PC Security
19 views | +0 today
PC Security
Information about upcoming virus threats, tips for computer security, review of antivirus brands, latest internet security news, and fraud and scam information
Curated by Rupesh Malik
Your new post is loading...
Your new post is loading...
Scooped by Rupesh Malik
Scoop.it!

Internet safety for kids who are using Tumblr

Internet safety for kids who are using Tumblr | PC Security | Scoop.it

Tumblr is an extremely simple and user-friendly microblogging site popular among teens. The reason behind this could be the fact that they don’t have to learn any coding language like HTML or web design to work on this. After creating a free account on Tumblr, users can post short articles to their ‘tumblelog.’ Apart from text, they can also post photos, quotes, links, chat, audio file, and videos on their blog.

 

While Tumblr is a good way to express your opinions and maintain a dairy, parents should consider the following points to ensure the online safety of their kids on this platform. The article by Tyler ORourke on uKnowKids website beautifully captures these points.

 

Full Article Here: http://antivirus.iyogi.com/internet-security/parental-controls/internet-safety-for-kids-using-tumblr.html

 

more...
No comment yet.
Scooped by Rupesh Malik
Scoop.it!

Shopping with Smartphone: 7 Safety Tips

Shopping with Smartphone: 7 Safety Tips | PC Security | Scoop.it

Shopping has become a social, mobile experience. Mobile shopping not only provides the comfort to shop from home but also gives consumers an option to locate a cheaper price for the product they wish to buy. Shopping apps like Google Shopper, Yowza!!, Consumer Reports Mobile Shopper, FastMall, Groupon, etc., allows consumers to look up a product on the Internet by either scanning it or typing in the bar code.

 

According to some experts, smartphone shopping will dwarf online shopping in the next decade. A recent report by IBM reveals that mobile commerce doubled in the first quarter of 2012 as compared to 2011.

 

Increased smartphones usage has also led to concerns about privacy violation issues besides the need to safeguard against identity thefts and financial frauds. We can make use of the following simple safety points to convert our smartphone-assisted shopping into an enjoyable experience:

 

Full Article Here: http://antivirus.iyogi.com/internet-security/shopping-safety/shopping-with-smartphone-safety-tips.html

 

more...
No comment yet.
Scooped by Rupesh Malik
Scoop.it!

Affinity Fraud used by bishop to run a massive Ponzi Scheme

Affinity Fraud used by bishop to run a massive Ponzi Scheme | PC Security | Scoop.it

The FBI has unearthed a massive Ponzi Scheme run by a bishop in the American Anglican Convocation for nearly a decade. Martin Sigillito was convicted for swindling $52 million from more than 200 victim investors.

Start of the Scam
Martin, also a St. Louis attorney, opened his law office and advertised his consulting services for participating in the ‘British Lending Program’ (BLP). He assured investors to invest in this program that grants loans to real estate developers in the United Kingdom in return for a high rate of interest.

Martin posed himself to be an expert in international law and finance and claimed he was a lecturer at Oxford University in England. He used affinity fraud to reach more users by exploiting his personal links and affiliation groups like church, social clubs, professional acquaintances, family, and neighbors.

 

Full Article Here: http://antivirus.iyogi.com/news/affinity-fraud-used-by-bishop-to-run-ponzi-scheme.html

more...
No comment yet.
Scooped by Rupesh Malik
Scoop.it!

So you think your Mac is malware protected?

So you think your Mac is malware protected? | PC Security | Scoop.it

Know about 12 Antivirus Apps that can protect your Mac from Malware Attack

 

The notion that Macs cannot be busted has been proved as a myth now with the recent Mac-directed malware attacks like Mac Flashback malware. The good and the strange point is that security vendors have already developed a range of solutions to counter such attacks and most of them are free to download and install.

 

Read Full Article: http://antivirus.iyogi.com/internet-security/secure-mac/so-you-think-your-mac-is-malware-protected.html

more...
No comment yet.
Scooped by Rupesh Malik
Scoop.it!

