Recent Comments


Comment by Wild Bill on Who is Winning the Robocall Wars? (November 20, 2024 01:35 AM)
I suspect (based on the number of calls to our landline and the near impossibility of tracking and apprehending the miscreants) that some of the 50% d...
Comment by Erik S on [SCAM ALERT] Smishing is Getting Worse (what you need to know and do) (November 19, 2024 11:38 PM)
"WHAT IS MY NAME?" Whenever I have doubts, this is the question that I send back (in capital or regular letters). Not a single time so far h...
Comment by Ernest N. Wilcox Jr. (Oldster) on Who is Winning the Robocall Wars? (November 19, 2024 11:00 PM)
I have MagicJack for y home phone. The service includes call screening, where a caller must enter a random number to complete the call. This feature h...
Comment by BobZ on Who is Winning the Robocall Wars? (November 19, 2024 09:09 PM)
On my iPhone I have turned on “Silence unknown callers,” which automatically sends calls from numbers not in my contacts to voicemail. I can’t r...
Comment by Radische on Who is Winning the Robocall Wars? (November 19, 2024 09:02 PM)
I voted early this year. Two days after leaving my ballot in the City Hall of the City I live in, I got a "Probable Scam Call" from an unknown number....
Comment by S G on Which People Finder Sites are Legit? (November 15, 2024 01:03 AM)
I searched my name and address on fastpeoplesearch.com and found that the information was mostly wrong (including the address that I have supposedly l...
Comment by Mike H on Which People Finder Sites are Legit? (November 14, 2024 11:49 PM)
After checking out fastpeoplesearch.com I got a very suspicious series of emails that I will block. I use https://www.usphonebook.com/people-search ...
Comment by jerry on Which People Finder Sites are Legit? (November 14, 2024 10:32 PM)
Even if I don't mind paying, how do I know the information is for the correct person before paying? It is truly amazing how many people with unusual n...
Comment by BDD on Which People Finder Sites are Legit? (November 14, 2024 10:22 PM)
I would use one of the pay sites if they charged a one time fee. My issue is paying for a monthly service which I will never do....
Comment by Patti Dowie on Which People Finder Sites are Legit? (November 14, 2024 10:11 PM)
I have great luck with truepeoplesearch.com, and it’s free. Works 99% of the time for me!...

Security Articles

 

The Most Common Computing Mistakes (how many have you made?)

You might prefer to blame hackers, cyber-criminals, and shoddy software, but the unpleasant truth is that most computer problems are caused by users. Here's the good news: there are a few basic steps you can take to avoid malware infections, data loss, and performance issues. Too often, people try to save time or money by cutting corners, and they end up paying the price. Check out my list of common computing mistakes, and how to fix (or even better, avoid) them. Read on...

...

Is Your Laptop Secure? (find out now)

Laptops are popular because they offer computing with convenience and mobility. But that makes it imperative for laptop owners to take steps to secure their laptops, and the sensitive data often stored on them. There are several simple things that you can do to keep your laptop safe. Read on to learn how to protect your laptop from theft, snooping and data loss...

...

The Miscreants Who Menace Millions

Philosophers have pondered the nature of evil for centuries. Perhaps you also have wondered how a medium meant for information sharing has become a minefield of privacy and security risks. Spam, viruses, ransomware, identity theft, data breaches, phishing, malicious links and other cybercrimes have become commonplace. Who does this stuff, and what the heck is wrong with them? Let's take a look at what motivates the bad guys who lurk in the dark corners of the Internet...

...

Was Your Password Just Revealed in a Massive Data Breach?

On July 4, 2024, a hacker known as "ObamaCare" released a compilation of nearly 10 billion plaintext passwords on a popular hacking forum. This leak, dubbed "RockYou2024," is an updated and more extensive version of the infamous "RockYou2021" leak, adding approximately 1.5 billion more passwords to the already vast database. This massive repository significantly increases the risk of brute-force attacks on various online accounts. Should you be worried? Here's what you need to do...

...

Hacker Defense: Your NINE Point Tuneup

If you think the online world gets more dangerous every day, you’re not wrong. The AV-TEST Institute reports over 450,000 new malware samples are discovered DAILY. Thousands of social media accounts are hacked every day; and untold millions of consumer records compromised in data breaches are used by hackers in increasingly clever attacks. Your defense systems must be kept in tip-top shape. Here are nine ways to harden your system against hackers. (Don't worry, you won't need a screwdriver or soldering iron!) Read on...

...

Extra Security Tip: Offline Malware Scanners

You almost certainly have an “always on” malware detection tool already installed on your computer. It provides constant protection against viruses and other malware that may sneak into your computer. But no anti-malware program is foolproof; something may slip through its defenses and infect your hard drive. So what can you do if a really nasty virus disables your anti-malware protection, or fouls up your hard drive so Windows won't even start? Here's the answer...`

...

The High Price of Anonymity

Virtual Private Networks (VPNs) are designed to offer privacy and security online, but not all VPNs are created equal. While premium VPN services invest in robust security measures, free VPNs often come with hidden risks. A recent investigation into the 911 S5 botnet highlights the potentially severe dangers associated with free VPNs. This botnet,which the Director of the FBI has described as “likely the world’s largest ever”, relied heavily on unsuspecting users who installed free VPN software. Read on for my advice on the threats posed by free VPN services...

...

[REVEALED] The Most Dangerous Person on the Web

Every year security software provider McAfee publishes a list of the 'most dangerous celebrities' on the Internet. The 'Hacker Celebrity Hot List' has nothing to do with their tech skills, how many times they've been in rehab, or how 'bad' their screen persona may be. It's their popularity that induces cyber-criminals to create malicious websites by exploiting their names. Here's what you need to know before you head off to your favorite search tool...

...

[HOWTO] Use a Sandbox for Malware Protection

Is that program, document, or spreadsheet you just received potentially harboring a nasty surprise? Any time you install or run new software, there is a risk of damage to your computer. Even if the software is not designed to make mischief, there's still a chance that it has flaws or is vulnerable to exploits that could wreak havoc. Sometimes just opening a newly-arrived document will trigger an embedded malware threat. Read on to learn how a digital sandbox can insulate your computer from software or other files that may pose potential privacy or security threats...

...

[SCAM ALERT] Smishing is Getting Worse (what you need to know and do)

Scammers and other cyber-criminals are endlessly adaptable, switching to new attack vectors as rapidly as users catch on to old ones. Most users have raised their guards against email phishing scams, but “smishing” - a mashup of SMS and phishing - is a growing threat due to the ubiquity of mobile phones. Read on for the scoop, and how to protect yourself from “smishing” attacks...

...

Can You Get a Virus By Scanning a QR Code?

An AskBob reader wants to know if there is any potential danger in scanning a QR code. Can a QR code hide dangerous content, or trigger a malicious action? Let's take a look and see if simply scanning a QR code can result in a virus or other type of malware infection. Read on...

...

[HOWTO] Boost Your Laptop Security Now

Laptops are great because they offer computing with convenience and mobility. But that makes it imperative for users to take steps to secure their laptops, and the sensitive data often stored on them. There are several simple things that you can do to keep your laptop safe. Read on to learn how to protect your laptop from theft, snooping and data loss...

...

Was Your Email Inbox Hijacked?

A concerned AskBob reader says: 'Please help... it seems my email account got hijacked, and now all my friends are getting spam, FROM ME! I am always careful with my password and online activities. How could this have happened, and what should I do?' Read on for my answer...

...

Use Outbound Firewall For Extra Security?

A curious and astute AskBob reader says: “I understand why I need a firewall to protect my computer from inbound threats. But a friend is telling me I need another type of firewall, which blocks outbound traffic as well. If I have good anti-virus software, do I really need this outbound firewall?” Good question, here’s my take on outbound firewalls...

...

Would You Click This Link?

Your mouse hovers over a link... your trembling finger is poised to click... but you stop to think. Is there danger lurking behind that link? Do you know how to tell right away if a website (or link) is going to lead you into a world of hurt? A single click can trigger an unwanted download, a malware infection, stolen login credentials, ransomware, or identity theft. Here are some practical tips and tools you can use to click smarter...

...

Fileless Malware: The Ghost in Your Computer

A clever but pernicious software technique that's been known for more than a decade is being adopted by today's malware authors, complicating the work of anti-virus developers and digital forensic analysts. Tracking down so-called “fileless malware” is to detection of regular malware what ghost-hunting is to catching a garden-variety burglar. Read on to learn about this resurgent threat and what you can do to stop it...

...

How Good is Your Cybersecurity?

Cybersecurity is the practice of protecting computer systems from unauthorized access, theft, damage, or disruption. Some examples of cyber threats are viruses, malware, phishing attacks, hacking, ransomware, data breaches, identity theft, and denial-of-service attacks. Read on to learn which ones are most likely to affect YOU, and best practices for defending your digital castle...

...

Virus Alert: Real or Rogue?

A worried AskBob reader says: “Do I have a computer virus? My computer will sometimes stop and it says I have a virus, and I must call a number on the screen. Then supposedly they will walk me through the process to fix it. Is this true? I have antivirus installed but still, it pops up now and then.” Here's my diagnosis...

...

Yes, Virginia, There is a Whitelist

“Yes, Virginia, there is a Santa Claus” is a line from a famous editorial published in 1897. The writer opined that Santa Claus existed “as certainly as love and generosity and devotion exist,” and that “the most real things in the world are those that neither children nor men can see.” You might not believe in Santa Claus, but malware is a veritable menace (even though invisible to the eye) to which you must take heed. In today's article, I'll explain how a whitelist can protect you much better than the old-school security software you're probably using now. It's something to do with Naughty and Nice. Read on...

...

Hacker Defense: Your SEVEN Point Tuneup

If it seems the online world gets more dangerous every day, you’re not wrong. The AV-TEST Institute reports over 450,000 new malware samples are discovered DAILY. (That's up from 350K two years ago.) Thousands of social media accounts are hacked every day; and untold millions of consumer records compromised in data breaches are used by hackers in increasingly clever attacks. Your defense systems must be kept in tip-top shape. Here are seven ways to harden your system against hackers…

...

Faster and Safer Internet? Here's How...

Today’s topic might sound geeky, but I promise I'll explain it all in plain English and show you how to make your Internet usage both faster and safer, for adults and curious kids. In the past, I have recommended using alternative DNS as a means to a faster and more reliable Web browsing experience. But faster Web surfing isn't the only benefit of switching your DNS servers. Read on...

...

[ALERT] Smishing Scams On The Rise

Scammers and other cyber-crooks are endlessly adaptable, switching to new attack vectors as rapidly as users catch on to old ones. One of the “new” vectors is actually many years old, but it’s achieving some prominence now as mobile phones have become nearly ubiquitous and users have raised their guards against email phishing scams. Read on for the scoop, and how to protect yourself from “smishing” attacks...

...

Can Simply Opening an Email Trigger a Virus?

Is it possible to get a computer virus by simply opening an email? It's true that email has been and remains one of the most popular attack vectors. Hackers, spammers, scammers, phishers and other cyber-miscreants are all knocking on the door of your inbox. But is it really that easy to slip in, and wreak havoc on your computer? Let's find out...

...

Who is The Most Dangerous Person on the Web?

Security software vendor McAfee publishes a list of the 'most dangerous celebrities.' It has nothing to do with how many times they've been in rehab, or how 'bad' their screen persona may be. It's their popularity that induces cyber-criminals to create malicious websites. Here's what you need to know before you head off to your favorite search tool...

...

Can You Get a Virus from a QR Code?

You know a technology is catching on when malware creeps start using it to snare unwary users. QR codes, those little squares of black and white patterns that you see in various places are typically benign shortcuts for mobile users, but they can carry a nasty (and expensive) payload. Read on for the scoop...

...

Govt Spooks Say: Avoid These Security Mistakes

Cybersecurity agencies of the United States, Canada, and the United Kingdom have kindly compiled a list of the top poor “cyber hygiene practices” that allow hackers, crackers and even slackers to compromise a victim’s computer. The report identifies common exploits that may allow unauthorized person to gain access to a poorly secured system. The Cybersecurity Advisory was published as a joint effort of the FBI, NSA, the Canadian Centre for Cyber Security, the UK's The National Cyber Security Centre, and security agencies in New Zealand and the Netherlands. Read on to learn which security mistakes you must avoid...

...

So You Think You've Been Hacked?

Anti-virus programs are awesomely sophisticated these days, featuring heuristics, real-time monitoring, blacklists, reputation systems, and still... they don't always keep bad things out of your computer! YOU are the last line of defense against hackers and malware, so you should be familiar with these telltale symptoms that your computer, smartphone or online account has been compromised...

...

Here's Why You Must Keep Your Software Updated (and how to do it for free)

The most common computer problems can be fixed or avoided altogether, simply by keeping all of your software up to date. Updates include patches for security vulnerabilities as well as fixes for bugs, new features, and improvements of existing features. Check out these free programs that will help you keep all your software updated, with just a few clicks...

...

Try This Automatic Password Changer

Security experts have “best practices” for passwords that can be cumbersome. They recommend you make your passwords long and obscure; never write them down where they can be stolen; and update them regularly. Unfortunately, all of that is so difficult that it seldom gets done. The key to password security is to make is easy. Read on to learn how you can strengthen and change all your most important passwords in just a few seconds...

...

[ALERT] ATM Skimmer Scammers

What is the biggest threat to financial networks? It's not ransomware, phishing, or denial-of-service attacks. It’s “ATM skimming,” the illegal capture of debit card data and PIN numbers by a “skimmer” device inserted into an Automated Teller Machine (ATM). Here's how to spot a skimmer and how to protect against this type of scam...

...

