Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
3 Steps to Ending Scams and Virus Problems > NetSparsh - Viral Content you Love & Share

3 Steps to Ending Scams and Virus Problems

Watching how the traditional media covers the latest virus or scam would make one think we are all innocent victims and it is the "evil Internet" at work once again. News flash! Innocent? More like uninformed. Victim? In many cases add the word "willing." The media's point of view and how they choose to portray these occurrences always makes me chuckle.

In the past decade, there has been very little progress when it comes to onliners wanting to acquire just enough information and knowledge to know how to protect themselves. They throw their hands up claiming "I'm not a techie!" while they proceed to want to participate in "technienology." The truth is these issues are part and parcel of participation.

Many do not update their virus programs (that is if they even have one in the first place) and they believe some of the most gratuitously ridiculous offers. That is as long as those "offers" insinuate easy riches with little effort or expense. To that end; there is your weakest link. The propensity to believe misinformation that caters to one's inner desires.

When did plain old common sense go out the window? Why do the natural rules of trust, common sense and due diligence for some reason not seem to apply online? Off-line if these tactics were used, most would probably laugh the salesperson right out of the building! But online, we enter the surreal world of possibilities combined with the perception that some of the most important issues of all are ours to ignore or disregard if we so please.

When it comes to impeding scams and viruses there are three simple solutions:

1. For Scams: Simply don't believe it; none of it! If it comes in an e-mail you didn't request-just hit delete! If it's on a Web site, do your due diligence to confirm claims and to ask for recommendations and proof. Investigate how long the site has been online. Read their terms and conditions. E-mail them with every single question you may have before you give them one red cent of your hard earned dollars. Only proceed if you receive timely and concise answers. Not willing to make these efforts? Then plan on getting ripped off and you deserve it! Buyer beware? More like buyer be informed!

2. For Viruses: Update your virus software every time you log on. Simple. Don't click on any links within e-mails that you are not expecting. Most virus software has an automatic scheduler so that the software can update daily at specified times. Once this is setup you will no longer have to manually update. Then, keep your update subscription current. Remember, you computer doesn't know what to protect you from without these updates!

3. Make an effort in both these areas to understand the tools and resources available to you to help you participate in a smart and informed manner. You can literally check anything out online by searching Google to find reviews, warnings or even accolades and recommendations. Take the time to use and absorb the information available to you if you want to participate in information technology!

By following the above three steps, those who create viruses wouldn't have a leg to stand on and the scammers would not be in business by taking advantage of what folks don't want to take the time to understand or verify.

As long as Netizens do not make a concerned effort to be informed there will be someone out there willing to take advantage of them. Don't blame technology; don't blame the scammers and hackers. The blame should be placed with those who can easily avoid these situations, but choose to not be informed enough to do so.

About the Author:

Judith Kallos is an authoritative and good-humored Technology Muse who has played @ http://www.TheIStudio.com for over a decade.

Check out her popular Technology Cheat Sheets: http://www.LearnAndThrive.com

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

NBCNews.com

White House drafts more clearance cancellations demanded by Trump
Washington Post
The White House has drafted documents revoking the security clearances of current and former officials whom President Trump has demanded be punished for criticizing him or playing a role in the investigation of Russian interference in the 2016 election ...
Admiral who oversaw Bin Laden raid to Trump: 'Revoke my security clearance, as well'NBCNews.com
Ex-CIA Director John Brennan Strikes Back After Trump Revokes His Security ClearanceNew York Times
Why a retired Navy SEAL commander wants Trump to revoke his security clearanceUSA TODAY
Business Insider -Fox News -Washington Post -Wall Street Journal
all 1,932 news articles »

Vox

Trump reportedly plans to strip more security clearances to distract from the news cycle
Vox
What if every time there's a new Omarosa tape, the White House strips another security clearance, as it did with John Brennan? According to a new report, that might be the sort of scenario we're in for. The White House has drafted documents revoking ...
Inside the security clearance revoltAxios
The Russia Investigations: Trump On Collision Course With National Security WorldNPR
Intel trying to stay out of Trump's security clearance blow upCNN
NBCNews.com -WIRED -Business Insider -GovDelivery
all 2,083 news articles »

WIRED

Security News This Week: A Devastating Report on the CIA's Deadly Mistakes in China
WIRED
It has been unclear how the Chinese government knew who to target, but US officials told Foreign Policy this week that Chinese operatives compromised the CIA spy network thanks to flaws in what was supposed to be a secure communication system.


Week In Politics: Security Clearances
NPR
Heard on Weekend Edition Saturday · Domenico Montanaro - 2015 · Domenico Montanaro · Twitter. We have the latest on the week in politics, including President Trump's decision to revoke the security clearance of former CIA Director John Brennan.


