Why Malicious Programs Spread So Quickly?

It seems that nowadays cybercriminals prefer cash to fun. That is why malicious programs of various kinds (viruses, worms, Trojan horses, etc.) are very often aimed at stealing valuable -- in a direct sense of this word -- private and financial information. When written, these programs are spread all over the Web.

What do means of their distribution have in common? Thinking a bit about it will help us ordinary Web users realize how to behave online and what to avoid.

Let's use logic and good old common sense. What do you think are the most suitable (for a criminal)means to spread malicious code? The answer is almost obvious. It is something which, first,ensures his anonymity and, second, offers victims (i.e. us) very little or no protection against malware. Last, but not least -- this means should be very cheap or, even better, free.

(I'll confine myself to mentioning only those means which endanger EVERY Internet user. Not everyone exchanges files or downloads music and freeware. But is there anybody who doesn't send and recieve email or visit websites?)

Well, if you were a cybercriminal who wanted to spread a malicious program quickly and as widely as possible, how would you distribute it?

What first comes to mind? First, sending contaminated emails through spam. It is possible (and not too difficult for, say, a programmer) to enclose virtually anything into the attachment. With more effort, a programmer can create a message without any attachments that will infect a PC anyway.

Though many email service providers offer basic anti-virus protection, they aren't obliged to do it. How effective this protection is -- that's another question.

Besides, spam is very cheap to distribute. Of course, spammers of all stripes don't use their own machines. Why should they? They prefer PCs which became remotely controlled after being infected with a special program. Cybercriminals build huge networks of such machines and hire them out to spammers. Using "bots" (they are also called "zombies" or "slave computers") gives a spammer so valued anonymity -- spam messages come to frustrated PC users from IP addresses registered somewhere on the other side of the globe.

What about other possibilities? Websites. Malicious websites are very dangerous.Cybercriminals create them exclusively to execute malicious code on the visitors' computers. Sometimes hackers infect legitimate sites with malicious code.

When unsuspecting users visit malicious sites, various nasty applications are downloaded and executed on their computers. Unfortunately, more and more often these applications contain keyloggers--software programs for stealing information.

Keyloggers, as it is clear from the name of the program, log keystrokes --but that's not all. They capture everything the user is doing -- keystrokes, mouse clicks, files opened and closed, sites visited. A little more sophisticated programs of this kind also capture text from windows and make screenshots (record everything displayed on the screen) -- so the information is captured even if the user doesn't type anything, just opens the views the file.

Blogs can be contaminated with malware, too. In April experts from Websense Security Labs warned users that they discovered hundreds of these "toxic" (contaminated with malcode) blogs set by hackers. Blogs are suitable for them: there are large amounts of free storage space, no identity authentication is required to post, and there is no scan of posted files for viruses, worms, or spyware in most blog hosting services.

Three months passed, and here is the quote from a new Websense report released this Monday, July, 25th : "hackers are using free personal Web hosting sites provided by nationally- and internationally-known ISPs to store their malicious code?" This July Websense detected that these sites are used for this purpose much more often. The company's senior director of security and technology research said that "in the first two weeks alone we found more instances than in May and June combined." By all means it's a tendency, and a very disturbing one.

Such sites are free and easy-to-create. With the average lifespan of between two and four days, they are difficult to trace. Free hosting services rarely offer even basic security tools. Short-lived websites,no files scanning for viruses, nothing prevents "authors" form uploading executable files ? isn't such a site an ideal tool for distributing malicious code?

Anonymity of the creator -- no end user protection -- no cost. What else can a cybercriminal wish? That is why there was the outbreak of "toxic blogs" in April - and that's why infested free websites are multiplying so quickly now.

But how to contaminate as many computers as possible? It is the aim of cybercriminals, isn't it? The more traffic, the more programs lands on end users' computers. Hackers attract traffic to malicious websites by sending a link through spam or spim (the analog of spam for instant messaging (IM).

They are ingenious in finding new ways to make people open an attachment or click on a link to visit a certain website, though people are constantly told not to follow links in spam.

