Vital Internet Security Alerts and Information for the
everyday Non-technical Computer user, Internet User and
Web Surfer who just wants to be safe doing basic stuff
without the hassle of viruses, spyware, or worse.
I'm very pleased that you're here today,
and that you're
concerned about your computer security and family
Internet Safety. I look forward to your early return to
the Security Alert Blog.
Feed or book-marking this page will make it a lot easier
for you to visit again.
July 9, 2010
Considerations for Avoiding Current security Threats
There aren't many people who have a PC or Mac computer
connected to the Internet that aren't aware of Computer
Generally, PCs are targets of most of the more than
280,000 currently recognized viruses.
Macs don't become infected with the PC viruses designed
to exploit vulnerabilities of the Microsoft Operating
System. However, Macs are still targets of cyber
criminals and it is possible for an Apple Macintosh to
get a virus. But the likelihood of an Apple Macintosh
user getting a virus when compared to a Microsoft
Windows user is very little to none.
In fact, there are many Apple Macintosh users who still
don't even run an antivirus protection program.
But, believe it or not, in spite of all of the recent
media coverage and even newscaster hysteria about the
Conficker worm, Stuxnet, and more recently,
Flame, there are many ordinary computer users who
have no current protection against any kind of malware,
especially the latest versions and iterations of these,
and older viruses.
So, what are the latest threats and where can we go to
identify them? The answer to this question is in my
free report -
It's enough to scare me away from answering, or clicking
on any of the links in those suspicious daily email
And by the way, I always hesitate to open any email that
is presented in html (not plain text), unless I'm
absolutely familiar with the source/sender.
Much of the
phishing email in circulation is purposely designed
to appear as if it comes from legitimate sources like
your bank, a shipper like FedEx or UPS, the FBI, and
other common and easily recognized names.
Reminder about Why Strong Passwords are so
One of my most interesting
and reliable sources for learning about the latest nasty
stuff taking place on the Internet is Brian Krebs' Blog "KrebsOnSecurity"
While reading through his blog posts recently, one of
the headlines attracted my attention - "Hacked
Inboxes Lead to Bank Fraud".
The meat of his post described exactly what happened to
us, a small business, as I reported in my March 30th
post - even to the contents of the email sent by a
hacker to one of our local banks from our email address
- using our email service which the hacker then
Read Mr. Krebs post here - "Hacked
Inboxes Lead to Bank Fraud" and when you get to the
part where the Hacker's email is described, you'll see
why our local banker was astute enough to be suspicious
and contact us for verification.
Worse still, of the 3 examples cited in Mr. Kreb's blog
post, one of the banks failed to challenge that email.
The Bad grammar and poor punctuation should have raised
the alarm for any trained and responsible bank employee.
Mr. Krebs further points out that "Hacked and phished
email accounts increasingly are serving as the staging
grounds for bank fraud schemes targeting small
businesses. The scams are decidedly low-tech and often
result in losses of just a few thousand dollars, but the
attacks frequently succeed because they exploit existing
trust relationships between banks and their customers".
didn't realize our email password had been cracked,
...on a recent Friday morning, we received a 'phone call
from a local Bank Manager asking if we had just made an
email request for the balance in our account.
This was from a bank where we did not have an
A short time later, we realized that our incoming email
had stopped - no messages since around the time the Bank
Manager called us.
We contacted our eMail Service Provider and learned that
our password had been compromised and replaced by the
Hacker, who also installed a redirect code that
diverted all of our incoming email to his
private Gmail address.
Looking back at this episode, it became apparent that
our password for this email account was weak -
very weak, as a matter of fact.
The eMail Service Provider helped us clean up the mess
and guided us in restoring our email service with a much
stronger - very much stronger password.
What did we learn?
One - you can't be complacent or
unconcerned about the way things are when it comes to
your computer and Internet security. You must review and
Two - hackers and crackers have
software that can decipher your simple keywords at cyber
Three - our computers are being
bombarded constantly by non-human attackers.
"Incapsula, a cloud-based, website security and
performance company, recently did a study of 1,000 of
their customers to determine who or what was visiting
their sites. The results were rather astounding.
More than half (51%) of their client’s website traffic
was non-human including hackers, spambots,
scrapers and spies of sorts collecting proprietary
business information and
Threats to our online security are always with us but
aren't always easy to recognize. The cyber crooks are
sophisticated - and devious. They understand human
emotions like fear, anxiety, and apathy and continually
design - and redesign their phishing emails to trap us
into exposing our personal and even our financial
I'm leaving the "EVERGREEN"
posts here as reminder Alerts to a variety of recent
phishing practices to help us recognize, or become
suspicious of similar messages that can appear in our
Media and your kids Safety- are they at risk?
As a parent, grandparent, and now a great-grandparent, I've
watched more than a dozen children learn to socialize with
other kids - it's part of growing up.
As grown-ups, we socialize in many ways. We tweet, we make
friends on facebook, we Stumble, Digg, make videos to
share on YouTube, and look to make friends on even more Social Media sites .
Social networking sites are fun and children want to participate
in them, too, but they do present some potential dangers.
With the popularity of social networking sites, here are some
words of caution.
