Protection for Your PC - Painless and Free!

Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet is a veritable minefield of things that can invade your PC and affect it's Security and Performance.

You can do something about it and you can do it FREE, using some or all of the following programs and tips.

Anti-Virus protection.

One of the best Free programs for this is AntiVir Personal Edition Anti-Virus software. Download it from: http://www.free-av.com Install on your PC and leave it running to block any incoming bugs or viruses! It can also be used to scan your system for any previous invasions, but be patient, this takes about 15 minutes to complete. Worth running periodically, to check all is ok.

FireWalls and Broadband.

If you are on Broadband, consider using Firewall software. Most good ISP's now supply free. (eg AOL). If yours doesn't, you can get a reasonably good Free personal firewall system from 'ZoneAlarm' at http://www.zonelabs.com . Tip ? DON'T leave your PC connected to the Internet when you are not using it! Reduce the chance of something loading while you are not monitoring things !

SpyBot finders and Ad blockers.

Various programs available on the web, both 'Paid' and 'Free'. You can get good results from using 2 Free packages that are available. These are 'SpyBot Search & Destroy' and 'Ad-Aware'. Downloads available at http://www.lavasoft.de for AD-Aware http://www.safer-networking.org for SpyBot Using both of these packages ensures that, you get with one, any 'bots' that the other one misses.

Suspect you have a virus?

If you think you already have a virus, a good Free tool for checking and killing them is McAfee Stinger. Free download at: http://us.mcafee.com/virusInfo/default.asp?id=stinger

Some General Tips

Get in the habit of, every time you disconnect from the web, deleting ALL files from the following folders:

C:/WINDOWS/Cookies
C:/WINDOWS/Temporary Internet

Beware 'Boys Toys' and 'Freebies'! Think, if someone wants to spread a bug, get tracking software onto your PC etc, the best place for them to do it is places where you go to get 'freebies' to download! The above sites are normally 'ad free', but be aware that if you download porn, free music, free games, free software, there is often a 'price' to pay. Always use the above programs after visiting ANY of these sorts of sites!

John Roberts is a Freelance Training Consultant and Director of JayrConsulting Ltd. (http://www.jayrconsulting.co.uk) John is also an active member of TrainerBase (http://www.trainerbase.co.uk) and is always open to discussion on any training topics.

In The News:

