Vital Internet Security Alerts and Information for the
everyday Non-technical Computer user, Internet User and
Web Surfer who just wants to be safe doing basic stuff
without the hassle of viruses, spyware, or worse.
I'm very pleased that you're here today,
and that you're
concerned about your computer security and family
Internet Safety. I look forward to your early return to
the Security Alert Blog.
Feed or book-marking this page will make it a lot easier
for you to visit again.
you don't have a Virus Protection program yet, here's an
Emergency Step you should take,
McAfee offers a FREE Virus Scanning program named
It's a great backup tool when, for example,
your computer is infected with a
virus and you can't go online
for an update, or even use
your existing anti-virus
program. If you saved the latest
version of McAfee Labs Stinger
to a CD or flash drive, you
could disconnect from the
Internet and run a scan or two
with Stinger, which currently
searches for 2038
viruses, Trojans and variants!
*Stinger is a standalone
utility used to detect and
remove specific viruses. It
is not a substitute for full
anti-virus protection, but
rather a tool to assist
administrators and users
when dealing with an
infected system. Stinger
scan engine technology,
including process scanning,
digitally signed .DAT files,
and scan performance
optimizations. It detects
and removes threats
identified under the "List
Viruses" icon in the Stinger
March 26, 2011
Are you still using outdated Microsoft
Internet Explorer browsers?
experience in creating websites that render properly in
various browsers was that the 10 year old IE6
doesn't always display our sites properly - showing
broken pages, misplaced images, etc.
Didn't seem to matter if the sites were created using
Dreamweaver or FrontPage.
Then we read in SunbeltSecurityNews,
that Microsoft is Urging Users to upgrade from IE6 (and
in my opinion, users should update if they are still
using IE7, too)
If you recall - the worlds top
software-security experts were panicky over the
discovery of a drone-like computer virus last summer. It
was notably different from and a lot more sophisticated
than any theyd seen.
We haven't heard a lot of public discussion about
Stuxnet recently, other than an occasional reference
to Cyber Warfare - but a tremendous amount of research
seems to have gone on behind the public view.
Vanity Fair published an article by Michael
Joseph Gross on their website that is
as thrilling as any spy story you might pick up at your
It's a "Not To Miss" article that raises many question
about clandestine activities of major governments in the
far East, Europe and the United States - and can scare
the heck out of you concerning the potential for
panic-creating Cyber warfare.
You will note that Yontoo has made our Top 10. Yontoo is
adware. If you don't like adware on your computer then
you should not download it.
Adware, also known as advertising software displays
third-party advertising on the computer. The ads can
take several forms, including pop-ups, pop-unders,
banners, or links embedded within web pages or parts of
the Windows interface.
Some adware advertising might consists of text ads shown
within the application itself or within side bars,
search bars, and search results. Adware is often
contextually or behaviorally based and tracks browsing
habits in order to display ads that are meant to be
relevant to the user.
This information, provided courtesy of Sunbelt
Software, Inc is covered by
Copyright Sunbelt Software, Inc. 1996-2011 and is
published here in accordance with their terms. None of
the above has been edited or changed from the
information provided in their "Security News". ...Richard
If you found our Security Alert Blog interesting, please
subscribe to our RSS feed!
GFI Labs, which is part of the GFI
security family (http://www.gfi.com/),
is hosting a Blogger site to help Internet users
identify and remove rogue security software and other
malware from infected computers.
Their website is not intended to promote or advertise
malicious software. What it does provide is solutions to
removing Rogue Antispyware for the following phony
But first, "What is Rogue antispyware?". Wikipedia has a
simple definition -
"Rogue security software is a form of computer
malware that deceives or misleads users into paying for
the fake or simulated removal of malware. .."
The blog includes instructions for removal of the
following rogues -
* Windows Optimal Settings (Yes, that's the right name)
* Antivirus System 2011
* Windows Optimal Solution
* Microsoft Security Essentials Alert
* AntiVira AV
* Windows Care Tool
* Windows Wise Potection
* PC Security 2011
Here's the link to all of these instructions, with
pictures of the Rogue software screen images to help you
identify your problem software -
I suggest you bookmark this Blogger post - just in case
one of these Rogues should infiltrate your system - and
cause you a lot of grief. You can even subscribe to
their posts thru an RSS link and have their updates
appear on your RSS aggregator (like my.yahoo, Newsgator,
Thank you GFI.*
* (GFI Software provides a single source of web and
mail security, archiving, backup and fax, networking and
security software and hosted IT solutions for small to
This Week's Top 10 Spyware Threats
(Alert furnished by Sunbelt Software Company)
Please note Number 5 -
An Exploit is software or code that targets
security vulnerabilities, usually in the operating
system or browser, but may also target vulnerabilities
in other programs.