Just some of their dodges -- disguising infected spam emails as CNN news alerts, subject lines with "breaking news" like "Osama bin Laden caught", "Michael Jackson tried to commit suicide". How about celebrities in the nude? Just click! And, one of the latest, an "amateur video" that ostensibly shows London bombing sights.

These (and similar) tricks are usually called social engineering. Online criminals have become good psychologists -- the big bucks which crimes like online bank fraud can bring turned them into earnest students.

However, there is one thing that spoils the mood of those who spread malicious programs.

To hackers' deep regret, people become more aware of the risks they face in the Internet. A study by Pew Internet and American Life Project released on July 6th shows that:

91% (!) of respondents (adult Internet users from the U.S.) changed their behavior online one or way another. 81 % have become more cautious about e-mail attachments 48 % have stopped visiting certain websites which are said to be harboring malicious programs People stop using file-sharing software (25%) and even start using Mozilla, Firefox or other browser instead of Internet Explorer (18%)

Well done! Actually, there is nothing left for us users but to become more conscious of the threats and more cautious in the Web. Every PC user has to care for his information himself, protecting his own computer against numerous data-stealing programs of all sorts.

But don't you think that protection against various malicious programs shouldn't be only end users' private business? It is up to service providers to offer at least basic protection for end users and break this "triad" (Anonymity of the creator -- little or no end user protection -- little or no cost) which enables all this crap to spread so easily.

Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides various products and services for information security. Software aimed at making identity theft impossible, services like protected email and protected Web hosting are only small part of what this company offers.

Learn more -- visit the company's website http://www.anti-keyloggers.com

In The News:

Chinese Surveillance, Facebook Tracking, and More Security News This Week  WIRED3-D printed rifles, Iran missile hacking, and more of the week's top security news.
Merkel Rejects Trump Calling German Cars a Security Threat  TIMEChancellor Angela Merkel rejected President Donald Trump suggesting that European autos are a threat to U.S. national security.
YouTuber shot while filming security guard outside synagogue  The VergeA YouTuber who films her own confrontations with law enforcement was shot yesterday while recording a security guard outside a Los Angeles synagogue and ...
Govt begins reviewing security of separatists  Greater KashmirGreaterKashmir: The police have begun a head count of personal security officers guarding resistance leaders in Kashmir, day after home minister Rajnath ...
Amid reports of attacks on Kashmiris, MHA asks states to ensure security  The Indian ExpressThe meeting attended by RAW, IB top brass among others discussed possible steps to rope in social media giants like Facebook, WhatsApp and Twitter among ...
Man Arrested at Orlando Airport for Trying to Breach a Security Checkpoint  TIME(ORLANDO, Fla.) — Authorities say a man was arrested after he attempted to breach a security checkpoint at a Florida airport. In a tweet, Orlando Police said ...
Army deploys 9 security columns in Jammu  Economic TimesThe Army has deployed nine security columns with air support in Jammu following massive protests over the terror attack in Pulwama in the Valley in which 40 ...
Sharad Pawar says lapses in security led to Pulwama attack  Economic TimesNationalist Congress Party Chief Sharad Pawar said on Friday that the suicide attack on a CRPF convoy in Jammu Kashmir was worrying and leads to the ...
Was Jeff Bezos the weak link in cyber-security?  BBC NewsAre humans the weakest point of our cyber-defences, and what can we do about it?
Pulwama attack: A serious security lapse - In flames  Economic TimesAround 3.15 pm on February 14 in south Kashmir's Pulwama district, a Jaish-e-Mohammad terrorist drove his SUV rigged with 350 kilos of explosives towards a ...
Rajnath holds meeting with RAW chief, NSA, other security officials  Times of IndiaIndia News: NEW DELHI: Union Home Minister Rajnath Singh on Saturday held a meeting with RAW chief A.
Nauru and Manus Island asylum seekers face fresh security and character assessments  ABC NewsHundreds of asylum seekers on Manus Island and Nauru will undergo *fresh* security and character assessments as the Government prepares for an "influx" of ...
Trump will declare a national emergency to secure money for his border wall  Vox.comPresident Donald Trump has officially signed a spending bill that will keep the government funded until September, while also declaring a national emergency in ...
IB Security Assistant/Executive Admit Card Released For Tier I Exam  NDTV NewsMinistry of Home Affairs (MHA) has released the admit cards for selection exam which will be conducted for recruitment of Security Assistant/ Executive posts.
Attorney-general defends $423 million Manus Island security contract  SBS NewsAttorney-General Christian Porter has defended a controversial contract awarded to a security contractor on Manus Island.
What is the role of Cabinet Committee on Security?  India TodayFinance Minister Arun Jaitley attended the Cabinet Committee on Security (CCS) meeting to discuss the terror attack on Central Reserve Police Force (CRPF) ...
A new tactic for smart-home security: shaming Walmart  Yahoo FinanceThe state of smart-home security should be embarrassing. Take for instance the webcams hacked and exploited to launch massive denial-of-*service* attacks, ...
These weatherproof wireless security cameras with 2-year battery life are half the price of Arlo cams  BGRThere's no question that Netgear's Arlo brand is responsible for starting the cord-free security camera craze. Of course once something gets popular you know ...
Top Court Says No To Rs 10 Crore Karti Chidambaram Security As Investment  NDTV NewsThe Supreme Court on Friday declined the request of Karti Chidambaram that the Rs 10 crore, which he was asked to deposit as security for travelling abroad, ...
Remarks by Vice President Pence at the 2019 Munich Security Conference | Munich, Germany  Whitehouse.govHotel Bayerischer Hof Munich, Germany. 11:41 A.M. CEST. THE VICE PRESIDENT: Ambassador Ischinger, distinguished guests, it is my honor to join you for ...
The Three Stages Of Cloud Transformation: Application, Network, Security  ForbesTransitioning to a cloud-first IT strategy has become an imperative.
Pending US troop withdrawals concern officials, military at security conference  Washington ExaminerMUNICH — President Trump's intent to withdraw American forces from Syria and Afghanistan is provoking concern and skepticism from U.S. officials and military ...
Review security of those funded by Pakistan: Rajnath  Times of IndiaIndia News: SRINAGAR: Security agencies and Jammu and Kashmir police overlooked intelligence inputs about an impending attack on paramilitary forces ...
Privacy and security risks with genetic tests like 23andMe, Ancestry  Business InsiderThe DNA from the spit you submitted to Ancestry or 23andMe might be private for now. But experts warn it's getting easier to link your DNA to your identity.
Mobile networks call for 5G security inspector  BBC NewsThe mobile network industry has called for a new security testing scheme to check 5G equipment.
