|
Richard Rossbauer's
SECURITY
ALERT BLOG Vital
Internet Security Alerts and
Information
for the everyday
Non-technical Computer user,
Internet
User and Web Surfer
who just wants
to be safe doing
basic stuff
without the hassle
of viruses, spyware, or worse.
I'm very
pleased that you're here today,
and that you're concerned about
your
computer security and family Internet Safety. I look forward to
your early
return to the Security Alert Blog.
Using the
Web Feed or book-marking this page will make it a lot easier
for you to
visit
again.
Thanks, Richard Rossbauer
(Read About Us)
Save This Page
Blogroll Me!
|
POSTS FOR APRIL THRU DECEMBER 2010 |
December 28 2010
Are You aware of How
How Internet Marketing
Gurus Make You Buy Their Stuff?
It is said that the pen is mightier than the sword.
That is so true especially in internet marketing where
there is very little face-to-face interaction between
the marketer and the prospective customer.
Therefore, it is imperative for internet marketers to
'speak' to their prospects through what they write.
Successful internet marketers have learned the art of
communicating through powerful, compelling copy that
almost hypnotizes their prospects into buying their
stuff.
How do they do it?
Read about Guru Marketing Tactics HERE
With all this information, you can see through all
the gurus' methods of making you buy their stuff. Not
that much of it isn't of value, but this article will
give you the background you need to better practice
your own due diligence.
...Richard
If you found our Security Alert Blog interesting, please
subscribe to our RSS feed! |
HAPPY HOLIDAYS |
December 25th
has been here and gone for another year. I feel that the most valuable gifts that
could be
given to anyone are love and friendship, respect, and
tolerance.
Can you imagine how much better this world would be if
everyone had it in them to bestow these gifts every day,
not just on an annual holiday.
I wish all of the best to you now and into the future.
Your support as followers of my web postings is
cherished. Thank you.
Richard Rossbauer
|
Check the
Security Alert Blog Archives -
Lots of Cool Posts |
December 19, 2010
We Used the Kitchen for a Computer Room
by Jim, Philadelphia, PA suburbs
This is another one of the top rated
responses to our Invitation to
Help Others by Sharing Your Experiences in Teaching Your
Children To Be Safe When They Were learning to Surf the
Internet.
______________________
My children range in age from toddlers to
early teens. The older ones learned a
lot about using the computer by instant messaging with
their class mates. It was amazing to watch as they
chatted with 5, 6, or more kids at the same time.
The younger ones learned from watching, too. By age 5,
one of my little girls was able to put a cd in and start
the computer all by herself.
With only one computer, they had to learn to take turns
and it took some supervising to even it it out for them.
But we kept the computer in between our
kitchen and dining area so it was pretty easy to see
what they were doing.
The teeners are aware of the bad stuff and we remind
them to be very careful when they get email and go to
the chat rooms.
They know not to tell private stuff to strangers.
... Jim
CLICK HERE to Share
your Experiences and learn how other parents
helped their kids to safety
If you found our Security Alert Blog interesting, please
subscribe to our RSS feed! |
Check the
Security Alert Blog Archives - Lots of Cool Posts |
December 12, 2010 Keep
your name private
by BM, London UK
This is one of the top rated responses to
our Invitation to
Help Others by Sharing Your Experiences in Teaching Your
Children To Be Safe When They Were learning to Surf the
Internet.
I believe it carries a very important
message. Do You?
____________________________
I asked my my teen daughter what one
thing she thinks is the most important thing she has
been taught to keep herself safe on the internet.
Her response: not to tell anyone her name.
I can add that when she is using a chat room, she is
not to stay chatting if someone she does not know
(as in someone who is not in her class at school or
circle of friends) comes into the chat room and
starts to chat with her and her friends. Even if
someone she knows invites the person, she knows not
to chat while the unknown person is part of the
chat.
It is sad but true that every case of child abuse
that I know of personally has involved either a
family member or someone who is a close friend of
the family. The internet makes it so easy to make
friends and become familiar with people. Trying to
teach children to see everyone as a threat does seem
unfair but the only real way to make them aware of
how close and innocent danger can appear to be.
