Instruction

I Keep Getting Update Notifications, Why?

I Keep Getting Update Notifications, Why?

Hackers, those that would love to get in and take your site over, change your life for the worse, and infect your email contacts and website visitors, do so when the updates are not completed.

Computers are great for communication. They are open doors too. If you keep your updates current, your website, your computer, and your Anti-Malware, Anti-Virus programs, you will go a long way to keeping things that way.

What people say to me about updates:

1. I am afraid to do updates because some things won’t work afterwards.

This is a legitimate concern, but not a safe action. If things don’t work the same afterwards, those things might need an update too. I recommend you update the programs and drivers in a computer, AND update the plugins and extensions for a website before the system is updated. Don’t update WordPress before updating the plug-ins. Don’t update to Windows 10 until you have done the drivers and other software updates first.

2. I don’t understand what it is going to do to my computer.

Another legitimate concern. Computers are complicated in their components and systems. Ask a local (to you) tech to do the updates. Many of them will set up a monthly maintenance service with you. Many updates can be done remotely. If you chose this option, make sure you are connecting with a personally recommended technician.

3. I don’t recognize some of the updates and am not sure I should do them.

This is BIG. In this day and age of computers, it is vital that you FIRST have the computer scanned for Malware and make sure it is free of unintentional programs. Why? Because some malware is designed to look like the real updates, while it is really providing a backdoor into your system for a much more serious Malware Hack. Most technicians will scan for Malware. I recommend using Malwarebytes. It is free and it is efficient.

What I say about updates:

1. Scan first for Malware

2. Update drivers, and software before a SYSTEM (Operating Software) upgrade.

3. Keep up on Windows Updates. Let Windows manage those.

4. ALWAYS UPDATE these programs:

  1. Adobe products
  2. Anti-virus, Anti-malware products
  3. Microsoft products
  4. Windows program
  5. Remote Control software such as Logmein, Teamviewer, PC Anywhere
  6. Internet Browsing Software

If you don’t know, ASK. If your friends have a tech they like, call that person. NEVER ACCEPT help from a COLD CALL company for computer service, especially if the caller says:

“We want to inform you that your computer is infected and you are infecting other computers.”

Hang up from that call and use it as a reminder to have your system checked. If you do not know how to do it, call someone you know and trust.

Use a quality anti Malware product:


 
 

Trend Micro Internet Security

Posted by | View Post | View Group

Keep Your Passwords Safe

Keep you passwoKeepass Iconrds safe and available to use.  Don’t keep resetting passwords for websites you do not access everyday. Don’t use a single password habit to avoid having to memorize them. Use Keepass Free

I use this for my online passwords.

Here is what is being said about the product:

Editor’s ReviewRead User Reviews

KeePass is a portable password manager for PC (Windows, Linux, Mac OS X), with ports available for Android, iPhone, iPad, and more. Let’s face it, most of us use the same password over and over to avoid password management but this practice is highly risky. It means if someone gains or cracks your password, they could log into any of your accounts, stealing data and jeopardizing your security. Having a separate, lengthy, and random password for every site is considered the best way to secure data. KeePass keeps every username and password pair in an encrypted database, protected by a single master password or key (the only one you have to remember). And it doesn’t store your database in the cloud unless you upload it there.

KeePass at a Glance

You can easily download KeePass for Windows and you can port it on a USB stick for most other operating systems. The interface is as busy as it is robust. For example, KeePass supports password groups for sorting passwords. You can drag and drop passwords into most windows or use a hot key to type your login information into windows automatically. You can also quick copy user names and passwords to the clipboard with a double-click on a field in the password list. And KeePass can import data from a variety of formats like CSV, while the password list can be exported to formats such as TXT, HTML, XML, and CSV.

