Malware is everywhere. You can get infected by opening up a rigged attachment in your email, or by visiting a booby-trapped website that automatically downloads malware on to your computer. Once infected, your computer can turn into a zombie, being remotely controlled by criminals to attack other computers. Criminals may steal your personal data or use your computer for nefarious activity.
While you need to take precautions to prevent getting infected in the first place, such as running an up-to-date security software, it’s also important to know how malware works and how they spread. There is a lot of misinformation out there, so here are some of the myths about malware you shouldn’t believe.
Continue Reading… Five Myths About Malware You Need to Know
- March 19th, 2014
- 14 Comments
The clock is ticking for Windows XP holdouts. Microsoft has announced that official support for Windows XP and Office 2003 ends on April 8, 2014, and users are urged to switch to a more modern operating system.
Ending support means Microsoft will no longer be releasing patches to fix vulnerabilities in the software. Even if serious issues are later found in XP or Office 2003, or if attackers target previously unknown bugs, Microsoft will not be releasing any updates after April to address them. The last update for Windows XP will be released as part of Microsoft’s April Patch Tuesday, on April 8, 2014.
Continue Reading… The End of Windows XP is Near: Here’s What to Expect
- March 12th, 2014
- No Comments
More and more people are beginning to use cryptocurrency, such as Bitcoin, and more businesses are beginning to accept it. The growing popularity, however, means thieves are also increasingly interested in stealing it.
Cryptocurrency is a digital currency. There is nothing physical—no coins or dollar bills—and it is generated (“mined”) by computers performing complex mathematical calculations. Bitcoin is perhaps the most well-known digital currency currently available, but there are plenty of others, including dogecoin, mazacoin, megacoin, and even solarcoin.
Continue Reading… Bitcoins: What You Need to Know About Securing Digital Currency
- March 5th, 2014
- 4 Comments
Online Privacy, PC security
It’s exciting to see a Friend Request at the top of your Facebook page. You’re likely to accept Friend Requests without thinking twice, especially if it’s a friend or a name you recognize. You may even be thinking that there’s no real harm in accepting all Friend Requests that come your way. Having more friends means you’re more popular…right?
Continue Reading… Don’t Be Too Quick to Accept That Friend Request!
- February 27th, 2014
- 5 Comments
It’s a common enough scenario, and familiar to most: When typing a URL in the Web browser’s address bar, you accidentally mistype the name. You may type ctibank.com instead of citibank.com, gacebook.com instead of facebook.com, or the ever popular gooogle.com instead of google.com.
The page at the wrong address is an example of typosquatting, where scammers register domains with names that are similar to legitimate sites. The owner of the site benefits from the fact that the user mistyped the name, whether by displaying ads and links, setting up fake storefronts, or tricking users with phishing pages.
Continue Reading.. Typosquatting: How Spelling Errors Could Lead to Scams