Although malware threats to the Mac have been minimal compared to the PC, for those desiring additional protection there are choices. Topher Kessler (CNET MacFixIt) recently commented on an analysis of the most common anti-virus products. The antivirus tools used in the tests included a number of free and paid scanner packages from Avast, VirusBarrier,… Continue reading Best Mac Anti-Virus?
So, what’s the best Internet Security product for your PC? There’s no “one size fits all” answer. Perhaps your new PC included a bundled anti-virus program and you’re wondering whether to activate and use it or get another one (after uninstalling the current program). Perhaps the subscription for your current anti-virus product expired and you’re… Continue reading Best PC Internet Security Product?
This MacWorld article “What you need to know about the Flashback trojan” provides an overview of this malware and the associated risk. Flashback is the name for a malicious software program discovered in September 2011 that tried to trick users into installing it by masquerading as an installer for Adobe Flash. Cnet’s MacFixIt followed up… Continue reading Mac Flashback Malware
Walt Mossberg’s recent article “4G or Not 4G: A Guide to Cut Through All the ‘Fast’ Talk” discusses the current state of mobile device connection speed. Of all the confusing technology terms used in consumer marketing today, perhaps the most opaque is “4G,” used to describe a new, much faster generation of cellular data on… Continue reading 4G Reality
The latest issue of Vipre Security News notes: … There you are, casually downloading an update, when you suddenly find that you’ve also downloaded an unwanted toolbar… or worse. It’s called piggybacking and it’s an industry phenomenon that enables other software to “piggyback” on software your download. Yes, you must opt-in to receive the “selected”… Continue reading Watch Out for Piggyback Software
The Government’s Information Assurance Mission at NSA issued “Best Practices for Keeping Your Home Network Secure” in April 2011. The document summarizes recommended practices for home personal computers and networks.
The FBI (Federal Bureau of Investigation) maintains a Web page for alerting the public to recent scams and online frauds: http://www.fbi.gov/scams-safety/e-scams
VIPRE Security News Vol.1, #5 – August 10, 2011 – Issue #5 discusses what CC and BCC mean and security issues. Sending emails to your friends and associates by BCC does not expose their address to the rest of your list. There are a couple of issues in using BCC to keep in mind …
VIPRE Security News Vol.1, #5 – August 10, 2011 – Issue #5 contains a list of both government and corporate email addresses to send incidents of fraud and/or phishing.
The latest issue of Vipre Security News contains some articles on email spoofing and what to do if your email account is hijacked. … email spoofing is the forgery of an email so it appears to be coming from someone other than the actual source. Spammers often use spoofing to get folks to open and… Continue reading email hacking and spoofing
This Enterprise Systems article highlights once again that protecting yourself from phishing attacks requires guidance and training. Relying on good intentions is not enough. Many are tricked into clicking on links in phishing e-mail messages anyway. The cleverness of cybercriminals can still overcome the best intentions of employees. As Sjouwerman [KnowBe4 founder and CEO Stu… Continue reading Employees Fall for Phishing
ars technica writes, “The Security Update 2011-003 that Apple released on Tuesday directly addressed the Mac Defender malware threat in two ways: it changed the way malware files are detected by enabling automatic daily updates, and included code to remove at least two of its variants.” The article further discusses Apple’s response to a growing… Continue reading Apple Security Update and File Quarantine
Apple posted this article regarding: A recent phishing scam has targeted Mac users by redirecting them from legitimate websites to fake websites which tell them that their computer is infected with a virus. The user is then offered Mac Defender “anti-virus” software to solve the issue. And MacWorld writes: Online crime falls mostly into four… Continue reading How to avoid or remove Mac Defender malware
The United States Computer Emergency Readiness Team (CERT) defines a fake anivirus as: Fake antivirus is malicious software (malware) designed to steal information from unsuspecting users by mimicking legitimate security software. The malware makes numerous system modifications making it extremely difficult to terminate unauthorized activities and remove the program. It also causes realistic, interactive security… Continue reading Recognizing Fake Antiviruses
May 2011: I was glad to see a major blog take on something which has riled me as well. Like when I update Adobe Flash on every PC. Ed Bott at ZDNet conjured up the new term “foistware” for the insidious practice, even by large reputable software companies. See: “Adobe and Skype top my Foistware… Continue reading Auto opt-in’s: Free software and unwanted add-on’s