Are security concerns over Huawei a boon for its European rivals?  The EconomistIN THE DAYS of pre-internet capitalism the troubles of one dominant company in an industry tended to be good news for its rivals. In today's hyperconnected ...
How To Hire And Train For IT Security In 2019  ForbesLearn how to hire the IT security talent you need and implement IT security training for your entire workforce to ensure your business remains protected from ...
7 keys to a successful IT security career  CSO OnlineLearn these traits and realities of being an IT security professional if you want a long, successful and happy career in the field.
Facebook Stored Hundreds of Millions of User Passwords in Plain Text for Years  Krebs on SecurityHundreds of millions of Facebook users had their account passwords stored in plain text and searchable by thousands of Facebook employees — in some ...
Six new cars rated 'poor' for security in theft-risk survey  BBC NewsSix new car models have been given a "poor" ranking in a theft-risk report on keyless entry vehicles. Thatcham Research assessed the vulnerability of cars to ...
Elite advisers to help NSF navigate security concerns  Science MagazineThe National Science Foundation (NSF) in Alexandria, Virginia, doesn't fund classified research. But it is hoping a group of prominent scientists with a long ...
Facial recognition can speed you through airport security, but there's a cost  CNETA growing Customs and Border Protection program pits convenience and security against privacy.
Microsoft's Defender Security Suite Is Coming to macOS  ExtremeTechMicrosoft Defender ATP is starting as a preview that's limited to businesses, which gives you a clue as to why ...
IT Security and Policy: Why All Lawyers Must Care About It | The Legal Intelligencer  Law.comSeveral years ago my insurance broker suggested I get cybersecurity insurance for my firm. It seemed a cybersecurity insurance policy was unnecessary not ...
Cisco directs high priority patches for IP phone security exposures  Network WorldCisco this week advised customers using its 7800 and 8800 series IP phones they should patch a variety of “high” priority vulnerabilities that could lead to denial ...
Microsoft warns Windows 7 users of looming end to security updates  TechCrunchMicrosoft has rolled out a patch that will warn Windows 7 users that security updates will soon come to an end. The patch rolled out Wednesday warning users of ...
Vitalik Buterin: High Ethereum Price Good for Security, Ecosystem Development  CointelegraphNews. Ethereum (ETH) co-founder Vitalik Buterin says that high ether prices are important both for network security and the wider ecosystem's development.
Onfido Works To Solve The Personal Identity Security Problem  ForbesA series of interviews with innovators operating at the intersection of consumer behavior and business transformation: Husayn Kassai, co-founder and CEO, ...
Jammu & Kashmir: Militants hold citizens hostage as security forces close in  India TodayA hostage situation may be developing in Bandipora in Jammu and Kashmir as militants are suspected to be holding two persons including a 10-year-old boy ...
Why NZ needs to follow weapons ban with broad review of security laws  The Conversation AUNew Zealand's ban on semi-automatic weapons and assault firearms is one small step in a country that will need to address gaps in its security approach.
Exclusive: Bangladesh top security adviser accused of abductions  Aljazeera.comPrime Minister Sheikh Hasina's security adviser accused of using state security to abduct three men in business dispute.
Ex-Swedish ambassador to China denies breaching national security  Financial TimesSweden's former ambassador to China has denied breaching national security in the latest stage of a long-running spat between the two countries.
What Parkland's experience tells us about the limits of a 'security' response to Christchurch  The Conversation AUParkland, Florida, where 17 people died in a school shooting on Valentine's Day 2018, was already a place of highly secure, gated communities, so the ...
Major Aadhaar data leak plugged: French security researcher  The HinduThe Indian cyber security machinery, in collaboration with a self-proclaimed anonymous French security researcher who has been vocal about data security ...
OPINION | Rafale Expose: No security secret revealed  Deccan HeraldThe MoD itself publicises techno-military developments. Does that mean it has compromised national security?
Watch: PM Modi's audio interaction with security guards across the country  Economic TimesPrime Minister Narendra Modi Wednesday hit back at Rahul Gandhi for his 'chowkidar chor hai' barb at him, saying the Congress president has insulted people ...
How the Energy Department is Prioritizing Secure Infrastructure  NextgovThe budding Office of Cybersecurity, Energy Security and Emergency Response aims to deflect cyber, manmade and natural security hazards.
Researcher finds new way to sniff Windows BitLocker encryption keys  Naked SecurityA researcher has published a new and relatively simple way that Windows BitLocker encryption keys can be sniffed in less secure configurations as they travel ...
Latest tactics used by cybercriminals to bypass traditional email security  Help Net SecurityCybercriminals are using new strategies to get past email security gateways, with brand impersonation being used in 83 percent of spear-phishing attacks.
Everything you need to know about router security to avoid getting hacked by cybercriminals  USA TODAYLook for a router that supports the newest security standard called WPA3. If you have an older router, select one with WPA2. Always avoid WEP.
