Category: Security Issues. Virus’ and Spyware, Scams

Security For Everyone – Reviewing McAfee Total Security 2015

The last time we tested McAfee’s security products we were quite disappointed. However, a new version is now available, so things might have changed in the meantime. We thoroughly tested McAfee Total Security 2015 for a week and we’re ready to share our conclusions with you. Read this review to learn about “the good, the bad & the ugly” of using McAfee security products on your Windows computer.

The Complete Article is no longer available. Go here for another review article.

My Five Favorite Free Windows utilities

Everyone has their favorite tools, especially when it comes to Windows. Today I thought I’d share my favorites, the programs I absolutely must have.

They’re all free, and they’re always free, so no worries today about anything selling out or sudden price changes. Read on, then hit the comments to nominate your favorite freebies for Windows!

The Complete Article

Five Facebook Threats

Do you remember how life was without Facebook? Probably not. The site has pervaded our lives and it is no surprise that Facebook is now prime hunting ground for anyone with nefarious intentions.

They employ stealth and cunning, like a predator stalking its prey, looking for the slightest weakness to pounce on you. By simply visiting Facebook, you potentially expose yourself to viruses and malware. Criminals can make you take some unintended action, steal your data, spy on you or “enslave” your PC for their own illegal ends such as launching DDOS attacks.

We take you through some of these Facebook threats and outline the precautions you should take to avoid becoming another statistic of cyber crime.

The Complete Article

What Is The Cloud?

cloud-smThe Cloud. It’s a term that gets thrown around a lot these days – so much so that its definition seems to have been diluted over the years. What is the cloud, exactly? Why does it matter if we know about it? And what does it mean for us?

Don’t be intimidated by the jargon. At first glance, phrases like hybrid cloud and acronyms like SaaS might seem like alien talk, but I promise you that they’re actually quite simple. Keep reading and I’ll prove it to you.

  http://www.makeuseof.com/tag/cloud-2/

Cloud storage vs. external hard drives: Which really offers the best bang for your buck?

Behind the Spec Sheet seeks to draw new insights based on hardware data. Produced by FindtheBest, a company that aggregates specs and features in a centralized database, this weekly guest column will share data-driven discoveries and surprises, and attempt to expose common misconceptions.

By now, you know the basic arguments in the on-site versus off-site storage debate. External hard drives are fast (everything backed up in minutes!) and safe from hackers (you control the data), but are susceptible to theft, fire, and hard drive failure. Meanwhile, cloud solutions provide ongoing, reliable service, but are slower than on-site solutions, and (theoretically) more vulnerable to hackers.

But for today, let’s put aside the usual arguments and focus strictly on cost. Assuming your data will not be hacked, stolen, or burnt to a crisp in a house fire, which solution—cloud storage or an external hard drive—is more cost effective, byte for byte?

At FindTheBest, we compiled data on more than 400 external hard drives, including brands like Seagate, LaCie, and Western Digital, as well as more than 80 online backup services, including familiar names like DropBox and Box, as well as smaller companies like BackBlaze and Crashplan.

The Complete Article

Hidden smartphone setting maps your every move

SEATTLE — It’s supposed to provide iPhone users the ability to see where they’ve been, but a hidden setting could also allow someone with access to the device see where the user has been and map their movements.

It’s called “locations services,” and many applications use it to provide location-based information for various iPhone apps.

Customers with concerns about a phone recording and even broadcasting their location have learned to turn off location services for particular applications except those needed to enable mapping programs and security measures. 

Those actions do not disable a deeper setting in the Apple IOS 7 mobile operating system which tracks a user’s frequent locations. If the wrong person got his hands on that device and was able to access it, he can easily learn the daily habits of the phone’s owner.

Students at the University of Washington volunteered their phones to see how easy it can be to see where the device has been. The frequent locations setting creates a map, and tapping on a specific locations reveals the dates and times of a particular visit and even how long you were there.

The Complete Article

Why Your Router Is A Security Risk & How To Fix It

The introduction of the home router was a great advancement in security for many owners. Before routers, most PC users relied only on a software firewall or, more often than not, ran no firewall at all. Routers with built-in firewalls have generally been a very good thing.

An item that provides safety can also lead to a false sense of security, however, and leave users vulnerable when attacks that they thought impossible occur. Routers are no different. They can be difficult to set up and often require updates to patch exploits discovered after release. Here’s what you must do to make your router is a boon instead of a burden.

The Complete Article

Windows 8 Is The Most Secure Version Yet: Here’s Why

Windows 8 is the technological equivalent of marmite. Whilst the system is not as universally hated as Windows Vista, the latest Microsoft operating system certainly polarises opinion. Critics say the modern UI lacks important functionality, the experience of switching between the desktop and the modern apps is jarring, and the lack of genuine start button is confusing.

On the other hand, its supporters say that the faster start-up, excellent OneDrive (formerly SkyDrive) integration, and the ever-growing app store more than make up for its deficiencies elsewhere.

One factor is frequently overlooked though – Windows 8 is unquestionably Microsoft’s most secure version of Windows to date. After being regularly criticised for poor levels of security in past operating systems, Microsoft deserves credit for the wholesale changes made to their latest release.

The Complete Article

Internet and IE Security: More

http://www.cnet.com/news/stop-using-ie-until-bug-is-fixed-says-us/

 

Stop using Microsoft’s IE browser until bug is fixed, US and UK warn

In a rare move that highlights the severity of the security hole in one of the Web’s most popular browsers, the US Computer Emergency Readiness Team and its British counterpart tell people to stop using Internet Explorer until Microsoft can fix it.

 

It’s not often that the US or UK governments weigh in on the browser wars, but a new Internet Explorer vulnerability that affects all major versions of the browser from the past decade has forced it to raise an alarm: Stop using IE.

The zero-day exploit, the term given to a previously unknown, unpatched flaw, allows attackers to install malware on your computer without your permission. That malware could be used to steal personal data, track online

There’s more

 

http://www.cnet.com/news/stop-using-ie-until-bug-is-fixed-says-us/

 

 

Bill Proffitt

Internet Explorer Security Problem

 

Most of you may know this, but I just heard on the radio that IE is not safe to use right now. I think it’s versions 6-11, with most likelihood of being targeted–versions 9-11.

 

The security hole was discovered over the weekend and they said MS will likely be trying to get a fix distributed this week.  However:  they didn’t know if MS would do a fix for Win XP….since they aren’t supporting it anymore; maybe not.

You can download and install Google Chrome or Firefox to use until IE is fixed….or you could uninstall or disable Adobe Flash–since that is apparently where the vulnerability is.

 

Sr. Dorothy