Several Java security vulnerabilities surfaced earlier this month that allow attackers to access computers visiting compromised or malicious websites. If you’re still reading, allow me to translate the previous sentence to English: if you visit a website that has code to take advantage of the Java security hole, then the code would install malware on your computer. If you’ve ever asked yourself “how did that virus/malware get on my computer?” this is one answer.
Imagine for a moment that your job is to break into personal accounts on websites and collect the data you find. What makes your job easy is that many fail to create good passwords to protect their personal accounts. You just need to run down a password list, such as the list of the 25 most common passwords for 2012 and with a little luck, you’re in. As a pretend identity thief, you know that the average person has 25 online accounts and 2 out of 3 people use 1 or 2 passwords for all of those accounts. If you figure out the password for one website you’ll definitely try it for other popular websites. […]
In the good old days (before 2009), you could do a Google search anywhere or on anyone's computer and consistently get the same results. Today when you do a search, Google takes into account your location, your search history and other information already on hand from Google related websites you may use. This is known as "personalization." Why is this a big deal? Read on to find out...
Have you ever work up from a bad dream with very real anxiety that was then overcome by a deep feeling of relief when you realized it was just a dream? That is how it feels to lose critically important files and then remember you have it all backed up. With a current and working backup in place, it only takes a few clicks to make all well again.
Even though we’ve taken steps to protect our computers, sometimes malware can still get on our computers: it could be someone else used our computers, or maybe some clever new piece of malware tricked us into installing it. In any case, there are several telltale signs that you’re infected, and several things you can do about it. […]
Everyday Google finds 9,500 new websites that are loaded with viruses or malware. With so many websites having malware and so many people surfing the internet, the risk to our computers and personal information is very real. Malware has the ability to damage and/or steal files from your computer, log the websites you visit and passwords you enter, send email as you and even allow someone to remotely control your computer. […]
Android malware is on the rise; the number of “samples” of malware has risen from 400 in June to over 15,000 in February. A piece of malware on your Android phone has the potential to track your location, access your contacts, make calls on your behalf, monitor your activity such as when your enter your banking information for mobile transactions. […]