Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Is My PC Vulnerable on the Internet? > NetSparsh - Viral Content you Love & Share

Is My PC Vulnerable on the Internet?

No longer are viruses the only threat on the internet. In recent years other threats have evolved which include spyware, adware, hacking, identity theft, information theft, pop-ups and the loss of information.

Let's begin with the basics. We all need to protect our PC in the same way we protect our home, car and bank account. We wouldn't give a stranger the keys to our car, home or bank account now would we. If you don't protect your PC it is like giving the keys to a stranger and letting him/her have full access to your PC. Once the stranger has the keys they can snoop around and take whatever they want. I know, your thinking how can they do this, my computer is in my house and my doors are locked. Well, today you can be anywhere in the world and access someone's computer via the internet. Since the introduction of cable modems and DSL everyone's PC is online all the time and accessible.

Why do I need to protect my PC, I don't keep any important information on it? Ask yourself a couple of questions.

1. Do I bank online?
2. Do I shop online?
3. Do I create documents, spreadsheets?
4. Do I let other people use my PC?
5. Do I download music, files onto my PC?

If you answered yes to any of these questions then your PC is vulnerable. If you bank online then you are sending personal confidential information to your bank via the Internet. For Example: Let's say you are infected with spyware and you are typing in your account number plus password. A spyware installation can record key strokes and then send them off to a site on the internet. Now the person who setup the site has your account number and password to your bank. Here is one more example, if you answered yes to I let other people use my pc, here is what happens. The other person decides that they like this new cool piece of software. They download and double click on the exe, msi or whatever installs the software. The adware, spyware or virus installs. Now the infection is installed and now it can start stealing confidential information or cause havoc on your PC. You get onto the PC as always, since you don't know this has happened and start doing what you always do, type documents, go to chat rooms, do your banking online, reconcile your banking with quicken and all this time your confidential information is stolen and you are completely unaware that this occurred.

The million dollar question, what do I do? Well, you can follow this approach.

1. Install a Spyware application and install and configure correctly. If you already have spyware application installed make sure it is up to date and make sure that is configured properly.

2. Install an Adware application and install and configure properly. If you already have adware application installed make sure it is up to date and make sure that is configured properly.

3. Install an AntiVirus application and install and configure properly. If you already have antivirus application installed make sure it is up to date and make sure that is configured properly.

4. Install backup software, why because if something does get through your defenses or delete something by accident you always have a way of retrieving the information. You should try to backup your system at least every other day.

5. Install Encryption software. This software will encrypt files like word docs, spreadsheets, banking file on quicken. This way if someone does steal your information they will not be able to read it.

6. Install a Firewall. The Firewall can either be software or hardware based. I would install both especially if you bring your laptop with you and connect to the internet at different locations. The Firewall will block hackers trying to scan your system while you are on the Internet.

Many people have these applications installed but they do not configure them correctly. Just installing the application does not mean that the application is working properly to stop the threat/infection. On some applications you need to configure the setting to make the application work the way it was designed to. Find out how to configure and install the software properly either by reading a how to book or getting someone to help. If you already have the application installed make sure it is up to date and make sure that is configured properly. All of the software needs to be up to date and kept current. As new threats are release on the internet, all applications will need the current updates to fight these threats.

If you would like to find out if you're PC is protected you can take the test. This will not harm your PC it just checks for vulnerabilities and lets you know if you passed or failed. The application is a single exe and DOES NOT NEED TO BE INSTALLED. All you need to do is run the test application and follow the instructions. Get Risk Assessment Tool

All articles are written by HowtoPCGuru! HowtoPCGuru http://www.howtopcguru.com You may reproduce and use this article just so long as you add a link (http://www.howtopcguru.com) down at the bottom. HowtoPCGuru, All the latest articles, tools, news, file hosting and more!