Report spells out overcrowding and security risks at country's busiest court  Stuff.co.nzNine defendants crammed into one cell, staffing shortages and long paperwork delays are some of the security risks outlined in a damning report into the ...
Google working on new Chrome security feature to 'obliterate DOM XSS'  ZDNetGoogle announces Trusted Types browser API, a new defense against DOM-based XSS attacks.
Homeland Security raids Santa Cruz home before dawn  The Mercury NewsSANTA CRUZ —The raid Friday in the 500 block of Windsor Street had nothing to do with immigration enforcement, according to Homeland Security ...
Security guard now on patrol at three Terrace banks  Terrace StandardCompany hired to secure ATM vestibules due to safety concerns.
Russian FM Sergei Lavrov Holds Final Presser at Munich Security Conference  Sputnik InternationalThe 2019 Munich Security Conference (MSC) is taking place in southern Germany from 15 to 17 February, with more than 450 people, including politicians, ...
EU shuts down Puigdemont event over ‘security threats’  POLITICO.euParliament says there is 'a high risk that the proposed event could pose a threat to the maintenance of public order.'
Facebook uses its apps to track users it thinks could threaten employees and offices  CNBCFacebook security monitors users who have made aggressive comments, as well as former employees, through a "be on lookout" or "BOLO" list. It can use its ...
February security patch now rolling out for the Galaxy Note 9  9to5GoogleThe February security patch is rolling out now to the Samsung Galaxy Note 9 in a staged update process that will no doubt expand over the coming days.
Light rail security tightens as crowds flood uptown for NBA All-Star Weekend  WSOC CharlotteWith the hype around Buzz City taking off as thousands of visitors flood uptown for NBA All-Star Weekend, the city has made some major changes to light rail ...
Take a walk around the security perimeter of the Spectrum Center for the All-Star game  Charlotte ObserverIf you walk the security perimeter around the Spectrum Center it will take about 20-30 minutes. This video is running at 20x normal speed.
'What Was The National Security Adviser Doing?' Mamata Banerjee on Pulwama Attack  News18Banerjee questioned why the Centre was not declaring national mourning for the CRPF jawans. She also slammed the PM for inaugurating a project on Friday.
Lake Central cameras keep an eye on school security  nwitimes.comST. JOHN — Security cameras and monitors have become as much a part of the education ambiance as textbooks, teachers and football games.
Congress party stands with the security forces and government: Rahul Gandhi  Economic TimesVowing to stand with the security forces and the government, Congress president Rahul Gandhi today said that his party will refrain from political argument and ...
Trump's next national security charade: Car tariffs  Washington ExaminerPresident Trump has already used national security to justify damaging steel and aluminum tariffs. Now he's considering doing the same thing with cars and car ...
Pulwama terror attack: Entire opposition stands with security forces and govt, says Rahul Gandhi  Economic TimesA day after the Pulwama attack, Congress president Rahul Gandhi on Friday said his party and the entire opposition is fully supportive of the government and the ...
Fans in uptown Charlotte okay with tight security for NBA All-Star  WBTVPolice say so far – inside the zone in uptown where NBA activities are happening – they haven't had any significant problems.
National Security operatives gather intelligence, they don't take action – Nunoo-Mensah  GhanaWebA former Chief of Defense Staff, Brigadier General Joseph Nunoo-Mensah says operatives of the National Security have no business moving in or taking action ...
After MacArthur Center shooting, questions raised of security at mall, downtown Norfolk  WAVY-TVNORFOLK, Va. (WAVY) -- 10 On Your Side is getting some first-hand accounts from people who saw the MacArthur Center shooting as it happened, right in front ...
Cave Spring High gets $50,000 security upgrade  WDBJ7CAVE SPRING, Va (WDBJ7) It's a sign of the times at Cave Spring High School: Construction, mobile classrooms, and for parents like Francisca Baffoe-Bonni, ...
Ex-student sues Huston-Tillotson, says security guard raped her  Austin American-StatesmanA former student who said she was raped last year by a security guard who worked for Huston-Tillotson University is suing the school, its former security ...
Former Huston-Tillotson student sues, says security officer raped her  KXAN.comAccording to a lawsuit filed Wednesday, the woman, who hasn't been identified, was a 17-year-old freshman at the time. The lawsuit claims a security guard ...
Munich Security Conference: Live blog  POLITICO.euRolling news and reaction from global gathering of leaders, ministers and policymakers.
‘Why is government so apathetic to security of jawans?’  Times of IndiaTEHATTA/HOWRAH: Two Bengal villages — one in Howrah's Bauria and the other in Nadia's Tehatta—on Friday became microcosms of the nationwide outrage ...
Ex-Homeland Security secretary Tom Ridge is at the center of questions over JetSmarter's security policies  CNBCFormer Homeland Security chief Tom Ridge is now at the center of growing concerns over security and passenger screening at JetSmarter. Following a CNBC ...
DHS official: Border security bill does not contain 'amnesty' poison pills  Fox NewsImmigration hawks slammed the border security compromise President Trump signed into law Friday for containing last-minute provisions that they argued gives ...
