Scammers Want Our Data, Yet CNET Finds Many of Us Aren’t Protecting Our Devices


Scammers will never pass up an opportunity to use malware to steal your data. While we’re using the internet for nearly everything from banking to social media, they’re creating thousands of new viruses daily to target the activities you engage in the most.
   
Maybe we’ve gotten too comfortable online, checking for the usual red flags like suspicious links and misspellings. And we’ve trusted antivirus software to shield us from those sneaky attempts to install malicious software that can gather our personal information in seconds. CNET’s latest findings show that, despite advancements in antivirus software and other cybersecurity tools, scammers are still finding ways to bypass our trusted antivirus software. 

Over half (54%) of US adults with personal laptops have encountered potential malware on these devices in the past year. It may surprise you to learn which malware threat is leading and what laptop owners do when they encounter potential malware. 

What you do when you come across a malicious link, email or app download is what matters most. Ignoring a pop-up or clicking a link out of curiosity can lead to a virus, identity theft and even fraud. 

We can help you navigate these instances. Here are CNET’s latest survey findings, and how far CNET’s experts say antivirus software can really protect you from phishing headaches and hassles.

  • 78% of US adults currently own a personal laptop. More than half of the laptop brands US adults own are HP (32%) and Apple (26%) brands.
  • Over half (54%) of laptop owners have encountered potential malware on their personal laptop over the past 12 months.
  • 88% who reported seeing potential malware in the past 12 months took action against it, while 12% did nothing.
  • 68% of laptop owners who took action either deleted the file or closed the suspicious website or pop-up.
  • 37% of laptop owners have received phishing emails in the past 12 months.

Laptop owners have encountered phishing emails the most

My mom just got a new laptop and told me she doesn’t need antivirus protection. She’s not entirely wrong. CNET’s antivirus experts, Moe Long and Attila Tomaschek, say you don’t necessarily need another antivirus program if your device already has built-in antivirus protection — as most computers today do.

Windows 11 includes Microsoft Defender antivirus protection. Mac users have XProtect to check for malware, while the Malware Removal tool catches anything XProtect may have missed. And the Gatekeeper feature stops you from opening apps and software that aren’t trusted. But viruses, phishing and malware attempts are still lurking, as CNET’s study shows.

CNET found that over the past year, US adults who own a laptop have encountered or interacted with phishing emails most often (37%), followed by urgent pop-ups (24%), unusual payment requests (17%), and branded spoofing (17%). 

Tharon Green/CNET

Cybercriminals are using artificial intelligence to make scams more believable — even through impersonation. And they’re coming up with new tactics much faster than in the 1990s, when we all took our desktops to the Geek Squad for help after a scammer’s successful malware attack. 

But here’s the most important distinction to know: Antivirus software may not be able to help identify phishing and malware attempts that are constantly evolving. It can help prevent malicious software from attacking your device and personal data, so long as that malware is in its database of known threats. But you’ll need to use your best judgment to avoid clicking those suspicious links first. 

88% of US adults took action after seeing potential malware

CNET found that 88% of US adults who own laptops took action after coming across potential malware over the past year. That’s encouraging news for Long and Tomaschek. 

“You don’t really want to mess around with malware, especially the way a lot of modern malware is designed to get your data instead of crashing your computer or something like that,” Long says. 

Here’s a closer look at how laptop owners take action. 

Tharon Green/CNET

Over half (60%) of US adults either manually deleted the file or closed a website or pop-up, and 35% immediately ran an antivirus or anti-malware scan. However, Long says some of these actions are effective and helpful, while others aren’t. 

If there’s a malicious pop-up, and you close it without clicking a link, you may not have to worry about malware or a virus, Long says. If you download a malicious file, you might be able to delete it before it does any harm. But if you download an executable file, like a software application that infects your device when it’s run, you could actually be installing malware on your computer along with what you think is just an application. 

Some actions are definitely worth taking, like immediately running an antivirus or anti-malware scan after encountering malware (35%), says Long. 

But other actions aren’t, like installing a VPN, which 8% of US laptop owners do, according to CNET. 