In addition, every user of the computer has their
own login details and none of the accounts used for
surfing the internet have any admin. privileges.
Browsers are also set up to not display or download
any third party content, neither images nor scripts.
As a final security measure, the hosts file is kept
up to date with all requests for 'banned' sites sent
to 127.0.0.1.
... BM, London, UK
CLICK HERE to Share
your Experiences and learn how other parents
helped their kids to safety
If you found our Security Alert Blog interesting, please
subscribe to our RSS feed!
|
|
November 21, 2010 Use NoodleNet
to help keep your kids safe online
by Guest Author Pam Brown (Texas)
I have found the best product out there
for protecting my children. My oldest son "accidently"
hit upon several adult entertainment sites when
searching for toys. So that left me searching for how to
protect him when he is searching for games and toys and
perhaps give him some safe sites to visit.
Give NoodleNet a try. It creates a safe desktop
enviornment. That means that it temporarily takes over
you computer's desktop. This way kids can play games on
such sites as Disney, Discovery Kids, NickJr, and tons
of other safe sites.
This software is amazing, it even stops the kids from
clicking on an ad that might take them to something they
shouldn't see. It blocks chat so no one can talk to my
kids and offer them who knows what. You can even set
session timers. That allows you to set say an hour a day
for your child to play on the computer.
I don't work for NoodleNet, so don't get the wrong idea.
This isn't an ad, just a Mom that found a good solution.
I wanted more people to know about it.
CLICK HERE to COMMENT on
Pam's Post and to
add your own experiences.
... Richard
If you found our Security Alert Blog interesting, please
subscribe to our RSS feed!
|
Sorry about not keeping these posts
up-to-date. I had some medical problems over the
past few months that I'm now getting under control. I
hope to keep you better informed in the coming months.
Thanks for being here, today.
...Richard Rossbauer |
November 12,
2010 Going
on Computers when left alone
This is one of the top rated responses to
our Invitation to
Help Others by Sharing Your Experiences in Teaching Your
Children To Be Safe When They Were learning to Surf the
Internet.
I believe it carries a very important
message. Do You?
____________________________
Going
on Computers when left alone
by Samantha Cole
(Oxfordshire)
I am in my view; a very protective
and sensible Mum, I have spoken not just once but
many times of internet dangers.
I have followed the recommended precautions, not
allowing my children to be on the internet without
either Parent present, I have the passwords to all
their sites and monitor their online 'friends' and
chats, and until yesterday I believed my daughter
had totally understood why we do what we do with
regards keeping her safe.
In my arrogance of thinking I was doing all I could
to keep her safe, I failed to appreciate the 15mins
she is alone at home after School while I am picking
my other child up and in those 15mins she made a
video of herself and had a conversation with a
stranger who got her to give out the information she
had been told never to do.
She told her name, her school, where she lived, it
was all the stuff the books tell us children will
do-I am 'numb' to say the least.
The Police have had to be informed and it's blown
mine and my families world apart. This isn't easy
for me to put into words BUT if it keeps another
family from going through what we're experiencing
and keeping just one child safe then praise be to
God.
Don't feel confident like we did, children will
expose any weakness as I've found out, it seems the
more we try to keep them from these 'dangers' the
more intriguing they become to them.
I don't have any clever answer I just wanted to
share my experience and to make you aware of the
times when you may be out to disable your system as
I've found out 15mins is a damaging amount of time.
CLICK HERE to COMMENT on Samantha's Post and to
add your own experiences.
... Richard
If you found our Security Alert Blog interesting, please
subscribe to our RSS feed!
|
Check the
Security Alert Blog Archives - Lots of Cool Posts |
October 20,
2010 Cyber War - Looks like Stuxnet
is one of the Tools
Target identified, missile launched, countermeasures
applied, so reports Iran -
"The industrial computers infected by the Stuxnet virus
have been cleaned," Mohsen Hatam, deputy industry
minister, was quoted as saying on the state television's
website.