How to enable HDR in your Ring security camera  TechHiveRing is adding an HDR (high dynamic range) feature to its cameras, but it doesn't come switched on by default. HDR helps even out the bright and dark areas of ...
Gantz to speak at Munich security conference after Netanyahu cancels  The Times of IsraelMove seen as a boost for former IDF chief who will share a stage with world leaders, bolstering his diplomatic credentials ahead of elections.
Ring Alarm is the best security-focused smart home system you can buy. Today it's cheaper than ever  PCWorldProtect your home with the superb Ring Alarm system for $159, its lowest price yet.
The Internet of Dongs remains a security dumpster-fire  Boing BoingThe Internet of Dongs is Brad Haines's term for the world of internet-connected, "teledildonic" sex toys, and Haines, along with Sarah Jamie Lewis, have ...
Minimum-security inmate walks away from work release site  WMTVAuthorities are searching for minimum security inmate Garland D. Taylor Jr. who walked away from a work release site.
Oh Snapd! Gimme-root-now security bug lets miscreants sock it to your Ubuntu boxes  The RegisterCanonical has issued an update for Ubuntu to address a security vulnerability that can be exploited by malware and rogue users to gain root access. As this bug ...
SC Declines Karti's Plea of Putting His Rs 10 cr Security as Interest-bearing Short Term Deposit  News18The ED had earlier opposed the plea of Karti Chidambaram is seeking permission to travel abroad, and said that he has been evasive, non-cooperative and ...
Xiaomi Mi Home Security Camera Basic launched in India For Rs 1,999: Here Are The Details  News18The new Mi Home Security Camera Basic 1080p will be available for grabs in India starting tomorrow.
Security officer, suspect taken to hospital after altercation at River Park Square  KHQ Right NowSPOKANE, Wash. - A security officer at River Park Square was taken to the hospital after an altercation with a suspect Saturday.
Personal information of 14.8 million 500px users leaked in security breach  The VergePhoto-sharing website 500px says that the personal information of 14.8 million of its users was impacted by a security breach that occurred in July 2018. The site ...
PREKEH THREATENS SECURITY FORCES | News  Jamaica Star OnlinePrekeh, the most wanted man in Jamaica, has released a video, threatening to avenge the death of his friend, Richard 'Cruz' Anderson, who he said was killed ...
Android’s Real Security Problem is the Manufacturers  How-To GeekIf you're running a Google Pixel handset, your phone is safe from a security hole that could let a PNG file completely wreck the system. If you're using nearly any ...
Nearly 4-year-old Samsung Galaxy S6 gets January 2019 security update  XDA DevelopersSamsung Galaxy S6 and Galaxy S6 Edge have received the Google security update from January 2019, even four years after its launch.
An Apple-Hacking Teen, SIM-Swap Indictments, and More Security News This Week  WIREDLocation data scandals, a Zcash bug, and more of the week's top security news.
StartupBharat: This Indore-based security startup is securing your infrastructure data using a hacker’s point of view  YourStory.comSecuritybulls is a penetration testing and infrastructure security *service* provider that analyses threats to a company's digital assets from a hacker's point of view.
7 security tips to stop apps from stealing your data  CNETWe asked data privacy experts how to protect your personal information when downloading and using apps on your phone.
'Whistleblower' seeks protection after sounding alarm over White House security clearances  NBC NewsA White House staffer is seeking whistleblower protection after raising concerns about security clearances for Jared Kushner and other officials, sources say.
The Apple 'black site' that gives workers few perks and little security  Economic TimesSeveral people who worked here say its widely referred to within Apple as a “black site,” as in a covert ops facility.
Trump isn’t happy with a congressional border security deal — but says he wants to avoid another shutdown  Vox.comCongressional negotiators have kind of, sort of reached a border security deal — and while President Donald Trump has said he isn't particularly “happy” with it, ...
Two radicalised Singaporeans detained under Internal Security Act  Channel NewsAsiaSINGAPORE: Two Singaporean men have been detained under the Internal Security Act (ISA) for their involvement in terrorism-related activities, the ...
Security guard admits molesting mentally disabled woman on Hong Kong building site - Asean Plus  The Star OnlineDefence lawyer says Shah Arshad 'would have never touched her' if he had known of the victim's abnormality Sentencing adjourned to April 3, pending impact ...
Why the security situation in Kashmir keeps going from bad to worse  ThePrintThings have come a full circle in Kashmir. When militancy declined in the mid-2000s, there was widespread acceptance in the Kashmiri society that violence had ...
Shocking lapse of security in Kashmir  gulfnews.comAt least 40 Indian paramilitary soldiers have been killed in a suicide attack on a vehicle convoy in the Kashmir valley. Initial reports suggest that a car filled with ...
Day after Pulwama attack: Thin traffic, heavy security on highway  The Indian ExpressThe authorities had halted traffic near Lethpora, where the attack took place, for several hours after the strike. The road was reopened by Thursday evening.
