Featured Posts

<< >>

How to Keep your PC Clean, Virus Free and Tuned Up!

I believe Malware or Annoyanceware come from many places. Ads on Google and other sites, especially free software, games, coupon and music sites. Avoid Coupon sites, I think the printing services they install on your PC boarder on Malware and track your activity and influence your web

How to clear iPhone Email Badge of Huge Incorrect Unread Gmail Email Count after iOS 7, 8 & 9 Updates

1) Go to full site for Gmail on a computer and click on the gear in the upper right. Go to settings and select 100 conversations per page (this is the max). 2) type in the following in the Gmail search field “is:unread” (without the quotes). 3)

FBI: ‘Ransomware’ virus infecting computers, seizing data

This FBI Virus is like the Energizer Bunny, it keeps going and going and going …. Beware it’s still out there! – JoeSAN ANTONIO – The Federal Bureau of Investigation is warning computer users about a specific type of computer virus known as “Ransomware” thatᅠ…

‘Ramsonware’ targeting smartphones

Just like a computer virus, ransomwear can invade your smartphone if you click on a bad link or download an infected file. This scam has beenᅠ… Click here to visit the original source of this post

Biz Bulletin: Be smart with smartphonesto avoid scams

Just like a computer virus, it can invade your smartphone if you click on a bad link or download an infected file. This scam has been infecting personalᅠ… Click here to visit the original source of this post

A Newly-Discovered Computer Virus Is Wiping Data From Iranian Hard Drives

Iranian computers are being targeted by a new malicious virus that clears large portions of hard drives, according to Iran’s Computer Emergency Readiness Team (CERT). Cybersecurity researchers don’t know where the virus came from. All they know is that Business Insider

Click here to visit the original source of this post

How to Avoid Mobile Adware – Mobile Security

Free mobile apps come at a cost – mobile adware or madware can be intrusive, but also potentially malicious.

www.mobilesecurity.com/…/312-how-to-avoid-mobile-adware

Click here to visit the original source of this post

“Dexter” malware steals credit card data from point-of-sale terminals

Dexter, as the malware is called, has infected hundreds of point-of-sale computers at big-name retailers, hotels, restaurants, and other businesses, according to a report issued by Aviv Raff, chief technology officer of Israel-based security firm Seculert.

Click here to visit the original source of this post

For PC Virus Victims, Pay or Else

Don’t Pay the RansomWare Virus. They very rarely unlock your computer. Have your local computer guy remove the virus manually.

compromised because account owners independently clicked on a malicious link or were compromised by a computer virus that stole password credentials.

www.cnbc.com/id/…/For_PC_Virus_Victims_Pay_or_Else

Click here to visit the original source of this post

Beware of Bogus Scam Phone Calls from someone claiming to be “Microsoft”

A customer of mine fell pray to a phone call from someone claiming to be “Microsoft”. The guy said that there was a number of programs not running on his computer and that he would have to remote in to fix it and, oh by the way, it will cost $200 bucks. The guy remoted in and showed my customers a list of services that are not running, which is totally normal in Windows and charged my customer the $200 to supposedly fix it. 

Days later, My customer did get help from Microsoft and they called the number associated with the charge on his credit card. The guy on the phone said they didn’t know anything about it??? But would refund the charge within 24 hours. My customer cancelled the credit card anyway. The “real” Microsoft guy helped my customer scan his computer for Malware and only found some Adware and tracking cookies. So, we believe the scam was really just the money and not any siginficant Malware placed on his computer. 

Bottome line: Microsoft, Dell or whoever are not monitoring your computer for errors or programs and services running and they will never call you claiming such. I wish my customer would have called me first so he could have skipped this hassle, but he is safe now and that’s the most important thing. 

Safe computing,

Joe

Cyber criminals using Citadel malware platform as scam

A new extortion technique is being deployed by cyber-criminals using the Citadel malware platform to deliver Reveton ransomware. The latest version of the ransomware uses the name of the Internet Crime Complaint Center to frighten victims into sending

Click here to visit the original source of this post

Missing Pa. Girl’s Case Highlights Need For Internet Safety

WASHINGTON, D.C.(WUSA) – A 13-year-old missing girl from Pennsylvania has been found here in Washington with a 20-year-old man that she met online. The girl is safe, but the man was arrested and charged with corruption of a minor. 13-year-old W*USA 9

Click here to visit the original source of this post

Hackers steal €36m from European banks using computer virus

HACKERS USING A Trojan computer virus successfully stole an estimated €36 million from more than 30,000 bank customers at multiple banks across Europe according to a report published yesterday. The report by security vendors Versafe and Check Point

Click here to visit the original source of this post

Naval Academy to add cybersecurity major

ANNAPOLIS — The U.S. Naval Academy is aiming to be among the first colleges to have a cybersecurity major accredited by a top professional body, a school official said Monday, and the superintendent has been meeting with Navy officials to discuss how to fund a $100 million cybersecurity facility on campus.

Read more: http://www.washingtontimes.com/news/2012/dec/3/naval-academy-to-add-cybersecurity-major/#ixzz2ECJAVVKU
Follow us: @washtimes on Twitter

US government needs cybersecurity doctrine, experts say

A doctrine could define several aspects of cybersecurity, including defense against attacks, steps the U.S. will take to deter attacks and ways to safely use the Internet, said Michael Swetnam, co-author and CEO and chairman of the Potomac Institute.

Click here to visit the original source of this post