Worst Data Breaches of 2021 (what you need to know, and do)

Ransomware-related data breaches have doubled two years in a row. Identify theft and related fraud is rampant. Those are the takeaways from reports by the Identity Theft Resource Center and Spanning, a cloud security firm. Read on for details on some of the worst recent data breaches, what type of information was exposed, and what you need to know about protecting yourself in the age of vanishing privacy...

...

Yes, Virginia, You Need a Whitelist

The Internet security suites that I have examined over years (almost) all operate on the same basic principle: the blacklist. Malware is identified as such and gets put on a list of things to block and quarantine. The vast majority of antivirus and Internet security programs employ blacklisting. But this approach has some serious limitations. Here's what you need to know about the whitelisting approach...

...

Does Your Internet Router Auto-Update? (it should...)

Today I'll tell you what I think is the MOST important security feature that your Internet router should have. “Self-updating” is the basement floor of my house of router standards. I can’t imagine using Windows without automatic security updates, and keeping a router’s operating system patched is no less critical. Read on for my recommendations on secure, self-updating routers...

...

Are You (and your password) on The Naughty List?

It's for your own good, I promise... please see this list of the worst 200 passwords of 2021, and I hope none of yours is found there. If so, you and your password will be on every hacker's “naughty list” and you'll get digital coal in your stocking. Find out if your password is on the naughty list, and what you can do about it. Read on...

...

Time to Start Encrypting Your Email?

Interest in secure, encrypted email has skyrocketed since 2013 when Ed Snowden revealed the NSA’s widespread surveillance of electronic communications. And more recently, there has been an epidemic of data breaches and ransomware attacks that can expose sensitive data. Here is the low-down on email encryption, and some free tools to help you send and receive secure emails...

...

Outbound Firewall For Extra Security?

A curious AskBob reader says: “I understand why I need a firewall to protect my computer from inbound threats. But a friend is telling me that I need another type of firewall software, which blocks outbound traffic as well. If I have anti-virus software, do I really need this outbound firewall?” Good question, here’s my take on outbound firewalls...

...

[ETERNAL VIGILANCE] Is it Safe to Click?

Your mouse hovers over a link... your finger is poised to click… but you stop to think. Is there danger lurking behind that click? Do you know how to tell right away if a website (or link) is going to lead you into a world of hurt? A single click can lead to an unwanted download, a malware infection, stolen login credentials, ransomware, or identity theft. Here are some practical tips and tools you can use to click smarter…

...

Are You Vulnerable to Fileless Malware?

A clever (but insidious) software technique that's been around for over a decade has obtained newfound favor among today's malware authors, complicating the work of anti-malware developers and forensic analysts. Tracking down so-called “fileless malware” is to detection of regular malware what ghost-hunting is to catching a garden-variety burglar. Read on to learn about this resurgent threat and what you can do to stop it…

...

I'm Positive... It's a False Positive!

Several AskBob readers have emailed me, noting that their McAfee security software was warning about “suspicious content” on AskBobRankin. I’ve checked into these reports, and I’m confident that this is a false positive. There is no malware, and no harmful or “suspicious” content on my site. Please read on for the details, and some links YOU can use to check other pages for harmful content...

...

Pipelines, Ransomware, and The Solution

You’ve probably heard a lot of news about the Colonial Pipeline cyber attack which happened on May 7th. The pipeline was shut down for several days, causing widespread fuel shortages and price hikes. That pipeline delivers almost half of the fuel (gasoline, diesel, heating oil, and jet fuel) to the East coast of the USA, about 100 million gallons of fuel daily. Read on to learn how this could have been prevented, and the steps YOU can take to protect yourself from cyber attacks...

...

Will LifeLock Save Your Bacon?

If you're worried about identity theft these days, you're not paranoid. Frequent and massive data breaches provide scammers with the personal information they need to pull it off. If someone assumes your identity they can open new credit cards, raid your bank accounts, ruin your employment prospects, or even commit crimes for which you are blamed. With so much at stake, many people are paying $20 or more a month for identity theft protection services. But are they wasting their money? Here's the scoop…

...

You, Your Router… and Eggs?

The old adage says “Don’t put all your eggs in one basket.” Yet most of us do exactly that with all of our expensive “smart” home electronics, and the consequences can be as calamitous as the old proverb implies. The latest cyber attacks are targeting home internet routers. Here's my advice on what you need to know to defend yourself against router attacks...

...

Are You in the 51 Percent Club?

Over forty years since the first spam email was sent, it is still the favorite tool of crooks and criminals online. A report from security group F-Secure says that spam is the most common method used to distribute malware, phishing attacks, malicious URLs, and scams. Read on to see if you're in the 51 Percent Club, learn the tell-tale indicators of malicious emails, and the true origin of spam...

...

Should You Deep Freeze Your Hard Drive?

There’s a software tool that claims to make your PC or Mac computer indestructible. It does this by 'freezing' your hard drive, so your computer's software and settings can be returned to a pristine state every time you start it up. Let's take a look at how Deep Freeze works, and find out if it's a good solution for you...

...

What’s New in PC Matic 4.0?

PC Matic 4.0 was just released, and is a major update that improves the usability, stability, and appearance of the program, read on for my review of the computer security tool that I use and recommend...

...

Is Your Terrible, Insecure Password on This List?

Today I want to draw your attention to a list of the worst 200 passwords of 2020, and I hope none of your passwords is on it. Nordpass, a security tools vendor published the list, along with an estimate of how much time it would take to crack each of them. (The majority of them can be guessed in under a second.) Find out if your password is on the naughty list, and what to do about it...

...

Spam and Malware: Why Do They Exist?

Email spam, viruses, ransomware attacks, identity theft, phishing, malicious links and other cybercrimes have become commonplace. A medium meant for information sharing has become a minefield of privacy and security risks. Who does this stuff, and what the heck is wrong with them? Let's take a look at what motivates the miscreants who menace millions on the Internet…

...

Want Your Internet Faster and Safer?

I know today’s topic might sound geeky, but I'll explain it all in plain English and show you how to make Internet usage both faster and safer, for adults and curious kids. In the past, I have recommended using alternative DNS as a means to a faster and more reliable Web browsing experience. But faster Web surfing isn't the only benefit of switching your DNS servers. Read on…

...

[ALERT] A Gaping Hole in Your Online Security

For several years, I’ve been writing about and recommending two-factor authentication, also known as “2FA” or "two-step verification", to secure your online accounts. (It can protect you even if your password is guessed or stolen.) You may have already started using this technique. But you may be blissfully unaware of a gaping hole that could still leave you exposed to account takeover and identify theft. Read on to learn about the dangerous flaw in two-factor authentication, and of course, the solution!

...

Do You Have a Computer Virus?

A concerned AskBob reader asks: “Do I have a Virus? My computer will stop and it says I have a virus and to unfreeze everything I must call a number on the screen. Then supposedly they will walk me through the process to fix it. Is this true? I have antivirus installed but still, it pops up now and then.” Here's my diagnosis...

...

Time to Encrypt Your Email?

Interest in email encryption has skyrocketed since 2013 when Ed Snowden revealed the NSA’s widespread surveillance of electronic communications. And more recently, there's been an ongoing spate of data breaches and ransomware attacks that can expose sensitive data. Here is the low-down on email encryption, and some free tools to help you send and receive secure emails…

...

What's in The 2020 Digital Defense Report?

Microsoft’s Digital Defense Report for 2020 has just been published, providing a snapshot of the state of cybersecurity. The folks in Redmond say they analyze 8 trillion security signals per day, generated by their global customer base. This allows them to identify the current threats, and predict what attackers will do next. Here’s what you need to know...

...

Do You Need an OUTbound Firewall?

An AskBob reader asks: “I think I understand why I need a firewall to protect my computer from inbound threats. But a friend is telling me that I need another type of firewall software, which blocks outbound traffic as well. If I have anti-virus software, do I really need this outbound firewall?” Here’s my take on outbound firewalls...

...

Keep Your Software Up To Date (or else…)

Many computer problems can be fixed or avoided altogether, simply by keeping all of your software up to date. Updates include patches for security vulnerabilities as well as fixes for bugs, new features, and improvements of existing features. Check out these free programs that will help you keep all your software updated, with just a few clicks...

...

Router Security: Close Unnecessary Ports

Are your virtual hatches battened down? In this article, we will examine one type of router vulnerability and learn how to protect your system from hackers and malware that seek to exploit it. Our subject today is, “unnecessary open ports,” a very common vulnerability. Read on, and find out if your router passes the Looney Tunes test...

...

[VIGILANCE] Is it Safe to Click That Link?

Your mouse hovers over a link... but is there danger lurking behind that click? Do you know how to tell right away if a website (or link) is going to lead you into a world of hurt? A single click can lead to an unwanted download, a malware infection, stolen login credentials, ransomware, or identity theft. Here are some practical tips and tools you can use to click smarter...

...

Laptop Security 101 (and 102)

The convenience and portability that laptop computers offer has made it imperative for users to take steps to secure their laptops, and the sensitive data often stored on them. There are several simple things that you can do to keep your laptop safe. Read on to learn how to protect your laptop from theft, snooping and data loss...

...

[DIGITAL LOCKDOWN] Authenticator Apps Protect Your Accounts

Data breaches expose millions of account credentials (usernames, passwords and other personal info) on a frighteningly regular basis. But there are ways to protect your online accounts from criminals who buy and sell this information on the dark web. One of them is to use a secure authentication app such as Google Authenticator. Doing so will make you immune to account hijacking, even if your password is exposed. Read on for the scoop on how authenticator apps can lock down your online accounts...

...

Fileless Malware: Are You Exposed?

A software technique that's been around for more than 15 years is finding favor among today's malware authors, complicating the work of anti-malware developers and forensic analysts. Tracking down so-called “fileless malware” is to detection of regular malware what ghost-hunting is to catching a garden-variety burglar. Read on to learn about this resurgent threat and what you can do to stop it...

...

Eternal Vigilance is the Price of Security

The quote “Eternal vigilance is the price of liberty” is often attributed to Thomas Jefferson, but there's no evidence that he ever spoke or penned those words. The story behind that quote is actually quite interesting. Read on for the details on that, oh, and some security tips you may not have learned about elsewhere...

...

Your SEVEN Point Tuneup For Hacker Defenses

It seems the online world gets more dangerous every day. The AV-TEST Institute reports over 350,000 new malware samples are discovered DAILY. Thousands of social media accounts are hacked per day; and untold millions of consumer records compromised in data breaches are used by hackers in increasingly clever attacks. Your defense systems must be kept in tip-top shape. Here are seven ways to harden your system against hackers...

...

[ALERT] Fake Customer Service Scams

If you're having trouble finding the customer service or tech support phone number for a large company, there's a reason for that. And scammers are taking advantage in clever ways. One concerned reader wrote to ask me if she had been scammed after calling what she thought was Facebook customer support. Read on for the details of the Customer Service Imposter scam...

...

[ALERT] Have You Been Smished?

Spammers and scammers are endlessly adaptable, switching to new attack vectors as rapidly as users catch on to old ones. One of the “new” vectors is actually many years old, but it’s achieving some prominence now as mobile phones have become nearly ubiquitous and users have raised their guards against email phishing scams. Read on for the scoop, and how to protect yourself from “smishing” attacks...

...

Don't Fall for the CatPhishing Scam

Many years ago, Ambrose Bierce wrote: 'I have known men to fall in love by light so dim they would not choose a suit by it.' Today, the light is not only dim but deceptive. Lonely people of all persuasions are at increasing risk of being preyed upon by phony romantic partners who not only aren’t what they seem to be, but may not exist at all! Read on to learn about catphishing...

...

Here's Why Phishing is Getting Worse

Webroot, a computer security company, conducted a phishing survey last August, and asked 4000 office professionals about their email habits. The results may be surprising, but they shed light on why phishing attacks are increasing, both in the home and in the workplace, and how to protect yourself from this threat. Read on for the scoop on phishing...

...

Extra Security: Offline Malware Scanners

If you’re smart, you have a real-time internet security tool already installed on your computer. It provides constant protection against viruses and other malware that may sneak into your computer. But no anti-malware program is foolproof; something may slip through its defenses and infect your hard drive. So what can you do if a really nasty virus disables your anti-malware protection, or fouls up your hard drive so Windows won't even start? Here's the answer...

...

Why Do Spam and Malware Exist?

Computer viruses are everywhere. Spam is abounding. Ransomware, identity theft, denial of service attacks and other cybercrimes are commonplace. Who does this stuff, and what’s wrong with them? Let's take a look at what motivates the miscreants who menace millions on the Internet...

...

How Hackable is Your Password?

Over the past few decades, password rules have become more complicated and burdensome upon users. Users have coped with arbitrary, complex password rules by creating the most easily remembered passwords that comply with the rules, changing them when required in minor, predictable ways, and reusing compliant passwords on multiple online accounts. The results include lots of frustration and LESS security. Here's how to do it right...

...

Here's How to Make Your Computer Indestructible

According to Faronics, their Deep Freeze software can make your PC or Mac computer indestructible. It does this by 'freezing' your hard drive, so your computer's software and settings can be returned to a pristine state every time you start it up. Let's take a look at how Deep Freeze works, and find out if it's a good solution for you...

...

More Dangerous Than Malware?

Most experts writing about computer and Internet security focus on threats found 'out there' in the online sphere, or in the form of malicious hackers with malevolent intentions. The danger is that they will get to you or your computer, and steal or do damage. Most security measures focus on preventing such intrusions. But the greatest threat is not 'out there.' It's much closer than you think. Read on for the answer...

...

[SECURITY] Your Password Is Not Enough

If you scanned that headline quickly, you might have read it as 'Your Password Is Not Strong Enough.' The point of today's article is no matter how strong your password, it's not enough to protect you. Some security tips bear repetition. I've been beating the drum for two-factor authentication for several years. I know, it sounds geeky, but it's actually a simple tool that can protect you even if your password is stolen or compromised in a data breach. Here's what you need to know...

...