The border-security compromise is a good start. Now help the ‘dreamers.’  The Washington PostAssuming the president signs off on the bipartisan plan, the next step is for Congress to help the young people seeking a path to U.S. citizenship.
Encounter underway between militants, security forces in J&K's Pulwama  Moneycontrol.comSecurity forces launched a cordon and search operation in Ratnipora area of Pulwama in south Kashmir during the night following specific information about the ...
Churchstanton Primary School plans increased security to prevent pupils absconding  Somerset County GazetteTHE safety of several pupils at a village school has been compromised as they escape from the campus "whenever they have the opportunity",…
Dhoni's Gesture After Fan Breaches Security With India Flag Will Make You Proud  News18The unusual incident happened when a fan paced to the ground and ran straight to Dhoni during the third T20I against New Zealand at Hamilton.
Don’t Get Your Valentine an Internet-Connected Sex Toy  WIREDMozilla expands its “Privacy Not Included” gift guide to the bedroom: It's all sexy fun and games until someone hacks a WiFi-enabled butt plug.
Lenovo Watch X Riddled with Security Vulnerabilities  ThreatpostResearchers are raking the Lenovo Watch X over the security coals in a report that blasts the device for shipping with a half dozen “disturbing” privacy and ...
Rina Mitra, Overlooked for CBI Chief, to Be Bengal's Security Adviser  The WireThe senior IPS officer will likely report to chief minister Mamata Banerjee but her duties are yet to be defined.
How urban agriculture can improve food security in US cities  The Conversation - USUrban farming can make it easier for city residents to obtain healthy, affordable food. But to raise big yields from small pieces of land, farmers need training and ...
Kaspersky Total Security vs. Norton Security Premium  PCWorldKaspersky is a fan favorite in the AV world, while Norton is a longtime brand that's not nearly as beloved. Who wins when these two suites mix it up?
Microsoft: 70 percent of all security bugs are memory safety issues  ZDNetPercentage of memory safety issues has been hovering at 70 percent for the past 12 years.
Selfies and security: Russia moves to ban certain millennial behavior in the military  DefenseNews.comMOSCOW — The Russian parliament has approved a second draft of a bill to ban *service* members from carrying certain electronic devices and sharing ...
Uzbekistan: Head of security services gets chop amid talk of surveillance  EurasianetIn a shock reshuffle in Uzbekistan, the head of the security services has been removed from his post. Officials says it is for health reasons, but there are reports ...
New security measures in Quintana Roo where homicide rate has doubled  Mexico News DailyThe governor of Quintana Roo has announced a new 10-point strategy to combat insecurity in the state, where the homicide rate more than doubled last year.
The Best Free Antivirus Protection for 2019  PCMag.comEven if you're running Windows 10, you shouldn't rely on Microsoft's security tools. Many free third-party security apps are more effective at keeping you safe.
Former Evanston Township HS security guard charged with sexually assaulting student  WLS-TVEvanston police said a former security guard at Evanston Township High School has been charged with sexually assaulting a 17-year-old student.
Report: Security at Dorchester Co. nightclub begged assault victim not to call police  Live 5 News WCSCEDITOR'S NOTE: The incident report from the Dorchester County Sheriff's Office is not clear about the time of the incident in this case. In one instance, it states ...
F5 Networks teams up with Equinix to increase security for multi-cloud environments  Moneycontrol.comThe joint solution will provide security for organizations hesitant to store keys in the public cloud.
That VPN may not be as secure as you think  Network WorldIf you're a VPN subscriber and have ever wondered just how secure the supposedly encrypted pipe that you're using through the internet is — and whether the ...
A Facebook Crackdown, Amazon Facial Recognition, and More Security News This Week  WIREDHackers use SS7 flaws to rob banks, Japan goes after IoT vulnerabilities, and more security news this week.
Upcoming Air India One to get massive security overhaul - Flying fortress  Economic TimesThe two new Boeing 777 being retrofitted to be the future VVIP long haul aircraft for India will have the world's most advanced security gizmos, including missile ...
Five militants killed in encounter with security forces in J-K's Kulgam district  Economic TimesThe gunbattle broke out after the ultras opened fire on a search team of the security forces in the district's Kellem village.
Your Cell Phone Is a Security Threat Hackers Can Use to Steal Your Accounts. Luckily, There's a Fix  Inc.You can't keep your phone number secret. Here's how to protect yourself.
U.S. border security talks progressing: negotiators  ReutersWASHINGTON (Reuters) - U.S. lawmakers negotiating a deal with President Donald Trump on border security funding on Thursday said progress was being ...
General Motors’ Finance Arm Joins Blockchain Data Security Initiative  CointelegraphNews. United States automotive giant General Motors (GM) has become the latest member to join blockchain startup Spring Labs' partner project to enhance ...
WVWC student arrested after security finds marijuana, gun in dorm room  WBOY.comA West Virginia Wesleyan College student has been arrested after officers recovered marijuana and a firearm in his dorm room.