Exploits are typically used to install malicious
software on the victim's computer without the victim's
knowledge or consent. An Exploit may be used to
malware that gives the attacker complete access to
and control of the affected computer from a remote
Before you download that PDF make sure you know its
source. In fact before you download anything be certain
of who sent it and what they sent. And of course always
keep your definitions up-to-date.
Social networking sites rely on
connections and communication, so they encourage you to
provide a certain amount of personal information.
When deciding how much information to
reveal, people may not exercise the same amount of
caution as they would when meeting someone in person
* the internet provides a sense of anonymity
* the lack of physical interaction provides a false sense of
* they tailor the information for their friends to read, forgetting
may see it
* they want to offer insights to impress potential friends or
While the majority of people using these sites do not
pose a threat, malicious people may be drawn to them
because of the accessibility and amount of personal
information that's available.
The more information malicious people have about you,
the easier it is for them to take advantage of you.
Predators may form relationships online and then
convince unsuspecting individuals to meet them in
person. That could lead to a dangerous situation. The
personal information can also be used to conduct a
social engineering attack.
By using information that you provide about your
location, hobbies, interests, and friends, a malicious
person could impersonate a trusted friend or convince
you that they have the authority to access other
personal or financial data.
Additionally, because of the popularity of these sites,
attackers may use them to distribute malicious code.
Sites that offer applications developed by third
parties are particularly susceptible. Attackers may be
able to create customized applications that appear to be
innocent while infecting your computer or sharing your
information without your knowledge.
How can you protect yourself? US-CERT (a
provides 10 very important tips on maintaining
your safety when you participate in sites like facebook,
twitter, MySpace, etc.
- - - - - - - - - - - - - - - - - - - - -
Children are especially susceptible to the threats that
social networking sites present. Although many of these
sites have age restrictions, children may misrepresent
their ages so that they can join. By teaching children
about internet safety, being aware of their online
habits, and guiding them to appropriate sites, parents
can make sure that the children become safe and
- - - - - - - - - - - - - - - - - - -
(This information was Produced 2006, 2009, 2011 by
US-CERT, a government organization.)
I urge you to visit the US-CERT site from which I
obtained this information and copy and print these 10
Tips to share with your children, older family members
Computer maintenance is one way to keep
your laptop or PC working like new five years from now.
Most people dont think about maintenance until
something catastrophic happens, but you have the good
fortune to be thinking about it now. One part of the
maintenance process is keeping your computer running at
There are many reasons that computers begin to run slow:
viruses, not enough memory, too many applications (goes
along with insufficient memory) or a lot of files.
Whatever the reason, something needs to be done so you
dont have to work at a snails pace.
Behind the scenes on your computer, many things are
going on. If you get on the Internet, your computer may
be allowing cookie files to be stored to remember
where youve been. We download any and everything from
music to videos to eBooks from the Internet. There are
temporary files created for some of your downloaded
items that can accumulate over time.
Sometimes, the hard drive just needs to be cleaned up a
bit. With the defrag process, the computer finds ways to
free up space on your hard drive. This cleaning process
ensures optimal performance from your computer when
something else is not the problem. Defragmenting
your computer is a good first step when performance is
not at its best.
If you are having a hard time navigating the various
files on your computer, the proper name of the process
used to correct this is Disk Defragmenter. You can use
your program search bar on the Start Menu to find it
easily. The defragmenter takes fragmented files and
consolidates them or gets rid of them completely
depending on what they are and if theyre needed.
This is not something that you need to do every day.
Remember, you are maintaining here. Performing the
operation once a week is good for those who use their
computer every day and create a lot of documents and
files. The best thing about Windows is that these
maintenance operations can be set up on a schedule so
that they work behind the scenes. Schedule maintenance
operations at odd times like early in the morning or in
the middle of the night, when you are not at work on
your computer in order to keep them from slowing down
your PC while youre trying to work.
In a nutshell, disk defragmentation is important for
everyone. Scheduling the operation leaves your brain
free to think about other things. If the defragmentation
process does its job, your computer will continue
working well for you without any hitches or glitches.
By the way - SunbeltSoftware's blogger, Larry Jaffe
(he's really the Editor of SunbeltSecurityNews) reports
these as the current malware threats of the week -
DiskOK is a rogue security product that pretends to find
hard disk and file errors on a victim's machine in order
to frighten him or her into purchasing this useless
application. VIPRE detects it as
(Number 8 below).
On Patch Tuesday (January 11, 2011)
Microsoft released two bulletins with patches for three
security holes affecting all versions of the Windows
The Microsoft Security Bulletin Summary for January 2011
describes multiple vulnerabilities in Microsoft Data
Access Components and Windows Backup Manager. Microsoft
has released updates to address the vulnerabilities.
marketers and webmasters -
Who's stealing your stuff?
