3 Steps to Ending Scams and Virus Problems

Watching how the traditional media covers the latest virus or scam would make one think we are all innocent victims and it is the "evil Internet" at work once again. News flash! Innocent? More like uninformed. Victim? In many cases add the word "willing." The media's point of view and how they choose to portray these occurrences always makes me chuckle.

In the past decade, there has been very little progress when it comes to onliners wanting to acquire just enough information and knowledge to know how to protect themselves. They throw their hands up claiming "I'm not a techie!" while they proceed to want to participate in "technienology." The truth is these issues are part and parcel of participation.

Many do not update their virus programs (that is if they even have one in the first place) and they believe some of the most gratuitously ridiculous offers. That is as long as those "offers" insinuate easy riches with little effort or expense. To that end; there is your weakest link. The propensity to believe misinformation that caters to one's inner desires.

When did plain old common sense go out the window? Why do the natural rules of trust, common sense and due diligence for some reason not seem to apply online? Off-line if these tactics were used, most would probably laugh the salesperson right out of the building! But online, we enter the surreal world of possibilities combined with the perception that some of the most important issues of all are ours to ignore or disregard if we so please.

When it comes to impeding scams and viruses there are three simple solutions:

1. For Scams: Simply don't believe it; none of it! If it comes in an e-mail you didn't request-just hit delete! If it's on a Web site, do your due diligence to confirm claims and to ask for recommendations and proof. Investigate how long the site has been online. Read their terms and conditions. E-mail them with every single question you may have before you give them one red cent of your hard earned dollars. Only proceed if you receive timely and concise answers. Not willing to make these efforts? Then plan on getting ripped off and you deserve it! Buyer beware? More like buyer be informed!

2. For Viruses: Update your virus software every time you log on. Simple. Don't click on any links within e-mails that you are not expecting. Most virus software has an automatic scheduler so that the software can update daily at specified times. Once this is setup you will no longer have to manually update. Then, keep your update subscription current. Remember, you computer doesn't know what to protect you from without these updates!

3. Make an effort in both these areas to understand the tools and resources available to you to help you participate in a smart and informed manner. You can literally check anything out online by searching Google to find reviews, warnings or even accolades and recommendations. Take the time to use and absorb the information available to you if you want to participate in information technology!

By following the above three steps, those who create viruses wouldn't have a leg to stand on and the scammers would not be in business by taking advantage of what folks don't want to take the time to understand or verify.

As long as Netizens do not make a concerned effort to be informed there will be someone out there willing to take advantage of them. Don't blame technology; don't blame the scammers and hackers. The blame should be placed with those who can easily avoid these situations, but choose to not be informed enough to do so.

About the Author:

Judith Kallos is an authoritative and good-humored Technology Muse who has played @ http://www.TheIStudio.com for over a decade.

Check out her popular Technology Cheat Sheets: http://www.LearnAndThrive.com

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

SFGate

Bitcoin a shadowy realm as US weighs security clearances
SFGate
"There are a lot of good things about cryptocurrencies, but at the same time there are these security risks," said Param Vir Singh, director of the PNC Center for Financial Services Innovation at Carnegie Mellon University. "Think about a knife: It ...


WIRED

Security News This Week: T-Mobile Web Portal Exposed 74 Million Accounts
WIRED
T-Mobile has about 74 million customers, and the company added a credential login to protect the tool after receiving the alert from security researcher Ryan Stevenson. Per its bug bounty program, T-Mobile awarded Stevenson $1,000 for the discovery.


Washington Post

Scott Pruitt's security detail cost nearly $3.5 million his first year, agency reports
Washington Post
The round-the-clock security detail for Environmental Protection Agency Administrator Scott Pruitt cost taxpayers almost $3.5 million during his first year in office, according to figures published Friday by the agency. The EPA spent more than $2.7 ...
EPA spent $3.5 million to protect Scott Pruitt, nearly twice the typical security costCNBC
EPA chief's security bill soars, agency cites death threatsReuters
EPA spent nearly $3.5M on Pruitt security - CNNPolitics - CNN.comCNN
CBS News -ABC News -Politico -Politico
all 118 news articles »

WBAL Baltimore

Security guard fatally shoots man in Catonsville
WBAL Baltimore
A security guard fatally shot a man who fired his own gun after refusing to leave a Catonsville business Saturday, Baltimore County police said. County police said security guards were asking people to leave the parking lot because the business was closed.
Man killed after gunfire exchange with security guard at Catonsville ...Fox Baltimore

all 9 news articles »