As a parent, the very first thing we should do is teach our children
about the possible dangers that exist on the Internet, particularly
about situations that might crop up on a social networking website.
This free article highlights some of the more Important subjects to
review with our children
- You can read it in abut two minutes
Labs Stinger* Updated thru Dec
you don't have a Virus Protection program yet, here's an
Emergency Step you should take,
McAfee offers a FREE Virus Scanning program named
It's a great backup tool when, for example,
your computer is infected with a
virus and you can't go online
for an update, or even use
your existing anti-virus
program. If you saved the latest
version of McAfee Labs Stinger
to a CD or flash drive, you
could disconnect from the
Internet and run a scan or two
with Stinger, which currently
viruses, Trojans and variants!
*Stinger is a standalone
utility used to detect and
remove specific viruses. It
is not a substitute for full
anti-virus protection, but
rather a tool to assist
administrators and users
when dealing with an
infected system. Stinger
scan engine technology,
including process scanning,
digitally signed .DAT files,
and scan performance
optimizations. It detects
and removes threats
identified under the "List
Viruses" icon in the Stinger
If you found our Security
Alert Blog interesting, please
subscribe to our RSS feed!
marketers and webmasters -
Who's stealing your stuff?
"How Would YOU Feel ...if you were surfing the Web and
suddenly saw an exact copy of something you created, and
to which you own the legal rights of use, on someone
else's web site? Including, but not limited to ...
* YOUR Articles,
* YOUR Web Site Designs
* YOUR Web Site Copy
* YOUR Sales Letter Copy
* YOUR Ebooks or Reports
* YOUR Ad Copy
* YOUR Software
* YOUR Other Products
* YOUR Graphics & Images
* YOUR Newsletters & Ezines
How would you reclaim your copyrighted
Wouldn't you like to know how to get your stolen
Intellectual Property removed from the web without
hiring a Lawyer?
You'll be pleased to learn that there is a brand new
ebook where you'll discover how you can "Beat Web
Thieves at Their Own Game!"
Actually, you really need this ebook BEFORE your
own intellectual property (or copyrighted material) is
stolen so you can take the necessary steps to protect
Included in her ebook is a recent case history
documenting how she used her expertise to have a blatant
case of plagiarism (complete sections of the i-Cop
website stolen and republished word for word) removed
within a matter of hours!
There's stuff in this ebook that has already helped me
prepare to take action against the thieves who have
copied my property and even shut down a couple of my
-some of which is the included word-for-word,
fill-in-the-blanks samples to use in corresponding with
the plagiarists, their ISP's, web hosts, and even their
lawyers, if necessary.
You'll want to take advantage of the low "Public Launch
price" before it goes up in the near future. Click on
over to learn how and where you can get immediate access
to your ebook -
"Beat Web Thieves at Their Own Game!"
hesitate to express
your views and opinions on my Security Alert Blog and Cyber
Security Alert postings (easily done by clicking on
the highlighted 'COMMENT' |
at each post. Watch for postings on fraud alerts,
virus alerts, worm alerts, Internet Security alerts, security scams,
parental controls, online predators, net security, and more. Be sure to visit our
Firewalls-and-Virus Protection website for even more help
Free report -
"Avoiding Current Security Threats"
There are still some unresolved issues with the
Conficker worm and Cyber criminals are flooding the
Internet with bogus "Anti Virus and Anti Spyware"
programs designed to steal your personal information,
add your computers to world wide "botnets", and generally
prey on unsuspecting web surfers with unprotected
But you can take steps to avoid these security threats,
and I have outlined them in a special report you can have
This report is an update and a bit of an overview of the
information published in my newsletters, blog and
It covers the basics of what to look for and
how to prepare your computer to avoid the next high risk
threat. It's a quick download (PDF file) which you
can obtain by going to the registration page and leaving
your email address so that the download instructions can
be sent to your email inbox.
Get Free Report here and share this web address with
your friends so the emails you get from them are clean
and free of malware.
Please accept our
to Help Parents Teach Their Kids to be Safe Surfers –
an Invitation to Help other Parents, Grandparents and Guardian by Sharing Your
Teaching Your Children To Be Safe When
They Were learning to Surf
the Internet. Please Tell Us
About It HERE
Contact Me Unlike the
people who use
Twitter to tell you they've
walked their dog, I Tweet
Only the things that I believe
all my followers will find useful.
So, grab a Twitter account and
Follow me on Twitter
Checkout the eBook "How to
Protect Your Privacy and Security
CLICK HERE for the Security Tips ebook, bonus
PC Security ebook
Free Resale Rights
Access - Instant Download - Anytime of the day or night
(These are electronic books that you
will download upon purchase...there will be no book mailed to your
- Instant Download - Anytime of the day or night
(This is an electronic book that you
will download upon purchase...there will be no book mailed to your
You should assume that the owner of this website has an affiliate
relationship and/or another material connection to the providers of
goods and services mentioned in this message and may be compensated when
you purchase from a provider. You should always perform due diligence
before buying goods or services from anyone via the Internet or offline.
-- (Terminology used with permission of
your Subscription to th
Security Alert News Reporter
A Newsletter with
periodic updates on the latest
events and issues affecting your personal
security We Value
Click Button to Read a recent issue and subscribe