Not a day goes by that I don’t see some sort of scam or attack. Awareness of the latest scams it key to staying safe — here are some new scams you should be aware of. Ransomware’d Printers The latest in ransomware techniques is to target vulnerable printers inside networks. As noted in a recent article, the attack takes advantage of a network if port 9100 is open. While in a small network behind a router provided by your Internet Service provider, the chances are small that port 9100 will be open if you’d like to make sure you can perform the following steps. From a computer inside your network go to the ShieldsUP website. Click on proceed to begin the process In the box, enter 9100 Click on user specified custom port probe The test will indicate if the port is open or closed. Chances are very good that the port will be closed. If so, you will not be at risk to this attack from external sources. However, I have seen several firms impacted by this attack because the malware entered into the network into a workstation and was able to attack vulnerable printers. In one case it … Read More
Credit card numbers, Social Security Numbers, scanned passports, plans for world domination — these are only a few of the items that you may be tempted to send in an email. But unless you have encryption, you shouldn’t hit “send” on any of them. A message can pass through numerous servers on its journey and can be read on any of them. Encrypting a message can be much more complicated than encrypting a file or even a drive. There are other people involved. And they may not be as tech savvy or security conscious as you. So you need encryption that won’t confuse someone who panics at the thought of downloading a file. Another issue you need to consider: Just how much security do you need? It’s one thing to protect your information from run-of-the-mill cybercrooks. It’s another to keep your private words from the government. And remember that there is no perfect security. Even the best encryption algorithm can be cracked if someone uses a password like 123456. The goal is to find something both practical and sufficiently secure. The Weak Encryption You Probably Already Have Your messages probably already travel encrypted from your email client to your email provider’s server, … Read More
Keeping your personal financial information safe from cyber thieves doesn’t require a ban on online shopping and banking — it just requires care.
Follow these tips and you should be okay — even if you take the riskier path of banking by cell phone.
It’s a new era in terms of risk on the Web: from scams to spam to predatory practices, you have more reasons than ever to be proactive about protecting your kids while they’re surfing online.
Fortunately, Windows 7 gives you a robust set of built-in parental controls.
Frequent Internet users get mixed messages about data privacy.
We worry about data miners and identity theft but put our life stories up on Facebook. Here are some basic steps to enhance your personal security.
You wouldn’t drive your car at night without at least buckling up and turning on the headlights, so why would you surf the Web without using basic safety procedures?
Our Windows Secrets Security Baseline is a simple summary of the products and services that give PC users a minimum safe PC configuration.
Protecting yourself from the criminals of the Internet shouldn’t cost you a fortune. In fact, it doesn’t have to cost you anything.
Firewalls and antivirus programs can’t do all the work of safe computing — small, targeted utility apps that encrypt your files, keep your passwords safe, and clean up your PC add to your protection.