877 422 1907

Posts Tagged: Computer Security

Computer Security Watch – April 16 2014

Computer Security Watch – April 16 2014

April 16, 2014

Sorry Rover, Cellphones Are A Man’s Best Friend.   Today’s Top Threat VBS.Crigent  The VBS.Crigent is a buddy virus! A buddy virus is when it is on your computer it will try to download and install other malware and viruses. Unfortunately there are no big warning signs on your computer that warns you that you […]

Read More

Computer Security Watch – April 15 2014

Computer Security Watch – April 15 2014

April 15, 2014

Privacy In This Age? Yes, I Will Accept The Changes, Wait You Need Access To What?   Today’s Top Threat SONAR.RogueAV!gen23 The Sonar.RogueAV!gen23, is as the name implies, the twenty third iteration of a fake “anti-virus” virus. If you are asking yourself if there is anything different from this one and the past versions the […]

Read More

Computer Security Watch – April 14 2014

Computer Security Watch – April 14 2014

April 14, 2014

Lucky Day For Me! Not Lucky For 552M People In 2013.    Today’s Top Threat SONAR.Zbot!gen3 The Sonar Zbot is a variant of the older Zeus bot, it is designed to steal private information and pass it back to an offsite source. The most common way to get this virus is through spam emails and […]

Read More

Computer Security Watch – April 10 2014

Computer Security Watch – April 10 2014

April 10, 2014

Which get rich quick scheme is faster, bitcoins or spam? Today’s Top Threat Microsoft Word CVE-2014-1761 Remote Memory Corruption Vulnerability Yesterday we covered a vulnerability in Internet Explorer, today it looks like it’s an issue with Microsoft Word. It looks like it is up to the same shenanigans as the Internet Explorer version, in this […]

Read More

Computer Security Watch – April 9 2014

Computer Security Watch – April 9 2014

April 9, 2014

Corruption, vulnerability, and DOS attacks. No this isn’t your local government it’s the internet! Today’s Top Threat Microsoft Internet Explorer CVE-2014-1760 Memory Corruption Vulnerability Big scary name for today’s top threat! With a scary name comes scary repercussions of having this particular virus. The most common way to get this virus comes from clinking on unsecured links on the […]

Read More

Computer Security Watch – April 7 2014

Computer Security Watch – April 7 2014

April 7, 2014

Brightly colored cremation services and embalming?  You had me at brightly colored, I will take two!  Today’s Top Threat Trojan.Asprox.B The asprox.B virus is a Trojan Horse virus and a botnet. It attaches itself onto your computer generally through emails and will spam out emails once it is connected to your computer, so be wary […]

Read More

How Changing Internet Browsers Can Increase Cyber Security

How Changing Internet Browsers Can Increase Cyber Security

October 4, 2012

While no internet browser out there can offer you complete and total security, you could increase your protection by switching your browser, especially if you change to one that is less well known than others. In addition to that, deciding to use one browser for highly sensitive tasks and using another one for everyday web […]

Read More

What are malware, viruses, spyware, and cookies, and what differentiates them?

What are malware, viruses, spyware, and cookies, and what differentiates them?

October 3, 2012

Sometimes putting something into a QA style helps people understand, so let’s do this with an issue that affects the entire world. Q: What are malware, viruses, spyware, and cookies, and what differentiates them? A: Let us take the easy one first. “Malware” is short for malicious software and is typically used as a catch-all […]

Read More

Government Seeks to Mandate Computer Security for Businesses

Government Seeks to Mandate Computer Security for Businesses

August 9, 2012

With the rash of security breaches over the past couple of years, especially within some of the biggest companies and organizations in the world, Obama’s administration has decided to weigh plans to use executive powers to force United States businesses to better protect themselves, as well as critical industries, from potentially crippling computer attacks. This […]

Read More

Spammers Exploit McAfee Vulnerability

Spammers Exploit McAfee Vulnerability

January 18, 2012

A problem in McAfee’s Saas Endpoint Protection software that allows computers to serve as open proxies for spam is being investigated by the company according to a recent statement from a McAfee representative. A statement from the rep says, “We are aware of the issues and have both threat analytics and development teams diligently analyzing the problem […]

Read More