Destroyed Notes and a Nondisclosure Agreement Gum Up an EPA Cloud Security Assessment  NextgovA routine EPA Office of Inspector General security audit has taken a weird turn.
How Acapulco Exemplifies Mexico's Ongoing Security Crisis (Part 2)  ForbesPart 2. Once Mexico's flagship resort city, in recent years Acapulco has earned the unfortunate reputation of being the one of the most violent cities in the country.
Polymath, SeriesOne Team Up to Simplify Security Token Issuance  CoinDeskSecurity token platform Polymath has partnered with digital securities fundraising platform seriesOne to offer an “end-to-end” solution for security token issuance.
Libya stands at a 'critical juncture', UN mission head tells Security Council  UN NewsPredicting that the “days ahead will prove foundational to the years ahead for Libyans and the region”, the top United Nations official in the country told the ...
Facebook’s former chief security officer Alex Stamos on protecting content moderators  The VergeFormer Facebook chief security officer Alex Stamos and Casey Newton discuss protecting *content* moderators and the difficult issues that plague Facebook and ...
Pat Gelsinger On VMware's 'Radical' Security Plan And Andy Jassy 'Bro Hugs'  CRNFive years ago, I stood on stage and said, 'If you use Amazon, you're stupid.' And Andy [Jassy] would stand on stage and say, 'If you run a data center, you're ...
Which programming language is the most secure? High security vulnerabilities for Java have declined since 2015  JAXenterTime to put languages to the test. Which programming languages are the most secure and which have dents in their armor? A report from WhiteSource ...
Blockstream Revamps ‘Green’ Wallet, Adding Security Features and Sidechain Support  CoindeskBlockchain technology startup Blockstream has unveiled a revamped version of its bitcoin wallet, now called Blockstream Green. Perhaps the biggest overhaul ...
Elsevier exposes users’ emails and passwords online  Naked SecurityElsevier – publisher of scientific journals such as The Lancet – has left its users' passwords and email addresses lying around online. What Motherboard ...
Aibo learns a new trick with security upgrade  TechCrunchThe new Aibo is impressive. Ultimately, however, it's an extremely expensive toy that does very little. One of the upsides of opting for a robot dog over the real ...
How To Begin A Career In Cyber-Security  ForbesWhat are some good tips for people who want to begin a career in cybersecurity? originally appeared on Quora: the place to gain and share knowledge, ...
[Update: Winners] Giveaway: Win one of three Reolink security camera sets, plus 15% off for everyone else (US)  Android PoliceIf you are looking for a quality solution for your outdoor security needs, look no further than the Reolink 4MP 8CH PoE Video Surveillance System, Argus 2... by ...
Why 91% of IT and security pros fear insider threats  TechRepublicInsider threats are a larger concern for most organizations than cybercriminals or hacktivists, according to a BetterCloud report.
Landmark IoT Security Summit Gathers Industry Cybersecurity Experts and Leaders to Build Cross-Sector Guidelines for Securing Connected Devices  Associated PressThis *content* is a press release from our partner Business Wire. The AP newsroom and editorial departments were not involved in its creation.
Top US general to meet with Google on China security worries over use of its AI venture  The Japan TimesThe top U.S. military officer plans to meet with Google representatives next week amid growing concerns that American companies doing business in China are.
America’s Corruption Is a National Security Threat  Foreign PolicyIf they've been paying attention, Americans have received some rude wake-up calls in recent years. What unpleasant news do these messages convey?
HDFC Bank issues 8 guidelines for complete cyber security, see video  Times NowHDFC Bank has issued eight guidelines to protect the customers from fraudsters and to ensure “complete cyber security”.
Ex-Obama Official Lisa Monaco Joins O'Melveny as Data Security and Privacy Co-Chair | National Law Journal  Law.comLisa Monaco, a veteran official of Washington's highest levels, is joining O'Melveny & Myers as partner and co-chair of the firm's data security and privacy group.
Galaxy S7 and Galaxy S7 edge now receiving March security update  SamMobileSamsung has started rolling out this month's Security Maintenance Release for the Galaxy S7 and Galaxy S7 edge in a number of markets. - SamMobile.
Narendra Modi ‘apologises’ to security guards, claims ‘some people’ are calling chowkidars thieves  Scroll.inPrime Minister Narendra Modi on Wednesday apologised to security guards around the country, claiming that “some people” have started calling “chowkidars” a ...
Nebraska flood shows how extreme weather can threaten national security  The VergeCatastrophic flooding in Nebraska has wiped out roads, overtopped dams, and left at least a third of the Offutt Air Force Base submerged, highlighting the ...
Google researcher discovers new type of Windows security weakness  Naked SecurityMicrosoft has said it plans to patch a new class of Windows security bug discovered by a Google Project Zero researcher despite finding no conclusive evidence ...
Security firms detail Android and Google Photos vulnerabilities that exposed user data  VentureBeatResearchers recently uncovered two unrelated vulnerabilities in Google products. Imperva found a way to perform a side-channel attack on Google Photos that ...
India slams Security Council for 'undermining' UN General Assembly's authority  Times of IndiaUNITED NATIONS: India has said the UN General Assembly must take lead in finding solutions to the challenges faced by the world, slamming the Security ...
