Everything You Need To Know About Spyware and Malware

You are at your computer, checking out software on EBay. The computer is really sluggish, and you are not running anything else. You click on a link, and BLAM you are redirected to a search page you've never heard of and the "back" button won't work.

You've got Spyware! Just what is "Spyware?" The word brings to mind exploding pens and shoe phones. In fact, software makers have struggled to define what spyware is, and is not.

The Anti-Spyware Coalition, a group of companies that include EarthLink, Microsoft, and Hewlett-Packard, have recently published a document that defines spyware as such: "Spyware impairs users control over material changes that affect their user experience, privacy or system security; use of their system resources, including what programs are installed on their computers; or collection, use and distribution of their personal or otherwise sensitive information"

In simpler terms, spyware "spies" the software on your computer, personal information, what web pages you look at, and in some cases, usernames and passwords. Ugh.

The first spyware distribution was in 1999, and is attributed to a popular freeware program called "Elf Bowling." Many users found to their dismay that this "harmless game," was sending information to the creators, Nsoft. This spawned the first anti-spyware program in the year 2000.

Now, both spyware and anti-spyware programs are too numerous to count.

There are several types of software that fall under the generic description of spyware. Let's look at a few, and what they do.

Adware ? adware is an application that displays advertising banners. The reason this is criticized is that it can send information back to the company, who then "targets" you with specific banners based on the web pages you've opened. This is different from clicking on a banner for more information. This program sneaks in the "back door," not "advertising" its presence. Please note that the word "AdWare" is a trademark of AdWare Systems, an honest software company. They are not a part of adware, just share the unfortunate name.

Key loggers are just that. They collect the keystrokes you make, like logging into your bank account, and send it to the hacker. Now he has your account number, user name, and password.

Hijackers and Toolbars are another form of spyware. Hijackers take over your browser, opening pages you don't want, and preventing you from opening ones you need ? like a site that tells you how to get rid of them. Toolbars are the same sort of thing. Now, you may want to have a toolbar like Yahoo or Google on your browser. They can make searches easier, and may have popup or ad blockers. The malware forms of these try to look like them, but they have completely different motives.

Malware is a generic term for "malicious" software. These programs don't just collect information; they are out to get your computer. Technically, these are not spyware, but a brief explanation seems to be in order. Malware spreads itself through the computer, changing files, making copies to send, even erasing the hard drive. Virus' and worms are a part of this group.

Other malware programs are "Trojan Horse, or Backdoor." These hide quietly in your computer until you connect to the internet. Then they creep around your browser, "reporting in" to the owner, who then uses your computer "address" to send out virus's, malware, and spam. Some hackers link several computers to send so much nonsense information to a particular web site that it is overwhelmed, causing it to shut down.

How does spyware end up on your computer? You're not going to like this . . . but most likely you loaded it on yourself! Wait! Before we get nasty letters, let us explain. Remember those "smileys" you downloaded last week? How about the cute cursor the nine year old picked? Most of these "free" programs have spyware attached, or imbedded in them. Even Adobe Reader loads a "Yahoo search bar" when you update the reader.

Remember when you installed the program and that gray box popped up with a thousand lines of small print? Did you read it? I doubt anyone does. The spyware distributor counts on that. If you do manage to slog through the legalese, and stuff only advanced programmers would know (or care about), there will be a few innocuous lines, something along the lines of: "this program will collect information to better your enjoyment of this program," or "a web search toolbar will be added to your browser." When you click on the "accept" button to install the software, you have also agreed to the spyware program.

Another way is when a box pops up claiming to be legitimate software needed to view the site properly, or that it is an update. It only has a "yes" button, implying that you are required to allow the download. These are copying legitimate updates from places like Microsoft, or Macromedia.

Just what is spyware going to do to your computer? Anything you can do, he can do better. It is an executable that can record keystrokes, read your files, watch your word processing program, change your home page, add and delete files, read your cookies (with personal info), then "phone home" with the info. Some spyware will crash your browser if you try to uninstall it. Others may "pretend" to be uninstalled, but they wait until your back is turned to load itself back on your system.

