full cyber task force


What Does “Quarantine” Mean?

When security software finds a suspicious file, it doesn’t delete it immediately.

Instead, it isolates the file in a secure area where it can’t cause damage.

That’s quarantine.

Later, the system analyzes it to decide if it’s truly dangerous or a false alarm.


Gabriela’s Safety Rules

  • Only download apps from official stores
  • Don’t click suspicious links
  • Be skeptical of “amazing” promotions
  • Keep your antivirus and apps updated
  • Use strong, unique passwords
  • Avoid pirated sites, torrents, and unknown mods
  • Never plug in random USB drives
  • Enable two-factor authentication (MFA)
  • If something feels off, ask for help

Thinking About a Cybersecurity Career?

You could specialize in:

  • Malware Analysis
  • Incident Response
  • Endpoint Security (Antivirus, EDR, XDR)
  • Reverse Engineering
  • Threat Intelligence
  • Cyber Defense

You can start learning early — and one day protect real systems, real people, and real data.

Knowledge is protection.

And protection starts with awareness.

Gabriela, Cyber Heroes League

Deixe uma resposta

More Articles & Posts

Descubra mais sobre Cyber Heroes League

Assine agora mesmo para continuar lendo e ter acesso ao arquivo completo.

Continue reading