"Who done it?" A leading European analyst said
Israel introduced the Stuxnet computer virus into Iran's
nuclear energy plant at Bushehr. Ralph Langner, a German
cybersecurity expert, said Israel, in what he said was
an operation called "myrtus," appeared to have designed
Stuxnet and embedded the virus in control systems at the
1,000 megawatt Bushehr reactor.
Bloomberg Businessweek reports that The spread of the
Stuxnet computer worm has heightened fears about the
security of industrial control computer systems that run
factories and power plants. The rogue program, which
affects machines sold by Siemens (SI), has been found in
computers around the world, Symantec says. Most are in
Iran, leading analysts to believe that its nuclear
program is the target.
What does it mean?
From guardian.co.uk - Dave Clemente, a researcher
into conflict and technology at the International
Security Programme at Chatham House in London, argues
that where once the threat from cyber war was "hyped
reality has quickly caught up".
"The US and the UK are now putting large amounts of
resources into cyber warfare, in particular defence
against it," said Clemente, pointing out that there is
now a cyber security operations centre in GCHQ and a new
office of cyber security in the Cabinet Office. He
added: "What I think you can say about Stuxnet is that
cyber war is now very real. This appears to be the first
instance of a destructive use of a cyber war weapon.
Think about it - are you anti-infection programs
up-to-date and in order?
... Richard
If you found our Security Alert Blog interesting, please
subscribe to our RSS feed! |
|
September 28, 2010
Stuxnet
- Is this malware the Cyber Terrorist's Ultimate Threat?
Republished from The Daily Beast on Sep 28, on the
Business Insider, Trevor Butterworth's article is a must
read for anyone who wants to know what
CyberCriminals are really Planning, and Doing.
Titled "Cybercriminals Launch New Era of "Geek Terror",
Trevor reveals some of the high-stakes crimes being
planned and perpetrated in secrecy - like A worm in
Irans nuclear facility. A plane crash in Spain. Chiles
Web heist.
Makes one wonder if it's just cybercriminals or if Rogue
Nation States aren't part of these terrorist threats,
and actual incidents.
If we thought Conficker was dead because there hasn't
been much news about it, well, Conficker is still
considered by many to be the big mystery of the
cyberworld because no one knows why its there or what
its going to do.
And now, along comes Stuxnet, like a pre-programmed
guided missle that can do unimaginable harm to people,
businesses, the military and even governments.
Read more, it might raise the hair on the back of your
neck:
http://www.businessinsider.com/cyber-war-2010-9
... Richard
If you found our Security Alert Blog interesting, please
subscribe to our RSS feed! |
Check the
Security Alert Blog Archives - Lots of Cool Posts |
August 8, 2010
Internet
marketers and webmasters -
Who's stealing your stuff?
"How Would YOU Feel ...if you were surfing the Web and
suddenly saw an exact copy of something you created, and
to which you own the legal rights of use, on someone
else's web site? Including, but not limited to ...
* YOUR Articles,
* YOUR Web Site Designs
* YOUR Web Site Copy
* YOUR Sales Letter Copy
* YOUR Ebooks or Reports |
* YOUR Ad Copy
* YOUR Software
* YOUR Other Products
* YOUR Graphics & Images
* YOUR Newsletters & Ezines |
How would you reclaim your copyrighted
property?
Wouldn't you like to know how to get your stolen
Intellectual Property removed from the web without
hiring a Lawyer?
You'll be pleased to learn that there is a brand new
ebook where you'll discover how you can "Beat Web
Thieves at Their Own Game!"
Actually, you really need this ebook BEFORE your
own intellectual property (or copyrighted material) is
stolen so you can take the necessary steps to protect
yourself, now.
Who wrote the book? - jlScott. The author is Director of
the International Council of Online Professionals (i-Cop).
Included in her ebook is a recent case history
documenting how she used her expertise to have a blatant
case of plagiarism (complete sections of the i-Cop
website stolen and republished word for word) removed
within a matter of hours!
