Listed below are a series of links to computer security articles and general computer advice.
It is essential to be aware of these threats and to take appropriate countermeasures.
Please read the articles below and avoid becoming a victim of cybercrooks.
There is also additional information under Computing Links.
**WARNING-Norton & McAfee automatic renewals
***IF YOU READ NOTHING ELSE, PLEASE READ:
12 SURE-FIRE WAYS TO GET INFECTED
(to which should be added, Number 13, never, EVER click on an email attachment unless you are 110% certain that it is genuine. Always assume that an email attachment is malicious. If in doubt, delete it).
SECURITY SOFTWARE (What do I need?)
Recover your stolen laptop
Backup your Computer NOW!
Backup your computer-Part 2
GENERAL SECURITY ADVICE
Shadow Explorer for W7 etc
XP needs replacing!
Why you should give up Windows XP for good
When you go online to view pages on the World Wide Web (The Internet), you access these pages by means of a program called a web browser.
The main browsers are Mozilla Firefox, Google Chrome, Opera and Internet Explorer (plus Safari for Apple products).
Personally I would not recommend using Microsoft’s Internet Explorer. The reason I say this is because when the Java 7 security flaw (below) was discovered, Microsoft did not immediately disable the Java plugin (additional software module) in Internet Explorer. This left millions of Microsoft IE users at risk from the Java 7 security flaw. In contrast, Mozilla immediately disabled Java in its Firefox browser to protect its users.
Java 7 flaw:
Should I disable Java?
The short answer, in my opinion, is YES, for two main reasons.
Firstly, Java is notoriously insecure and vulnerabilities continue to be found in it. These vulnerabilities are then exploited by malicious hackers.
Secondly, Java’s owner, Oracle, actively tries to install unwanted software on your computer at every Java update. Even when you untick the pre-ticked boxes, this unwanted software can still be installed thanks to a 10 minute execution delay (see below).
How to disable Java:
Java and its deceptive updates (10 minute delay):
Java: should you remove it?
Courtesy of Kaspersky Lab, here is a list of common malicious computer security threats together with their definitions.
An excellent source of free online security advice.
Get Safe Online
Understanding Hackers, Phishers & Cybercriminals
Fake Bank Email-An Example
PROTECT YOUR COMPUTER & YOURSELF
Computers held to ransom!
Windows Expert Console
Did you know that you can be spied on (including being recorded) via your own webcam?
This can be done without activating the indicator light, so you are totally unaware that you are being watched.
One type of spyware becoming increasingly common is known as a RAT (Remote Access *Trojan), which criminals can use to access your computer or mobile device to take control of it to obtain your private information or spy on you. This is known as ratting.
(*Trojan: A non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm).
The following links on how to avoid webcam ratting should be studied closely.
If you need further assistance or advice please use the email link on the Computer Support Group page.