Not every malware is noticeable.
There are many different types of malware. If the aim of the attack is, for example, identity theft (your user IDs + passwords), remote control of your computer for further attacks (your computer becomes part of a Distributed Denial of Service attack (DDoS) or a botnet) or the mass sending of SPAM, then the attacker will of course do everything to ensure that you do not notice the attack or infection - and they will succeed.
There is no such thing as 100% security against infection. However, if you keep your virus software up to date and all other software packages up to date, are careful when clicking on links and opening e-mails and only download software from known, trustworthy sources, you are already a long way ahead.
The German Federal Office for Information Security (BSI) provides further tips : How can I protect my IT from attacks
See also BSI-Computer Security.
Does this also apply to your access data for online banking, health insurance, online stores and your credit card details or, at university, your exam results or even your medical history?
Anyone who goes online, shops online or uses paid services is a potential target.
Even if you are not directly harmed by the attacker, there is a thriving illegal trade in personal data. In addition, you can also quickly become a victim of ransomware - your hard disk is encrypted and you have to pay a ransom for your own data - unless you have an up-to-date backup. In addition, a poorly protected device, e.g. as part of a botnet, can in turn become a springboard for attacks on other targets.
Of course, cloud storage is practical and - with reputable providers - also offers a high standard of security.
However, access is naturally always via the Internet. If there are technical problems, the provider discontinues its service or goes bankrupt, or even if your Internet connection is disrupted, you run the risk of not being able to access your data at all.
Also bear in mind that non-European providers are not covered by European or even German data protection law.
The regulations are sometimes very different from ours.
If the cloud storage is integrated into your computer as a network drive, your data can also fall victim to ransomware there.
So there's no getting around a backup or at least backup copies on a separate storage device. The GITZ offers a backup and archive service for organizational units of the TU Braunschweig (service catalog item 3103).
Unfortunately, this is simply wrong.
When deleting and then emptying the recycle bin, the data remains completely intact, only the references in the “table of contents” are deleted.
There are easy-to-obtain tools that can be used to easily restore such data as long as it has not been overwritten. The targeted overwriting of the data is the only secure method of actually deleting the data if, for example, you want to sell your computer including the hard disk - apart from the physical destruction of the data carrier, of course.
Attention: Flash technology-based storage devices, e.g. USB sticks or SSD hard disks, cannot be securely deleted except by destroying them!
Selected topics of the BSI(Federal Office for Information Security):