Long says that a VPN is a privacy tool, and it has very few security benefits. If you’re using a VPN on a public Wi-Fi network that’s under attack, a VPN can mitigate the risk of the attack reaching your device. But for the most part, VPNs are just another part of your cybersecurity toolkit, but for privacy, not online security, says Tomaschek.

The best course of action if you believe your computer is infected with malware is to perform a factory reset to wipe your hard drive clean, leaving nothing behind from the current state. You’ll also need to make sure you don’t restore from a backup where you had that malware infecting your machine, Long says. Keep in mind that it won’t erase any information that attackers may have retrieved. 

There are other measures you can take to try resolving a potential malware infection without a factory reset. Long recommends disconnecting your device from the internet to prevent it from infecting other devices on your network. Then, try using advanced malware scanners, like Microsoft Defender’s offline scanner, to try to find and resolve any threats. But be careful — infected files could harm other devices if you transfer them.

There’s not a one-size-fits-all solution to dealing with malware, but if you think your device is infected with malware, factory resetting it completely can be a good option, although it’s important to note that even a full factory reset may not be able to remove some malicious software, such as malware that’s embedded in difficult-to-reach locations, such as a rootkit.

If you click a link in a phishing email or pop-up, it’s best to act right away to minimize damage — though that’s not guaranteed. Your device may have malware installed if it isn’t working normally, you’re getting pop-ups or seeing programs that you didn’t install. 

However, the signs of malware or phishing aren’t always clear, so it’s best to use a malware scanner, like Malwarebytes, to see if malicious software was installed on your device. If so, your antivirus program can give you steps to remove it. Afterward, Long advises downloading another malware scanner to double-check and try to make sure the malware is completely removed.

On the other hand, 12% of laptop owners don’t take any action at all, which is concerning.
   
“People may not take action because they may believe it’s a false positive, but you should still verify that it’s not malware, and if it is, you should definitely take action,” Long says. A malware scanner is still a good first step for scanning your computer’s memory, files and programs for viruses.

If you suspect that you’re a victim of a scam, report it on the Federal Trade Commission’s website.

Watch this: How to Recover After Giving a Scammer Your Personal Information

‘Cybersecurity now is a multitool approach’

Antivirus software won’t protect you from a data breach, your data being on the dark web or identity theft. 

“Cybersecurity now is a multitool approach,” Long says. “There are a number of different apps that people will want to have in addition to antivirus protection to make sure that they are staying secure and private.” 

Tomaschek recommends educating yourself about the different types of scams and viruses to stay aware of which ones are on the rise. The Federal Trade Commission has news about the latest scams and lets you report them. 

It’s also important to learn how to identify phishing and malware attempts on both your phone and computer. Look for red flags like misspellings, odd email addresses or links from domains you’ve never seen before. If you’re still unsure, contact the company directly through a different channel. Long also recommends other common internet safety practices, like using strong passwords and downloading software or apps only from verified sources, like Apple’s App Store or an official company website. 

It’s also best to make sure your computer has the latest software update, which may include security upgrades. Next, arm yourself with a wide range of tools for better online security and privacy. It may all sound like a lot, but CNET’s experts have a few recommendations to help narrow down your search for the right cybersecurity tools. Here’s a list: 

The best tools for online security and privacy

Antivirus software The right antivirus software can help spot malware downloaded onto your computer. CNET recommends Bitdefender for its budget-friendly plan options, which offer strong antivirus features, including active scans that use minimal computer resources in the background. And it has a comprehensive list of digital security tools.
Identity theft protection Signing up for an identity theft protection service can alert you if your personal data is found on the dark web or in a data breach, so that you can take action. CNET recommends Aura as the best identity theft protection service overall for its plans, easy-to-use interface and three-credit bureau monitoring.
Password manager The right password manager helps you generate complex passwords and safely store them from hackers. CNET recommends Bitwarden for password management because it has a pretty good free plan that syncs across multiple devices.
VPN You’ll need a VPN to mask your IP address and encrypt your internet traffic when using public Wi-Fi or whenever you want to boost your online privacy. ExpressVPN is CNET’s top pick for its easy-to-use interface and speed, which are must-haves if you’re using a VPN for streaming. ExpressVPN has servers in all 50 states. However, it’s one of the more expensive options.