Ransomware is Getting Worse (here's what to do)

Multiple sources say the ransomware problem is getting worse. Over 850 million ransomware infections were detected last year, an increase of 97 percent. Part of that increase is due to a 109 percent increase in phishing emails that lead to ransomware attacks. Read on for some of the best tips on preventing ransomware, and how to recover if you are infected by ransomware...

...

[IMPORTANT] Here's How to Protect Your Router

The old adage says “Don’t put all your eggs in one basket.” Yet many people do exactly that with all of their expensive “smart” home electronics, and the consequences can be as calamitous as the old proverb implies. The latest cyber attacks are targeting home internet routers. (And yes, you have one.) Here's what you need to know to defend yourself against router attacks...

...

Try Adding THIS to Your Anti-Malware Arsenal

In the ever-escalating virus/antivirus wars, no single program eradicates every bit of malware infection. If problems persist after a full scan with your standard malware killer (or you just want a second opinion), you can try a specialized program that digs deeply into the dark corners of your system where advanced malware hides. Read on to learn about this tool that you should have in your internet security toolbox...

...

Try This, For Faster and Safer Internet

On occasion, I have recommended using alternative DNS as a means to a faster and more reliable Web browsing experience. But faster Web surfing isn't the only benefit of switching your DNS servers. I know it sounds geeky, but I'll explain it all in plain English and show you how to make Internet usage both faster and safer, for both adults and curious kids. Read on...

...

Avoid These TEN Common Computing Mistakes

We prefer to blame hackers, cyber-criminals, and shoddy software, but the unpleasant truth is that most computer problems are caused by users. There are a few basic steps you can take to avoid malware infections, data loss, and performance issues. Too often, people try to save time or money by cutting corners, and they end up paying the price. Check out my list of common computing mistakes, and how to fix (or even better, avoid) them. Read on...

...

Does Your TV Need Antivirus?

One maker of popular laptops and smartphones, recently advised customers to run a virus scan. That's good advice for anyone who owns a computer or mobile device, but this warning was directed at “smart TV” owners. Wait, your TV can get a virus? Do smart TV sets really need anti-malware protection? Here's what you need to know...

...

Ransomware: Are You at Risk?

Ransomware is the fastest-growing form of malware on the Internet. This diabolical cyber-scourge, which encrypts one’s hard drive and demands payment for the key, has exploded in recent months. One high-profile attack has cost the city of Baltimore over $18 million. Here's what you can do to prevent a ransomware attack, and quickly recover if it does happen...

...

Are Passwords Useless?

Brett Arsenault, Microsoft's chief information security officer (CISO), says passwords are 'useless' to protect against hacking and other cyberattacks. Why does the guy in charge of security for one of the largest corporations on the planet make such a statement? And what does he recommend? Read on...

...

Are You Securing Your Laptop? (Here's how...)

The convenience and portability that laptop computers provide has made it imperative for users to take steps to secure their laptops, and the sensitive data often stored on them. There are several simple things that you can do to keep your laptop safe. Read on to learn how to protect your laptop from theft, snooping and data loss...

...

[2019] What Dangers Lurk in Cyberspace?

In predicting what online security threats will loom largest in 2019, we can start with one assumption. Online crooks will continue following the paths of least resistance to the greatest rewards. Some of the threats can be countered by conscientious consumers. Other threats are beyond the control of ordinary people, who can only make preparations to mitigate damages that may occur. Read on to learn what computer security threats should be on your radar in the coming year…

...

Are You Ready for Hardware Security Keys?

Are you tired of unlocking your phone or computer a hundred times a day? Would you like to login to all your favorite websites with a single tap, and never reemember another password? That's the promise of hardware security keys. Let's take a look at the current offerings, and you can decide if one is right for you...

...

Is Your Password on the Naughty List?

The 8th annual list of The Worst Passwords is out, and I hope none of your passwords is on it. To make this list, security software firm SplashData examines millions of passwords that were leaked in data breaches throughout the year, ranking passwords on their frequency of occurrence and security weakness. In other words, the passwords on this list are both commonly used and easily hacked. Find out if your password is on the list, and learn how to beef up your password security...

...

Got Malicious Chrome Extensions?

Your web browser is your first line of defense against all manner of cyber attacks. But some disturbing reports of malicious Chrome extensions that resist most manual removal efforts have led me to wonder just how good Google is at keeping malicious extensions out of the Play Store, and how committed Google is to doing so. Read on for the scoop…

...

[REVIEW] Google Safe Browsing Protection

Google’s livelihood depends on people’s trust in the Web. So Google devotes enormous resources to keeping the Web a safe place to explore. Collectively, these resources are called Google Safe Browsing. Let’s see how Safe Browsing works, and how it protects your web browsing, email, and downloads -- even if you don't use Google services...

...

[LOCKDOWN] How Authenticator Apps Protect Your Accounts

I made several security recommendations in response to Facebook’s loss of 50 to 90 million user “access tokens.” One of them is to use a secure authentication app such as Google Authenticator. A reader requested more info on that, and I am happy to oblige. Read on for the scoop on how Authenticator can lock down your online accounts...

...

[WOW] 32,003 Router Vulnerabilities Found

A nonprofit consumer advocacy group looked at 186 SOHO (small office/home office) WiFi routers from 14 U.S. vendors and found 83% of them were running outdated firmware whose vulnerabilities are public knowledge, leaving the routers and their users vulnerable to hacking attacks. Is yours on the hit list? Here's what you need to know...

...

Here's the END of Weak Passwords

I am going to have to find a new pet peeve to write about when other topics fail to inspire me. My old standby, “weak passwords,” is now defunct. There is no longer any excuse for using a lame, easily guessed password like 'monkey' or '12345678.' None! Read on to learn why...

...

Malware Pre-installed On Your Android Phone?

Mobile operating systems are complex beasts, so it’s no surprise that each new version of Android comes with one or two theoretical security flaws that could, if discovered by hackers before they are patched, spell disaster for unhappy users. Did your smartphone come with malware pre-installed? Read on...

...

PC Matic - An Overdue Review

Having vowed never to pay another licensing fee to iObit Corp., as I have done since 2011 for its Advanced System Care Pro optimizer/antimalware program, I went in search of a replacement. I didn’t have to look farther than the comments sections on my own articles. Here is my assessment and review of PC Matic…

...

My Data Breach Experience

I suppose it was inevitable. Thirty percent of American consumers were notified of a data breach involving their personal data in 2017, according to Javelin Strategy & Research. This year it was my turn. Here's what happened to me, and how I handled the problem...

...

[ALERT] The Video Blackmail Scam

A new phishing email scam is making the rounds. It claims to have compromising video of victims and threatens to send it to all of their contacts unless hush money is paid. Yesterday, a reader wrote to me about one, and by coincidence I received one today. Here is how it looks and why you should not be taken in...

...

Is Titan the KEY to Your Security?

Recently I wrote an article about the importance of using two-factor authentication (2FA), with a caveat that there is a serious flaw in the way most people use it. Today you'll learn about a gadget called the Titan Key that makes 2FA (and your online accounts) virtually hacker-proof. Read on...

...

When 2FA Goes Bad

Reddit, the maverick social network, suffered a security breach in June, 2018, its management has revealed. It was a mild disaster, as such things go. But it highlights a flawed method of online authentication that you are probably using on a regular basis. Here's what you need to know…

...

Does Your Router Auto-Update? (it should...)

For the past few weeks, I've been writing a series on router security, and in this final installment I'll tell you what I think it the MOST important security feature that your router should have. “Self-updating” is the basement floor of my house of router standards. I can’t imagine Windows without self-updating, and keeping a router’s operating system patched is no less critical. Read on for my recommendations on secure, self-updating routers...

...

Router Security: Add a Guest Network

You may be aware that your router has a “guest network” feature, and you may think you know what it does. But a guest network is useful even when you do not have visiting relatives or friends. Let’s look at guest networks in detail and see how one can protect your home from cyber-intruders constantly...

...

Does Security Software Protect Your Router?

As home network owners become more aware of security threats that target routers they are asking, “Does my security suite defend my router along with the other devices on my network?” Let’s look at some of the most popular security suites and see exactly how they protect routers, if they do so at all. Read on...

...

[SHOWDOWN] Avast vs AVG

Avast and AVG are two of the most respected names in Internet security software. But many consumers don’t know that they became one company in October, 2016, when Avast bought AVG for $1.6 billion. Since then, the two software brands have remained distinct. But under the hood, they have grown more alike. There are still some differences in important features that may sway your choice. Let’s compare Avast Free Antivirus to AVG AntiVirus Free...

...

Router Security: Closing Unnecessary Ports

This article is part of a series on the subject of router security. In this article, we will examine one type of router vulnerability and learn how to protect your system from hackers and malware that seek to exploit this type of vulnerability. Our subject today is, “unnecessary open ports,” a very common vulnerability. Read on...

...

UPnP - The (almost) Forgotten Vulnerability

It was an awkward moment in 2006 when one of the most useful and popular networking features ever invented was discovered to also be very useful to hackers. Some vendors got busy on the problem, improving their product and making it more difficult for bad guys to exploit it. But hundreds more deliberately ignored the threat. Read on find out if you are exposed to the UPnP (Universal Plug-N-Play) vulnerability...

...

[HOWTO] Protect Your Router Now

“Don’t put all your eggs in one basket,” they say. Yet most of us do exactly that with all of our expensive “smart” home electronics, and the consequences can be as calamitous as the old proverb implies. The latest cyber attacks are targeting home internet routers. Here's the first article in a series detailing what you need to know to defend yourself against router attacks...

...

[SECURITY] Do You Need a Whitelist?

The security suites that I have examined over the past few days all operate on the same basic principle: the blacklist. Malware is identified as such and gets put on a list of things to quarantine. The vast majority of antivirus and other types of security programs employ blacklisting. But this paradigm has some serious limitations. Here's what you need to know about the whitelisting approach…

...

Best Smart Locks For Your Home

We may forgive the Internet for being insecure; after all, it wasn’t designed to be secure. But locks certainly are, by definition. When you make something smarter it gets better, right? No, not always. Here's what you need to know about smart locks...

...

MalwareBytes Free vs Paid

Oh, MalwareBytes, how I hope you make it! I admit up front that I admire this security suite purely for its aesthetics and attitude towards customers. But the question remains: Can the Premium "always-on" version stop malware effectively? Let's take a look at the free and paid versions of the MalwareBytes internet security product...

...

[ALERT] VPNFilter: The Russians Really Are Coming For Your Data

A deadly serious threat is on the loose: a virus called VPNFilter that infects business and consumer-grade routers to steal passwords and other sensitive data from any device on a network served by an infected router. Here's what you need to know now...

...

Is Norton's Paid Security Protection Worth It?

Unlike most internet security products, Norton does not have a free watered-down version of its security suite. But you do get 60 days to try Norton products before your credit/debit card is charged for the first time. So continuing my exploration of free versus paid anti-malware tools, I took the Deluxe version of Norton Internet Security for a test drive. Read on for my verdict...

...

Avira Free or Paid - How About Neither?

Like most security software developers, Avira has evolved to include far more than detection and eradication of viruses (self-replicating destructive malware). That’s why I now prefer the term “security suite” over “antivirus” when discussing such products. In this article, I'll give you my advice on the wisdom of upgrading from a free to paid version of the Avira security software...

...

Are Premium Malware Suites Worth Their Price?

I have always been a fan of free software; all but a handful of the hundreds of programs I have recommended over the years have had a free version as well as a paid one. Every top-tier anti-malware suite offers full-spectrum protection in its free version. So why pay for any of it? Here's my take on the paid version of one popular Internet security product...

...

Cybercrime and Secret Sauce

A new report that looks at the big picture pegs the worldwide haul from cybercrime at 1.5 trillion dollars. That’s not just criminal business, it’s an entire criminal economy, say the authors of the report, “Into The Web Of Profit.” So what's this about secret sauce? Well, you'll have to read on for that...

...

Will Passwords Ever Go Away? Maybe.

Passwords have been a thorn in the side of computer users for a very long time. Passwords are forgotten, at best. At worst, they are posted in plain view, rendering them useless. Finally, we see some real hope that passwords and all their irritations will go away. Here's what you need to know…

...

SOPHOS Business-Grade Security for Your Home

The words “anti-virus,” “anti-malware,” and anti-whatever are entirely inadequate these days. Show me a software tool that only sniffs out viruses and I’ll show you an application that deserves the trivializing abbreviation “app.” Read on to learn how Sophos can secure your digital domain…

...

[HOWTO] Security for Your Laptop

The mobility and convenience that laptop computers provide has made it imperative for users to take steps to secure their laptops, and the sensitive data often stored on them. There are several simple things that you can do to keep your laptop safe. Read on to learn how to protect your laptop from theft, snooping and data loss...

...

Just Say NO to Facebook Messenger Malware

Fly fishermen are always tying new flies, refining the tricks they play on trout and other piscean species. Likewise, phisher-men in the digital waters constantly try new ways to get you to bite on their hook, which is baited with malware. Recently, researchers at Kaspersky Lab reported a fancy new “fly” involving Facebook’s Messenger, the bigger, better messaging app that Facebook is pushing to replace that awful, tiny, temperamental chat box. Read on to see how Messenger has been used to deceive users into clicking links that lead to loss...

...

FBI Warns of Virtual Kidnapping Scam

The FBI has issued an updated bulletin warning the public about the rising threat of “virtual kidnapping scams,” in which unseen bad guys call a victim and demand ransom for an allegedly kidnapped loved one. Here's what you need to know...

...

Spectre and Meltdown - Should You Worry?

You may have heard of Spectre and Meltdown, two security vulnerabilities that exist in virtually every CPU ever made by the chip giants Intel, AMD, and ARM. Either vulnerability can expose your system to “arbitrary code execution,” the geeky way to say, “A hacker could take complete control of your computer” and run any malware he wants on it. Read on to find out more, and if your computer is vulnerable to these attacks...