Product Details

Here is a detailed breakdown of KeePass’s features:

  • Strong security—KeePass uses AES encryption to encrypt its password databases, SHA-256 password hash, protection against dictionary and guessing attacks, in-memory protection, and more.
  • Portable—KeePass is portable, carry it on a USB stick and run it or directly install it on Windows if you prefer desktop access.
  • Easy Database Transfer—A password database, consisting of a single file, is easy to transfer between computers.
  • Multiple user keys—Use a master password to decrypt the complete database or carry a key file with you.
  • Powerful password generator—KeePass generates passwords based on character sets and patterns, with many options.
  • Extensible—KeePass provides plugin architecture for advanced features and supports over 40 languages.

Pros

Cons

KeePass has a powerful password generator and is available with multi-factor authentication, and it can handle non-standard login sequences. Plugins provide advanced features. KeePass takes a while to warm up to, with its feature-filled interface that might confuse some beginners, but a help center is available to assist you as you find your way around.

I wish it had a mobile component that allowed me to access it from my Smartphone. That being said, it is VERY important that you do not lose your Master password as it is unrecoverable. You would not be able to access or recover the database if you lose that password. The list can be exported, so , it can be saved offline. I have not mastered it yet, but I will!

Posted by | View Post | View Group

I love Snopes (dot) com

snopeslogoI love Snopes (dot) Com for the ability to weed out the scary into the factual.

Have you ever gotten an email from a relative of friend telling you you MUST do something OR you can do something to prevent some other dire happening?

Snopes.com is a place where you can check out the “rumor” and see if it is a reality or a false belief.

For example: in April of 2015 via Twitter someone started this: Costco will start selling Marijuana in bulk. Clicking this link will reveal the reality.

OR this one:

Did you know about the reverse ATM pin entry notifying the police? Good if you did not, it is not true!

When you get an email from a friend or a stranger, check out the validity of the story at Snopes.

Posted by | View Post | View Group

New kaspersky Total Security for PC and Mac

Kaspersky Total Security: The Safest Way to Shop and Bank Online Buy Now

For 2015: All-New Updated Security
Ring in the New Year by keeping your customers’ computers and mobile devices safe with Kaspersky Lab’s 2015 release of Kaspersky Total Security (formerly Kaspersky PURE Total Security), and Kaspersky Internet Security for Mac! Kaspersky Total Security is the solution for securing multiple vices running a variety of operating systems.

kaspersky1

Kaspersky Internet Security for Mac protects users from the growing list of threats to Mac systems, and is OSX Yosemite compatible.
NEW! Kaspersky Total
Security
NEW! Kaspersky Total Security | $99.95
Complete and total package for digital security
Financial protection: account numbers, and personal information while online banking and shopping
Protects user’s identity, passwords, and important documents
Assures that they and their child’s online activity is secure.
Provides the same efficient protection across all devices for the most enhanced digital experiences.
NEW! Kaspersky
MacKasperskyInternet Security for Mac
NEW! Kaspersky Internet Security for Mac | $59.95
Blocks network attacks that slow down user’s Mac
Prevents Macs from spreading malware to another user’s PC
Works with the latest versions of OS X, Yosemite

Posted by | View Post | View Group

How to Report a PayPal Fake Email

How to recognize and How to Report a PayPal Fake Email

Reporting a fake PayPal email to PayPal helps everyone. Your report gives PayPal another opportunity to see how these emails are being created and further protect your account from hacks.

1. PayPal answers what to do:

If you think you have experienced PayPal fraud or received a PayPal scam via email (e.g. a fake email pretending to be from PayPal), forward the entire email to spoof@paypal.com, and delete it from your email account. If you came across a fake PayPal website, contact our Customer Service team.

Recognizing a fake is easy:

Check the email greeting: Emails from PayPal will always address you by your first and last name or the business name associated with your PayPal account. A PayPal scam email may include the salutation “Dear PayPal User” or “Dear PayPal Member”

Here is a sample of one I got today:

Paypal-Scam

 

 

 

 

The mail was sent from: Support Pay-Pal <pay-pal@secure.ght> This is not PayPal.
I forwarded the email and got this response. Join the fight against this FAKE email.