You don't know how the stuff was loaded on your computer, but it is causing all kinds of problems. The computer is running slower, certain programs are not working, and on occasion, you see the dreaded "blue screen of death." (crash). Don't worry, you are not alone According to an October 2004 study by America Online and the National Cyber-Security Alliance, 80% of surveyed users' computers had some form of spyware, with an average of 93 spyware components per computer. 89% of surveyed users with spyware reported that they did not know of its presence, and 95% reported that they had not given permission for it to be installed.

Now what do you do? There are several good "spyware removal" programs out there. But be warned! There are also a number of programs that claim to be anti-spyware that do not work, or worse add more spyware to your system! A good resource for "suspect" spyware is the list at: http://www.spywarewarrior.com/rogue_anti-spyware.htm They have a list of over 200 programs that claim to take care of spyware, but may not do what they claim.

Once you get your computer "clean," how do you avoid getting "dirty" again? There are firewalls and programs designed to watch for known spyware. When you register, the "known spyware" definitions can be updated on a regular basis.

You could use a browser other than Internet Explorer (most spyware exploits problems here). This writer loves Mozilla Firefox ? it's free at www.mozilla.org

Our lawmakers are doing their best to stem the tide of spyware/malware. For example, in Washington State, USA, it is illegal for anyone other than the owner/operator of a computer to install software that alters web browser settings, monitors keystrokes, or disables computer security software.

The Gibson Research Corporation, www.grc.com, has several free fixes to "plug holes" in Internet Explorer's security.

There is hope. In 2005, NY Attorney General Eliot Spitzer brought suit against Intermix Media, Inc. Intermix's spyware program spread by drive-by download (loaded without permission), and installed itself in such a way it was very difficult to remove. Intermix settled for $7.5 million dollars.

Spyware is here to stay. Your best bet is to be informed ? know the tricks used by spyware to load itself. Use a firewall or spyware blocker program. Most important, understand exactly what that new program will install on your innocent computer.

ABOUT THE AUTHOR:
Mike Christy is the owner of http://www.spywarecenter.info which is a free information site providing the latest Spyware news and instructions on how to remove Spyware from your computer.

In The News:

DNC Accuses Russia, ACLU Sues ICE, and More Security News This Week  WIREDTrump dominated security headlines this week, but there's plenty of other news to catch up on.
Kenya to arm private security guards after al-Shabab attack  Aljazeera.comMove follows attack on hotel complex in Nairobi that lasted 18 hours and left 21 people, excluding attackers, dead.
DDoS sueball, felonious fonts, leaky Android file manager, blundering building security, etc etc  The RegisterRoundup This week we wrangled with alleged Russian election meddling, hundreds of millions of username-password combos spilled online, Oracle ...
Police searching for two ‘dangerous individuals’ over security guard murder at New Year’s Eve party  The IndependentPolice are searching for two “dangerous individuals” in connection with the murder of a security guard at a New Year's Eve party in central London.
Chinese embassy in Sweden slams ‘irresponsible’ security threat claims  South China Morning PostRemarks follow Swedish media reports that agreements were signed with Chinese military on controversial satellite station in the country's north.
US shutdown: George W Bush gives pizza to security team  BBC NewsThe former president gives pizza to his Secret *Service* staff who are unpaid during the shutdown.
Jemel Roberson: Police release name of cop who killed black security guard who was corralling a gunman  USA TODAYCHICAGO – A suburban Chicago police department on Friday confirmed the name of the officer who shot a black security guard as he was detaining a ...
Homeland Security says it will provide security assistance to Super Bowl despite shutdown  CNNThe Department of Homeland Security says it will still provide federal support to the Super Bowl this year, despite the partial government shutdown.
Early Android Q build surfaces with new security and UI features  gizmochinaHere is a first look to Android Q thanks to a leaked early build!
Trump to Address Nation on Government Shutdown, Border Security  VOA NewsU.S. President Donald Trump says he will make a major announcement about the government shutdown and border security during an address to the nation ...
EU-Morocco Agreements: Development must be treated as a security priority  Times of IndiaIn a significant development, the EU and the north African nation of Morocco have renewed their agriculture and fisheries agreements over the past week.
When Congress debated border security without having a total meltdown  POLITICODebates over funding for the border have become more contentious.
Increasing safety and security seen after local murders  KOLOAfter four murders in Douglas and Washoe counties, residents are increasing home security and arming themselves for safety.
Trump expected to propose extending DACA, TPS protections in exchange for wall funding  CNNWashington (CNN) President Donald Trump is expected to propose extending protections for Deferred Action for Childhood Arrivals recipients and individuals ...
'Collection #1' data breach is just the beginning, cyber security experts warn  The IndependentThe vast data breach that might be the biggest ever posted on the internet is just the beginning, cyber security experts have warned. The trove of sensitive ...
Linux-Targeting Cryptojacking Malware Disables Cloud-Based Security Measures: Report  CointelegraphNews. A new cryptojacking malware has the ability to disable cloud-based security measures to avoid detection on Linux servers, research by information ...
Top Security Officials Ousted From Metro Transit  St. Louis Public RadioThe top people who handled security for the Metro Transit agency are out of a job. Bi-State Development President Taulby Roach confirmed the departures on.
Future of airport security on show in London  BBC NewsA shoe scanner that works on passengers queuing at airport security is on show in London.
How to digitally secure your smart home  Popular ScienceIf you've filled your house with internet-connected gadgets, you need to make sure nobody can access them. Here's how to secure your smart home.
White House web security has lapsed because of the shutdown  QuartzThe security certificates authenticating more than 130 US government websites, including a subdomain at whitehouse.gov, have expired during the federal ...
BSF blames Bangladesh security force for sending Rohingya to India  The Indian ExpressThe Border Security Force (BSF) on Saturday denied allegations of Border Guards Bangladesh (BGB) that the Indian border guards have been pushing ...
Chinese nanny caught abusing 10-month-old infant on home security camera - Asean Plus  The Star OnlineA video purportedly captured by a home security camera showing a nanny abusing a 10-month-old boy has gone viral in China, triggering a police investigation ...
After CBI Removal, Rakesh Asthana Takes Over As Aviation Security Head  NDTV NewsA day after the government curtailed his tenure in the CBI as Special Director, Rakesh Asthana, who had a bitter fight with ousted agency chief Alok Verma, was ...
Update on Texas Tech University’s security cameras, one year later  KCBDOne year later, Texas Tech Police say they've gotten good results from their security cameras, and they plan to install more.
Avoid Long Security Lines With the TSA's App  LifehackerNo one wants to wait in an hour-long security line, but it's always a possibility—now more than ever. One app designed to show you wait times may help save ...
Changes made to security leadership at MetroLink, for now  Belleville News-DemocratBi-State Development President and CEO Taulby Roach changed the MetroLink security leadership. Richard Zott no longer oversees the security. Safety has ...