...

Microsoft Takes on the Scammers

Starting March 1, 2018, programs that attempt to coerce users into paying for dubious protection or PC performance “optimization” will be removed automatically by Microsoft Windows Defender Antivirus and other Microsoft security products. I can think of several rogues that will be hopefully out of business soon. Here's what you need to know...

...

[UPDATE] Is Windows Defender Enough Security?

Windows Defender Security Center (“Defender” for short) is the latest name for the built-in suite of anti-malware and security features in Windows 10. Historically, Defender and its antecedents have been mediocre offerings. So mediocre, in fact, that multiple test labs rated it dead last in effectiveness. But recently, Microsoft has focused on making Defender a comprehensive, safe, and free choice for all your security needs. Let’s see how close it has come...

...

Is Your Password on the Naughty List?

It’s that time of year when we look back on our mistakes and vow not to continue making them in the new year. Using weak passwords, and using passwords incorrectly, is a perennial shortcoming that afflicts millions. Here is one software company’s list of the worst passwords seen in 2017, and my tips for improving password security…

...

Most Dangerous Security Threats of 2018?

What will be the biggest security threats of 2018? Would it surprise you to learn that YOU might be on the list? Read on to learn about the threats to your privacy and security that are most likely to impact you in the coming year…

...

Have You Been Phished?

Phishing, the art of getting users to click on malicious links in bogus emails, is the favorite tool of scammers, by far. The reason is, phishing works. Scammers are getting better are slipping their phishes through spam filters and past anti-malware software. Ironically, the successful campaign to raise users’ awareness of online security hazards is making phishing more successful. Read on to learn about the latest phishing developments...

...

Can This Robot Manage Your Passwords?

RoboForm is one of the best and most popular password managers on the market. Version 8 was released recently, and the company invites you to try it for free for one year! Let’s see what’s new and improved in Roboform 8…

...

Malwarebytes: Protection for Android

Malwarebytes has released the latest Android version of its acclaimed security suite. It’s not just a port of MBAM for Windows, but a program carefully designed for mobile devices and the threats their users face, even from apps that they trust. Read on to see how Malwarebytes for Android works…

...

[KRACK] Your Encrypted WiFi Just Got Decrypted

The encryption protocol used by virtually every WiFi-enabled device on Earth has been cracked by a Belgian security researcher. It’s a huge problem for every maker of routers, PCs, smartphones, IoT devices, and more. But should you panic? Read on for the scoop...

...

[HACKED] A Reminder To Be Vigilant

Piriform, developer of the popular CCleaner software, issued a security bulletin on September 18, 2017. Somehow, malware sneaked into recent versions of CCleaner and CCleaner Cloud. Here is what you need to know...

...

Here's Why Your Password is Hackable

Over the past two decades, password rules have become more complicated and burdensome upon users. Users have coped with arbitrary, byzantine password rules by creating the most easily remembered passwords that comply with the rules, changing them when required in minor, predictable ways, and reusing compliant passwords on multiple online accounts. The results include lots of frustration and LESS security. Here's how to do it right...

...

Android Tip: Securing Your Smartphone

Your Android smartphone is under attack from many directions, from pickpockets to malware to human error and suspicious spouses. Multiple security defenses are required to keep your phone as safe as it can be, which unfortunately isn’t “perfectly safe.” But here are SIX ways to secure your Android phone as best you can...

...

[ALERT] Change Your Passwords... NOW

A spammer’s database of 711 milliion email addresses and passwords, including email server admin credentials, has been discovered on a wide-open Web server in the Netherlands. It’s the biggest trove of stolen identities yet found. But what’s really interesting - and frightening - is how it’s being used to circumvent spam filters and infect victims with malware. Here's what you need to know, and do...

...

[HOWTO] Detect and Remove Keyloggers

It's a fact that many malware infections result in a vulnerability to keystroke logging, which can compromise your privacy and lead to identity theft. A recent news story tells how over TWO MILLION passwords were stolen by keyloggers. Learn more about keyloggers, how they work, and how to defend yourself from this invisible threat...

...

DoublePulsar: The Undetectable Backdoor

While everyone was preoccupied with the Wannacry ransomware epidemic that began in mid-May, a bigger threat was secretly spreading through tens of thousands of computers. It locks up files and demands a ransom, too, but that’s just a smoke screen designed to distract victims from what this sneaky malware is really up to. Here's what you need to know about DoublePulsar…

...

Free Protection Against Ransomware

More than 70% of new malware released these days is of the ransomware variety. Why? Because it works! Ransomware takes all of a user’s data hostage, a terrifying moment for most of us. Only by paying a few hundred dollars can you get the key that unlocks your data, the extortionists claim. Many people pay quickly under the pressure and anxiety. Let's proactively deal with that problem -- check out these free tools to block and recover from ransomware...

...

Has Judy Malware Infected Your Phone?

On May 26, a presumably mortified Google booted 41 apps from the Google Play store. All of them were infected with malware; collectively, they have infected 36.5 million Android devices. It’s bad enough that one infected app slipped past Google’s stringent vetting, let alone 41. What’s even worse is that at least one of the bogus apps had been on Google Play for more than two years! Here's what you need to know...

...

[ALERT] Latest Ransomware Threats

Ransomware seems to be the darling of bad guys these days. It’s a very direct, powerful technique for extorting hundreds of dollars from a single victim very quickly, or millions of dollars when there are thousands of victims. Let’s take a look at the latest ransomware campaigns and how you can protect yourself from them...

...

5-Point Tuneup For Hacker Defenses

The online world gets more dangerous every day, it seems. Some quick statistics: 230,000 new malware samples are discovered daily; over 600,000 social media accounts are hacked per day; one in ten social media users has had an account hijacked by hackers. Your defense systems must be kept in tip-top shape. Here are five ways to harden your system against hackers...

...

Do I Need an OUTbound Firewall?

I think I understand why I need a firewall to protect my computer from inbound threats. But a friend is telling me that I need another type of firewall software, which blocks outbound traffic as well. If I have anti-virus software, do I really need this outbound firewall?

...

Beware of This Clever New Scam

Sometimes security researchers publish information that might better be kept under wraps. That seems to have happened in the case of a Trend Micro blog post about a phishing technique that abuses a popular Internet security standard. Within days, someone was using that technique to trick users into granting access to their Google accounts. Here's what you need to know about OAuth scams...

...

Is This Your New Internet Security Tool?

MalwareBytes Anti-Malware, commonly abbreviated as MBAM, has long been recommended as a supplement to full-coverage security suites. Now with the arrival of MBAM Version 3, it's a full-coverage security suite. Read on to see what’s new, and if you should switch...

...

Are Keyless Cars Hackable?

Does your car have an old-school key that opens the door, or a new-fangled electronic push-button key fob that opens the door and also starts the car? If it's the latter, then it's most likely trivial for a thief with some inexpensive gadgetry to unlock your car and drive away. Here's what you need to know, and one easy way to protect against this hack...

...

[ALERT] USB Malware and The Kill Stick

Back in August 2014, I wrote about a “Serious Security Flaw In USB Drives.” Short story: it’s possbile to overwrite the firmware of a USB flash drive (or other USB device) so that it injects malware into the host machine when plugged into a USB port. Since anti-malware software can’t check firmware, this type of exploit cannot be detected. And lately, the story has gotten worse. Read on for the scoop on why you should be EXTRA-careful with USB sticks...

...

[SHOCKER] Internet Security is Getting Worse

An IBM study of Internet security was released this week, and the news is both surprising and depressing. Data breaches, denial of service attacks, and ransomware are up by over 500%. Spam and phishing are also on the rise. Here's what you need to know...

...

Are Password Rules Making Us LESS Secure?

Isn't it maddening when your bank, insurance company, grocery store and a dozen other websites demand that you follow a complicated set of rules when coming up with a new password? It's bad enough that these passwords are hard to remember. But new research shows they actually make it EASIER for hackers to compromise your account. Read on for the scoop…

...

Do You Need a PUP Cleaner?


Today's article has nothing to do with smelly dogs or canine shampoo. In the context of software, a PUP is a Potentially Unwanted Program. Read on to learn how they can sneak into your system, what they can do, and how to find and remove these pests…

...

How To Eliminate 94% of Windows Vulnerabilities Easily

A new report from security experts at Avecto highlights hundreds of critical vulnerabilities discovered in Microsoft Windows just in the year 2016. Any of them could allow a hacker to take full control of an unpatched PC. But one simple trick can create a roadblock to neutralize more than 94% of these threats. Read on for the scoop…

...

Beware Fake Tech Support Scammers

Have you received an unexpected phone call from a helpful customer service rep of Microsoft, or perhaps your ISP? I didn't think so. But many people have received calls from scammers posing as tech support reps, warning that their computers are infected with malware and offering help to fix the purported problem. Here's what you should do if they call you...

...

When White Hats Collide

Has your security software suddenly disappeared? There's a nasty battle brewing among some popular anti-virus software vendors, and it's escalated to the point where they are classifying each others' products as malware, and deleting them on sight! Here's what you need to know...

...

[ALERT] Rogue Certificates

Security experts advise us not to enter passwords, credit card details, or other sensitive information on any website that does not provide an encrypted connection, and to use a bookmark to access sites that deal with banking or other private matters. But there's a new threat being used by clever hackers to thwart both of those measures. Read on for details…

...

[OUCH] One Billion Yahoo Accounts Hacked

On December 14, 2016, Yahoo revealed that over one billion (with a “b”) of its users’ accounts had been hacked, in August, 2013 (yes, with a “3”). That’s in addition to another 500 million breached accounts that were discovered separately in September. You might have a Yahoo account and not even know it. What should you do? Read on...

...

Top 10 Security Vulnerabilities of 2016

What software currently running on your computer is the MOST vulnerable to attacks by cybercrime exploit kits? Software made by Adobe Systems and Microsoft provided the most zero-day vulnerability targets during the past year, according to Recorded Future, a real-time cyber-threat detection and mitigation firm. Read on to learn which of those programs you should avoid...

...

BOTNET ATTACKS: Are You Vulnerable?

How easy is it to take over hundreds of thousands of computers, and enslave them in a botnet that could be used by hackers for malicious purposes? Not so hard, it turns out. The shocking truth is that the tools to create and operate botnets are cheap and readily available to malevolent miscreants. Read on to learn how to detect and defend against botnets, and some really good news about “Operation Avalanche” ...

...

Gooligan Malware Spreading Like Wildfire

A new malware known as “Gooligan” is infecting 13,000 Android phones each day, according to CheckPoint, a cybersecurity firm headquartered in San Carlos, CA. Over one million smartphones have already been infected, making Gooligan the biggest security breach that Android has ever experienced. Do you need to worry? Read on...

...

Ten Stupid Things You Can Do To Mess Up Your Computer

Aside from actually drop-kicking it or smashing it with a sledge hammer, it's fairly difficult to actually break a computer. That said, there are a number of ways to render your computer just slightly more useful than a doorstop. Certain careless acts can cause crashes, freezes, painfully slow performance, loss of data or invasion of your privacy. Here's my list of stupid things you can do to really mess up your computer...

...

Securing Your Internet of Things

Right behind every cyber-scare comes a gaggle of “new” solutions. Sure enough, we’re seeing new security appliances purportedly designed to protect the IoT devices on your home network. But are they new, and do they protect? Do you even need another separate device? Read on to get the straight story…

...

Attacking the Internet is Now Child’s Play

Brian Krebs has made a lot of enemies by publicizing and thwarting many hacker organizations. So it’s not surprising that his website is constantly under attack. A recent attack on Krebs' website effectively silenced him for a week. Another recent attack took many popular sites offline for hours. Read on to see what's happening, and what you can do about it...

...

IoT Security News Just Gets Worse

It was bad enough to learn that millions of “Internet of Things” devices have deplorably poor security. But now we learn that many IoT devices also have a backdoor built into them that hackers can exploit. Read on to understand this new threat and see what you can do about it...

...

[LOCKED] Extra Security for Your Google Accounts

The threat of identity theft is at an all-time high and it just keeps growing every day. Since early 2015, I have recommended two-factor authentication (2FA) as an extra layer of security wherever it is available. Google makes 2FA available free of charge, in more than one form. Read on to learn how it works, and your options for getting started...

...

Doxware - A Devilish Improvement to Ransomware

It’s bad enough when ransomware encrypts your hard drive and demands payment in Bitcoins for the key to unlock your data. But a few innovative cyber-extortionists are also stealing your most sensitive data and threatening to publish it if you don’t pay up. Here's what you need to know about doxware…

...

Have You Been Pwned?

Yahoo made headlines recently by admitting that it suffered a data breach that may have compromised more than 500 MILLION Yahoo accounts. Here's how to find out if you may have been affected by this (or one of many other) massive data breaches...

...

The Flaw in Secure Logins

You've probably experienced two-factor authentication (also known as "two-step verification") when logging into certain websites. In addition to your username and password, many banks and other online services now send you a text message with a code that you must enter to verify your identity. But there's a gaping hole in that extra layer of security. Here's what you need to know...

...

[NEWSFLASH] An Egregious Blunder

Some of the most powerful hacking tools, apparently developed by the National Security Agency’s elite cyber-espionage group, have been leaked online, creating an enormous threat to the security of the entire Internet and everyone who uses it. Governments, corporations, and yes, you, must now deal with the possibility that anyone could have these super-spy tools and start using them. Read on…

...

Why Hasn’t Microsoft Fixed This 20 Year-Old Vulnerability?

A security flaw in Windows allows anyone to steal usernames and passwords of logged-in users or even infect Facebook with malware simply by tricking users into visiting a specially-crafted Web page. Microsoft has known about the vulnerability since at least 1997, but the company has no plans to close this gaping hole. Read on to learn why, and how to easily protect against this threat...