Security becomes a ‘smart’ business opportunity  The HinduInnovative Ideals & Services has evolved from being the purveyor of simple video door phones to that of wearable safety devices with advanced features.
Kudelski Partners With Smart Contracts Auditor Hosho on Blockchain Security Solutions  CointelegraphCybersecurity firm Kudelski Security has partnered with smart contracts auditing firm Hosho to pool resources in order to provide greater security for blockchai...
These are the top ten security vulnerabilities most exploited by hackers  ZDNetBut one simple thing could help stop the vast majority of these attacks, say researchers.
6 Ways Mature DevOps Teams Are Killing It in Security  Dark ReadingNew survey shows where "elite" DevOps organizations are better able to incorporate security into application security. Previous. 1 of 7. Next. Image Source: ...
Is Huawei a security threat? Seven experts weigh in  The VergeThe United States government is cracking down hard on Huawei. Lawmakers and intelligence officials have claimed the telecommunications giant could be ...
Hacked tornado warning systems leave Texans in the dark  Naked SecurityAdd this latest public warning system sabotage to a growing list of fear-and-panic-spreading hacking incidents.
Did the SEC Chairman Confirm Ethereum Isn’t a Security? Not Quite, but It’s Optimistic  CointelegraphEthereum is most likely not a security under U.S. laws, but a statement by the SEC chairman did not confirm it.
Cummings: Jared Kushner and Ivanka Trump’s private emails, texts raise security concerns  PBS NewsHourRep. Elijah Cummings, D-Md., said in a letter to the White House that the use of private email accounts and the messaging application WhatsApp by senior ...
Security beefed up, Delhi Police prepared in case of colourful Holi  India TodayWith a deployment of over 25,000 police personnel including traffic cops in the city, the Delhi Police has made elaborate arrangements to prevent unruly ...
Elaborate security arrangements for Holi; Delhi Metro services to be available after 2.30 pm  Economic TimesMetro services will not be available till 2.30 pm on Thursday, the Delhi Metro Rail Corporation (DMRC) said.
Injured Stars Jaxson Hayes And Romeo Langford Must Choose Security Over Readiness In Draft Decision  ForbesJaxson Hayes and Romeo Langford would each benefit from another year in school before leaving for the NBA. However, recent injuries and a lack of financial ...
Nehru, China, and the Security Council seat  The HinduToday's policymakers fail to understand Nehru's eminently sensible approach.
Christchurch footage shows suspect fired at people from car  CNNFootage obtained from a hotel security camera shows the suspected shooter in Christchuch, New Zealand, fired at people in the street.
BitGo Adds Custody Support for Blockchain Capital’s Security Token  CoinDeskCryptocurrency custodian BitGo Trust Company is adding support for the BCAP security token from venture capital firm Blockchain Capital. Revealing the news ...
CYBERSECURITY: How 5G high-speed America jolts grid security  E&E NewsCall it a choice between "Black Panther" and blackouts in the rollout of super-fast 5G internet technology. America's tech titans are lined up against electric ...
Funding Platform SeriesOne Partners With Polymath to Use Its Security Token Protocol  CointelegraphNews. United States-based crowdfunding platform SeriesOne has partnered with security token protocol platform Polymath, according to a press release ...
Aditya Khullar appointed as OYO’s cyber security head  ETCIO.comAditya Khullar has recently been appointed as the new Head-Cyber Security at OYO. Khullar, formerly was the tech security leader at Paytm. A seasoned ...
UN Security Council sanctions regime  Economic TimesThe Security Council can take action to maintain or restore international peace and security under Chapter VII of the UN Charter. Sanctions measures under ...
Chowkidar effect: BJP mops up bulk of private security donations  Business StandardWith the Bharatiya Janata Party (BJP) mobilising itself on social media and on the ground by invoking the chowkidar (watchman) tag, the move has both political ...
Rational Security: The 'Domestic is Global' Edition  LawfareThe killing of 50 Muslims by a white supremacist in New Zealand prompts us to reconsider the meaning of domestic terrorism. The Pentagon identifies projects it ...
Flaw in popular PDF creation library enabled remote code execution  Naked SecurityA security researcher has discovered a high-severity bug in a popular PHP library that could enable attackers to run remote code on web servers.
Border walls aren't about security — they're about preventing empathy  SalonThis and other lessons from the 40-year friendship between Israeli Ruth Dayan and Palestinian Raymonda Tawil.
Security cover of ex-IAS officer Shah Faesal withdrawn  India TodayThe Jammu and Kashmir administration on Tuesday withdrew security cover of former IAS officer Shah Faesal. The J&K administration has also withdrawn the ...
Swedish ambassador to China faces security breach probe in Gui Minhai case  South China Morning PostSwedish authorities said on Wednesday that the country's ambassador to China was under criminal investigation for breaching national security, after she was ...
Telcos need to re-engineer networks to ensure security, says Airtel CTO  Economic TimesHe further elaborated that core is where majority of the work is happening because it has to support 5G as well as other generations of technology.
