Saturday, January 10, 2015

How to Avoid Getting a Computer Virus

First and foremost take your time: 


I know this is hard to do. But take your time and pay attention when installing any program on your computer. Look in the terms and conditions for third party app installs or similar. A lot of free applications are not really free they are paid for by advertisers who then install there malicious software along with the software you were intending to get for free.

Beware of misleading Pop-Ups: 


Some of the most nefarious popups on the internet are designed to mimic the look of legitimate anti-virus software. These popups attempt to trick the user into thinking their antivirus software has found an infection. When you click the popup, however, the adware is actually installed.
 Instead of clicking the warning, close the popup window and open the antivirus program on your computer. You most likely will not see any warnings. If you are still worried, run a scan using your installed software. Don't try clicking the "X" to close the popup window, as this will usually lead to more popups. Instead, use the Task Manager to get rid of it. (ctrl+alt+delete) Other popups may warn of an infection that only their software can fix. No legitimate antivirus company will advertise their product this way, so avoid clicking on any of these popups.
Check to ensure that your browser is configured to block popups.

Avoid clicking on everything


There are thousands of banner ads and popups on the internet that are designed to get your attention and make you click. Due to the way most modern browsers work, there are very few ways for you to get infected with something online UNLESS you click on it yourself. This means you should avoid clicking on banners for offers that are too good to be true.

Fake Torrents or websites That Need a Specific Video Player: 


Upon entering a website clicking a link or playing a video file you'll see a message that you need to download a new video player because it’s encoded specially or words to that effect. Don’t do it! There are great legitimate video players with every codec you'll ever need to play a video file. (EX: VLC Media player or Media Player Classic)


Create a guest or non Admin account: 


for the younger or non tech savvy it’s a good idea to have a guest account for them to use while on the web etc… It will limit their ability to do any major harm to your computer.


Email Trouble: 


Avoid emails that you don't recognize or that have been forwarded to you (especially with attachments). Email viruses can come from friends or family as it looks through there contact list and then forwards the emails out to all the users and then does the same to you and so on.

Hang Up on Cold-Calling Technical Support Agents: 


there has been a dramatic increase in the number of scam telephone calls from supposed Windows technical support agents. Here’s how it starts: A: Hi there, I’m from (indecipherable) and we've registered an error from your Windows Computer – have you been experiencing any issues with it lately? At this point, 90% of people will be thinking their Windows is broken and yes, of course they have been experiencing issues. You’ll then be walked through how to give this caller complete remote control access to your PC, where they perform some fake technical checks and try to get you to purchase a support contract.

Install an antivirus program if you don't have one already


An antivirus program will actively protect your computer from virus infections by scanning active programs and performing scheduled full-system scans. There are free antivirus programs that come with basic virus protection, such as AVG, Bitdefender, and Avast. You should only have one antivirus installed at a time in order to avoid conflicts between them. Make sure that your antivirus gets updated at least every week. Scan your computer at least weekly, more often if you are heavy internet user.

An antivirus program is not a foolproof system, and should not replace good browsing habits and common sense.

Wednesday, November 19, 2014

I think my computer has a Virus - Whats the difference between computer threats?

Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of executable codescripts, active content, and other software. Malware' is a general term used to refer to a variety of forms of hostile or intrusive software. Malware includes computer viruseswormstrojan horsesransomwarespywareadwarescareware, and other malicious programs. As of 2011 the majority of active malware threats were worms or trojans rather than viruses.


Computer Virus - computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected".

Trojan horse - Trojan horse, or Trojan, in computing is a generally non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm.

Spyware - Spyware is software that aids in gathering information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.

Adware - Adware, or advertising-supported software, is any software package which automatically renders advertisements in order to generate revenue for its author.

Computer Worm - A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.[1] Often, it uses a computer networkto spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program.

Ransomware - Ransomware is a type of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator(s) of the malware in order for the restriction to be removed. 

Scareware - Scareware, included into the class of malware known as Rogueware, comprises several classes of ransomware or scam software with malicious payloads, usually of limited or no benefit, that are sold to consumers via certain unethical marketing practices. The selling approach uses social engineering to cause shock, anxiety, or the perception of a threat, generally directed at an unsuspecting user. Some forms of spyware andadware also use scareware tactics.

Old Post From April 2014 - Zeus & CryptoLocker - Cybercrime

Zeus & CryptoLocker: What are they?


They are two types of attacks that work together being propagated from some of the largest global cybercrime networks. Normally spread as an innocent and official looking link or email attachment, Gameover Zeus silently monitors data and intercepts communications with online banking sites in order to steal login details and passwords.

Whether or not it succeeds, it will launch the second attack, Cryptolocker, which encrypts the files on a computer and extorts a heavy ransom from the user to regain control of their machine. Once infected, the machine then becomes part of the network spreading the attack. Over $100 million have already been stolen.

Short time to act?


On the 2nd June, the FBI, Europol and the UK’s National Crime Agency announced they had
temporarily disrupted the network of machines spreading the infection, and warned users they have a
two-week window to ensure their computers are secure. That deadline is when they expect the
cybercriminal behind the attack to regain control of the network and potentially
unleash a large scale cyber-attack.

What you can do to help stay safe?

Protect your PC: It’s vital that your PC has up-to-date security installed that checks download links and email attachments.
Run Windows Update: ​Security updates in newer versions of o/s like Windows® will help you to avoid these attacks.
​Back up your data: This will prevent Cryptolocker from being a threat to your vital data and documents, and is overall good insurance.
​2 step authentication: This added layer of security requires randomly generated codes to confirm online purchases & transfers.

Old Post from April 2014 - End of Windows XP Support

Windows XP Support is coming to a close. On April 8th 2014 

What does this mean?  
This mean that there will be no more updates or patches provided by Microsoft for this system leaving it open to attacks. If you plan on using this Operating system on the internet then you will be open to identity theft and Hacker attacks. In short this system will no longer be safe to use. 

What should I do?  
You have 2 options: Upgrade your current computers operating system or purchase a Computer that has a new Operating System on it. I.E. Windows Vista, Windows 7 or Windows 8/8.1 (upgrade cost from XP is on special for $69.99 plus the purchase of a new operating system) 

​Below is the list of End of Support dates for Windows Operating Systems. The end of extended support is when Microsoft will stop
providing updates for that Operating System. 

Operating Systems      Last Service Pack    End of Main Support   End  of Ext. Support
Windows XP                    Service Pack 3              April 14, 2009                    April 8, 2014

Windows Vista                Service Pack 2              April 10, 2012                     April 11, 2017

Windows 7*                     Service Pack 1             January 13, 2015              January 14, 2020

Windows 8                      Windows 8.1                 January 9,2018                January 10, 2023