...

Could Hackers “Rig” The Election?

Donald Trump has predicted that the November elections will be “rigged.” Most politicians and pundits dismiss that idea as “impossible.” But according to many security experts, thousands of electronic voting machines that will be used across the country on November 8 are so riddled with security holes that the possibility of manipulating the votes they record cannot be waved away. Here's what you need to know...

...

Are Wireless Keyboards Leaking Your Data?

Wireless keyboards transmit every keystroke to your computer, via a low-power radio signal. Is it possible for a hacker to intercept that signal, to steal your passwords and other sensitive data? In some cases, yes. Should you panic? Maybe. Here's what you need to know...

...

The “No More Ransomware” Project

Ransomware is the fastest-growing scourge on the Internet. This diabolical form of malware, which encrypts one’s hard drive and demands payment for the key, has exploded in recent months. Here's what you can do to prevent a ransomware attack, and quickly recover if it does happen...

...

Virtual Kidnapping Scams On The Rise

The FBI has issued a bulletin warning the public about the rising threat of “virtual kidnapping scams,” in which unseen bad guys call a victim and demand ransom for an allegedly kidnapped loved one. Here's what you need to know...

...

Free 5-Point Tuneup For Hacker Defenses

The online world gets more dangerous every day, it seems. Some quick statistics: 230,000 new malware samples are discovered daily; over 600,000 social media accounts are hacked per day; one in ten social media users has had an account hijacked by hackers. Your defense systems must be kept in tip-top shape. Here are five ways to harden your system against hackers...

...

A Malware Funnel Pre-Installed on Your PC?

The biggest security vulnerability on your desktop or laptop PC probably is not something you picked up off the Internet, or that a phisher injected into your system when you clicked on the wrong email or web link. No, it’s most likely an application that came with your computer, provided free of charge (and responsibility) by HP, Dell, Lenovo, or whatever company made your system. Here's what you need to know…

...

Security Without Passwords?

Google has promised to eliminate the need for passwords by the end of 2016, at its recent developers’ conference called Google I/O. And the company is making measurable progress towards that worthy goal. Will you be password-free by the end of this year? Will an ancient tabulating device play a role in the process? Read on to learn the details...

...

[WARNING] Paper Checks Can Lead to Fraud

In March 2016, I wrote about electronic bill payment, and asked “Are You Still Paying Bills With Paper Checks?” The overwhelming majority of readers who left comments said that they do. Some recent news casts serious doubt on the safety of this practice. If you pay bills with paper checks, you MUST read today's article...

...

[BREACH] Be Careful Of Password Resets

Netflix and Facebook (and possibly other sites) began resetting the passwords of certain users recently. The affected users were locked out of their accounts; essentially, they found that the lock on the door had been changed and their key no longer fit it. Here's what's happening, why, and the steps you may need to take as a result…

...

[SOON] Google Chrome to Block Adobe Flash

A majority of the online industry would love to see Adobe Flash die once and for all, including yours truly. Google is driving another nail into Flash’s coffin in the near future; the Chrome browser will soon begin blocking Flash content by default on all but a few major websites. Here's what you need to know, and do...

...

Crafting The Perfect Password

Security geeks, including yours truly, are constantly nagging everyone to use strong passwords. But truly secure passwords can be hard to remember. Today I've got a simple recipe to help you create strong passwords that you can easily remember. Does that sound perfect? Read on...

...

[CLICK...] Is There Danger Ahead?

Do you know how to tell right away if a website (or link) is going to lead you into a world of hurt? A single click can lead to an unwanted download, a malware infection, stolen login credentials, or identity theft. Here are some practical tips and tools you can use to click smarter...

...

[ALERT] Adobe Flash - The Last Straw?

Adobe Flash is a favorite target of hackers and malware writers because it's old (dating back to the mid-1990s), complex, and riddled with hidden bugs. Last week, Adobe issued a security update that fixed twenty-seven vulnerabilities, including one that could be exploited to deliver ransomware infections. Is it time to stick a fork in it?

...

[QUICK] Uninstall QuickTime for Windows

Windows PC users who have the Apple QuickTime video player installed should uninstall it immediately to prevent its exploitation by hackers, says Apple, the U.S. Department of Homeland Security, security experts at Trend Micro, and anyone else you may ask. Here's why, and how…

...

[LOCKED!] The Latest in Anti-Ransomware

Ransomware is the Internet bogeyman of the moment. This breed of malware, which encrypts the data stored on infected machines and then demands a payment for the key that unlocks the data, is the fastest-growing threat online today. The tech press has ensured that awareness of ransomware is at an all-time high. Are you protected? Read on…

...

[HACK] Should You Worry About Getting Mousejacked?

More than 80 media outlets have echoed a security alert issued by startup security firm Bastille Networks. “Hackers can exploit your wireless mouse to take control of your cursor and keyboard... or even inject malware into your computer!” Should you ditch your wireless mouse, or is this story a bit overhyped? Let's take a look at the facts…

...

[SECURITY] AntiVirus Test Results

The Grammy Awards are over; the Oscars will be passed out on February 26. Between these two pop culture love-fests lies one for us geeks: the annual awards for antivirus programs. The envelopes, please…

...

[YES!] You Really Need Windows Auto-Update

Earlier this week, Microsoft released several security patches rated Critical, which fixed vulnerabilities that could be exploited to give an attacker complete control of a computer. Did your Windows system automatically apply those patches? Read on to learn why you need to use Windows Update, and tweak it with my recommended settings...

...

[DOIT] Free Google Security Checkup

As part of “Safer Internet Day 2016” Google is encouraging everyone to do a Security Checkup. As a reward for completing this two-minute task, you'll get a free boost of 2 GB in your Google Drive storage allotment. Even if you don't care about the extra storage, I do strongly recommend that you take the Security Checkup. And when you're done, I have an extra credit assignment for you...

...

[ALERT] Can You Trust These Tech Firms?

The Comodo Group is a well-known Internet security company founded in 1998. Its slogan is, “Creating Trust Online.” Comodo actually sells trust - the firm is the world’s largest vendor of digital security certificates, with one-third of the market. But now, Comodo has betrayed every one of its customers. And it’s not the only tech firm that has done so recently. Read on for the surprising details...

...

A New Weapon Against Ransomware

Malwarebytes, maker of the venerable MBAM security software, has released a beta version of a new tool that guards against all known variants of ransomware, the company announced on January 25. Malwarebytes Anti-Ransomware uses behavioral analysis to detect and block malware that attempts to encrypt a user’s data and extort a ransom payment.

...

This Antivirus Plugin Makes You LESS Secure

Billionaire Warren Buffett said, “It takes 20 years to build a reputation and five minutes to ruin it. If you think about that, you'll do things differently.” He might have been talking to the folks at AVG Antivirus; if he was, they weren’t listening. Read on to learn how AVG might have made you LESS secure...

...

Windows Smartscreen Gets Smarter

Microsoft rolled out a new version of its Smartscreen web content filtering software in the December 2015, “Patch Tuesday” update. Just like Gandalf on the bridge in Lord of the Rings, the new and improved Smartscreen aims to protect you from dangers that lurk in dark places. Read on to learn about Smartscreen, what it can do, and why it may not help you, unless...

...

Who Lost Your Data In 2015?

It’s probable that your personal data was leaked this year. In 2015, over one billion personal records were illegally accessed, up 54% from the previous year. The stolen data included financial and medical data, email addresses, Social Security Numbers, and more sensitive information. Learn more and find out if YOUR personal info was leaked...

...

Got a Dell? Read This Now!

Every Dell computer running Windows has a gaping security hole that allows bad actors to eavesdrop on secure connections and bypass anti-malware defenses. Whether you have a Dell or not, here's what you need to know -- and do -- right away...

...

Best Password Managers of 2015

Good password management is a critical part of online security, but it can be difficult to do. The more online accounts you have, the more difficult it is to create strong passwords, keep track of them without exposing them to thieves, and remember to change them regularly. Read on to learn how password managers can simplify the task…

...

Is This TrueCrypt's Fatal Flaw?

For many years, TrueCrypt was the gold standard in free encryption software. But in May 2014, the software’s developers abruptly quit, warning users of unspecified “security issues” in TrueCrypt. Security luminaries declared there was nothing wrong with the last version of TrueCrypt so it has remained in use. But now, there's a problem. A big one, in fact...

...

Spammers and Scammers In The Slammer

The steady stream of media reports about data breaches, phishing scams, and other cyber-threats can get pretty depressing. It seems like the bad guys are constantly winning. But in fact, law enforcement does score victories against spammers, scammers, and identity thieves, sending many to prison or worse. Here are a few examples...

...

Is Computer Security an Illusion?

This year's Black Hat security conference, the 18th annual gathering of InfoSec (information security) geeks in Las Vegas overflowed with attendees and alarms. In a nutshell, the message was “Everyone is vulnerable.” Here are the most important takeaways, what you should know, and what you can do...

...

The Internet of Insecure Things

The “Internet of Things,” or IoT, is exploding like a mushroom cloud. Coffee makers, toys, cars, even light bulbs are getting IP addresses and connections to the cloud as manufacturers rush to “add value” to commodity products. But in the mad dash to realize Dr. Vint Cerf’s famous motto, “IP On Everything,” virtually no attention is being paid to securing smart devices against hackers...

...

Stagefright: Worst Android Vulnerability Yet

Remember back in June when you snickered at your iPhone friends, because a specially crafted text message could shut down their phones? It's payback time. A similar vulnerability in Android phones can do much scarier things. Here's what you need to know, and do…

...

Dump Adobe Flash NOW?

Adobe Flash has a long history of security vulnerabilities; over a dozen have required patching in 2015 so far. Three more zero-days in Flash that were discovered and fixed recently have some in the tech industry crying, “Enough! Time to kill Flash forever!” But is it? Read on for the scoop...

...

SECURITY TIP: Lock Down Your WiFi Router

While we’ve been focusing on the security of our desktop PCs, laptops, and mobile devices, malware-manufacturing miscreants have been exploiting the most overlooked computer in most homes and businesses: the router. Here's what you need to know…

...

IMPORTANT: An Extra Layer of Security

Some security tips bear repetition. I've been beating the drum for two-factor authentication for several years. I know, it sounds geeky, but it's actually a simple tool that can protect you even if a hacker steals all your passwords. Here's what you need to know...

...

Does Your Wallet Need a Tinfoil Hat?

Recently, a friend forwarded to me a Houston TV station’s story about “electronic pickpocketing.” In it, reporters say they watched a security expert steal credit card numbers from 39 victims in less than 15 minutes, simply by walking past them. But is this a real problem? Read on...

...

What's in The PhAT Report?

The most recent Phishing Activity Trends Report (or as I prefer to call it, “The PhAT Report”) contains some accepted wisdom and some startling surprises. It may influence your choice of security software and the focus of your security awareness. Read on...

...

Install Google Password Alert?

Google suffered an embarrassing moment just a day after it released a free browser extension intended to protect users against phishing attacks. Google fixed the mistake quickly, but the fix is also vulnerable to being bypassed. Should you install the Google Password Alert tool anyway? I say yes...

...

Mobile Malware: No Big Deal?

Verizon’s security research team wants you to know that the odds of catching a truly serious malware infection are about 0.03 percent, about the same as the average odds of being struck by lightning during a lifetime. So should we worry? Read on for the details, and my recommendations...

...

The Phish Are Still Biting

Despite a decade of terrifying headlines, education programs, employment and school policies, and other efforts to enlighten the masses, the odds are one in four that a phish will get a bite, according a recent report. Why is phishing still such a big problem? Read on...

...

ALERT: Time to FREAK Out?

A vulnerability that could allow man-in-the-middle eavesdroppers to crack HTTPS (secure web connections) and steal sensitive data exists in every version of Windows, Mac OS X, iOS, Android, and even Blackberry OS. EVERYBODY PANIC! FREAK OUT! For a few days, at least. Here's what you need to know now...

...

Does your Computer Have VD?

If you bought a Lenovo laptop any time since September, 2014, it may have come with a piece of adware called Superfish that puts all of your Web browsing sessions at risk of hacking. The same flawed technology has been found in three different parental control programs, and may be incorporated in any number of other legitimate programs. Here's what you need to know, and do...

...

5 DIY Home Security Systems

A do-it-yourself (DIY) home security system can reduce your homeowner’s insurance premium and boost your home’s resale value; provide peace of mind while you’re away or asleep; make an intruder change his mind; and even summon police or firefighters when necessary.

...

Take the Free Google Security Checkup

As part of “Safer Internet Day 2015” Google is offering a free boost of 2 GB in your Google Drive storage allotment. Even if you don't care about the extra storage, I do strongly recommend that you take the two-minute Security Checkup. And when you're done with the Google checkup, I have an extra credit assignment for you...

...

Internet Security Predictions for 2015

Each year, Websense Security Labs releases a report with predictions regarding the computer and Internet security landscape for the coming year. This year’s 13 pages of prognostications contain some expected prophecies, and some surprising ones. Read on to stay ahead of the curve…

...

Ransomware Strikes Again - Cryptowall

Making regular backups of critical data and keeping your software up to date is more important than ever thanks to the arrival of new, “improved” malware like Cryptowall 2. This update to a well-known ransomware exploit is making life miserable for business and personal computer users worldwide. Here's what you need to know...

...

Dashlane's Free Automatic Password Changer

The “best practices” for password security are 1) make your passwords long and obscure; 2) never write them down where they can be stolen; and 3) change them every 30 days. Unfortunately, all of that is so difficult that it seldom gets done. The key to password security is to make is easy. Read on to learn how you can strengthen and change all your most important passwords in just a few seconds...

...