Severe security bug found in popular PHP library for creating PDF files  ZDNetA security researcher has found a severe security flaw in one of the internet's most popular PHP libraries for creating PDF files.
See who's out there with the eufyCam E Wireless Security Camera System at $80 off  iMoreThis camera system comes with a base station and a single wireless security camera that can be used inside or outdoors as needed.
Controversial security firm moving into Myanmar | Article  Asia TimesBlackwater founder Eric Prince's Frontier *Service* Group continues to expand in Asia.
Despite 2016 hack, some Democratic candidates haven't taken this basic step to secure emails  CNNThe release of hacked emails helped derail Hillary Clinton's 2016 presidential bid. But most 2020 Democratic presidential primary candidates have not taken a ...
Half of organisations lack enough security talent to be secure  ITProPortalCompanies are turning to artificial intelligence to plug the gaps.
Domestic security not a concern for Turks, reveals poll  Hurriyet Daily NewsOne of the findings of the poll conducted by Kadir Has University's Center for Energy and Sustainable Development was about the Turkish public's view on ...
Will remain sensitive towards India's security, strategic concerns: Maldives  Economic TimesThe Maldivian leaders also expressed commitment to support India's efforts to combat terrorism, particularly cross-border terrorism, and crimes such as piracy, ...
Security video shows man's trail of destruction at Glendale airport  AZFamilyFor the first time, police released security video of a major vandalism incident at the Glendale Airport.
Homeland Security Chief Cites Top Threat to U.S. (It’s Not the Border)  The New York TimesWASHINGTON — Kirstjen Nielsen, the homeland security secretary, said on Monday that cyberthreats against the United States were a national security crisis ...
Blast at Egyptian chemical factory kills at least eight: security sources  ReutersAt least eight people were killed and five injured on Thursday when a chemical tank exploded at a phosphates factory in the Red Sea port of Ain Sokhna, three ...
Implementation of the Peace, Security and Cooperation Framework for the Democratic Republic of the Congo and the Region - Report of the Secretary-General (S/2019/229) - Democratic Republic of the Congo  ReliefWebEnglish UN Document on Democratic Republic of the Congo and 12 other countries about Peacekeeping and Peacebuilding, Protection and Human Rights, ...
The 3 least secure programming languages  TechRepublicThese coding languages have the most open source vulnerabilities, according to a WhiteSource report.
Some Windows 7, 8.1 users reporting Security Essentials and Windows Defender problems  ZDNetSome Windows 7 and 8.1 users are noticing that their automatic anti-malware protection has been turned off and are seeing out-of-date virus definitions.
Taliban captures 50 Afghan security personnel  The HinduAt least 50 members of the Afghan security forces have surrendered to the Taliban in a fight for control of Afghanistan's western province of Badghis that has ...
What Federal Employees Can Expect From the Overhauled Security Clearance Process  FedSmith.comThe government is laying the framework for overhauling the security clearance process. What are the implications for federal employees?
Protester, Security Personnel Killed During Violence at Vedanta Plant in Odisha  The WireVillagers from the Lanjigarh area who had surrendered land to Vedanta had reportedly gathered to ask for jobs when security personnel attacked them 'without ...
ETIMC: Telcos need to re-engineer networks to ensure security, says Airtel CTO  ETTelecom.comAt a time when security has become the key focus area of telecom operators and equipment vendors, Airtel CTO Randeep Sekhon shared how re-engineering ..
The Election Fix: Kargil to Balakot, do Indians vote with national security in mind?  Scroll.inWelcome to The Election Fix, Sunday edition. On Mondays and Thursdays we bring you all the news, analysis and opinions that you need to pay attention to ...
'Hypersonic' weapons test center here called key to national security  Buffalo NewsIn an unremarkable-looking building just off Genesee Street in Cheektowaga, researchers perform tests for missiles and other weapons that can travel many ...
The Kushner Security Clearance Noise  American ThinkerOn March 5, 2019, Democrats and their mainstream media allies tried to deploy yet another tactic in their endless efforts to disrupt the internal working of the ...
Researchers fret over Netflix interactive TV traffic snooping  Naked SecurityNo sooner has Netflix made an interactive TV show than people are pulling apart its privacy implications and fretting about its potential to leak private information ...
Epic in hot water over Steam-scraping code  Naked SecurityPlayers noticed that Epic Games was gathering and storing data from Steam accounts without their permission.
Venezuelan security forces detain key aide to opposition leader Juan Guaidó  NBCNews.comVenezuelan security forces detained attorney Roberto Marrero, chief of staff to opposition leader Juan Guaidó, in a raid on his home early Thursday, ...
Morrison announces $55 million for security at religious premises and warns against “tribalism”  The Conversation AUScott Morrison has warned against “tribalists” hijacking policy arguments, declaring the migration issue “must not be appropriated as a proxy debate for racial, ...
Two Men Charged For Allegedly Assaulting Security Guard In Greater Noida  NDTV NewsTwo men have been charged in Greater Noida on Monday after they allegedly assaulted a private agency's security guard, who had stopped them for enquiry ...

