The modern malware landscape is huge, and it’s growing more and more sophisticated every day. In one of our previous blog posts, we discussed the different types of malware, their infection mechanisms and how they act within a system. Currently, there is one category of malware that is becoming increasingly more popular called “ransomware.” In this blog post, we will discuss what ransomware is and what strategies and techniques are used in creating and propagating this latest trend in internet crime.
Continue reading “All You Need To Know About Ransomware”
Over the past few decades, computer security has become an important concern among users. Security vendors have faced tremendous challenges dealing with complex security threats with IT experts placing more effort on educating people. Nevertheless, there are many computer security myths that exist today and surprisingly, many people still believe them. In this blog post, we’ll reveal a few of the most common malware myths and the misconceptions that can put you at risk.
Continue reading “6 Common Myths and Misconceptions About Malware”
In today’s world of ever-increasing digital crimes, cyber-attacks, and Internet frauds, there is nothing more important than protecting your online accounts and identity. We have been using “Username” and “Password” as an integral part of computer security systems from the beginning, but they are no longer enough to thwart cybercriminals. In order to provide us better security against cyber-attacks, a new form of authentication called “two-factor authentication” (2FA) is being used by several major tech players and banks, and many others are in process of implementing it as well.
Continue reading “Two Factor Authentication – What’s It All About?”
When we talk about network security, security risks associated with routers is a major concern among users. A router, whether it’s wired or wireless, is an integral part of any home or business network. However, wireless routers or Wi-Fi routers are considered to be less secure than wired ones, but that doesn’t necessarily mean you should avoid wireless networks. In fact, wireless networks have many advantages over wired networks. If your wireless router is configured correctly, it can be virtually as secure as a wired setup.
Continue reading “Why Wireless Router/Gateway Security Is So Important As Part Of Your Security System”
How to be Safe from Phishing Today!
In today’s increasingly technology-driven world, the Internet plays a large role in spreading information. There are however things that people need to be aware of when using the Internet, such as cybercriminals, who misuse the Internet to carry out their criminal phishing attacks. They set out to deceive users into revealing their sensitive information unknowingly which can result in substantial financial loss.
Phishing attacks are one of the most serious problems that users face on the Internet and has been growing at an alarming rate. According to a reportpublished by EMC Corporation, the total number of phishing attacks launched in 2012 was 59% higher than in 2011.The global financial loss from phishing attacks is estimated to be around $1.5 billion in 2012, representing a 22% increase from 2011.
Continue reading “How to be Safe from Phishing”
Back in January of this year, the United States Department of Homeland Security advised PC users to disable Java from their web browsers following the serious zero-day vulnerabilities discovered in Java. In response, Oracle released an emergency Java patch, but the fix was not meant to patch all the critical vulnerabilities.
Staying protected against Java exploits is a rising concern among millions of Windows®, Mac OS®, and Linux® users. What makes this exploit such a big deal is the fact that Java runs on more than 850 million personal computers and on billions of devices worldwide, including mobile devices and TVs1.
Continue reading “Is It Time To Disable Java™?”
Many PC users consider malware, viruses, spyware, adware, worms, Trojans, etc. as the same thing. While all these infections harm our computers, they are not the same. They are all types of malicious software that each behave differently.
Continue reading “Malware, Spyware, Virus, Worm, etc… What’s the Difference?”
SUPERAntiSpyware Warns Users to Expect Many New Spyware Infections the First Week of April
April Fool’s Day typically brings an increase in spyware and malware infections. SUPERAntiSpyware provides some useful tips to avoid getting infected.
Read the full media release here…
I had a friend call me last night to tell me that his computer was infected after he did “nothing” – typical 🙂 After a little investigation I found out that he was searching for a post fight interview from UFC 100 for a fighter named “Michael Bisping” who was knocked out by Dan “Hendo” Henderson. He found a nice link on Google that led to the following series of events (don’t try this at home!):
Video site indicating they have the video….
Now just click to watch the video…..
SUPERAntiSpyware Scan after attempting to watch video….
As you can see these links are floating around Google, Yahoo and MSN. Remember, think before you click!
If you have come across these types of situations, it’s a good idea to scan with SUPERAntiSpyware to make sure your system is clean!
UPS Tracking Fake E-Mails
We are seeing an upswing in the E-Card and Fake UPS Tracking # E-Mails. Unzipping and running these will of course lead to an infection. As we receive these in our labs we install them to ensure we remove all traces and block the installers.
Always pay attention to what you are opening! We receive many support requests each day from users who fall victim to these types of e-mails.
Sample fake UPS Tracking E-Mail :