XRP Tip Bot security upgraded; prevents attacks on unclaimed Twitter handles and loss of tips  AMBCrypto NewsThe creator of XRP tipbot, Wietse Wind upgraded the security of the tip bot which would otherwise allow attackers to claim tips of unclaimed Twitter handles.
Chief Information Security Officer Priorities For 2019  ForbesThe Chief Information Security Officer supports the business by reducing risk. This isn't easy when faced with the erosion of traditional perimeters, new threats, ...
Security and public health: the interface  The LancetSecurity and health sectors are often interconnected in their attempt to resolve public or global health issues; however, military involvement can have contrasting ...
Telus, Huawei await feds' next move on telecom security concerns  Vancouver SunHuawei has been a key supplier to parts of Telus' wireless network, but not at the core. Government is evaluating whether to exclude Huawei from 5G networks.
New Massive Security Breach Exposes 773 Million Passwords  ExtremeTechA new massive data breach has leaked 773 million email addresses and associated passwords. ...
TSA says security wait times are 'within normal' range in latest statement  Fox NewsThe Transportation Security Administration says wait times at security checkpoints are largely returning to the “normal” range following reports of ...
Man fined over ‘melee’ with security guards at Aberdeen darts event  Aberdeen Evening ExpressGordon Gray, 42, had been at the venue for a Premier League Darts event on May 10 last year. Fiscal depute Katie Murray told Aberdeen Sheriff Court: “At ...
Terrifying holes in airport security which mean Australia's 9/11 moment could happen at any time  Daily MailIt's no secret that Australians love to travel, but the ability to hop on and off domestic flights without having to produce a passport at any point is a growing ...
Thieves who stole security camera that caught them in the act have been arrested, police say  KMOV.comSOUTH ST. LOUIS (KMOV.com) -- Police in South City say two suspects who stole a home security camera and were caught in the act on that very camera have ...
Pentagon Confirms Climate Change Is A National Security Threat, Contradicting Trump  HuffPostMore than a year after President Donald Trump nixed climate change from his administration's list of national security threats, the Pentagon has released an ...
Senate GOP blocks bill to reopen Homeland Security | TheHill  The HillSenate Republicans blocked legislation on Friday that would have temporarily reopened the Department of Homeland Security (DHS).
Security guard shoots, kills man on Fremont Street  FOX5 Las VegasLAS VEGAS (FOX5) - A security guard shot and killed a man near a bus stop on Fremont Street and Casino Center Boulevard Thursday afternoon, according to ...
Fortnite security flaw exposed 80 million accounts  FOX 59 IndianapolisCARY, N.C. – A major security flaw in a popular video game exposed millions of players to hacking risks, according to Forbes. More than 80 million players ...
The Millions Silicon Valley Spends on Security for Execs  WIREDFacebook told investors it expects to spend $10 million annually on security for CEO Mark Zuckerberg.
Private security guards to be issued with guns in six months  The StandardKenyans will soon start seeing armed private security officers guarding banks, shops, supermarkets and other private premises.
Supreme Court to hear plea of 2 women seeking security after they entered Sabarimala temple  Economic TimesThe Supreme Court will hear on Friday a plea of two women seeking 24x7 security after they recently entered the Sabarimala temple in Kerala. Senior advocate ...
CNN's King questions taxpayers funding Karen Pence's security while teaching | TheHill  The HillCNN anchor John King asked on Friday if it matters that taxpayer dollars are being used to pay for Karen Pence's housing and Secret *Service* protection if the ...
Advancing Peace and Security on the Korean Peninsula: The Case for Koreanization  38 NorthSeven months after President Donald Trump and North Korean leader Kim Jong Un met in Singapore for a historic summit to accelerate negotiations on ...
Government shutdown: Atlanta airport wait times still nation's longest; track security delays  AL.comFILE- In this Monday, Jan. 14, 2019, file photo security lines at Hartsfield-Jackson International Airport in Atlanta stretch more than an hour long amid the partial ...
Homeland Security chief Kirstjen Nielsen: We can protect State of the Union address by Trump despite Pelosi claim  CNBCKirstjen Nielsen's statement came hours after House Speaker Nancy Pelosi suggested President Donald Trump reschedule his Jan. 29 speech to a joint session ...
As the Government Shutdown Drags on, Security Risks Intensify  WIREDFrom potential nation state hacks to a brain drain, the shutdown has done nothing good for cybersecurity.
Family of teen who says school security guard beat him to sue school district  WPLG Local 10The family of a 14-year-old boy who claims he was choked and punched by a security guard at Miami Norland Senior High School in Miami Gardens is planning ...
Police arrest, accuse man of pointing gun at security guard in French Quarter bar, police say  NOLA.comAndrew Breaux was booked with aggravated assault, negligent carrying of a concealed weapon, possession of firearm inside of an alcoholic beverage outlet ...
Cisco CEO Robbins On Tariffs, Security, And The State of The Global Tech Industry  CRNCisco CEO Chuck Robbins took to the airwaves to discuss U.S.-China trade, cyber security, and what the self-proclaimed 'eternal optimist' thinks could ...