A Trio of Apple Security Flaws

Until very recently, Apple users didn't need to worry about malware, so long as they avoided jailbreaking their devices, and downloaded only from the official Apple App Store. But clever hackers have exploited some loopholes that could act as a conduit for rogue or malicious software to make its way into an iPhone, iPad or a computer running Mac OS X. Here's what you need to know...

...

WOW: Surprising Stats on Phishing

Researchers at Google and UCSD have released a study showing that an astonishing 14% of all phishing attempts are successful. They also reveal how the bad guys gain access to victims’ accounts and what they do once they get in. Read on, and please forward this article to a friend...

...

New Mobile Malware Threat

A well-known predator named “Koler” has ramped up its game from “drive-by download” to “self-replicating virus,” accelerating the spread of this ransomware from one smartphone to all its owner’s contacts. Read on to learn about a secret feature that will zap this and other mobile malware apps...

...

Will MBAM Protect Against ALL Malware?

A reader asks: 'Based on advice from you and others, I have installed MalwareBytes Anti-Malware (MBAM). It claims to detect and remove viruses, spyware, rootkits and other nasties. So do I still need a separate anti-virus program, or will MBAM provide all the protection I need?' Read on for my advice...

...

Shellshock! Are You Vulnerable?

A serious flaw was recently discovered in software that's found on untold millions of web servers. But desktops, laptops, smartphones and other devices may be vulnerable to the “Bash Bug” as well. Read on to cut through the hype and find out whether you need to take action...

...

Over 1 Billion Passwords Stolen

Russian cybercrooks have hijacked a mother lode of 1.2 billion unique username and password credentials. The New York Times did some quick math and noted, “that’s more than the population of China!” The thieves have also amassed a list of 500 million email addresses -- so should you be worried? Read on...

...

Is Apple Spying on Your iPhone?

According to security researcher Jonathan Zdziarski, every iPhone, iPad, and all other iOS devices can be ransacked by Apple, the NSA, or hackers through remote-access tools “hidden” in the iOS operating system. These tools give a remote user full control of the device and the ability to download nearly every scrap of data it holds. But what's the truth? Read on...

...

Have You Been Hacked?

Anti-malware programs are awesomely sophisticated these days, featuring heuristics, real-time monitoring, and reputation systems; and still they fail to keep bad things out of your computer! You are the last line of defense against hackers and malware, so you should be familiar with these symptoms that your computer or online account has been compromised...

...

Old Androids Never Die, They Just Become Bots

Is there a horrible, terrible security vulnerability lurking in your Android-powered mobile gadget? Are evil Russian hackers controlling Richard Engel's smartphone at this very moment? Read on...

...

Pandemiya: The New Trojan Horse

A new Trojan Horse malware program appears to be written entirely from scratch, a rarity in the malware trade and a special cause for concern among security researchers, anti-malware developers, and end-users. Here's what you should know…

...

How NOT to Get Exploited

Drive-by downloads -- malware delivered to random Web site visitors -- are one of the biggest, fastest-growing threats on the Internet. Learn how they spread across the web, and some easy things you can do to protect against these dangerous exploits...

...

GameOver and Cryptolocker Busted

Two of the biggest, most sophisticated, and most profitable scams on the Internet were neutralized at the end of May. The FBI, working with counterparts in seven countries, have (at least temporarily) shut down the GameOver financial fraud botnet and the CryptoLocker ransomware organization. In light of this, there are TWO IMPORTANT STEPS I'm asking you to take...

...

TrueCrypt Is Dead -- Long Live TrueCrypt!

A shockwave rolled through the Internet’s cryptographic community on May 28. TrueCrypt, a highly respected, open-source, on-the-fly encryption program, was abruptly abandoned by its developers. It’s not unusual for programmers to give up on their free software. What shocked everyone is the going-away present that TrueCrypt’s parents gave to the world.

...

Time to Boycott Java?

In January 2013, a reader asked me if Java was safe to use. My answer then was somewhat equivocal; yes, Java complicates PC security, but you may want to keep it – carefully – if you run into situations where you need it. Basically, I felt the risk/reward ratio of Java was a toss-up. But my assessment is changing now. Read on to find out if you should keep Java or dump it…

...

What's in the Microsoft Security Intelligence Report?

Twice a year, Microsoft releases an updated Security Intelligence Report detailing the latest threats, countermeasures, and trends in computer and Internet security. The SIR for the second half of 2013 is out, and it highlights trends that are important to consumers as well as business users. Here are the highlights, and what you should know...

...

ALERT: Serious Internet Explorer Flaw Discovered

Security holes in Web browsers are hardly unusual, and Microsoft’s Internet Explorer has had more than its fair share exploited and exposed. But the latest flaw is a doozy so dangerous that governments are urging users to switch to alternative browsers until Microsoft issues a patch. And it isn’t clear when that patch will be issued. Find out what you must do NOW...

...

Drive-by Download Dangers

The term “drive-by download” is often encountered in security bulletins and the media reports they inspire. What, exactly, is a drive-by download? Who is vulnerable to it? And how can you protect yourself against drive-by downloads? Read on for answers...

...

HOWTO: Deep Scan for Malware

A reader asks: 'My anti-virus software offers me the option to run a quick scan or a full scan. I've always run the quick scan, because that's the recommended setting. What does a full scan do, and how would I know if I need to do one?' Read on to learn about deep scanning, to check every nook and cranny of your computer for malware...

...

A Gaping Hole in Internet Security?

Yet another security hole in a widely-used Internet protocol has been discovered, prompting headlines about dire things that could have happened, may have happened, and might be happening to you this very instant. Here's what you need to know about the Heartbleed exploit...

...

Texting ATMs For Cash?

ATMs running Windows XP can be controlled remotely by hackers with smartphones, according to a top Internet security firm. Just send the right text message to an ATM and it will start spewing cash. An estimated 80 percent of U. S. ATMs are still running XP, so should we worry? Here's the story...

...

Announcing Malwarebytes Premium

I have always recommended the free version of MalwareBytes Anti-Malware for basic protection and eradication of malware infections. Of course, there’s a paid version too, called MalwareBytes Premium. How is it different from the free version, and is it worth the $24.95 annual subscription fee? Let's find out…

...

Geeks Who Cry Wolf

Every month - sometimes every week - the tech world is 'rocked' by dire warnings of scary-sounding security vulnerabilities, newly discovered in major products and services. But two recent examples didn't pass my sniff test. Here's the scoop…

...

Lies, Damned Lies, and Olympic Journalism

Just before the start of the 2014 Winter Olympics, NBC aired a story claiming that all visitors toting smartphones or laptops to Sochi with would be 'immediately hacked' and exposed to an array of horrors. Turns out the story was fabricated, but why? Read on...

...

Security Threat: Predictions for 2014

Each year Websense Security releases a report with predictions regarding the computer and Internet security landscape for the coming year. There's some good news for home users, and some cautions for those who handle high-value data. Find out where to focus in 2014 to protect your data and identity...

...

Two Clever Phishing Attempts

Among the phishing techniques making the rounds, the 'desperately needed user manual' trick is a reliable favorite. If you’ve ever searched online for the user manual of an older computer, household appliance, stereo system, etc., you’ve probably encountered this one. Another recent reprobate is the Google Docs scam. Let’s see how both of them try to trick you...

...

Can You Smell a Phish?

The latest fad in email scams is spear-phishing: deceptive emails highly targeted and carefully crafted to fool even the best anti-phishing technology. A savvy human being can still spot spear-phish reliably, but it’s getting more difficult as scammers refine their craft. Here’s is a little test you can take to see if you’re smarter than modern phish...

...

Free Microsoft Security Tools

When it comes to computer and online security, Microsoft Windows is often portrayed as the problem rather than the solution. But don’t get the idea that Microsoft doesn’t care about security. In fact, Microsoft publishes several free and effective security tools for home and professional users. Try some of these to see if your currently installed security software is doing everything it should to protect you...

...

ALERT: New Virus Demands Ransom For Your Data

A new type of malware is developing that renders computers unusable until their owners pay a ransom. Worse, the latest example of such ransomware will be sold for as little as twenty-five bucks to anyone who wants easy money. We could be in for a massive wave of cyber-blackmail. Here's what you need to know...

...

The Seven Most Common Internet Security Mistakes

A reader says: 'I have anti-virus protection but somehow I got a virus anyway. How did this happen?' That's hard to say without knowing more, but chances are, this person made one of the seven Internet security mistakes on my list. Any one of them can lead to malware infection or even identity theft. Are YOU vulnerable? See the list now...

...

HOWTO: Detect and Defeat Keyloggers

It's a fact that many malware infections result in a vulnerability to keystroke logging, which can compromise your privacy and lead to identity theft. A recent news story tells how over TWO MILLION passwords were stolen by keyloggers. Learn more about keyloggers, how they work, and how to defend yourself from this growing threat...

...

Would You Click on This?

Phishing is an attempt to trick you, by impersonating someone you trust. The good news is that far fewer phishing emails are being sent and fewer people are being targeted by information thieves. The bad news matters if you are one of the remaining targets: there are more bad guys gunning for you now and fewer places to hide than ever before. Here's what you need to know…

...

Should You BUY Anti-Virus and Anti-Spyware Software?

A reader asks: 'Should I run AVG, SpyBot, and other freeware, or should I pay for a supposedly better program? I read so much negative about every security program and I am quite confused about them. Some I hear are actually fakes. If they really are worth the money, I am willing to try them. Can you give me your opinion on the best anti-virus, anti-spyware and other Internet security tools?'

...

SECURITY TIP: Preview Shortened URLs

URL-shortening services like TinyURL and Bitly are handy for a variety of reasons, but shortened URLs also represent a ubiquitous and very dangerous security vulnerability. You must use your head and technology to avoid becoming a victim of malware, phishers, and hackers when clicking on shortened URLs. Here's what you need to know...

...

Don't Fall Victim to Scareware

A reader asks: 'I have heard of software, shareware, freeware, trialware and malware. And I think I know what all those things are. But what exactly is scareware?' Here's the scoop on these rogues that prey on misinformation and fear...

...

MalwareBytes Anti Exploit: Digital Ninja

Surprise attacks are often the most devastating, both in terms of damage they can do to individuals and the number of victims who are attacked. The online world has it own version of such attacks, in the form of drive-by downloads and zero-day exploits. But there's a new security tool that promises to provide ninja-like protection from these threats. Read on to learn more…

...

Microsoft Security Essentials: EPIC FAIL

Microsoft launched their Microsoft Security Essentials (MSE) antivirus software with great fanfare in 2009, touting it as a 'comprehensive security solution' for Windows. And publicly, they still do. But the head of Microsoft's Malware Protection Center is singing a different tune -- even recommending AGAINST relying on MSE. Here's what you need to know…

...

Five Free Malware Removal Tools

Nothing is perfect, especially in the realm of malware removal tools. In the ever-escalating arms race between malware authors and defenders of civilized computer users, the advantage shifts from one side to the other constantly. You may have the top-rated security and disinfection suite, but one day some clever new species of malware will defeat it. Here's what to do when that happens to you, a friend, or family member...

...

Avoiding Zero Day Exploits

Recently, software giants Microsoft and Oracle were hit by zero-day exploits that could affect users of Internet Explorer and Java software. The term 'zero-day exploit' sounds sinister and dramatic, but what does it mean? Find out now, and what you need to do to stay safe...

...

Android Security Update

Hey, the U.S. government is stealing my gig! The nice folks at the Department of Homeland Security (yes, the same people who brought you free irradiations, body scanners and airport gropings) are now turning their attention to everyday 'cyber threats.' So what do they (and other scare mongers) have to say about Android mobile gadget security? Read on...

...

SECURITY TIP: Two Factor Authentication

Okay, I'll admit this sounds geeky, but it’s important. Two-factor authentication isn’t all that complicated, and it can save your bacon from hackers and identity thieves. Read on to learn more about this online security technique that I'm strongly recommending for PC, Mac and mobile users...

...

Rootkits: Evil, Nasty and Sneaky!

A reader asks: 'My computer is acting strangely, and a friend said I might have a rootkit. What exactly is a rootkit, and how is it different than a virus? Also, how can I detect and remove rootkit infections from my computer?' Read on to learn more about this insidious threat to your security and privacy...

...

Locate a Stolen Laptop or Smartphone

A reader asks: 'I travel often with a smartphone and a laptop, so I'm looking for something to help me locate these gadgets if they are ever lost or stolen. What do you recommend?' Read on for my tips on recovering (and preventing) a lost or stolen laptop, tablet, or smartphone...

...

Computer Security: The Missing Link

Is your computer really secure? If you have antivirus software, malware scanners and a firewall, you might think you're safe from hackers, crackers and identity thieves. But chances are, you're missing one critical piece of the security puzzle. Read on to learn how to secure your software and truly lock down your computer...

...

Why Does Malware Exist?

Computer viruses are everywhere. Spam is abounding. Computer intrusions, identity theft, denial of service attacks and other cybercrimes are commonplace. Who does this stuff, and what’s wrong with them? Let's take a look at what motivates the miscreants who menace millions on the Internet...

...

Best Browser for Malware Protection?

Web browsers are used to interact with the Internet more than any other type of software. So it’s no surprise that the latest malware tries to infiltrate computers via Web browsers. But which browser does the best job of protecting you? Read on for some surprising test results...

...

Secure Backup: Solves TWO Problems

A backup copy of your data is not insurance against viruses and other malware infections, if the backup copy is also infected. The obvious solution is to scan and clean your files before they get backed up. Now, a popular Internet security developer makes that easy, and throws in cloud storage as well. Here's what you need to know...

...

HOWTO: Securing Your Smartphone

Your smartphone offers many conveniences, but it carries some risks as well. You may love having access to your email and other apps while you're on the go, but have you ever considered the potential damage that might result if your phone was lost or stolen? Here are some tips on securing your phone, and all the data that it carries...

...

BOTNET ALERT: Are You Vulnerable?

