up to date on Internet Security with the
Firewalls and Virus Protection Security Alert Blog
Richard Rossbauer's SECURITY
(Archives Apr-May-June 2009)
Internet Security Alerts and
for the everyday
Non-technical Computer user,
User and Web Surfer
who just wants
to be safe doing
without the hassle
of viruses, spyware, or worse.
pleased that you're here today,
and that you're concerned about
computer security and family Internet Safety. I look forward to
return to the Security Alert Blog.
Web Feed or book-marking this page will make it a lot easier to
In this period of economic turmoil, more and more people are
looking at adding to their income using the Internet. Although most of
these people are honest, some are simply predators preying on the the urgent need of
They present themselves as providers with offers of money
making schemes - often with outrageous claims of easily attained
riches with little or no effort.
They are the ultimate "Scam Artists".
If you are one of the
many considering the Internet as a source for earning some extra
income, keep in mind the old caveats, "Buyer Beware", and "If it
sounds too good to be true, it probably is."
How do you check if an offer is legitimate or not?
There are Websites that outline
scams online. A simple Google search will turn up several top
Websites and it is always a good idea to check and see what is not
Most online work at home jobs are
scams. There are more people who want to work at home
than there are jobs, so it doesn't make
Have you heard the radio and TV commercial reporting that an
identity theft takes place every 3 seconds?
Exaggerated or not, it's still an alarming thought. However, there
is something we can all do to prepare ourselves to
minimize our chances of being one of the victims.
We can learn about and understand how the perpetrators operate, and
what steps to take if we do become victimized. Here are
links to resources on my websites that should be in your
library - they are all free.
Part course on Avoiding Identity Theft ....
June 22, 2009Here's how
I plan to protect my computer this summer,
what are your plans?
recent issue of my "Security Alert NewsReporter",
there's an update on the current virus and Trojan Horse
threat activity and some advice on Rogue software which
is designed to fool us into believing our computers have
more viruses and worms than they may actually have.
There is also a lot of Free advice on protecting your computers,
advice in the form of a series of lessons and eCourses
that I hope you use.
This issue is different, however. There's an optional version to
the usual text email. You can read it
here (and I hope you will use the email link to give
me your opinion - the version you can read in your
browser, or the email text version)
Summer vacation time is soon here for us to enjoy - the
criminal element doesn't take vacations - they're using
all of their time to try to trap us - stealing whatever, and however they can.
3, 2009How to Protect your Computer when You Are
increasingly sophisticated software, faster
networks and online communication have brought many benefits for
everyday computer users. However, with these advances have come increased security risks. When cyber criminals harness this very
technology to further their evil ends, many previously unknown risks
lie in wait to trap the unprepared, often hidden among the social
The following should be a review for the more experienced computer
user, but some of these threats could be new to the lesser
experienced web surfers.
Here are some common threats and ways to
Viruses - These malicious software codes cause undesirable effects
on our computers. A virus is designed to spread itself without the
knowledge of the computer user. A computer may become infected
through downloads from the internet using CD's, floppy disks, or
storage devices with infected programs, or from other computers on
the network. Another extremely common way viruses spread is
through infected email attachments.
Given the many modes of transmission, computer viruses
are clearly a threat online as well as offline. The old adage
"Prevention is better than the cure" is particularly true in the
case of computer viruses. You can save yourself a lot of virus
grief and many hours of misery by avoiding infection in the first
If you have,
The Internet Crime Complaint Center (IC3) accepts
online Internet crime complaints from either the person
who believes they were defrauded or from a third party
to the complainant. If you have been victimized, your can file a complaint at
In their recent Press Release (03/31/09) The Internet Crime
Complaint Center (IC3) announced their "IC3 2008
Annual Report on Internet Crime".
The Report states that complaints of online crime hit a record high
in 2008. IC3 received a total of 275,284 complaints, a
33.1% increase over the previous year.
The total dollar loss linked to online fraud was $265 million,
about $25 million more than in 2007.
The average individual loss amounted to $931.
While the complaints consisted of a variety of fraud types, non-delivery
of merchandise and/or payment ranked number one (32.9%).
Internet auction fraud was the second most reported
offense (25.5%) followed by
There are still some unresolved issues with the
As of this writing, the worm, which started spreading to
computers last year, appears to be turning its infected
hosts into servers for e-mail spam, security experts
Apparently, the payload has been made more of a threat
by adding a second virus, called Waledac which
adds infected computers to botnets which send out e-mail
And yet a third virus carried by Conficker prompts
infected PC owners to purchase a fake (rogue software)
anti-virus program called
Spyware Protect 2009 for $49.95. (Don't
fall for it!)
But you can take steps to avoid these security threats,
and I have outlined them in a new report you can have
This report is an update and a bit of an overview of the
information published in my newsletters, blog and
It covers the basics of what to look for and
how to prepare your computer to avoid the next high risk
threat. It's a quick download (PDF file) which you
can obtain by going to the registration page and leaving
your email address so that the download instructions can
be sent to your email inbox.
Get Free Report here and share this web address with
your friends so the emails you get from them are clean
and free of malware.
aren't careful, you can be duped unto
buying antivirus software that is actually a fake -
designed to steal your money and often load your system
with malicious code that continues to pop-up false
alerts of virus infections.
How can you tell which ones are fake? It isn't
easy because the purveyors of these criminal ploys are
extremely talented and clever. The stuff they are
promoting - like Antivirus'09 - is so well
presented that even some more experienced web surfers
have been trapped.
So that you don't get trapped with this one, take
a look at the pictures of it at the
Sunbelt Software Company's Blog.
These images will help you recognize it - and avoid it.
The first place I saw this was on Paul Myers
TalkBizNews newsletter. It's an easy and simple
method that could identify the presence of the Conficker
worm on your PC
Here's how it works - Go to this page for the "Conficker
hesitate to express
your views and opinions on my Security Alert Blog and Cyber
Security Alert postings (easily done by clicking on
the highlighted 'COMMENT' |
at each post. Watch for postings on fraud alerts,
virus alerts, worm alerts, Internet Security alerts, security scams,
parental controls, online predators, net security, and more. Be sure to visit our
Firewalls-and-Virus Protection website for even more help
Update your Emergency Virus Protection program
you don't have your Virus Protection program yet, here's an
Emergency Step you should take, Right Now!
McAfee offers a FREE Virus Scanning program named STINGER.
It has grown in size a little over the past few years and no longer fits on a single floppy Disk.
But so many of the newer PCs, including lap tops don't have a "A" floppy
drive anyway, you should burn it to a CD or memory stick for an offline back up tool.
You can use it as we do, to check
any of your PC computers for viruses, without being on line.
It is an 'After the Fact' application, which means that it does not scan
incoming email files, attachments or downloads, but it does scan whatever
you have already received online.
It currently checks, and repairs over 200 recent viruses. It's FREE
to download fromMcAfee
Contact Me Unlike the
people who use
Twitter to tell you they've
walked their dog, I Twitter
Only the things that I believe
all my followers will find useful.
So, grab a Twitter account and
Follow me on Twitter
your Subscription to th
Security Alert News Reporter
A Newsletter with
periodic updates on the latest
events and issues affecting your personal
security We Value
Click Button to Read a recent issue and subscribe