There's stuff in this ebook that has already helped me
prepare to take action against the thieves who have
copied my property and even shut down a couple of my
sites -
-some of which is the included word-for-word,
fill-in-the-blanks samples to use in corresponding with
the plagiarists, their ISP's, web hosts, and even their
lawyers, if necessary.
Here's the link to get your ebook -
http://tinyurl.com/beat-web-thieves
You'll want to take advantage of the low "Public Launch
price" before it goes up in the near future. Click on
over to learn how and where you can get immediate access
to your ebook -
"Beat Web Thieves at Their Own Game!"
... Richard
If you found our Security Alert Blog interesting, please
subscribe to our RSS feed! |
Check the
Security Alert Blog Archives - Lots of Cool Posts |
July
29, 2010
Who is looking at
your Facebook profile?
How many of you have a Facebook page?
Ever wonder who might be checking out your facebook profile?
Well, hundreds of other folk have the same question and
that is exactly why scammers have created phony sites
offering to show you who is looking at your profile.
But beware - many of these are simply phishing sites
attempting to gain your personal information which can
be used for a variety of nefarious reasons.
If you make the mistake of clicking on the link to one
of these phony pages offering to tell you who is viewing
your Facebook profile, you will find that the people
behind the "services" want you to do a few things first.
The Sophos(*) Company's Senior Technology Consultant -
Graham Cluley - has posted images of some of these
phishing sites and some professional advice on how to
avoid scams like these.
Here's the link to that post, and if you have a Facebook
account, it's more than worth the few minutes it will
take you to check it out. (this not an affiliate link)
www.sophos.com/blogs/gc/g/2010/07/23/viewed-facebook-profile-care/
(*) Sophos is a world leader in IT
security and data protection offering organizations
complete protection and control defending against
known and unknown malware, spyware, intrusions, unwanted
applications, spam, policy abuse and data leakage, and
providing comprehensive network access control.
Richard
If you found our Security Alert Blog interesting, please
subscribe to our RSS feed! |
Check the
Security Alert Blog Archives - Lots of Cool Posts |
July
25,2010
Do you have
a paper shredder? - No?
It would be a good
idea to buy one immediately to protect your
privacy and personal information,
and to prevent identity theft.
Do this by shredding every piece of paper you handle
that contains your name, address, and any account
numbers into tiny pieces that a potential identity
thief has no chance of reassembling.
The papers you need to destroy include your utility
bills, bank statements, junk mail, canceled checks,
and most important - anything that contains
your Social Security Number and even your email
address.
Print-outs you make
while online often include your email address, date,
possibly your credit card and your bank account
numbers.
Anything that can
identify you, or any financial account papers that
you have, must be shredded beyond recognition.
Merely depositing such papers into a garbage can is
not good enough. Garbage cans and dumpsters are
treasure troves for "Dumpster Divers" and
identity thieves. Recycle bins are not safe
either. ID thieves will dig through personal recycle
bins and those at community recycling centers, to
get potentially damaging information on you. You can
and should recycle these documents once they have
been shredded, but how should they be shredded?
The features to look for in a paper shredder are
described in the rest of the article
"3 Most Important Paper Shredder Features"
Be safe - protect your family from Identity Thieves.
... Richard
If you found our Security Alert Blog interesting, please
subscribe to our RSS feed! |
Check the
Security Alert Blog Archives - Lots of Cool Posts |
July
22, 2010
New beta of
Microsoft's Security Essentials 2.0.
Read about it in cnet news
- download instruction included in the post.
http://news.cnet.com/8301-10805_3-20011194-75.html
Microsoft released a beta of the new version 2.0 of its
Security Essentials anti-malware software on July 20th,
with a few changes and enhancements.
It's smarter at detecting and removing security threats
and offers better performance than version 1.0,
according to a Microsoft blog. The software also now
integrates directly with Windows Firewall and gives
users the option to turn the firewall on or off.
The initial release of Security Essentials was well
received with positive reviews from CNET and other tech
sources.
More at the Microsoft Windows Blog
http://windowsteamblog.com/
.. Richard
If you found our Security Alert Blog interesting, please
subscribe to our RSS feed! |
Check the
Security Alert Blog Archives - Lots of Cool Posts |
June
15, 2010 Free
Stinger virus removal software updated on June 14th.
