background preloader

Malware & Threats

Facebook Twitter

How to secure your PC in 10 easy steps - CNET. There's one thing you can do to avoid being the victim of identity theft: follow this 10-step PC security plan.

How to secure your PC in 10 easy steps - CNET

Encrypt your network connection Most popular sites offer HTTPS connections at least some of the time. In Gmail, click the gear icon in the top-right corner and select "Always use https" under the General tab. To select Facebook's HTTPS setting, click the down arrow in the top-right corner and choose Account settings. Select Security in the left pane and Edit in the Secure Browsing section of the main window. Check "Browse Facebook on a secure connection (https) when possible" and click Save Changes to activate the feature. The Electronic Frontier Foundation's HTTPS Everywhere extension for Firefox doesn't encrypt every page you browse to, but it automatically requests an encrypted connection for those sites that support HTTPS and that have been added to the program's rules.

After you install HTTPS Everywhere, the extension's icon appears in the top-right corner of Firefox. Protect Yourself from Malware. Free Computer Protection. 10 Ways To Protect Yourself From Identity Theft. 10 Ways To Protect Yourself From Identity Theft Shielding your private information with no risk of a breakdown may be impossible these days.

10 Ways To Protect Yourself From Identity Theft

But there are some simple ways to protect you from becoming a victim of Identity Theft. The Houston Police Department is providing these simple, but very important, tips to protect you and your name. 1. Destroy private records and statements. 2. 3. 4. 5. 6. 7. How Do I Protect Myself Against Malware? The best way to deal with a malware attack is to avoid getting infected in the first place.

How Do I Protect Myself Against Malware?

This can be a difficult feat if your adversary has access to zero day attacks—attacks that exploit a previously-unknown vulnerability in a computer application. Think of your computer as a fortress; a zero day would be a hidden secret entrance that you do not know about, but which an attacker has discovered. There are many ways in which an attacker might try to trick you into installing malware on your computer. For example, in Syria, pro-Assad hackers targeted members of the opposition with malware hidden in fake revolutionary documents and a fake anti-hacking tool.

The best way to avoid being infected with this kind of targeted malware is to avoid opening the documents and installing the malware in the first place. How can I protect my Windows PC against malware? I have just ordered a Windows PC based on your recommendation, and now ask for your advice on anti-spyware and virus protection software for it.

How can I protect my Windows PC against malware?

Any help you could offer me would be greatly appreciated. Mary Mass-market malware is a numbers game, played mostly with familiar off-the-shelf exploit kits (EKs). Most of the victims are people who don't install updates to plug security holes not just in Windows but also in Oracle's Java, Adobe Flash, Adobe Reader, and other widely-used programs.

They're people who either don't run anti-virus software and firewalls, or don't keep virus signatures up to date. I ran into one yesterday when the Labour party press team unintentionally ("we were hacked") tweeted a link to an owl video that wanted me to install a "Flash update" that contained viruses. Just doing the right things is usually enough to keep more than 98% of Windows PCs malware free, barring accidents. How to Tell if your Cell Phone is Being Tracked, Tapped or Monitored by Spy Software - SpyzRus.net. There are a few signs that may help you find out if your cell phone has spy software installed and that it is being tracked, tapped or monitored in some way.

How to Tell if your Cell Phone is Being Tracked, Tapped or Monitored by Spy Software - SpyzRus.net

Quite often these signs can be quite subtle but when you know what to look out for, you can sometimes find out if your cell phone is being spied on. This article series will deal with How to Find installed Spy Phone Software and then How to Remove Spy Software followed by How to Secure your Cell Phone. This guide should help for all types of Smartphone including Android and for the iPhone there are a few extra tips. It seems that almost everyone is obsessed with cell phones, from young kids’ right through to the elderly. Babies seem to be the only ones missing out so far! I know that it might seem strange to younger readers, but back in the day, cell phones were only used to make phone calls (often quite unreliably). Is Your Mobile Phone Being Monitored? Spy software apps. FDIC: Safe Internet Banking. Tips for Safe Banking Over the Internet As use of the Internet continues to expand, more banks and thrifts are using the Web to offer products and services or otherwise enhance communications with consumers.

FDIC: Safe Internet Banking

The Internet offers the potential for safe, convenient new ways to shop for financial services and conduct banking business, any day, any time. However, safe banking online involves making good choices - decisions that will help you avoid costly surprises or even scams. This brochure offers information and tips to help you if you are thinking about or already using online banking systems.