Why You Should Reboot Your Router
The FBI is advising that everyone reboot their routers to stop malware that has infected 500,000 routers.
The FBI is advising that everyone reboot their routers to stop malware that has infected 500,000 routers.
Signs that the virus message popping up on your computer is completely fake.
How to defend against the WannaCry Ransomware Attack, and others like it.
How your Internet of Things (IoT) devices might be helping hackers and what to do about it.
It starts when you get an email from someone you haven’t emailed in a long time asking if you meant to send them a strange email. Then you get another email like this and then several more. You realize that someone has gained access to your email account and emailed everyone in your contact list.
Ransomware is malicious software that gets on your computer and encrypts your files so that you can no longer access them. The program will tell you that your files are encrypted and the only way to get them back is to pay for a decryption key. It may also say that you have a deadline before the key is destroyed, rendering all of your encrypted files useless. […]
The recently discovered Heartbleed bug allows attackers to read data that is supposed to be encrypted (protected) such as your log in information to a particular website. Somewhere around a quarter of all websites have been affected by this bug. After last week, many of the website originally affected have been patched. Once a website has been patched and you’ve changed your password for that website, then you’ll be protected from this bug going forward. […]
In martial arts, there are levels (belts) of competence in fending off attacks. The same applies to browsing the Internet: there are levels in fending off attacks on your privacy. There are different “moves” you make depending on if a potential attacker has access to the computer you’re using, the Internet connection you’re using or if they’re just a company on the Internet trying to track your browsing habits. […]
There are three types of software that can creep onto your computer, each type more ninja-like than the one before it: The Barnacle Download, the Pop-Up Download and the Drive-By Download.
Several Java security vulnerabilities surfaced earlier this month that allow attackers to access computers visiting compromised or malicious websites. If you’re still reading, allow me to translate the previous sentence to English: if you visit a website that has code to take advantage of the Java security hole, then the code would install malware on your computer. If you’ve ever asked yourself “how did that virus/malware get on my computer?” this is one answer.