Get the McAfee Labs Stinger
Virus Remover Software update link
here
Stinger is a
stand-alone utility used to detect and remove specific
viruses. It's not a substitute for full anti-virus
protection, but rather a tool to assist administrators
and users when dealing with an infected system. Stinger
utilizes next generation scan engine technology,
including process scanning, digitally signed DAT files,
and scan performance optimizations.
Save it to a CD or memory stick. It could save the day
if a virus blocks your connection to the Internet.
... Richard
If you found our Security Alert Blog interesting, please
subscribe to our RSS feed! |
Check the
Security Alert Blog Archives - Lots of Cool Posts |
June 14, 2020
Here's a
Free ecourse that could add to your safety
While reviewing the lesson pages for the new "Body
Language Basics" ecourse, the thought struck me that
understanding a person's non-verbal signals could easily
help avoid aggressive or threatening confrontations.
So, as a follower of my Safety Alerts postings, it
seemed quite appropriate to share this Free eCourse with
you.
Register for your copy of the eCourse here and
immediately start to receive a new lesson in your email
every two or three days until you have all five.
Here's the direct link to the sign-up page. Just enter
your first name and a valid email address, and you'll
have Lesson One within a few minutes.
http://tinyurl.com/2716ord
or use this sign-up address -
www.richardpresents.com/body-language-course.html
The "Body Language Basics " Course covers
information that will help you learn how to effectively
interpret the signs and signals people are sending you
with their body -
-in any situation!
... Richard
If you found our Security Alert Blog interesting, please
subscribe to our RSS feed! |
Check the
Security Alert Blog Archives - Lots of Cool Posts |
June 9, 2010
Microsoft,
Apple, and Adobe post a bunch of updates
-
Get Microsoft Security Updates
here
http://www.update.microsoft.com/windowsupdate/v6/thanks.aspx?ln=en&&thankspage=5
Apple Security updates for Safari 5.0 and 4.1
here
http://support.apple.com/kb/HT4196
Adobe Security Bulletin
here
http://www.adobe.com/support/security/advisories/apsa10-01.html
And when you have finished installing these, be sure to
check out the June 9, 2010 post about the ZeuS Trojan in
his blog at "Krebs
on Security",
http://krebsonsecurity.com/
Krebs reports that the ZeuS Trojan is loaded into a
major spam email campaign announcing fake alerts from
the IRS, Twitter and certain Youtube videos.
You should know, and remember that the Internal Revenue
Service does not communicate with taxpayers about their
accounts using email.
Do your family and friends a favor by reminding them
that they will not receive valid account information
from The IRS in their email, ever.
...Richard
If you found our Security Alert Blog interesting, please
subscribe to our RSS feed!
|
|
May
30, 2010
Am I
stupid? I could have become a millionaire
I could have become a millionaire
many times over this month.
I can't remember when I've been so lucky!
Every day during this past month there have been dozens
of notices in my email
that there are millions of dollars just waiting for me
to act.
There have been so many that I didn't know where to
start - the alerts came
from addresses like these, with Subject lines to grab my
attention
johnsigen@ btinternet.com |
ATTENTION:
BENEFICIARY |
officefile.office@ att.net |
Your Bank Draft
worth of $3.8million usd |
barbara.david@ btinternet.com |
CONTACT FEDEX
DELIVERY OFFICE COTONOU. |
sblucci@ sbcglobal.net |
Coca-Cola 2010
promo (contact claims office for your prize) |
a.kampman@ btinternet.com |
Fro.Mr.Johnson
Salim To You |
e3424@ btconnect.com |
CONGRATULATIONS
(3 million dollars on this one) |
centbnk16@ excite.it |
IMPORTANT AND
URGENT (Another Nigerian Lure) |
contractrevew@ gmail.com |
CONFIDENTIAL |
jjasssson49@ onet.pl |
INVESTMENT |
yisimon77@ yahoo.com.uk |
ATTN:SIR/ADAM |
What's the matter with
me? Why didn't I jump at these bonanzas?