How easy is it to take over hundreds of thousands of computers, and enslave them in a botnet that could be used by hackers for malicious purposes? Not so hard, it turns out. Last year, an anonymous researcher created software of the type used by hackers, and within one day, created a botnet of over 400,000 computers. He kept the botnet alive for four months, and nobody noticed. Here's what you need to know about botnets...

...

How Do Viruses Spread?

All the advice you've ever heard about how to avoid getting infected by a computer virus may be wrong. Well, at least some of it... A new study sheds light on how viruses and other malware are most commonly spread in today's Internet environment. Read on for details...

...

Lab Tests Reveal Top AntiVirus Programs

Have you been using the wrong antivirus program for the past year? Now is your chance to kick yourself and mend the error. The authorities on antivirus testing and rating have released their lists of the best-performing antivirus programs. Here's the scoop:

...

Do You Need Mobile Security Protection?

A reader asks: 'I am seeing more about viruses and malware on mobile devices. My wife has an iPad and I have an Android smartphone. Should we be concerned enough to look into anti-virus or other security software for these gadgets? Or is it all hype at this point?' Read on for my opinion of mobile security software...

...

SECURITY ALERT: Universal Plug and Play Vulnerability

Security research firm Rapid7 has identified a serious vulnerability in networking software known as Universal Plug and Play (UPnP). This UPnP component is installed in almost every network router, and is present in the Windows and Mac OS X operating systems. If your router or computer is exposed, you MUST take action to avoid the possibility of hacker attacks. Here's what you need to know, in simple terms...

...

Is Your Password Strong Enough?

You wouldn't lock up your car and leave the key in the door as you walked away. But many people do essentially the same thing when they create weak passwords for their online accounts. Don't make it easy for hackers to plunder your bank account or go on an online spending spree with your credit card. Here are some tips to help you create and manage passwords...

...

Is Java Safe and Do I Need It?

A reader asks: 'I've been seeing warnings lately that Java has a security flaw, and everyone should remove it. I'm not even sure what Java is. What is Java? Is Java safe? Should I disable or uninstall it?' Read on to find out...

...

Which AntiVirus Has the Best (and Worst) Protection?

Internet security suites have become exceedingly complex over recent years. That’s partly due to the ever-increasing number of vectors via which hackers and malware attack. It’s also due to feature-bloat, as anti-virus vendors add new bells and whistles to differentiate their products. But one bedrock feature of a security suite remains the same: how well does it detect virus-infected files? Here are some real-world test results you won't want to miss...

...

The Five Most Common Internet Security Mistakes

A reader says: 'I have anti-virus protection but somehow I got a virus anyway. How did this happen?' That's hard to say without knowing more, but chances are, this person made one of the five Internet security mistakes on my list. Any one of them can lead to malware infection or even identity theft. Are YOU vulnerable? See the list now...

...

Seven More Free Antivirus Programs

We can never have too many options when it comes to antivirus protection. Right? If you're still using Norton, McAfee or some other expensive Internet security software, you owe it to yourself to check out these free alternatives. Read on to see my list, and some tips on choosing antivirus protection...

...

Will Your AntiVirus Program Protect You?

A reader asks: 'Recently I got a virus, even though I have an updated version of Norton Security. Have we gotten to the point where one Internet security tool is no longer sufficient? What do you suggest as the best strategy to protect against viruses, spyware and other Internet threats?'

...

Are Digital Signatures Secure and Legal?

Your handwritten signature is a legal instrument that verifies the authenticity of a document, or your agreement to the terms of a contract. Historically, signatures have been affixed to a piece of paper, a bit of tree bark, a clay tablet, or some other tangible object. Read on to learn how you can securely sign documents in a paperless, digital world...

...

The Most Dangerous Person on the Internet?

Every year, security software vendor McAfee publishes a list of the 'most dangerous celebrities.' It has nothing to do with how many times they've been in rehab, or how 'bad' their screen persona may be. It's their popularity that induces cyber-criminals to create malicious websites. Here's what you need to know before you head off to your favorite search tool...

...

Review: Kaspersky Labs Internet Security 2013

Kaspersky Labs Internet Security 2013 adds two new features of note: better protection for your online financial transactions, and a new exploit blocking engine to guard against phishing and other attacks. Learn more about these and other security features in the latest release from Kaspersky Labs...

...

Defeat the Google Redirect Virus

A reader asks: Every time I search on Google and click one of the results, my web browser gets hijacked. I think I have a virus, but I can't even search for help on Google! Do you know about this, and is there a free tool I can use to fix the problem?

...

AVG Threat Report: Are YOU Vulnerable?

The AVG Technologies Q2 2012 Community Powered Threat Report is out, giving us new insights into the tactics of hackers, scammers, and malware distributors. It contains some interesting milestones, trends, and facts you should keep in mind. Here are some of the highlights of the AVG Threat Report...

...

Warning: Skype Urgent Online Repair Scam

I just got a phone call on my Skype number which was very strange. It looked like a virus warning, and the caller’s name was 'SYSTEM NOTICE - URGENT ONLINE REPAIR'. I assume this is bogus... right?

...

Hey, Is This Your Password?

According to a study that was just released, there's a 40 percent chance that any hacker could guess your password without breaking a sweat. Read on to find out if you're using one of the 25 most common (and easily guessed) passwords, and how to create strong, secure passwords that can't be hacked...

...

Can QR Codes Spread Computer Viruses?

Any doubts I may have had about the viability of QR codes have evaporated. You know a new technology is catching on when malware authors start using it to snare unwary users. Read on to learn how those funny black squares can carry a nasty (and expensive) payload...

...

Alert: Malware on the Rise

Malware developers have been working overtime, according to a recent McAfee Labs Threats Report. The security firm found over 8 million new species of malware in the first quarter of 2012, and the problem is by no means limited to desktop PC users. Mac OS X and smartphone users need to start paying attention to security threats, too...

...

Will Microsoft Security Essentials Take Over the World?

Microsoft recently released Microsoft Security Essentials (MSE) 4.0, their free antivirus software. And according to a recent market analysis, MSE is on the verge of becoming the number one antivirus product. Find out what's new in the most recent MSE 4.0 release, and if it's the right internet security solution for you...

...

Warning: You Could Lose Your Internet Access!

Several hundred thousand computers (both PC and Mac) may soon lose access to the Internet, if they're not cleansed of a malware infection known as DNSChanger. The FBI has kept these infected machines alive since last November, but this life-support system will be unplugged soon. Here's the story and how you can avoid this potential catastrophe...

...

WPS Security Flaw: Are You Vulnerable?

Last summer I wrote about a family in Minnesota that was terrorized by a neighbor who had hacked into their wifi. Fortunately, that guy is spending the next 18 years in prison, but there's a newly discovered wifi security threat that may affect you. If your wireless router uses the WPS security method, you could be affected. Is your home or office computer at risk? Read on to find out...

...

The Missing Link in Computer Security

Is your computer really secure? If you have antivirus software, malware scanners and a firewall, you might think you're safe from hackers, crackers and identity thieves. But chances are, you're missing one critical piece of the security puzzle. Read on to learn how to secure your software and truly lock down your computer...

...

Wifi Sidejacking: Are You Vulnerable?

A Firefox add-on named Firesheep ignited a firestorm of controversy when it was released in October 2010. Firesheep demonstrated a hacking technique known as sidejacking, or wifi session hijacking. Sidejacking is not a form of malware, so your anti-virus software can't protect you. But if you're aware of the problem, and you know what extra steps you should take when using wifi, you needn't worry. Read on and learn how to protect yourself from sidejacking when using a wifi connection...

...

Make Your Computer Indestructible With Deep Freeze

According to Faronics, their Deep Freeze software can make your computer indestructible. It does this by 'freezing' your software and settings, so your PC or Mac computer can be returned to a pristine state every time you start it up. Let's take a look at how Deep Freeze works, and find out if it's a good solution for you...

...

Warning, Danger: Botnets!

I've read warnings about my computer getting caught up in a botnet, but I don't really understand the danger. Can you explain in simple terms what a botnet is, how it would affect my computer, and how to avoid them?

...

Do Hackers and Spammers Get Away With It?

It may seem that the bad guys have free rein on the Internet. The flood of spam never seems to slow, and everyone knows someone who was hacked recently. Identity theft is rampant, and phishing scams continue, despite all the attention focused on this problem. Why can't the cops put these cyber criminals out of business once and for all?

...

Sync Your Passwords on Windows, Mac and Smartphones

How can I store and sync my passwords, so they will be available to me everywhere? I've got a PC and a Mac in my home, and I carry a laptop and smartphone as well. Is there a single password manager that will sync across all my desktops, browsers, and mobile devices?

...

Ten Steps to Securing Your New PC

I just bought a new computer, and I want to make sure I've got all the security bases covered before I go any further. My last computer was ruined by viruses, and I don't want that to happen again. What steps to you recommend to make sure it's as secure as possible?

...

Free Firewall Protection

Everyone says that if you have an Internet connection, you should have a firewall. But can I use a free firewall, or should I pay for one of the commercially available firewall packages?

...

Beware the Fedex Shipment Notification Scam

Recently, I received an email, apparently from Federal Express, advising me that a package I shipped had been delivered. That surprised me, because I didn't recall shipping any packages via FedEx lately. Read on to learn about the package delivery scam, and how to avoid it…

...

Do I Still Need Anti-Spyware Protection?

Do we still need both anti-virus and anti-spyware protection? I've always been told that, but I use Norton AntiVirus 2012, which claims to handle viruses, spyware and other threats. Is this sufficient, or should I still download an anti-spyware tool?

...

What is Cloud-Based Antivirus?

What is cloud antivirus? I've heard about a new kind of security software that runs in the cloud, instead of on my computer. Can you explain what this means, and if I should consider this as a replacement or addition to my existing anti-virus protection?

...

Do You Need a Link Scanner?

Are link scanners effective at detecting malware before you click? I have children in the house, and it seems they will click on almost anything. Please let me know if you think adding a link scanner to my security arsenal be a good move, and if there are any downsides.

...

Virus Alert: Fake Anti-Virus and Celebrity Scams

Recently I got a popup warning me that a virus had infected my computer, and I needed to download some antivirus program to get rid of it. I did so, and later discovered it was a very slick FAKE security tool that really messed things up. How can I avoid fake antivirus programs in the future?

...

Free Anti-Virus Programs

I've been using the free Norton antivirus package that came with my computer, but the subscription will expire in a few days. Are the free anti-virus programs any good? What do you recommend?

...

AVG Internet Security 2012 - Review

The latest version of AVG's anti-virus and internet security software has arrived. And just as in the automobile world, their 2012 release is several months early. But is AVG ahead of their time, or have they ventured too far? Read my review of AVG 2012 to see what's new, and my take on the pros and cons of this release...

...

How To Defeat a Keylogger

It's a fact that many malware infections result in a vulnerability to keystroke logging, which can compromise your privacy and lead to identity theft. Learn more about keyloggers, how they work, and how to defend yourself from this growing threat...

...

Traditional Anti-Virus May No Longer Protect You

I use Norton Anti-Virus, and am pretty careful about where I go online. But recently I got a virus, apparently just by visiting an infected website. I'm left wondering if I need some other form of protection to supplement or replace my anti-virus software. What do you suggest?

...

Personal VPNs for Anonymous Web Surfing

Who is watching when you travel the information highway? Your Internet Service Provider, hackers, even your government could possibly be monitoring your every move and transaction online. Personal VPN services offer a solution...

...

How I Got Hacked... And Why You MUST Have a Backup!

Last week I heard from a friend who thought she might have been infected by a virus. When she visited her own website, it was redirecting her to another web address. It sounded like a simple Javascript redirect, so I assumed it would be safe to visit her site and see where the problem was. Turns out that was a BIG mistake! Find out what happened to my computer, and how I finally managed to recover from the damage...

...

Do I Really Need a Firewall?

I've heard conflicting reports on whether or not I should be using a firewall. Some people say they are only needed for dialup users. Others say you MUST have a firewall if you have a high-speed DSL or cable connection. Can you give me some advice on this?

...

Is Your Operating System Secure?

Is your operating system as secure as you can make it? A lot of people fail to take the simplest step to ensure that they have the best protection against malware and hackers that their Windows operating system can provide. Can you guess what they're missing...?

...

Do I REALLY Need Antivirus Software?

I've used antivirus software for years, and it's never found a virus. I get the feeling that it's only slowing down my computer and costing me money, for no apparent benefit. Do I really need antivirus software?

...

Why Did My Computer Get a Virus?

For the third time this month, my computer has been infected with a virus. My wife and kids swear they didn't click on anything suspicious. I have anti-virus protection, so how does this happen? Also, any insights for prevention would be appreciated.

...

More Paid Antivirus Programs

A number of readers commented on last week's Best Paid Antivirus Programs article. Most of them were saying, in effect, You forgot mine! Any short list of a half-dozen programs is going to leave out some worthy contenders. Here are some readers' favorite paid antivirus programs, and my comments on each...

...

Is Your Webcam Spying On You?

Someone may be spying on you via your computer's Web camera. It's an old hacker trick, dating back to the late 1990s. But don't worry, such attacks are relatively rare. Here's how to tell if your webcam is being used by someone else, and security steps to minimize this risk...

...

Best Paid Anti-Virus Programs

My computer came with a free trial of the anti-virus software, and now it's nagging me to pay $49 to renew. Should I pay the ransom, or go with a free anti-virus program?

...

How Often Should I Change My Password?

A password is like a combination lock on your computer, Internet connection, or an online account such as Facebook or a financial institution. Depending on how careful you are in keeping the password secret, it should prevent unauthorized access indefinitely. But that's not how the real world works. There are many ways a password can fall into the wrong hands...

...

What is Microsoft System Sweeper?