Methodology 

All figures, unless otherwise stated, are from YouGov Plc. The total sample size was 2,539 adults, of whom 1,989 own a personal laptop. Fieldwork was undertaken March 18-20, 2026. The survey was carried out online. The figures have been weighted and are representative of all US adults (aged 18-plus). 





Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


Alteryx is a highly favored tool in data analytics due to its self-service capabilities and user-friendly interface. Many companies are actively seeking individuals proficient in Alteryx.

To establish a stable career in data analytics, consider acquiring skills in Alteryx. If you anticipate an Alteryx-related interview, a comprehensive Alteryx Interview Questions guide is available. This guide is valuable for both entry-level and experienced professionals preparing for interviews.

Now, let’s explore Alteryx interview questions categorized by experience levels.

Alteryx Interview Questions Most Frequently Asked with Answers

Basic AlterYX interview questions for freshers

1. What do you understand by Alteryx?

Ans: Alteryx is renowned as a trailblazer in data science and analytics, headquartered in Irvine, California, with a development center in Broomfield, Colorado. The company’s offerings, known for their user-friendly design, empower users to perform complex data analytics with ease, democratizing the process of data analysis across various sectors.

Learn new & advanced Architectures in AlterYX with hkr’s AlterYX Training !

2. Why would you recommend using Alteryx?

AnsAlteryx stands out for its intuitive interface, catering to users across varying degrees of expertise in business intelligence. It uniquely integrates data from diverse platforms into a single workflow, streamlining the process of data analysis and providing rapid results without the need for custom coding, making it invaluable for organizations seeking efficiency and agility in data handling.

3. What is an Analytics Gallery?

Ans: The Alteryx Analytics Gallery is a pioneering cloud-based platform for business analytics, designed with the ethos of bringing the convenience and connectivity of personal applications to business environments. It offers cloud-based workflow processing, enabling organizations to handle large datasets (Big Data) in a unified environment.

4. What Browsers Are Supported By The Analytics Gallery?

Ans: The Analytics Gallery is compatible with major browsers including Internet Explorer, Firefox, Safari, and Google Chrome, ensuring accessibility and ease of use across different user preferences.

5. What is the limit of app file size in Alteryx?

Ans: Currently, both applications and associated data in Alteryx are capped at a maximum size limit of 100MB.

6. What do you understand by the term Data Artisan?

Ans: A Data Artisan in the Alteryx context refers to a user who creates analytical applications using Alteryx Designer Desktop. These applications can then be shared within the Analytics Gallery, either publicly or privately. Data Artisans also enjoy the benefits extended to Gallery Members.

7. What is the process to run an app?

Ans: Running an app in Alteryx involves selecting the app, configuring it based on specific requirements like geocoding addresses, adding user files for demographic analysis, or choosing relevant data for your business. This customization allows for tailored analytics solutions.

8. What is the procedure to save an expression?

AnsIn Alteryx, expressions can be saved for repeated use, eliminating the need to recreate them from scratch. Users can craft expressions using variable selection and function insertion, and then save them for future use by choosing the ‘Saved Expression’ option.

We have the perfect professional AlterYX Tutorial for you. Enroll now!

Intermediate Alteryx interview questions

9. What is the process to turn on and off the annotations in Alteryx?

Ans: Alteryx provides flexibility in managing annotations. Users can toggle annotations on or off per tool, per module, or globally, offering a range of control from specific tool comments to overarching module settings.

10. Distinguish between the CrossTab tool and the Transpose tool?

Ans: Both the CrossTab and Transpose tools in Alteryx alter data orientation, but in opposing manners. The Transpose tool shifts horizontal data to a vertical format, whereas the CrossTab tool summarizes data on a group field by rotating vertical data to a horizontal axis.

Alteryx Training

  • Master Your Craft
  • Lifetime LMS & Faculty Access
  • 24/7 online expert support
  • Real-world & Project Based Learning

11. What is the way to share an app in Alteryx?

AnsSharing an app in Alteryx involves various methods. Apps published in a Studio can be accessed by other Data Artisans of that Studio, shared publicly in the Gallery, or included in a Collection for specific group access.