Increased Cyberbullying: Time to Install Parental Control Software [Infographic]

Increased Cyberbullying: Time to Install Parental Control Software [Infographic] | PC Security | Scoop.it

It’s high time for parents to get involved in their kids’ online world in addition to their real world


Kids and teens of today have more access to the technology and the online world than we used to have. One or the other electronic gadgets are constantly keeping them connected to the Internet. The recent stats, as shown in the infographic below, don’t show a healthy picture of this trend.

We, as informed readers, can do our bit and help save our children from the negative Internet experience of cyberbullying by installing appropriate parental control software in both PCs and mobile phones from the following options:

Full Article Here:
http://antivirus.iyogi.com/internet-security/parental-controls/increased-cyberbullying-time-to-install-parental-control-software.html

more...
No comment yet.
Scooped by Rupesh Malik
Scoop.it!

Get rid of DNS Changer Infection by July 9

Get rid of DNS Changer Infection by July 9 | PC Security | Scoop.it

July 9 could serve as the ‘Internet doomsday’ for an estimated 64,000 users in the United States, and an additional 200,000 users outside the United States. This is despite repeated warnings in the news, e-mail messages sent by ISPs and alerts posted by Google and Facebook.

 

You can check your system for the presence of DNSChanger infection and its removal by visiting the website of the DNS Changer Working Group (DCWG) brought in by the FBI for helping users.

 

Full Article Here: http://antivirus.iyogi.com/news/get-rid-of-dns-changer-infection-by-july9.html

 

more...
No comment yet.
Scooped by Rupesh Malik
Scoop.it!

TOP 7 ways to protect yourself from Phishing

TOP 7 ways to protect yourself from Phishing | PC Security | Scoop.it

According to Wiktionary, Phishing is an “act of sending email that falsely claims to be from a legitimate organization. This is usually combined with a threat or request for information: for example, that an account will close, a balance is due, or information is missing from an account. The email will ask the recipient to supply confidential information, such as bank account details, PINs or passwords; these details are then used by the owners of the website to conduct fraud.”

 

The ground reality is that we cannot completely escape from these phishing attacks but we can take the following logical steps to reduce its potential of harming us:

 

Full Article Here: http://antivirus.iyogi.com/internet-security/phishing/ways-to-protect-yourself-from-phishing.html

more...
No comment yet.
Scooped by Rupesh Malik
Scoop.it!

5 password managers that can help you survive password leak attacks

5 password managers that can help you survive password leak attacks | PC Security | Scoop.it

Let us first check the recent hacking trend. In June 2012, more than 6.4 million LinkedIn passwords were leaked to the web after an apparent hack. In July 2012, approximately 400,000 e-mail addresses and passwords of users of Yahoo! Voices have been leaked in plain text online. More recently, Android Forums (an online forum for Android users) was hacked that could have led to user information including passwords getting compromised. The latest one was the hack of NVIDIA developer forum “that may have resulted in the exposure of user names, e-mail addresses, hashed passwords and profile information,” according to eSecurityPlanet website.

One thing has become quite clear in all these recent hacking attacks. It is the fact that we need to fortify our passwords to prevent its leakage.

 

We, as end users, can do our bit by using passwords that are not easy-to-guess by hackers. The team at iYogi has therefore reviewed the following 5 password managers that will help us overcome the trouble of remembering those passwords across multiple platforms like Windows, smartphones, etc., along with other benefits:

 

Full Article Here: http://antivirus.iyogi.com/internet-security/passwords/5-password-managers-that-can-help-you-survive-password-leak-attacks.html

 

more...
No comment yet.
Scooped by Rupesh Malik
Scoop.it!

10 precautions for every smartphone owner

10 precautions for every smartphone owner | PC Security | Scoop.it

Smartphones are as powerful and connected as any PC or a laptop. They are like a mini computer. This makes it imperative for users to protect them from hackers and thieves as they can access and exploit our data.

 

According to the observations in the Honey Stick Project carried out by Symantec, “Lost phones are replaceable, but the information on them is still at risk unless users take precautions to secure and protect them.”