Well, you and I recognize them all as fakes, but what
about the less experienced
web surfers, young and old, who may be in dire need of
money to buy food, pay
for their utilities, rent, buy clothes -
They are being suckered into a trap.
Do you know anyone who might fall for these robber
tactics?
If so, save your friends and relatives from sure
financial disaster and warn
them that the chances of becoming a millionaire from
unsolicited offers like these
are a lot less than one in a million.
... Richard
Tags:
spam,
phishing
If you found our Security Alert Blog interesting, please
subscribe to our RSS feed! |
|
April 16, 2010
Does it
matter what you tweet?
You bet it does because
Big Brother is watching - and saving your tweets!
Thanks to a heads-up by
Tom Kelchner who posts to the SunbeltSoftware Company
blog, we visited the Library of Congress website to
learn that they are archiving yours, and my Twitter
posts!
With more than 50 thousand followers, and the donation
of its digital archives from Twitter, there's an
incredible amount of super sleuthing personal and other
information available for public and big brother
scrutiny.
So, does it matter what you tweet? It's nearly
mind boggling to understand what these resources could
lead to in the hands of the wrong people, political, or
radical groups.
The Library has been collecting materials from the web
since it began harvesting congressional and presidential
campaign websites in 2000. Today the Library holds more
than 167 terabytes of web-based information, including
legal blogs, websites of candidates for national office
and websites of Members of Congress.
In addition, the Library leads the congressionally
mandated National Digital Information Infrastructure and
Preservation Program www.digitalpreservation.gov, which
is pursuing a national strategy to collect, preserve and
make available significant digital content, especially
information that is created in digital form only, for
current and future generations.
There's a lot more fascinating evidence at the
Library of Congress website
...
and here's
a brief and interesting history of the
beginnings of the Library-
Founded in 1800, the Library of Congress is
the nation's oldest federal cultural
institution. The Library seeks to spark
imagination and creativity and to further
human understanding and wisdom by providing
access to knowledge through its magnificent
collections, programs and exhibitions. Many
of the Library's rich resources can be
accessed through its website at www.loc.gov
and via interactive exhibitions on a
personalized website at myLOC.gov.
When President John Adams signed a bill in
1800 transferring the seat of the Federal
government from Philadelphia to Washington
D.C., he provided a mandate for "such books
as may be necessary for the use of Congress
-- and for putting up a suitable apartment
for containing them therein
"
The original library was destroyed in 1814
when British troops set fire to the Capitol
building. But former president Thomas
Jefferson offered to replenish the library
with his own extensive collection.
Today's library contains more than 29
million books and other print materials in
460 languages. They, along with million more
films, maps, manuscripts and other
materials, are housed in three buildings
with the original named for President
Jefferson.
The library assists congress with research,
completing 822,000 research assignments in
2007. It is also open to the public,
receiving 1.4 million visitors in the same
year.-- (Information from The Library of
Congress Web site). |
Even without this consideration, it
just makes sense to use good judgment and discretion
with your tweets.
...Richard
Tags:
twitter,
Library of Congress,
Sunbelt blog
If you found our Security Alert Blog interesting, please
subscribe to our RSS feed! |
To
TOP |
April 11, 2010 Get
Ready for a Busy Security "Patch Tuesday" from Adobe and
Microsoft on April 13th
Expect a very active and important
release schedule from both Adobe and Microsoft for this
coming April 13th "Patch Tuesday"
Comment from the
Sunbelt Software blog by Tom Kelcher. "Given the
attention that malcode (malware) creators have lavished on Adobe
products recently, an updater to go along with regular
patch Tuesday updates will certainly help us all have
a good end-user experience."
More details here at
Adobe's reported April Security Updates
The
SANS Institute(*) reports that there will be 11 security
bulletins from Microsoft with 5 of them rated critical, and all 11
affect Windows or Microsoft Office and Microsoft
Exchange.
Microsoft Security Bulletin Advance Notification
has
comprehensive tables that list the bulletins in order of
major software category and severity.