12. How will you describe a Viewer?

Ans: A Viewer in the Alteryx Analytics Gallery context is a user who can access and run applications published in the Public Gallery, offering a broad access range to various analytics solutions.

13. How can you publish apps in the analytics gallery?

Ans: Publishing apps in Alteryx involves transferring them from the Alteryx Designer Desktop directly into a private Studio. This process is accessible to Alteryx Designer Desktop license holders and trial users, with the latter enjoying a 30-Day Free Trial of the Studio.

14. How to discover different users to add them to a given Collection?

Ans: To add users to an Alteryx Collection, one can utilize the ‘Search users’ field within the collection or invite unregistered users via email, expanding the collaboration and sharing capabilities within the Alteryx environment.

15. What kind of users are able to run the created private applications in a Collection?

Ans: Within a Collection in Alteryx, private applications can be accessed and run by Data Artisans and Members, whereas Viewers can see these applications but are not permitted to run them.

Other Related Article: Tableau vs Alteryx

16. What is/are the biggest misconception(s) about big data in your view?

AnsA significant misconception about big data is the overemphasis on its volume. The true value of data lies not just in its size but in the insights and information it yields, highlighting the importance of effective data analysis over mere data accumulation.

17. There’s a difference between data science and data intelligence – how do you see this?

Ans: Data science, data mining, and business intelligence are better seen as a continuum of activities rather than distinct, isolated fields. They collectively contribute to a comprehensive approach to data handling and analysis.

Advanced Alteryx interview questions

18. What are the main highlights and functionalities that Alteryx offer?

AnsAlteryx Designer, as Alteryx’s flagship tool, offers a comprehensive suite for data handling and analysis, including features for data input/output, preparation, joining, predictive analytics, spatial data handling, initial data analysis, and data parsing and transformation. This range of features makes Alteryx a versatile and powerful tool for a variety of data tasks.

19. Explain the concept of Analytic Application.

Ans: Analytic Applications in Alteryx are created by Data Artisans to address specific strategic analysis questions. These pre-packaged data and analytic integrations can be published to the Alteryx Analytics Gallery for broader access and use.

20. Explain the types of reports that can be produced by an app in Alteryx.

AnsDepending on their design, apps in Alteryx can generate reports in formats like Excel, Word, HTML, and PDF, containing diverse elements such as tables, texts, charts, and maps, providing comprehensive data insights.

Take your Analytics Skills to the Next Level with HKR Alteryx training in Bangalore!

HKR Trainings Logo

Subscribe to our YouTube channel to get new updates..!

 

21. Explain the kinds of Spatial and Tabular Data Output that is generated by an app.

Ans:The output of an Alteryx app can vary based on its construction, potentially generating files in formats like MDB/ACCDB, CSV, DBF, MID/MIF, FlatFile, KML SHP, TAB, and YXDB, catering to a wide range of data representation needs.

22. How will you explain the concept of Member?

Ans: A Member in the Alteryx context is a user who can execute applications shared privately through Collections, with this status granted by a Data Artisan. Members also have the rights of a Viewer, allowing them to run applications in the Public Gallery.

23. Can you get support for chained apps?

Ans: Currently, Alteryx does not support the creation of chained apps, indicating a limitation in its application sequencing capabilities.

24. How can you allow users within your Alteryx tool?

Ans: Within Alteryx, users can be added to a Collection by checking an option that allows other users to share the collection. The Data Artisan who creates the Collection can monitor and manage new user additions, ensuring controlled access.

25. What kind of Apps Can you Add To an Alteryx Collection?

AnsIn Alteryx, only apps published within a Data Artisan’s Studio can be added to a Collection. These apps can also be shared in the Public Gallery, but apps from different Studios or the Public Gallery cannot be added to a personal Collection.

