Shopping online is a normal routine for many people.
Trying to steal your info is also normal routine for criminal mind.
Read how you can stay safe when shopping online.
Article provided courtesy of https://www.securingthehuman.org/
To remove malware isn’t as easy as preventing it in the first place. Imagine that the door to a large factory is open and a sewer rat gets in.
Keeping him out was one thing, but to find him after he is in your building is difficult. Where will he go? Where can he hide? See the problem?
Malware is also able to hide in many different locations on your computer. It will seldom show up as a program that you can remove using “Add/Remove Programs” or “Programs and Features”.
It may only exist in the registry, which makes it very difficult to remove malware. But nonetheless, it is there, and may be slowing down your computer, or even gathering personal information.
These can appear in your mailbox disguised as a legitimate fax from a reputable company, in this case Xerox. . In fact, the link to Xerox is valid and will send you to their website. However, the same cannot be said about the attachment. Although innocent looking, it may contain dangerous zip files. A zip file can be used to get past email filters that will not allow an executable file to be delivered. This can properly be used to send a legitimate file to someone.
What are the clues that indicate that this email may contain dangerous zip files? Continue reading Don’t Unzip Dangerous Zip Files
This is an example of a phishing email. It came with an attached ZIP file which as you see below claims to contain a key change to your credit report, but will no doubt contain malicious code. The usual purpose of this a phishing email is to either get your personal information or install a rogue program on your computer.
A warning from Experian is here. Also note that the attachment may not be picked up by malware or anti-virus scanners, but that doesn’t mean it is safe,SO DON’T OPEN IT!
A phishing email can be very well disguised. The corporate logos can be found and copied and email links can appear to be from the company, but lead to the phishing site.
Always be cautious and realize that legitimate companies will not ask for personal information, nor will they supply a link in an email, but rather ask you to log into their site directly from your browser and check your account.
If you receive an unexpected email with an attachment be very suspicious.
|This email was sent because it contains important information about your account. Please note that if you have previously unsubscribed from Experian.com, you will no longer receive newsletters or special offers. However, you will continue to receive email notifications regarding your account. To ensure that you’ll receive emails from us, please add email@example.com to your address book.|
|*If it has been less than thirty days since you joined Experian.com, your monthly credit statement includes your information for the period of time you have been enrolled.|
Here is a list of security software and other great programs that I use both for daily operation of my computer and for troubleshooting problems.
Keep checking this post as it will be expanded over time.
How would you feel if your best friend turned on you? If email is your best friend you better know how to deal with it. Otherwise you could end up being betrayed. February Ouch! Newsletter teaches you how to avoid the pitfalls of email phishing attacks.
To view this newsletter in a different language, click here.
Public Wifi is available in many of our favourite coffee shops and restaurants. You may be greeted with a sign, “Free WiFi”. That is a convenient service that lets us check our email or surf the web while we eat or have a drink. But what surfing can you safely do there? Continue reading Public WiFi – Convenient – But safe and secure?
What is Java? Why is it on your computer and do you need it? Read about living safely with Java, or living wihout it, in January Ouch! Newsletter.
Links to other languages are available here:
1) Something you did.
2) Something you ALLOWED someone to do.
3) Hardware issues. Continue reading Computer Problems – Sources and Solutions
Many thanks to SANS for their great tips. Many are not just about how you use your equipment, but what you do with it when you are not actually computing or talking on your phone. Hope you benefit from these great tips.