Microsoft is also reminding users that as of July 13,
2010, it will no longer support Windows XP SP 2; users
are urged to upgrade to XP SP 3 or Windows 7. On the
same day, Microsoft will stop extended support for
Windows 2000; no updates of any kind for Windows 2000
will be released after this date.
(*)SANS is the most trusted and by far the largest
source for information on security training and
certification in the world.
I hope you have automatic update notification set up in
anticipation of these important security updates.
There's really little reason not to -
... Richard
Tags:
malware
If you found our Security Alert Blog interesting, please
subscribe to our RSS feed! |
To
TOP |
April 3, 2010
Malware Rivalry - childish? Maybe not
If you think "'School Yard Bullying and Rivalry" sound
juvenile, consider what's taking place in the "Malware
School yard".
Unfortunately, as juvenile and childish it may sound,
the ramifications are somewhat frightening.
KrebsonSecurity*
recently posted about the rivalry between authors of two
malware crime kits - the Zeus Trojan that we mentioned
recently, and "SpyEye", a more recent
keystroke logger package for sale.
Looks as if they're out to get each other - or at least
each other's crime clients. You know, the Internet
criminals who buy these malicious software packages (for
a much a $10,000) so they can steal yours, and my
private information from our computers and the financial
services we use online.
As I see it, this kind of rivalry leads to more and more
sophisticated malware, more difficult to block with our
current Anti-virus programs, and certainly extremely
more difficult to remove from our computers.
I suggest that
*Brian Krebs Post is a must read if you are concerned
about, or even just interested in the current state of
malware development
....Richard
Tags:
Zeus Trojan,
SpyEye
If you found our Security Alert Blog interesting, please
subscribe to our RSS feed! |
To
TOP |
Don't
hesitate to express
your views and opinions on my Security Alert Blog and Cyber
Security Alert postings (easily done by clicking on
the highlighted 'COMMENT' |
at each post. Watch for postings on fraud alerts,
virus alerts, worm alerts, Internet Security alerts, security scams,
parental controls, online predators, net security, and more. Be sure to visit our
Firewalls-and-Virus Protection website for even more help |
|
|
To
TOP |
Evergreen
Free report -
"Avoiding Current Security Threats"
There are still some unresolved issues with the
Conficker worm and Cyber criminals are flooding the
Internet with bogus "Anti Virus and Anti Spyware"
programs designed to steal your personal information,
add your computers to world wide "botnets", and generally
prey on unsuspecting web surfers with unprotected
computers.
But you can take steps to avoid these security threats,
and I have outlined them in a special report you can have
for
Free.
This report is an update and a bit of an overview of the
information published in my newsletters, blog and
websites.
It covers the basics of what to look for and
how to prepare your computer to avoid the next high risk
threat. It's a quick download (PDF file) which you
can obtain by going to the registration page and leaving
your email address so that the download instructions can
be sent to your email inbox.
Get Free Report here and share this web address with
your friends so the emails you get from them are clean
and free of malware.
http://www.richardpresents.com/avoid-threat-registration.html
...Richard
If you found our Security Alert
Blog interesting, please
subscribe to the RSS feed! |
To
TOP |
|
To
TOP |
Evergreen
Please accept our
INVITATION
to Help Parents
Teach Their Kids to be Safe Surfers
an Invitation to Help other Parents, Grandparents and Guardian by Sharing Your
Experiences of
Teaching Your Children To Be Safe When
They Were learning to Surf
the Internet.
Please
Tell Us
About It HERE |
|
To
TOP |
Evergreen
Update your Emergency Virus Protection program
If
you don't have your Virus Protection program yet, here's an
Emergency Step you should take,
Right Now!
McAfee offers a FREE Virus Scanning program named
STINGER.
It has grown in size a little over the past few years and no longer fits on a single floppy Disk.
But so many of the newer PCs, including lap tops don't have a "A" floppy
drive anyway, you should burn it to a CD or memory stick for an offline back up tool.
You can use it as we do, to check
any of your PC computers for viruses, without being on line.