26. Explain the pros and cons of an Alteryx Designer?

AnsPros of Alteryx Designer include its exceptional data blending capabilities, compatibility with a wide range of databases and file types, and the unique ability to produce Tableau data extracts. It’s versatile, not limited to ETL processes, and seamlessly integrates with R for predictive modeling. Additionally, Alteryx excels in creating detailed reports with dynamic filters. However, its cons involve limitations in reading Tableau data extracts, a lack of robust support for special characters, occasional instability with concurrent user access, and a learning curve to fully understand all tools and statistical R packages.

27. What is it that the system is conveying when you get, “No Values found before GetMean()” message?

AnsWhen encountering the “No Values found before GetMean()” message, it suggests a need to review your workflow’s upstream configuration. If an Allocate Append tool is in use, ensure the spatial object selected is a polygon, not a point object. If the error originates from a Reporting Map tool, verify that Smart Tiling isn’t applied to a String field in thematic mapping.

Other Related Article: Alteryx Tools

28. How to change the field type in Alteryx?

AnsThe most effective way to change a field type in Alteryx is through the Formula tool, which provides extensive control for custom data transformations. Alternatively, the Select tool and other tools with embedded select functions can be used to adjust field types, offering flexibility in data manipulation.

29. Why do you think a company should prefer Alteryx over other open or semi-open source apps?

AnsAlteryx stands out for several reasons, making it a preferable choice over open or semi-open source alternatives. Its strong reputation and positive ratings in Gartner’s Magic Quadrants for its analytical complexity, ease of use, customer experience, product quality, and top-notch support make it an industry leader in data analytics tools.

30. How to share an app in Alteryx via social media or an email?

Ans: To share an application through internet based life or email, first, you need to tap on the application to see its subtleties. At that point, click on the Share catch to share the application through various stages like Twitter, email, Google+, and Facebook.

Alteryx Training

Weekday / Weekend Batches

 

31. How to deploy analytics across your organisation using Alteryx?

Ans: Alteryx Server stands out for its simplicity in both setup and configuration, whether on-premises or cloud-based. This platform can be operational on the same day it’s set up. Post-deployment, users can establish schedules and automate tasks. The Alteryx APIs offer further advantages by allowing integration with other workflows, sharing applications, and more. This tool represents a quick and efficient method for implementing analytics throughout an organization.

32. Big data is causing enterprises to find new ways to leverage information sources to drive growth. What are your suggestions?

AnsIt’s crucial to prioritize analytical decision-making. Maintaining a record of decisions made based on various data types (big, small, and others) is essential. The key is to focus on how this data can be utilized for analytical decisions that have potential benefits.

33. How can you use big data analytics or large and complex datasets to predict future customer behaviors, trends, and outcomes?

AnsUtilizing a mix of internal, external, third-party, and cloud sources can enrich the understanding of customer behavior, social media sentiment, and outcome modeling. There’s a strong emphasis on making these insights accessible to business users, especially data analysts, to address their analytical needs effectively.

34. With the amount of data increasing exponentially how can businesses sustain information and analytics capability?

 AnsBusinesses must adapt to the rapid influx of data by focusing on market agility and productivity. According to Alteryx research, many business and analytical leaders are dissatisfied with the time it takes to extract necessary information from data. Integrating data from diverse sources, including data centers, cloud applications, and even desktop Excel spreadsheets, is a significant challenge. Alteryx addresses this by offering a user-friendly, code-free environment that simplifies data integration and accelerates processing.

About Author

author-image

As a senior Technical Content Writer for HKR Trainings, Gayathri has a good comprehension of the present technical innovations, which incorporates perspectives like Business Intelligence and Analytics. She conveys advanced technical ideas precisely and vividly, as conceivable to the target group, guaranteeing that the content is available to clients. She writes qualitative content in the field of Data Warehousing & ETL, Big Data Analytics, and ERP Tools. Connect me on LinkedIn.

Upcoming Alteryx Training Online classes

Batch starts on
21st Apr 2026
Mon & Tue (5 Days)
Weekday
Timings – 08:30 AM IST
Batch starts on
25th Apr 2026
Mon – Fri (18 Days)
Weekend
Timings – 10:30 AM IST
Batch starts on
29th Apr 2026
Mon & Tue (5 Days)
Weekday
Timings – 08:30 AM IST



Source link