CNBC

Security researchers say they can hack Medtronic pacemakers
CNBC
Security researchers say they've found flaws in the Medtronic pacemaker that leaves the life-saving device vulnerable to hackers and puts patients at risk. Billy Rios and Jonathan Butts say they've found vulnerabilities that compromise the pacemaker's ...

and more »

CoinDesk

Can Security Tokens Save Crypto From the Bear Market Blues?
CoinDesk
"Security tokens will save crypto." That's what Trevor Koverko, CEO of the crypto project Polymath, told CoinDesk at a blockchain technology festival in Toronto this week. There, tokenized dividends were the week's hot topic, even despite the bear ...


Kennebec Journal & Morning Sentinel

View from Away: A stunning lack of security in the Situation Room
Kennebec Journal & Morning Sentinel
For a place that most of us will never see firsthand, the White House Situation Room conjures vivid mental images: gleaming high-tech military coordination, late-night strategy meetings with global implications and, most of all, security. It was the ...

and more »

TMZ

Kim Kardashian West It's Not Easy Being Me ... Especially at Red Lights
TMZ
Kim was out and about in Miami with pals Larsa Pippen and Jonathan Cheban when she stopped at a red light and crowds started to swarm around her. She explains how her security has to jump out and hold people at bay, so the vehicle can move when the ...
Kim Kardashian shows off security WALKING alongside her car as they prevent fans from swarming vehicleDaily Mail

all 294 news articles »

KATV

Security deposit secured
KATV
But a month after moving out, Givens received a notice informing him that carpet cleaning, touch-up paint and the replacement of closet doors would cost him his entire $450 security deposit, plus $11 more. We asked: "How are you going to try and get ...


Vox

US sanctions Myanmar's security forces over Rohingya ethnic cleansing
Vox
The Trump administration has placed sanctions on several commanders and units of Myanmar's security forces for their roles in the “ethnic cleansing” of Rohingya Muslims and other minority groups in the country. On Friday, the Treasury Department ...
Treasury Sanctions Commanders and Units of the Burmese Security Forces for Serious Human Rights Abuses | U.S. ...Treasury Department
Senior Myanmar Officials Should Be Held Accountable for Crimes Against HumanityAmnesty International USA

all 532 news articles »
Google News

Adware and Spyware: The Problems and Their Solutions

The Threat10 years ago you could probably have run no... Read More

How to Prevent Online Identity Theft

Identity theft rates one of the fastest growing crimes in... Read More

Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and... Read More

Spyware Protection Software

Spyware protection software is the easiest way of removing spyware... Read More

Passwords or Pass Phrase? Protecting your Intellectual Property

Much has been said on the theory of password protection... Read More

Viruses and Worms, Protection from Disaster

Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More

Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders

Can you protect your computer from all possible viruses and... Read More

Wireless Network Security

Working from home has its advantages, including no commute, a... Read More

If You Steal It, They May Come!

Business on the internet is getting down right shameless. This... Read More

Identity Theft Offline -- So Many Possibilities

Chris Simpson, head of Scotland Yard's computer crime unit was... Read More

How to Manage Your Username and Password The Easy and Secure Way

Have been an Internet user for more than 9 years,... Read More

New Mass Mailing Spamming Internet Trojan for the Windows Platform

May. 16th 2005 - MicroWorld has reported the discovery of... Read More

Five Excellent Indie Encryption And Security Solutions You Have Not Heard About

1. Geek Superhero http://www.deprice.com/geeksuperhero.htmGeek Superhero watches your computer for changes,... Read More

Arming Yourself Against Spyware

While clicking from site to site on the internet you... Read More

Top Ten Spyware and Adware Threats Identified

On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More

Watching the Watchers: Detection and Removal of Spyware

If spyware were a person and he set himself up... Read More

How To Prevent Spyware Attacking Your Computer

Spyware is software or hardware installed on a computer without... Read More

New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

In 1997, I decided after 15 years as a practicing... Read More

Behavior to Stay Safer Online

1. Importance of a Virus Scanner: A Antivirus program can... Read More

Internet Small Business and Fraud

Be careful of sites that promise to send you "instant... Read More

Spyware, This Time Its Personal!

First the basic definition of Spyware: It is a type... Read More

A Painless Plagiarism Solution

A crowded marketplace can lead to unethical webmasters using underhand... Read More

Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is

A week or so ago, I received an inquiry from... Read More

How Can Someone Get Private Information From My Computer?

From the "Ask Booster" column in the June 17, 2005... Read More

Free Ways to Tackle Threats to Your Computer

Protect Your PCHaving problems with your pc? Do your kids,... Read More