$60M overhaul of high-security prison buried in Raimondos budget plan  The Providence JournalGov. Gina Raimondo is seeking to embark on an unannounced — and unheralded — $66-million renovation of the high-security prison for Rhode Island's most ...
VA security staff compromised safety and Shulkin violated ethics rules, oversight report says  Washington PostThere were inadequate threat assessments, the Veterans Affairs inspector general report found, and “insufficient written operational procedures that resulted in ...
Researchers identify malware that can dismantle cloud security protections | TheHill  The HillA team of researchers have identified a new kind of malware that they say can remove cloud security products.
Crowd overwhelms security agents as Buhari visits Jos  Daily TrustA massive crowd at the Rwang Pam stadium in Jos North local government area of Plateau State on Saturday overwhelmed security agents when President ...
Mayor Perkins uses plain clothes officers for security  KTBSShreveport has a new mayor, and a new security detail. But you may not see it.
WOTR Podcast: No Good, Very Bad Ideas in National Security  War on the RocksBad ideas. How much trouble do they cause in national security? How do they disrupt or hinder the protection and advancement of American interests? Where.
Senator requests FBI investigate whether Homeland Security Sec. Nielsen lied about family separation  KGUNSen. Jeff Merkley (D-Oregon) has asked that the FBI open an investigation into Homeland Security Kirstjen Nielsen committed to determinte whether she ...
A national security reset is in serious order | TheHill  The HillWe need to be more like President Washington, not Woodrow Wilson, and return to our roots as a country and ask ourselves if our military actions in the Middle ...
Snap's Security Chief Fired Over Secret Relationship With Outside Consultant  CheddarBy Alex Heath. Snap's global security chief has been fired after an internal investigation found that he had an undisclosed relationship with a woman from a ...
Alarming! Drug barons taking over NACOB – Security expert  GhanaWebSecurity expert, Adam Bonah has indicated there is a looming danger in the country as some drug cartels are working tirelessly to hijack Ghana's Narcotics ...
UPDATE: Police say man shot by bus security guard near Fremont Street  KTNV Las VegasPolice say a man was shot by a security guard in the 120 block of Fremont Street around 2 p.m..
GOP Rep. Will Hurd calls wall "least effective" border security measure  CBS NewsHurd, from Texas, is the only Republican member representing a district along the southern border.
Bitcoin SV News: BSV is Prioritizing Scaling, Security, Secure-Instant Transactions, and Stability  Invest In BlockchainBitcoin SV, at just 2 months old, is already pulling away from Bitcoin Cash's shadow with big plans ahead in 2019. According to Steve Shadders, the Technical ...
WATCH | Security guard robbed of gun at busy Soweto shopping centre  TimesLIVEPolice are appealing to residents of Soweto who might have information that could lead to the arrest of four men who robbed a security guard of his firearm in ...
'Mama will fight for you': Mother of security guard killed by Midlothian police officer speaks out  WLS-TVBeatrice Roberson is turning her pain into action. Her son, Jemel Roberson, was killed by a Midlothian police officer in November. After mourning for weeks, the ...
Tapper: Trump violated decades of security protocols  CNNCNN's Jake Tapper says President Donald Trump violated decades of security protocols by announcing House Speaker Nancy Pelosi's trip to Afghanistan.
Macron's ex-security aide Benalla in custody over diplomatic passport use  CNNParis (CNN) A former security aide to French President Emmanuel Macron has been placed in custody as part of an investigation into his use of diplomatic ...
How to secure, protect, and completely lock down your Android phone  PCWorldWhether you just got a new Android phone or have had one for a while, it's probably not as secure as it could be. Here's how to lock it down.
Exclusive: Offensive Security Names New CEO; Former No. 2 at HackerOne, Lynda  FortuneNing Wang is the new chief executive officer of Offensive Security, a cybersecurity training business best known for its popular certification programs which teach ...
Airport security: The future could simply involve walking through a corridor  The IndependentMost passengers say that the worst part of the airport experience is the security checkpoint, in which travellers are temporarily transformed from valued ...
Syria Kurds reject 'security zone' under Turkish control  Economic TimesQAMISHLI, SYRIA: Syria's Kurds on Wednesday rejected a US proposal for a "security zone" under Turkish control along the Syrian side of the two countries' ...
Some Brown School parents want better communication and security  WAVE 3A gun found right next door to the J. Graham Brown School still has some parents feeling uneasy. While the school was checked, some parents said security and ...
Drunk Security Guard Attacks Woman With Knife In Delhi's Dwarka: Police  NDTV NewsA 24-year-old woman was injured after she was allegedly attacked with a knife by a drunk man who worked as a security guard in the Dabri area of Dwarka ...
Supreme Court fires security guard who abandoned post  ABS-CBN NewsThe Supreme Court dismissed a security guard stationed at the Court of Appeals and forfeited all his retirement benefits for abandoning his post, the high court ...