Voice of America

Top Afghan Security Officials Visit Pakistan for Crucial Talks
Voice of America
A high-level Afghan delegation began a daylong official visit to neighboring Pakistan Sunday to discuss bilateral matters, border management and regional security. Afghan National Security Adviser Haneef Atmar is leading a team of top security ...
Afghan, Pakistani Security Officials Meet In IslamabadRadioFreeEurope/RadioLiberty

all 19 news articles »

South China Morning Post

Nato's second-in-command to address Asia security forum as North Korea looms large
South China Morning Post
Nato Deputy Secretary General Rose Gottemoeller will attend a major security forum in Asia next month, aiming to bolster the Western alliance's ties with the region amid lingering fears about North Korea's nuclear ambitions, a diplomatic source said on ...


Kansas City Star (blog)

Security of the midterm elections needs attention now
Kansas City Star (blog)
When top intelligence officials went to Capitol Hill one morning last week to give House members a classified briefing on the security of the upcoming elections, only 40 or so bothered to show up. In other words, nine out of 10 lawmakers thought they ...
Homeland Security announces 15000 additional seasonal visas for companies at risk of failureThe Hill
Homeland Security issues 15000 more H-2B visas amid crab industry labor shortage in Maryland, elsewhereBaltimore Sun
Homeland Security releases 15000 additional H-2B visasThe Boston Globe
UPI.com -Paulick Report
all 79 news articles »

Middle East Monitor

Iran security forces to confront unrest that serves US
The Jerusalem Post
"Judicial and security bodies ... will resolutely confront any group or individual that wants to compromise the country's security," said Gholamhossein Mohseni Ejei, the judiciary's news website Mizanonline reported, adding that fomenting unrest was ...
Iran says security forces to clamp-down on protestsReuters

all 3 news articles »

FOX 4 News

Downtown Dallas security team stepping up patrols after violent attacks
FOX 4 News
The Downtown Dallas security team is increasing its patrols after a woman was violently robbed and other recent crimes. Red Ledbetter was walking home with a friend around 3:30 Tuesday morning when three men attacked and robbed them near Ervay ...

Google News

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

The Never Ending Spyware Story

It's been with us since 1993, it's gotten more intrusive,... Read More

Virus Prevention 101

Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More

Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk

The trash folder in my main inbox hit 4000 today.... Read More

Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is

A week or so ago, I received an inquiry from... Read More

Is the Internet Insecure Because of You?

Long gone are the days that we could feel secure... Read More

Phishing and Pharming: Dangerous Scams

As soon as almost all computer users already got used... Read More

Are They Watching You Online?

When surfing the Internet you probably take your anonymity for... Read More

Behavior to Stay Safer Online

1. Importance of a Virus Scanner: A Antivirus program can... Read More

Eliminate Adware and Spyware

Everyone should eliminate spyware and adware from your hard drive... Read More

The Attack of the Advertiser - Spy Mother Spy

The menacing campaigns that drive the corporate spyware and adware... Read More

What is Hacking? Are You a Hacker?

WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More

Whats All This I Hear About Firewalls?

At this point, if you've got the whole "turning the... Read More

Top Ten Spyware and Adware Threats Identified

On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More

Computer Viruses - How to Remove a Computer Virus from Your Computer

Computer viruses infect millions of computers every day. Viruses can... Read More

Spyware ? Your Web Browser is the Culprit!

My first experience with a spyware BHO based infection was... Read More

Be Alert! Others Can Catch Your Money Easily!

So called phishers try to catch the information about the... Read More

Is Adware - Spyware Putting Your Privacy at Risk

Do you sometimes notice your computer running slower. Is your... Read More

Computer-Virus Writers: A Few Bats In The Belfry?

"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More

Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda

Fishing on the Internet has come a long way. However,... Read More

Internet Small Business and Fraud

Be careful of sites that promise to send you "instant... Read More

Top Five Spyware Fighting Tips

Spyware and adware are becoming major problems for online surfers... Read More

How Can Someone Get Private Information From My Computer?

From the "Ask Booster" column in the June 17, 2005... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More

Reclaim Your PC from the Internet Spies

Viruses are, however, not the only malicious software programs out... Read More