Dear Circe Denyer,
Thank you for being a proactive contributor by reporting
suspicious-looking emails to PayPal’s Abuse Department. Our security
team is working to identify if the email you forwarded to us is a
malicious email.
Paypal Will Always:
– Address our customers by their first and last name or business name of
their PayPal account
Paypal Will Never:
– Send an email to: “Undisclosed Recipients” or more than one email
address
– Ask you to download a form or file to resolve an issue
– Ask in an email to verify an account using Personal Information such
as Name, Date of Birth, Driver’s License, or Address
– Ask in an email to verify an account using Bank Account Information
such as Bank Name, Routing Number, or Bank Account PIN Number
– Ask in an email to verify an account using Credit Card Information
such as Credit Card Number or Type, Expiration Date, ATM PIN Number, or
CVV2 Security Code
– Ask for your full credit card number without displaying the type of
card and the last two digits
– Ask you for your full bank account number without displaying your bank
name, type of account (Checking/Savings) and the last two digits
– Ask you for your security question answers without displaying each
security question you created
– Ask you to ship an item, pay a shipping fee, send a Western Union
Money Transfer, or provide a tracking number before the payment received
is available in your transaction history
READ!
Any time you receive an email about changes to your PayPal account, the
safest way to confirm the email’s validity is to log in to your PayPal
account where any of the activity reported in the email will be
available to view. DO NOT USE THE LINKS IN THE EMAIL RECEIVED TO VISIT
THE PAYPAL WEBSITE. Instead, enter www.paypal.com into your browser to
log in to your account.
What is a phishing email?
You may have received an email falsely claiming to be from PayPal or
another known entity. This is called “phishing” because the sender is
“fishing” for your personal data. The goal is to trick you into clicking
through to a fake or “spoofed” website, or into calling a bogus customer
service number where they can collect and steal your sensitive personal
or financial information.
We will carefully review the content reported to us to certify that the
content is legitimate. We will contact you if we need any additional
information for investigating the matter. Please take note to the
security tips provided above as they may help to answer any questions
that you may have about the email you are reporting to us.
Help! I responded to a phishing email!
If you have responded to a phishing email and provided any personal
information, or if you think someone has used your account without
permission, you should immediately change your password and security
questions.
You should also report it to PayPal immediately and we’ll help protect
you as much as possible.
1. Open a new browser and type in www.paypal.com.
2. Log in to your PayPal account.
3. Click “Security and Protection” near the top of the page.
4. Click “Identify a problem.”
5. Click “I think someone may be using my account without permission.”
6. Click “Unauthorized Account Activity.”
Thank you for your help making a difference.
Every email counts. By forwarding a suspicious-looking email to
spoof@paypal.com, you have helped keep yourself and others safe from
identity theft.
Thanks,
The PayPal Team

Posted by | View Post | View Group

Securi – WordPress Vulnerability

Securi – WordPress Plugin Vulnerability –

WPTouch

 

This is a copy of an email I received. Pass the information along to anyone with a Word Press site that may be using this plugin.

Our research team found a very serious vulnerability in the WPTouch Plugin for WordPress that allows an attacker to upload files remotely to websites running the plugin that have not updated to VERSION 3.4.3 VERSION 3.4.3 (the version the WPTouch team just put out to patch the vulnerability).In order to secure your website if you’re using the WPTouch Plugin (and over 5 million sites are), make sure to update the plugin immediately. If your website scans show an infection, be sure to quickly open a malware removal ticket so that we can help.

This is just another example of our research team, @sucurilabs, actively searching for vulnerabilities that could affect your website security. If you’re worried about the ever-increasing rate of vulnerabilities in plugins, then try protecting your website behind our website firewall, CloudProxy, for free for a month and we’ll be able to proactively block these threats and protect your website from negative consequences. To take advantage of a free month of CloudProxy, just email us at info@sucuri.net.