"How Would YOU Feel ...if you were surfing the Web and
suddenly saw an exact copy of something you created, and
to which you own the legal rights of use, on someone
else's web site? Including, but not limited to ...
* YOUR Articles,
* YOUR Web Site Designs
* YOUR Web Site Copy
* YOUR Sales Letter Copy
* YOUR Ebooks or Reports
* YOUR Ad Copy
* YOUR Software
* YOUR Other Products
* YOUR Graphics & Images
* YOUR Newsletters & Ezines
How would you reclaim your copyrighted
Wouldn't you like to know how to get your stolen
Intellectual Property removed from the web without
hiring a Lawyer?
You'll be pleased to learn that there is a brand new
ebook where you'll discover how you can "Beat Web
Thieves at Their Own Game!"
Actually, you really need this ebook BEFORE your
own intellectual property (or copyrighted material) is
stolen so you can take the necessary steps to protect
Who wrote the book? - jlScott. The author is Director of
the International Council of Online Professionals (i-Cop).
Included in her ebook is a recent case history
documenting how she used her expertise to have a blatant
case of plagiarism (complete sections of the i-Cop
website stolen and republished word for word) removed
within a matter of hours!
There's stuff in this ebook that has already helped me
prepare to take action against the thieves who have
copied my property and even shut down a couple of my
-some of which is the included word-for-word,
fill-in-the-blanks samples to use in corresponding with
the plagiarists, their ISP's, web hosts, and even their
lawyers, if necessary.
You'll want to take advantage of the low "Public Launch
price" before it goes up in the near future. Click on
over to learn how and where you can get immediate access
to your ebook -
"Beat Web Thieves at Their Own Game!"
hesitate to express
your views and opinions on my Security Alert Blog and Cyber
Security Alert postings (easily done by clicking on
the highlighted 'COMMENT' |
at each post. Watch for postings on fraud alerts,
virus alerts, worm alerts, Internet Security alerts, security scams,
parental controls, online predators, net security, and more. Be sure to visit our
Firewalls-and-Virus Protection website for even more help
Free report -
"Avoiding Current Security Threats"
There are still some unresolved issues with the
Conficker worm and Cyber criminals are flooding the
Internet with bogus "Anti Virus and Anti Spyware"
programs designed to steal your personal information,
add your computers to world wide "botnets", and generally
prey on unsuspecting web surfers with unprotected
But you can take steps to avoid these security threats,
and I have outlined them in a special report you can have
This report is an update and a bit of an overview of the
information published in my newsletters, blog and
It covers the basics of what to look for and
how to prepare your computer to avoid the next high risk
threat. It's a quick download (PDF file) which you
can obtain by going to the registration page and leaving
your email address so that the download instructions can
be sent to your email inbox.
Get Free Report here and share this web address with
your friends so the emails you get from them are clean
and free of malware.
Please accept our
to Help Parents Teach Their Kids to be Safe Surfers
an Invitation to Help other Parents, Grandparents and Guardian by Sharing Your
Teaching Your Children To Be Safe When
They Were learning to Surf
the Internet. Please Tell Us
About It HERE
Update your Emergency Virus Protection program
you don't have your Virus Protection program yet, here's an
Emergency Step you should take,
McAfee offers a FREE Virus Scanning program named STINGER.
It has grown in size a little over the past few years and no longer fits on a single floppy Disk.
But so many of the newer PCs, including lap tops don't have a "A" floppy
drive anyway, you should burn it to a CD or memory stick for an offline back up tool.
You can use it as we do, to check
any of your PC computers for viruses, without being on line.
It is an 'After the Fact' application, which means that it does not scan
incoming email files, attachments or downloads, but it does scan whatever
you have already received online.
It currently checks, and repairs over 200 recent viruses. It's FREE
to download fromMcAfee
Contact Me Unlike the
people who use
Twitter to tell you they've
walked their dog, I Tweet
Only the things that I believe
all my followers will find useful.
So, grab a Twitter account and
Follow me on Twitter
Checkout the eBook "How to
Protect Your Privacy and Security
CLICK HERE for the Security Tips ebook, bonus
PC Security ebook
Free Resale Rights
Access - Instant Download - Anytime of the day or night
(These are electronic books that you
will download upon purchase...there will be no book mailed to your
- Instant Download - Anytime of the day or night
(This is an electronic book that you
will download upon purchase...there will be no book mailed to your
You should assume that the owner of this website has an affiliate
relationship and/or another material connection to the providers of
goods and services mentioned in this message and may be compensated when
you purchase from a provider. You should always perform due diligence
before buying goods or services from anyone via the Internet or offline.
-- (Terminology used with permission of
your Subscription to th
Security Alert News Reporter
A Newsletter with
periodic updates on the latest
events and issues affecting your personal
security We Value
Click Button to Read a recent issue and subscribe