HIGHLY RECOMMENDED: An Internet Security Blog For Home Based Computer Users and Experts Alike

June 29, 2012

As a retired Information Technology Manager, that was surrounded by people in a State Government healthcare setting, at a time when networks and the internet were just starting to ramp up, there was a very valuable lesson that I learned along the way.

I learned to never talk over the heads of my user base by using computer, internet, or network terms (or lingo) to suppress their learning or make them feel I was above their level of comprehension. I looked at the job as; I was the coach and my user base was the team. When the internet and my network started to mature, the lessons (and education to my users and myself) paid off and actually served as a physical layer of protection to keep my network safe.

Following my career as an IT Manager, my user base changed to that of the home computer user (i.e. readers of this blog, friends and family) where explaining things to people, in understandable terms, is even more important.

One of the hardest topics out there today to explain is internet security and cybercrime. It is a topic that is not easily comprehended, unless you have expertise; and, explaining internet security and cybercrime to others (such as the home computer user) is something that is very challenging to do.

Internet Security

Myself, I have learned to depend on blogs such as Bill Mullin’s Weblog – Tech Thoughts and Tech Paul’s –Tech for Everyone to keep myself aware and alert. You will find that bloggers, such as these, make it personal and have that ability to get it across in teaching you how to protect your computer and yourself.

There is another blog, that I intentionally did not mention above, that now exclusively specializes in internet security and cybercrime. The reason for that is that the name of the blog, authored by Paul Lubic, Jr, has changed from Paul’s Home Computing Blog to the more appropriate title of Paul’s Internet Security Blog. I HIGHLY RECOMMEND that you bookmark this site.

Paul initially started out his blog by specializing in sharing tips, techniques and advice on home computers and the home computing environment. His blog eventually evolved into what his real specialty is and that is the topic of Internet Security. Paul has been in the technology field for over 40 years and has held positions as programmer, IT Security Manager, and Chief Information Officer. His great love is in cyber-security where he worked with the U.S. Commonwealth of Virginia in the area of cyber-terror prevention and preparedness.

DO NOT let his credentials lead you to believe that he is going to talk over your head when it comes to internet security and cybercrime. It is quite the contrary. Paul Lubic, Jr. possesses the same traits that myself, Bill Mullins’, and Tech Paul possess; and, that is to explain things in a manner that you can understand and that you will ultimately will benefit from.  NOTE:  Be sure to check out Paul’s ever growing List of Terms .

——————————————-

GEEK BONUS AREA

Today’s Technology News, Software, Apps, Wallpapers, Tech Products and MORE…

Please Download Your Ticket

The Right Way To Respond To A Fake “Confirm PayPal Account” Phishing Email

Will Your Facebook Status Updates Come Back To Bite You?

Malwarebytes Pro Anti-Malware Lifetime

Bookmarks4Techs

Gold Box: New Deals. Every Day.

——————————————-

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]


Geek Squeaks’ of the Week (#77)

September 15, 2010

If you have a yearning to learn about information technology and computers, then be sure to check out the weekly roundup of Geek Squeaks’. The article links you see below are articles and information provided by the sites (and blogs) that are associated with the What’s On My PC blogroll.

Geek Squeaks'

Tech-for Everyone
Software License Giveaway Drawing: SPAMFighter Pro

Laptops Review Central
The many features of Toshiba Folio 100

Paul’s Home Computing Blog
Wanted: Cyber Warriors

TuneUp Blog about Windows
Finally, Smooth HD Playback on Slower PCs and Netbooks

Lifehacker
Remains of the Day: How Good Software Makes Us “Stupid

Rarst.net
How to find high quality images of stuff

Free PC Security
Malicious Sites September 13

Mister Reiner
Firefox vulnerabilities give me the creeps!

Gadgetsholic
WebOS 2.0 Screenshot Pictures Leaked

Bookmarks4Techs
Kindle Wireless Reading Device

Canadian Tech Blogger
How To: Adding Liquid Cooling To A PC

thePC Security
Free Software Update Software – Secunia PSI 2 BETA

Right On Technology
Google Instant Search
Introduced, Real-Time Results While You Type

Bill Mullins’ Weblog – Tech Thoughts
WOT (Web of Trust) – Is It The Most Important Browser Security Add-on You Need To Install?

EvilFantasy’s Blog
Flash Cookie Cleaners

Plato On-Line
73% of Americans Hit By CyberCrime

Faster PC! Clean! Clean!
How to Remover RegistryClever

RGdot
Simple Freeware: Screenshoter And Easy Image Modifier

AKSGEEK Live
Samsung Galaxy Apollo Coming Soon to Telus

Malware Removal Instructions
Remove dating.clicksearch.in (Uninstall Guide)

Chicago Mac/PC Support
Google’s New Scary Security Warning (via Meredith L. Eaton)

I Love Free Software
Create DVD Cover Create CD Cover with UnderCoverXP

Netbook Freeware
The Big Bad Launcher: Simple and Easy to Use
Launcher For Your Netbook

Worthy Tips
Canon PowerShot SD4500IS
available Shooting Modes and Photo Effects

404 Tech Support
Google Maps Instant, YouTube Instant, and YouTube Time Machine

I Want Ice Water
Tokyo in Time Lapse (via Metousiosis)

TTC Shelbyville
Free Sessions for Girl Scout Leaders and Girl Scouts

Snakebytez
Burn Blu-Ray and HD-DVDs with CDBurnerXP

Awesome Wallpapers
Windows Se7en Wallpaper Set 31 (Nature)

Laptop Computer Reviews
What Needs to Stop

What’s On My PC
Is magicJack’s VoIP For You

StumbleIt

jaanix post to jaanix

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]


BEWARE of “ScanVirus” – A “FAKE” Cloud Anti-Virus Service

February 14, 2009

With the wave of cloud apps appearing on the internet, I knew it would be a matter of time before malware would find its’ way into the cloud. Panda Labs, an international network of research and technical support centers devoted to protecting users against viruses, discovered  an interesting “cloud” tactic that is being used to trick computer users into infecting themselves with malware.