Learn more about today’s WPTouch disclosure here: http://blog.sucuri.net/2014/07/disclosure-insecure-nonce-generation-in-wptouch.html

–The team at Sucuri

Posted by | View Post | View Group

Beware of SCAMS Via PayPal Emails

Official PayPal Logo

Official PayPal Logo

Beware of SCAMS Via Emails – PayPal

I recently received an email that appeared to be from PayPal. Taking a second glance, it was not from Paypal.

I forwarded the email to the PayPal Spoof organization so they can prevent this from happening.

 

 

 

 

Paypal Spoof Email Sample

Paypal Spoof Email Sample

 

 

 

 

 

 

 

 

 

This email has earmarks of a SPAM/Spoof/Phishing email:

  1. Misspellings in the Subject Line
  2. Link to “Fix What’s Wrong”
  3. Salutation: Dears;
  4. Closing: Security Team
  5. Email is not a PayPal email address

All official Paypal emails address the recipient by first and last name. (Dear Circe Denyer,)

Closing of the email is:

Sincerely,
PayPal

If you cannot see the email address, find out how to read it. In GMail, the address is visible without opening the email itself. PayPal email is from @payPal.com

Send your SPOOF/PHISHING/SPAM payPal emails to spoof@paypal.com.They will respond to you.

Here is a sample of a response by PayPal:

 

Every email you forward helps others to be protected. PayPal uses the information to prevent these from getting sent in the first place.

 

 

 

Posted by | View Post | View Group

Ebay Database Hacked – Change Your Password

In February or March, Ebay was hacked and the database was stolen.

Ebay was hacked it is time to change your passwordEbay hacked. A cyber criminal has gotten into the Ebay customer database using an employee login account and the records for customers has been compromised.

It is a good time to change this password. For those that took my class on password suggestions and creation, remember you can use those symbols above the letters to form a phrase that visually you recognize, but make the password more cryptic.
Take a phrase like I buy ebay and turn it into a password that looks like this. IbuYEb@Y. Add non meaningful numbers to it and you’re done. IbuYEb@Y3409 where the numbers are meaningful only to you. ( A special date of old locker number).

Ebay password changes are done quite easily and is located under the Account settings for your Ebay account.

You can read the story of the attack on Fox2Now.com.

Changing your passwords frequently for Financial transaction sites is a good idea. Amazon, Ebay, PayPal, Banks, Stock sites, etc should be changed routinely. The changes should be logged so you do not get yourself locked out.

Password logbooks which allow you to write down the password off of your computer, but also let you store it away in a safe box that is fire safe, is also a good practice.

If you are using a laptop and keeping your passwords on the same laptop, you risk having your personal security breached if the laptop is stolen.

See a simple password logbook here on Amazon.

 

Posted by | View Post | View Group

Malwarebytes for finding the malware and removing it

I have been using Malwarebytes since I first began cleaning systems of Malware. Wikipedia says it was first released in 2008.That was 5 years ago and the new interface (front user screen) is new and different.

Malwarebytes is the best and even better now. It scans for PUPs; potentially unwanted programs. These programs are the ones that start allowing malware to infiltrate your system with other more serious infections such as trojans, worms, keyloggers, bots, and many more.

Easy enough for a novice and robust enough for a skilled  computer security professionals, this is the one to use for your anti-infection toolkit.

If your system is clunky, slow or just plain not what it used to be, a scan with Malwarebytes could reveal why.

The users I support are older computer users that need a easy to use, friendly scanning system to identify and remove Malware. This new version is just that. It does not require a computer degree to get the system scanned, cleaned and operational.

 

 

Posted by | View Post | View Group

Sharing Malware 101 from About .com

Sharing Malware 101 from About .com

Check out this article from About.com. You will find a great definition of threats to your PC explained in a way that is easy and clear.

Click the image to read the article

Do you like this?malware spyware bot sneakware keylogger trojan worm infection virus

[spider_facebook id=”1″]

Posted by | View Post | View Group