background preloader

How to Protect Your Computer from Hackers, Spyware and Viruses

How to Protect Your Computer from Hackers, Spyware and Viruses
This article has been inspired by a situation I ran into while visiting a cousin in India. Since I’m in the IT field, she asked me to take a look at her computer since it was acting “funny”. The “funny” part was that the computer would automatically restart whenever you tried to install ANY software onto it or download any program from the Internet. The first thing I noticed was that there was no anti-virus software installed on the computer, so my first goal was to install an anti-virus program and check for viruses. But of course, the virus that was already on the computer would not let me install or download anything! Smart virus! Most of the viruses on the computer were hidden in files that had been downloaded off the Internet: songs, videos, and movies. This is by no means a comprehensive list, so if you have any suggestions, please feel free to comment and I’ll add them on! 1. Avira – Avira has a free version that was ranked #3 in 2014 for detecting viruses. 2. 3. 4. 5. 6. 7. 8. 9.

http://www.online-tech-tips.com/computer-tips/how-to-protect-your-computer-from-hackers-spyware-and-viruses/

Related:  ThreatsMalware, Viruses, Spyware, Digital Terrorism and Staying SafeInternet HackingWeek 6viruses, malware, digital terrorism

TOP Spy Cell Phone Software Reviews. Before you select Cell Phone Spy Software you should learn what exactly it is used for and how it works on a target mobile device. Make sure you study the popular cell phone tracking applications reviews we provide to make a conscious choice of the spy software. Don’t forget there are online companies that misinform their clients with the aim of getting higher profits. 10 Ways To Protect Yourself From Identity Theft 10 Ways To Protect Yourself From Identity Theft Shielding your private information with no risk of a breakdown may be impossible these days. But there are some simple ways to protect you from becoming a victim of Identity Theft. The Houston Police Department is providing these simple, but very important, tips to protect you and your name. 1.

The Five Biggest Threats to Your Kids’ Privacy, and What You Can Do About Them Remember back in school, when your teachers warned that everything you did would go on your permanent record? It turns out your teachers have become right. That permanent record is the Internet. It’s hard to be a fully functioning adult in 2014 and not leave behind a digital trail. Now imagine how hard it is for your kids, who have never known a world where the net did not exist. FTC sees privacy threats in the 'Internet of Things' - Katy Bachman - POLITICO As consumers buy up fitness trackers, Internet-connected thermostats and even Web-enabled cars and toothbrushes, the Federal Trade Commission has a message: It’s watching. The agency is warning that as millions of new smart devices make people’s daily lives more convenient, they’re also collecting reams of personal information that raise new privacy and data security concerns. Story Continued Below

How can I protect my Windows PC against malware? I have just ordered a Windows PC based on your recommendation, and now ask for your advice on anti-spyware and virus protection software for it. Any help you could offer me would be greatly appreciated. Mary GameOver Zeus: Removal, detection and how you can protect yourself - News - Gadgets and Tech - The Independent The warning came after the FBI successfully disrupted a major cybercriminal network in the US from using the viruses to infect computers and steal data. GameOver Zeus, also known as P2PZeuS, was designed by Russia and Ukrainian gangs to find and harness computer files that give access to banking and financial information, while Cryptolocker encrypts all files on a target’s computer and demands the user pays around £300 to unlock the file. Almost 250,000 computers worldwide have been infected with CryptoLocker since it emerged in April and it has so far been used to extort payments of more than $27m (£16m), according to the FBI. Industry experts have been quick to back up the stern message from the National Crime Agency, whose advice to visit internet awareness group Get Safe Online's's website led to the site going down for 15 hours. Below are some methods experts recommend to protect yourself from GameOver Zeus and CryptoLocker, and remove it if you suspect you computer is infected.

Which nation-state is behind the sophisticated, stealthy Regin malware? Symantec Security Response has discovered a new malware called Regin which, they say, "...displays a degree of technical competence rarely seen and has been used in spying operations against governments, infrastructure operators, businesses, researchers, and private individuals." This back-door trojan has been in use, according to the security company, since at least 2008, and has stayed under the radar since. The level of quality and the amount of effort put into keeping it secret convinces Symantec that it is a primary cyberespionage tool of a nation state. Regin is a multi-stage attack, each stage but the first encrypted and none by themselves especially revealing about the overall attack. The picture only emerges when you have all five stages.

Lizard Squad Hackers Hit Xbox Live Despite promises to leave Microsoft's Xbox Live platform and Sony's PlayStation Network alone, hacker group "The Lizard Squad" is back. Late on Sunday, the hacker group tweeted a warning that Xbox Live would be next on their list of targets. Not one hour later, the hackers posted a series of tweets: "Xbox (360) Live #offline", "One more thing: Tell KimDotcom to take his vouchers and shove them up his fat a**", "XBL attack was done with the help of our associates from LNO: @LNOuNiTy @LNOVenom @Guidelines @we_are_lno", and "Haha "Xbox" is trending Worldwide. We're back :)" Reports of the outage were logged by users in the UK around 5 AM GMT on Monday, in line with the Lizard Squad's tweets.

Net Threats Experts say liberty online is challenged by nation-state crackdowns, surveillance, and pressures of commercialization of the Internet As Internet experts look to the future of the Web, they have a number of concerns. This is not to say they are pessimistic: The majority of respondents to this 2014 Future of the Internet canvassing say they hope that by 2025 there will not be significant changes for the worse and hindrances to the ways in which people get and share content online today.

Bank Hackers Steal Millions via Malware Photo PALO ALTO, Calif. — In late 2013, an A.T.M. in Kiev started dispensing cash at seemingly random times of day. No one had put in a card or touched a button. Cameras showed that the piles of money had been swept up by customers who appeared lucky to be there at the right moment. But when a Russian cybersecurity firm, Kaspersky Lab, was called to Ukraine to investigate, it discovered that the errant machine was the least of the bank’s problems. How Do I Protect Myself Against Malware? The best way to deal with a malware attack is to avoid getting infected in the first place. This can be a difficult feat if your adversary has access to zero day attacks—attacks that exploit a previously-unknown vulnerability in a computer application. Think of your computer as a fortress; a zero day would be a hidden secret entrance that you do not know about, but which an attacker has discovered.

Mobile Malware: Small Numbers, but Growing THE warning was dire: A small security company revealed a flaw in millions of smartphones that could allow dangerous software to masquerade as a legitimate app and seize control of a phone. The threat was a big conversation topic at this year’s Black Hat security conference. But after that, we didn’t hear much more about it. Why Everyone's to Blame for Identity Theft The other day a reporter asked me who’s to blame for the growing epidemic of identity-related tax fraud. I almost replied, “the government and the bad guys,” but I caught myself before committing to that inaccuracy. “We’re all to blame,” I said. I believe that breaches, and the identity theft that flows from them, have become the third certainty in life, right behind death and taxes. While it may seem like hyperbole, more than 1 billion consumer records containing some form of personally identifying information (PII) have been exposed to hackers, identity thieves and spies (forget, for the moment, the NSA) over the past 10 years. Anthem, the second largest healthcare insurer in the nation, recently joined the burgeoning list of mega corporations that have suffered massive data breaches.

Kishore, Aseem (2014). How to protect your computer from hackers, spyware and viruses. Retrieved from by estherpepin Mar 9

Related:  Week 6: Threats