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

Dont Get Hacked - A Guide to Protecting Your Business from Thieves

You've seen it in the news - 40 million credit... Read More

Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking

Airport Menace: The Wireless Peeping Tom ---------------------------------------- As a network... Read More

Firewall Protection - Does Your Firewall Do This?

The first thing people think about when defending their computers... Read More

Phishing - Learn To Identify It

Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More

Phishing

Recently I have received email from my bank/credit Card Company,... Read More

Wells Fargo Report Phishing Scam

First off I should explain what phishing is. Phishing is... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

The Saga of the Annoying Adware

When we think of adware, what comes to mind are... Read More

Hacking the Body Via PDA Wireless Device

First I would like to stress I am condoning the... Read More

Computer-Virus Writers: A Few Bats In The Belfry?

"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More

Preventing Online Identity Theft

Identity theft is one of the most common criminal acts... Read More

Wireless Network Security

Working from home has its advantages, including no commute, a... Read More

How to Get Rid of New Sobig.F Virus?

As you know, this time the virus under the name... Read More

Viruses, Trojans, and Spyware - Oh My!

Have you ever had to call Symantec or McAfee to... Read More

Data Security; Are Your Company Assets Really Secure?

Is your data secure? Think again. Securing data is unlike... Read More

Desktop Security Software Risks - Part 1

This is the second in a series of articles highlighting... Read More

Can I Guess Your Password?

We all know that it's dangerous to use the same... Read More

Phishing: A Scary Way of Life

The Federal Bureau of Investigation has identified "phishing" as the... Read More

Detect Spyware Online

You can detect spyware online using free spyware cleaners and... Read More

The Risk Of Electronic Fraud & Identity Theft

Electronic Fraud and Identity Theft ----------------------------------- Human beings are pretty... Read More

Dont Miss Information Because of Misinformation

It has been said that with the wealth of information,... Read More

Make Money Online - Latest Scam Disclosed

Before we start, I want to make it clear that... Read More

3 Pervasive Phishing Scams

Scams involving email continue to plague consumers across America, indeed... Read More

Protecting Your Children On The Internet

If you are a parent, as am I, I think... Read More