Yesterday, a friend told me about Microsoft System Sweeper, and recommended that I download it. I currently have McAfee anti-virus and spyware protection. What exactly does the new System Sweeper tool offer, and do really need it?

...

Should Unsafe Users Be Quarantined?

It's illegal to drive an unsafe motor vehicle on public highways. The reason is obvious: a broken-down car poses a danger not only to its driver (and passengers) but also to everyone else it passes on the road. Why shouldn't the same rationale apply to unsafe computers (and their users) on the information highway?

...

What To Do When Your AntiVirus Fails

Your trusty antivirus software found a virus on your system, but it can't remove the infection, even after multiple scans, removal attempts, and system restarts. Now what do you do?

...

Virus Checker For Downloads

It's good to scan your system for viruses regularly. It's better to use an antivirus program that offers real-time protection by scanning incoming files as you download them. But wouldn't it be best if you could scan a file for viruses before you started downloading it? Several free tools let you do just that...

...

Is Your Security Software Working?

You prudently downloaded a comprehensive security suite, installed it, and now your computer is protected from all online threats. Right? How can you know for sure that the security software is working? Here are some tips to test your security software...

...

Microsoft Safety Scanner

On April 14, 2011, Microsoft released a free malware detection tool called Microsoft Safety Scanner. It scans your computer for viruses, spyware, rootkits, and other forms of malware. Read on to learn more about the scanner, and if you should be using it...

...

Is the Internet Getting Safer?

About 30 per cent of Americans say they sometimes avoid using the Internet for fear of falling victims to identity thieves, scams, computer viruses, and other dangers lurking online. Are they right to be afraid, or has the Internet become safer over time? It's hard to say, but here are some stats to consider, and some tips for staying safe...

...

Scammed on Craigslist!

Craigslist, the free local classified ads service, is a popular way to buy, sell, and trade goods or services. It's also used as a dating service, a job-hunting and recruiting tool, and much more. But if you're not careful, you could end up scammed by someone you meet on Craigslist...

...

Malicious PDF Files

I got a warning from a co-worker about viruses in PDF files. I always thought that you could only get a virus from a program file, and PDFs are just for viewing. Am I right, or can you really get infected by a malicious PDF file?

...

Dump Norton and McAfee Anti-Virus?

I got a new computer and my friend is telling me that the first thing I should do is remove the Norton antivirus software that came with it. He calls it 'bloatware' and recommends some free program instead. I've always used Norton or McAfee for security, so I'm nervous about switching. What is your opinion?

...

Top Malware Threats for 2011

The digital ecosphere is evolving at an ever-increasing pace, including the dangerous parts. The year 2011 will see new malware threats and security exploits attacking people in alarming new ways, according to security analysts. Here are some of the depressing statistics and trends to watch out for in 2011…

...

Java Security Vulnerabilities

I keep getting warnings on my screen that I need a Java software update, but I'm not sure if this is safe to do, or if I really need it. Will I be more vulnerable to security threats if I keep ignoring these popups?

...

Has Your Wireless Router Been Hacked?

Malcolm Riddell was a tech-savvy guy who lived on the 12th floor of a building where most of his neighbors were retired seniors. He figured he didn't need a password on his wireless router. But after an unexpected visit from the FBI, he changed his mind. Here's what you need to know to keep hackers from using your wireless Internet connection...

...

Microsoft Security Essentials 2

Microsoft Security Essentials (MSE) is a free anti-malware program. It protects against viruses, spyware, rootkits, and even brand-new threats reported in real-time by computers running all over the world. Can MSE replace your existing Internet security software? Take a look at the features in MSE Version 2, and see if it's right for you...

...

What is Crimeware?

Imagine if, for only $3000, you could buy the role of a crime lord whose millions of minions obediently and constantly funnel money to you. Now imagine that anyone can. Finally, understand this is not fantasy, and you might become very scared. Learn more about crimeware, and how to protect yourself...

...

Remove Phone Listing

I just did a search for my phone number on Google and was shocked at the results that popped up. It showed my full name, street address and a map of my neighborhood with a big arrow pointing to my house! One more click and it showed a satellite photo of my house. I could see the car in the driveway and the dog in the back yard. How can I remove my personal information from Google and other online phone directories?

...

Best Internet Filtering Software

There are lots of websites and other things out there on the Internet that you don't want to see. There are many more that you don't want your children to see. If you run a business that used the Internet, there are things you don't want employees to see, or do. What's the best Internet filtering software for your situation?

...

Phishing - Are You Protected?

Phishing or phish emails are attempts to trick you into giving sensitive personal information to bad guys who are impersonating someone you trust. A phishing attempt may direct you to respond to it via email, or to a Web site that demands information, or to a phone number that talks you out of your identity. Here's what you need to know about phishing protection...

...

Microsoft Security Essentials - Good Enough?

Microsoft Security Essentials is a free anti-malware application first released in June, 2009. It replaces the subscription-based Windows Live OneCare antivirus service and the free Windows Defender, which only protected against spyware and adware. Does this all-in-one security tool provide enough protection? Let's find out...

...

Latest Phishing Scams

Phishing is the hacker's sport of fishing for gullible victims who will click on anything, and is an ever-evolving enterprise. The bad guys are constantly coming up with new bait that looks, smells, and tastes almost exactly like the real thing. But if you bite and click on that email or URL, you may get your identity stolen; your computer may be enslaved by a spammer's botnet; or you could download a virus without knowing it. So it's a good idea to be aware of the latest trends in phishing and the most widespread snares.

...

Free Online Virus Scanners

Even when you're not looking for an online virus scanner, ads for them appear on many Web sites. Sometimes, a free virus scanner appears to pop up out of nowhere and scares you with a message like Alert! Your PC may be infected! What should you do? Read on...

...

MalwareBytes Anti-Malware

I'm the goto geek for my friends, and I just want to mention that MalwareBytes Anti-Malware (MBAM) has helped me on many occasions when other anti-virus and anti-spyware apps failed to prevent or fix a malware problem. You'd be doing your readers a service to recommend this free security tool.

...

Digital Signatures

Your handwritten signature is a legal instrument that verifies the authenticity of a document, or your acceptance of and agreement to the terms of a contract. But you need something tangible to write upon, don't you? A signature must be affixed to a piece of paper, a bit of tree bark, a clay tablet, a stone, something you can lay your hands upon. How can you sign something in a paperless, digital world?

...

Credit Card Safety Online

It's the age of e-commerce. Millions of people spend billions of dollars online every day. And the usual method of payment is a credit card. Some people hesitate to provide their credit card numbers to e-commerce sites for various reasons. Do these concerns have merit? Is it safe to use credit cards for online purchases? Let's find out...

...

Has Your Computer Been Hijacked?

Computer hijacking happens when someone snatches control of your computer and makes it do his evil bidding. This is bad not only for the owner of the computer but also for the millions of Internet users against which the hijacked machine is used. Here's how to defend yourself against computer hijacking...

...

Internet Security Suites

I recently got a new computer, and the free trial of McAfee antivirus is about to expire. I've been looking at Internet Security Suites, but there are so many options and features that my head is spinning. What should I look for in an Internet security suite, and which one do you recommend?

...

Malicious Software Removal Tool

I already have a firewall, anti-virus, and anti-spyware protection. Do I really need the Malicious Software Removal Tool that Microsoft is recommending for me to download?

...

Does PCTools Threatfire Boost Security?

I've seen magazine ads for a security tool called PCTools ThreatFire, but I don't quite understand what it's supposed to do. Will it replace my anti-virus software, or do I need both?

...

Windows Password Reset

I changed my Windows login password yesterday, and now I can't remember it! Is there any way to reset the windows password, so I can regain access to my computer?

...

Microsoft Security Essentials

I just read something about a new security tool from Microsoft, that's supposed to be better than Windows Defender, which I use now. What is your recommendation?

...

Secure Your Software

Is your computer really secure? If you have antivirus software, malware scanners and a firewall, you might think you'e safe from hackers, crackers and identity thieves. But chances are, you're missing one critical piece of the security puzzle. Read on to learn how to secure your software and truly lock down your computer...

...

ATM Scams

Automated teller machines (ATMs) have been around for a few decades, and ATM scammers have been on the prowl for almost as long. Today most people use ATMs to do at least some of their banking, leaving millions of people and millions of dollars at risk. Learn more about ATM scams and how to protect yourself...

...

Securing Your Router

Your router is the box that feeds your high-speed internet connection into your computer. But is it also an open door to hackers, crackers and wifi moochers? Learn how to secure your router…

...

Free AntiSpyware Programs

Everyone seems to recommend a different free antispyware program. Which is the best for protecting me against spyware?

...

What is Scareware?

I've heard of software, shareware, freeware and malware. And I think I know what all those things are. But what exactly is scareware?

...

Phishing Scams

I got a note from my bank about phishing scams, but I'm still not sure what it means. Can you explain in simple terms what phishing is all about?

...

Avira Free Anti-Virus

I'm confused by all the free antivirus products. I've read in some forums that Avira is the best, others claim that AVG or Avast is definitely the way to go. Which one do you recommend?

...

Avast Free Anti-Virus

It seems there are lots of choices for a free anti-virus program. My neighbor swears by Avast! Anti-Virus and says it's better than Avira, which I currently use. Is Avast! worth looking into, or are they all pretty much the same?

...

Internet Security Cameras

I have someone in my home during the day to clean and do childcare. Can I install a wireless security camera that can be monitored over the internet? I'd like to be able to look in during the day from my office computer. If so, how expensive are internet security cameras, and what features do you recommend?

...

Malware Scanners

There are so many malware scanners to choose from, when trying to protect against adware, spyware and other online threats. Which one(s) do you recommend?

...

AVG Review

Is your computer safe from viruses? Without the proper protection, your computer can catch a virus faster than you can recite your email address three times. Viruses can destroy files, compromise your privacy, and make you vulnerable to identity theft. What to do?

...

What is a Botnet?

I've read warnings about getting caught up in a botnet, but I still don't understand the danger. Can you explain in simple terms what a botnet is, and how to avoid them?

...

Password Protection for Windows XP

How can I password protect a file on my Windows XP system? I want to add a password so that nobody can open the file without knowing the password. I tried the Sharing and Security option, but there was no place to enter a password. There must be a way...

...

Remembering Passwords

Passwords... we have a love/hate relationship with them. We love them because they are the first line of defense against fraud and identity theft. They protect the security of our email account, online banking and credit card purchases. We hate them because as we use passwords for almost every important activity on the internet, it becomes nearly impossible to remember all the usernames and the passwords that we have created. Fortunately there are tools to make the job easier...

...

Is Firefox More Secure?

Is Firefox more secure than Internet Explorer? Perhaps, for now, but they seem to be catching up in terms of the numbers of critical flaws discovered. And if you're running Windows Vista, the Firefox security problem gets worse...

...

Hide Your SSID?

I have a wireless network at home, which lets me get an internet connection on my laptop all over the house. But I'm concerned that neighbors or people driving by can hack into my computer. A friend said that hiding my SSID will solve the problem. What's a wireless SSID, how do I hide it, and will it help?

...

Too Many Spyware Scanners?

I downloaded a spyware scanner, which detected many problems. I then had to pay for the software to fix all the problems, which I did. But... since then my computer crashes often and I cannot get into some web sites. I use Windows XP/SP2, Norton AV 2006, Pest Patol, A2Square, Spyweeper, Spybot, Ad-Aware SE, and others. What should I do?

...

Spyware or Virus?

I had an anti virus program by McAfee but uninstalled because it was bogging my computer down. I now have anti spyware software, so do I still need to get an anti virus program? What is the difference between viruses and spyware? To me they seem very similar...

...

Secure Your Computer!

Cyberspace malefactors are enslaving millions of unsecured computers into zombie networks that are responsible for spewing out mountains of spam and attacking legitimate websites that oppose the spammers. Is your PC part of the problem? Find out now...

...

What is LSASS?

When I run Task Manager, I see a process named lsass.exe that is active. I'm worried that this might be a virus... should I get rid of it?

...

Identity Theft

Remember that 1995 movie The Net, starring Sandra Bullock? Okay, I didn't see it either. Somehow I couldn't imagine Sandra as a software engineer after watching her in While You Were Sleeping. But I digress... the movie was a story about a growing problem today -- identity theft. Read on to learn how it happens, and try my 12-step program to protect yourself.

...

Wireless Security

Is it safe to use wireless Internet access in my home? I've heard that neighbors or even people driving by can tap in to my wireless signal. There must be a way to do it safely, since it's so common these days. Got any tips on wireless security?

...

Windows XP Security Tips

Some of my geeky friends are telling me that Windows XP is full of security holes, and that I am putting my privacy at risk by going online with a Windows PC. Can you offer some tips to help me lock down my desktop?

...

Cannot Access Secure Sites

I have Windows XP SP2, and within the past two weeks I have not been able to get into any secure (https) sites. I can get to the web page, but when I enter my userid and password, it says The page cannot be displayed -- can you help?

...

Paypal and Ebay Phishing Scams

I keep getting warnings and alerts from Paypal, eBay, my bank, and various other banks and financial institutions that I don't even have accounts with, all telling me to log in and verify my account information. I've read about something called phishing and am wondering if that's what these messages actually are?

...

Is FTP Secure?

I got a warning that FTP was not secure any more and that I should go to WinSCP for a fix. I am not very tech-savvy, so I depend on you to keep my computer healthy. So - is this something I should do? And if you're wondering how an idiot like me can have a website to ftp to, all my younger relatives help me.

...

Whois Registry Database

I'm wondering about the possible vulnerability of having your personal information (name, address, phone, and email) visible on the Whois website registrant database. Some companies sell proxy services that shield this information from the public claiming it helps prevent identity theft. Are they just trying to scare people into a sale, or are there legitimate security concerns having your info visible in the database?

...


Copyright © - by - All Rights Reserved
About Us     Privacy Policy