Taking the following basic precautions can serve as a ‘stitch in time, saves nine’:

 

Full Article Here: http://antivirus.iyogi.com/internet-security/mobile/precautions-for-every-smartphone-owner.html

  

more...
No comment yet.
Scooped by Rupesh Malik
Scoop.it!

New GPS technology to prevent hacking attempts

New GPS technology to prevent hacking attempts | PC Security | Scoop.it

Defense company BAE Systems has made a new navigation system that can prevent hacking or jamming attempts of military weapons and vehicles by cyber criminals.

The new GPS navigation technology catches any signal (TV/radio, Wi-Fi, or cell phone) out of the air to figure out locations – even signals from GPS jammers. This system will enable military drones, ships, troops, and missiles to accurately find and strike the enemy targets even if they jam the GPS signals.

 

Full Article Here: http://antivirus.iyogi.com/news/new-gps-technology-to-prevent-hacking-attempts.html

more...
No comment yet.
Scooped by Rupesh Malik
Scoop.it!

Curing DNSChanger malware is just half the process

Curing DNSChanger malware is just half the process | PC Security | Scoop.it

Cleaning DNSChanger malware is like curing pneumonia. Cough in the form of faulty DNS settings still remains

 

The efforts made by the U.S. government along with other tech industry partners can be considered as an achievement in rooting out the global online scam and malware infestation. But, have we really won the battle?

 

Full Article Here: http://antivirus.iyogi.com/internet-security/malware/curing-dnschanger-malware-is-just-half-the-process.html

more...
No comment yet.
Scooped by Rupesh Malik
Scoop.it!

FBI Warning: No Internet Access to DNSChanger Infected Systems from July 9

FBI Warning: No Internet Access to DNSChanger Infected Systems from July 9 | PC Security | Scoop.it

DNSChanger is a malicious software program or a malware that allows cyber criminals to access rogue servers (or bad DNS servers) and manipulate the online browsing activity of users with infected systems. The malware affects both Windows-based PCs and Macs.

 

Current Scenario
Millions of PCs have been infected by this DNSChanger Trojan Horse. As per the article on the website Squidoo, the U.S. government is running an emergency program that allows them to temporarily replace rogue servers with clean ones so that victims of the virus can get time to clean their computers. FBI is also running several intense and complex international investigations such as Operation Ghost Click to raise awareness about ‘Internet Doomsday’ among users with infected systems.

 

Full Article Here: http://antivirus.iyogi.com/news/no-internet-to-dnschanger-infected-systems.html

more...
No comment yet.
Scooped by Rupesh Malik
Scoop.it!

Why you should get a health checkup of your mobile?

Why you should get a health checkup of your mobile? | PC Security | Scoop.it

The mobile market has been exploding like anything. This is pushing the demand for more apps in the app marketplaces. We may be unaware of this fact that the best breeding grounds for malicious software often sits in these app marketplaces for days, weeks and even months before finally being discovered.

 

How to secure mobile device from malware?

As per an article published in the Net Security website, “Scientists from NQ Mobile’s Mobile Security Research Center, in collaboration with North Carolina State University disclosed a new way to detect mobile threats without relying on known malware samples and their signatures.”

 

Full Article Here: http://antivirus.iyogi.com/internet-security/mobile/get-a-health-checkup-of-your-mobile.html

 

more...
No comment yet.
Scooped by Rupesh Malik
Scoop.it!

8 threats that even antivirus cannot catch

8 threats that even antivirus cannot catch | PC Security | Scoop.it

Malware attacks and data thefts are on the rise as evident from the recent news headlines. Relying entirely on antivirus solutions will not serve the purpose now because your system is exposed to threats in routine situations.

 

The whitepaper published by John Metzger, Senior Product Marketing Manager, and Jonathan Shaw, Product Manager at Sophos highlights eight everyday threats in which we need to update the protection of our PC beyond traditional antivirus program. Let us look at them and understand their implications:

 

Full article here: http://antivirus.iyogi.com/internet-security/virus-threats/eight-threats-that-antivirus-cannot-catch.html

more...
No comment yet.