'My Biggest Concern Is National Security': AZ Ranchers Advocate for Border Wall  Fox News InsiderArizona ranchers Fred and Peggy Davis explained on "Fox & Friends" what living close to the U.S.-Mexico border without a wall is like.
Mali: 'Dire' humanitarian situation, 'grave' security concerns challenge fragile peace  UN NewsWith over 800 schools forced to close due to insecurity, and 2.3 million vulnerable people in need of assistance this year, a top UN official told the Security ...
Sudan Unrest: government says determined to preserve security  Sudan TribuneJanuary 18, 2019 (KHARTOUM) - Sudanese Presidential Assistant Thursday defended the repressive policy against protesters saying his government is ...
Microsoft continues to build government security credentials ahead of JEDI decision  TechCrunchWhile the DoD is in the process of reviewing the $10 billion JEDI cloud contract RFPs (assuming the work continues during the government shutdown), Microsoft ...
Cobb legislators hear school security concerns from administrators  MDJOnline.comACWORTH — In a week that saw school safety initiatives come from both the state and local levels, security concerns were at the top of the list for school ...
No, you can’t hide a security camera in your Airbnb rental photos and call that 'disclosure'  MashableAirbnb is apologizing to one of its users after dismissing his privacy complaint. The user had discovered undisclosed security cameras inside his rental.
'What's the wait at airport security? Is my food safe?' More questions about the federal government shutdown -- answered  CNNHere are more answers to commonly asked questions about the historic shutdown.
Airbnb says sorry to guest for how it dealt with undisclosed security camera  Digital TrendsAn Airbnb guest recently found a surveillance camera in his rental apartment that hadn't been properly disclosed in the listing. The company's initial response ...
3 Myths That Will Ruin Your Retirement Security  ForbesRetirement planning is complicated and confusing. There are many myths that can trip up your financial security. We cover 3 retirement myths that you shouldn't ...
Security Waits Top an Hour at Atlanta Airport Amid Shutdown  BloombergSome airport security lanes in Atlanta, Washington and Houston were closed as the Transportation Security Administration continued to grapple with more ...
Cash-in-transit security guards caught with R2.6-million in looted money [photos]  The South AfricanThese two cash-in-transit (CIT) security guards rank high up there with the dumbest criminals in the world. We do not condone crime but if you are going to do it, ...
Apple spent $310K on Tim Cook’s personal security in 2018, here’s how that compares to other CEOs  9to5MacEarlier this month, Apple filed a proxy statement with the SEC in which it was revealed the company spent $310,000 on personal security for Tim Cook in 2018.
Hamilton to keep bylaw ban on security cameras facing the street  TheSpec.comOntario's privacy commissioner is holding up Hamilton's rare bylaw as a “blueprint” for other cities.
Intruder alert! The best smart home security cameras  The GuardianA new generation of cameras featuring a host of clever features will make conventional alarm systems obsolete. We review four of the best.
Ring Security Cam Snooping, Location Tracking, and More Security News This Week  WIREDA German hack confession, unencrypted government sites, and more security news this week.
Box hires former SAP exec as chief information security officer  TechCrunchBox announced today that it has hired Lakshmi Hanspal to be the company's new chief information security officer (CISO). She boasts 20 years of security ...
Greece Police to add extra security Tuesday following threat at Odyssey Academy  WHECGreece Police will have an officer at every secondary school...
Best security camera 2019 – Indoor and outdoor models to protect your home  TrustedReviewsBest security camera 2019: Keep your home safe and capture vital evidence with this top selection of indoor and outdoor models.
Person of 'national security concern' was accidentally granted permanent residency  CBC NewsTwo federal departments were forced to make changes after a person of “national security concern” was granted permanent residency “due to a series of failures ...
Breaking the impasse on shutdown, border security | TheHill  The HillA bipartisan commission to study what to do at the border would provide a face-saving way out of the current impasse.
What Financial Services Executives Need To Know About Data Security  ForbesThe financial services industry experiences 35% of all data breaches, earning it the unflattering title of the most-breached sector. It's easy to understand why.
After May riots, state to close maximum-security prison  STLtoday.comJEFFERSON CITY • Eight months after hundreds of inmates rampaged through a short-staffed maximum-security prison in northwest Missouri, the facility is ...
Yemen: Security Council backs new mission in support of key port city truce  UN NewsThe Security Council unanimously voted on Wednesday in favour of deploying up to 75 observers to monitor a fragile ceasefire in Yemen's port city of Hudaydah ...
Acapulco's mayor looks to adopt Los Cabos' security model  Mexico News DailyThe mayor of Acapulco has announced that she will seek to replicate the security model in place in Los Cabos, Baja California Sur, where crime has fallen ...
Ring security camera catches man licking the doorbell for hours  Digital TrendsSecurity cameras can capture all kinds of things that happen while you're gone. A family in Salinas, California had their Ring camera capture something pretty ...