Viruses and Worms: The Problems and Their Solutions

History and BackgroundThe virus was one of the first ever... Read More

SPYWARE - Whos Watching Who?

I am in the midst of Oscar Wilde's The Picture... Read More

How To Cover Your Tracks On The Internet

Every single time you access a website, you leave tracks.... Read More

Watch Out For That Scam

The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More

An Open Door To Your Home Wireless Internet Network Security?

This is not some new fangled techno-speak, it is a... Read More

How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer

If you use the internet, you have probably been infected... Read More

Watching the Watchers: Detection and Removal of Spyware

If spyware were a person and he set himself up... Read More

Reducing Fraudulent Transations ? 5 Simple Ways To Protect Yourself

The money being spent online is steadily growing. With billions... Read More

Be Alert! Others Can Catch Your Money Easily!

So called phishers try to catch the information about the... Read More

Virus and Adware - Fix them Both!

We all get the odd virus now and then, but... Read More

A New Era of Computer Security

Computer security for most can be described in 2 words,... Read More

Are You Surfing Safe?

Ok, you've got a computer, and you get online. You... Read More

Consumers: Shop Online and Get Information Safely

Do you really have to know how feeds work? Not... Read More

How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting... Read More

Backup and Save your business!

There you are busily typing away on your PC or... Read More

8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft

Ebay is a great site and is used by many... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

The One Critical Piece Of Free Software Thats Been Overlooked

Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More

Internet Scams: Dont be a Victim

As the number of people using the Internet as an... Read More

5 Simple Steps to Protect your Digital Downloads

A couple of days ago, I was searching for a... Read More

How To Give Away Your Personal Information

Identity Theft and Your Personal Information -------------------------------------------- Identity theft is... Read More

Information Security for E-businessmen: Just a Couple of Ideas

If you constantly deal with bank or electronic accounts, it... Read More

Virus Prevention 101

Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More

Protection for Your PC - Painless and Free!

Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More

Spyware, This Time Its Personal!

First the basic definition of Spyware: It is a type... Read More