The cybercriminals in this particular case have created a pretend web site (called ScanVirus – Cumulative Online Antivirus Service) that lures the visitor into thinking their computer is infected (see graphic below). The confidence of the visitor is gained from the displayed logos that are “copies” of logos from actual legitimate anti-virus and anti-malware companies. Upon visiting the site, the visitor is prompted to download a file called “AntiVir.exe”, which Panda Labs has identified as being malware (called “Adware/Antivirus 2009).

Beware of ScanVirus

To learn more about “malware” and to download software to “protect” your PC, I encourage you to read the following:

“FREE” Internet Browsing Protection…

Taking A Byte Out of Malware

Protect yourself against FAKE Anti-Virus
and FAKE Anti-Spyware Software…

Basic Computer Security Precautions You Need To Know
(at Bill Mullin’s “Tech Thoughts)

Internet Plague – Rogue Antivirus
(at TechPaul’s “Tech-for Everyone”)

StumbleIt

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]


Why the security breach at Monster.com and USAJobs.gov is a BIG deal…

January 30, 2009

Most everyone has read in the news about Monster.com and USAJobs.gov (both career job seeking and posting sites) being illegally accessed and account data being taken. You can read the official notices posted by both of these entities by clicking the links below:

“Monster Database Security Breach Alert”

“Attention USAJobs Users”

Most of you are probably wondering, what’s the big deal?  So what, someone has taken usernames, passwords and email addresses to a career site. Just change the password, as prompted or instructed, and you will be fine.  Wrong!

I want my readers to please watch the short video below, from Sophos Labs (Graham Cluey’s Blog) about this specific case and what it should teach us.

NOTE: I have the video link configured so that when you click on the graphic link below the video will open in a separate full screen window.  At the full screen window, click on the “play button” in the bottom left corner.

This video demonstrates how other web site accounts can be compromised, as a result of maintaining the same password for each account we access (i.e. your banking, credit card, etc…). The video points out that over 41 percent of people use the same password for every account they access.  From my experience, I say that percentage is even higher. I cannot stress the importance of practicing good password management.

To remind and educate about password management; and to provide you with a software tool to get you started, I encourage you to re-visit the post I composed titled:

“PASS-the-WORD”… Basic password management tips.”

I also would like to point out that this particular incident, with economic conditions being as such, demonstrates how low the cybercriminal will go to seek financial gain by stealing your identity.

clipped from vimeo.com

What the Monster.com security breach teaches us about passwords


by Sophos Labs

 

 


Hackers have stolen details on job seekers from recruit websites Monster.com and USAJobs.gov, bringing the risk of identity theft and phishing attacks.

Sophos Graham Cluey Video

Learn what you need to do to ensure that your website accounts aren’t compromised in this video by Sophos’s senior technology consultant Graham Cluley.

Read more on Graham Cluley’s blog at sophos.com/blogs/gc/g/2009/01/24/security-alert-monstercom

Get Clipmarks – The easiest way to email text, images and videos you find on the web.

Sent with Clipmarks

 

[ CLICK HERE TO LEAVE A COMMMENT ]

Bookmark and Share

 


Cyber-Crooks are using jealousy to trick you…

January 15, 2009

Bill Mullins, who maintains the blog “Tech Thoughts”, wrote a very interesting article titled, Jealous?  Cyber-crooks have your number” (see clips below). For some reason this article, by Bill, really jumped out at me due to the deceptive tactic, he points out, that cyber-crooks are using to trick people. This one is a good one and is crafted in such a way that it could even trick a seasoned computer user. I strongly encourage all my readers to read the article to protect yourself from this deceptive tactic (click on any of the links below) and to learn from Bill simple safeguards you can put into place.  It demonstrates how cyber-crooks are using a “human emotion” to trick us.  As I always say, “believe nothing and verify everything”…

clipped from billmullins.wordpress.com

Bill Mullins’ Weblog – Tech Thoughts

Jealous? Cyber-crooks Have Your Number

Jealousy_by_EvilTelephone

Jealousy is a human emotion that surrounds us. Arguably, it is an experience with which we are all familiar.

It’s no surprise then, that Cyber-crooks are now using jealousy as a social engineering email hook, to entice potential victims to click on an email containing enclosed links which can lead to the installation of a banking Trojan on the computer.

“Hello,

I apologize for my frankness. I’m sorry for not being able to speak to you in person, but I can only talk to you via email and I feel obliged to notify you to open your eyes, you are being betrayed.

I know it is difficult to prove, but every picture tells a story, I’ll send you these pictures so that you can see it with your own eyes. Take care…big hug

From a good friend who is very fond of you

View photos here”

Get Clipmarks – The easiest way to email text, images and videos you find on the web.

Sent with Clipmarks

 

[ CLICK HERE TO LEAVE A COMMENT ]

 

Bookmark and Share


Follow

Get every new post delivered to your Inbox.

Join 244 other followers