Identity Theft -- 10 Simple Ways to Protect Your Good Name!

Identity Theft is one of the most serious problems facing... Read More

Cyber Crooks Go Phishing

"Phishing," the latest craze among online evil-doers, has nothing to... Read More

The Move to a New Anti-Virus Model

This is the second in a series of articles highlighting... Read More

Consumers: Shop Online and Get Information Safely

Do you really have to know how feeds work? Not... Read More

Internet Small Business and Fraud

Be careful of sites that promise to send you "instant... Read More

All About Computer Viruses

Your computer is as slow as molasses. Your mouse freezes... Read More

Identity Theft Offline -- So Many Possibilities

Chris Simpson, head of Scotland Yard's computer crime unit was... Read More

Hacking the Body Via PDA Wireless Device

First I would like to stress I am condoning the... Read More

Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers

I am the victim of an internet scam. It is... Read More

Securities

NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More

Check Out That Privacy Policy

Before you enter your name, address or any other data... Read More

An Open Letter From a So-called Stupid

Someone recently told me, "You would have to be a... Read More

What is Spyware?

The most frustrating part of having Spyware on your computer... Read More

Cybercriminals Trick: Targeted Trojan-Containing Emails

Threats we ordinary Web users face online leave us no... Read More

Parental Control - Dangers To Your Child Online & Internet Child Safety Tips

Did you know...? 1 in 5 children who use computer... Read More

Phishing ? Its Signs and Your Options

Phishing is the act of some individual sending an email... Read More

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy,... Read More

Anti-Spyware Protection: Behind How-To Tips

There is no doubt that "how-to articles" have become a... Read More

Detect Spyware Online

You can detect spyware online using free spyware cleaners and... Read More

Phishing-Based Scams: A Couple of New Ones

Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More

Phishing: A Scary Way of Life

The Federal Bureau of Investigation has identified "phishing" as the... Read More

How To Give Away Your Personal Information

Identity Theft and Your Personal Information -------------------------------------------- Identity theft is... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More

Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk

The trash folder in my main inbox hit 4000 today.... Read More

Hacked: Who Else Is Using Your Computer?

A friend called me one day and asked if I... Read More