1. Download pirated movies, software or music
Because you can find all the media that you need but don't want to buy. But looking for your music at a file-Exchange site is like looking for a big meal at a junkyard: you may be able to enjoy a buffet full of food, but there's a good chance of something going wrong.
2. Abbreviated URLs on Weibo (that is, short addresses that are usually referred to)
This is a new way of communication, abbreviated Web site to make the entire website easy to read, but do not know where to go, the network has many to expand the initials of the service, as long as the input abbreviation URL, you can see the complete URL, although not necessarily a safe site, at least see the original source. The safest way, of course, is to use the network security software that has the malicious Web site Interception tool.
3. Search for Hot Topics
"Black_hat SEO search engine poisoning" is a hacker to allow some packaged malicious links in search engines to the top of the list of words and phrases of the structure of the site or Web page. So the next time you're searching for big-name celebrities or high-profile events with widespread media attention, look carefully at the links to search results before clicking on any links. For security, it's best to just tap into the mainstream websites you've heard about.
4. Installation of unknown anti-virus software
If you just click "OK" when you see the window showing up and you're going to take action, it's likely that you accidentally installed the latest version of fake anti-virus software fake AV. Fake antivirus software is distributed as a warning sign that infects malware. If you agree to download any of their promotional antivirus software, it is likely that the infection will be the malware that is trying to avoid it.
5. Use location sites and services on your phone
It's a pretty hairy thing to let a friend know where to go through a service such as Foursquare, and imagine how a clever, intent stranger can use such data.
Malicious rogue software everywhere, may be in a moment, suddenly came into our system, so we have to know how to master the various transmission of malicious rogue software to better preventive measures to protect the system from malicious rogue software.