It is an 'After the Fact' application, which means that it does not scan
incoming email files, attachments or downloads, but it does scan whatever
you have already received online.
It currently checks, and repairs over 200 recent viruses. It's FREE
to download from
McAfee
STINGER
Stinger
- Click
for Latest Version
... Richard
|
To TOP |
More Tags: Internet Safety Rules,
kids
Internet safety , parenting teenagers,
cyberbullying,
spam,
Firewalls,
Keyloggers,
Disaster Recovery,
botnet,
identity theft,
phishing,
teen age bloggers,
Trojans,
virus removal, anti spyware,
spyware
Conficker,
virus removal,
anti spyware, Rogue
software
|
To TOP |
CLICK to Visit our
Internet Security Website
 
|
|
►SUBSCRIBE ME
to the
Security Alert Blog
~~~~~~~~~~~~~
ARCHIVED POSTS
April 3, 2010 thru
December 28, 2010
Jan 11, 2011
Dec 28, 2010
Dec 19, 2010
Dec 12, 2010
Nov 21. 2010
Nov 12, 2010
Oct 20, 2010
Sep 28,
2010
Aug 8, 2010
July 29, 2010
July 25, 2010
July 22, 2010
June 15, 2010
June 14, 2010
June 9, 2010
May 30, 2010
April 16, 2010
April 11,2010
April 03,
2010
EVERGREEN

Contact Me
Unlike the
people who use
Twitter to tell you they've
walked their dog, I Tweet
Only the things that I believe
all my followers will find useful.
So, grab a Twitter account and
Follow me on Twitter
Visit our
Family Friendly Internet Security
Website


CLICK HERE
|
90 Percent of PCs are infected with Spyware -
IS YOURS?
Get your
FREE
anti-spyware
Download Trial HERE

CounterSpy - IT WORKS! |
Log
Out
|
Archives
Jan-Feb-Mar
2010
Oct-Nov-Dec09
Jul-Aug-Sep 2009
April-May-June 2009
Jan-Feb-Mar 2009
December 2008
Sep-Nov 2008
June-Aug 2008
April-May 2008
Feb-Mar 2008
Dec
- Jan 2008
Oct-Nov 2007
Aug-Sep 2007
Jun-July 2007
Apr-May 2007
Jan 2007,Feb-Mar 07
Oct 2006,Nov 2006,Dec 2006
July 2006,Aug 2006,Sep 2006
April 2006,May 2006,June 2006
Dec 2005,Feb 2006,Mar 2006
Sep 2005,Oct 2005,Nov 2005
June, 2005,July, 2005,Aug, 2005
March,
2005,April, 2005,May, 2005
February 2005
January, 2005
December 2004
|
|
Some of my
favorite Blogs
--------------
▪
Blogged By RichardPresents
▪Sunbelt Blog
▪Cnet Download Blog
▪Bill
Hely's Computer & Online
Security Blog
▪FaceTime Security
▪"Kenneth
A. McArthur
Marketing Thoughts"
●Basic
Computer Skills Blog
●PC
Maintenance
●WhyWait?
Start it Now
●Security
Fix Blog
|
Checkout the eBook "How to
Protect Your Privacy and Security
Online"

CLICK HERE for the Security Tips ebook, bonus
PC Security ebook
and
Free Resale Rights
Instant
Access - Instant Download - Anytime of the day or night
(These are electronic books that you
will download upon purchase...there will be no book mailed to your
address) |
|
|
CLICK HERE
for your
FREE Guide to
Stopping Spam - Once and For All

Instant Access
- Instant Download - Anytime of the day or night
(This is an electronic book that you
will download upon purchase...there will be no book mailed to your
address)
|
Disclosures
Material Connection
You should assume that the owner of this website has an affiliate
relationship and/or another material connection to the providers of
goods and services mentioned in this message and may be compensated when
you purchase from a provider. You should always perform due diligence
before buying goods or services from anyone via the Internet or offline.
-- (Terminology used with permission of
Ken McArthur)
|
|