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

ZDNet

In security update, Apple backports Meltdown fix to older macOS versions
ZDNet
Meltdown-Spectre: A reminder to the IT industry that security is a mirage. Apple has rolled out a security fix to older Macs in an effort to mitigate the risk from a vulnerability in modern chips. The technology giant on Tuesday released a fix for ...
Apple releases security update, fixes Meltdown on macOS Sierra and El Capitan9to5Mac
Apple Addresses Meltdown and Spectre in macOS Sierra and OS X El Capitan With New Security UpdateMac Rumors

all 32 news articles »

CNBC

Amazon's cloud business acquires Sqrrl, a security start-up with NSA roots
CNBC
Amazon's cloud business has acquired Sqrrl, a cybersecurity start-up that spun out of the National Security Agency. The deal, which Sqrrl confirmed on Tuesday, comes as Amazon Web Services aims to pick up more business from U.S. intelligence agencies ...
Amazon Web Services catches Sqrrl, a security startup founded by ex-NSA staffersGeekWire

all 5 news articles »

New York Times

France's New Labor Laws: 'Flexibility, and No Security'
New York Times
PARIS — The announcements came in a steady drumbeat. Around 1,300 job cuts at France's biggest automaker. At least 2,500 at France's largest supermarket chain. Over 200 sought at a major clothing retailer. And thousands more are on the way. Just weeks ...


Anti-piracy firm Denuvo acquired by digital security outfit Irdeto
TechCrunch
Denuvo's anti-piracy tech has been divisive in the gaming world, with some complaining that it restricts their gaming habits or stifles modding communities. But few will dispute that it has been unusually successful in its main goal of preventing ...

and more »

Reuters

Swiss marchers protest against Trump, break through Davos security cordon
Reuters
ZURICH/DAVOS (Reuters) - Anti-capitalists marched through Swiss cities on Tuesday to protest a planned visit by U.S. President Donald Trump to the World Economic Forum (WEF) and broke through a security cordon in Davos. Leftists organizers called for ...
Soldiers, snipers and security at Davos: Protecting the world's rich and powerfulCNBC

all 1,001 news articles »

TechCrunch

Sumo Logic expands security toolset with FactorChain acquisition
TechCrunch
The companies would not disclose the purchase price, but indicated the acquisition closed at the end of Q4 and all 12 FactorChain employees have joined Sumo Logic, including CEO Dave Frampton and CTO Ken Tidwell,. Sumo is broadly a cloud-based log ...

and more »

STLtoday.com

Do armed security guards make hospitals safer? Shooting at Barnes-Jewish spurs debate
STLtoday.com
Several local hospital officials declined to be interviewed on the subject of security. An informal tally shows that aside from Barnes-Jewish, BJC HealthCare hospitals do not equip their guards with guns. Guards at SSM Health hospitals carry Tasers but ...


Reuters

Afghan hotel attack stirs fresh debate on private security firms
Reuters
On Tuesday, security officials were meeting in the hotel, as guards of the Kabul Balkh Safety and Security Organisation (KBSS) stood outside, with rifles slung across their chests. KBSS won the contract to guard the hotel three weeks ago, the ...
Kabul hotel guests describe lax security before deadly attackGeo News, Pakistan

all 266 news articles »

Buffalo News

Former Buffalo police commissioner lands job in private security, including City Hall
Buffalo News
Daniel Derenda – who retired last week as Buffalo police commissioner – has started work for one of the world's largest private security firms that provides security at Buffalo City Hall. Derenda, 58, is the general manager for G4S Security Solutions ...
Former Buffalo Police commissioner Daniel Derenda takes new position at security companywivb.com

all 4 news articles »
Google News

Desktop Security Software Risks - Part 1

This is the second in a series of articles highlighting... Read More

Make Money Online - Defend Against The Latest Scam

First, let's do a little recap'. As I stated in... Read More

Top Spyware Removers Considerations

Only the top spyware removers are successful at detecting and... Read More

Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking

Airport Menace: The Wireless Peeping Tom ---------------------------------------- As a network... Read More

Reporting Internet Scams

When it comes to reporting Internet scams most of us... Read More

All About Computer Viruses

Your computer is as slow as molasses. Your mouse freezes... Read More

How to Protect Your Child from the Internet

When the Internet first came about, it was realized it... Read More

Temporary Internet Files - the Good, the Bad, and the Ugly

A little bit of time invested into learning about internet... Read More

Be Aware of Phishing Scams!

If you use emails actively in your communication, you must... Read More

New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

In 1997, I decided after 15 years as a practicing... Read More

Computer Viruses - How to Remove a Computer Virus from Your Computer

Computer viruses infect millions of computers every day. Viruses can... Read More

Cyber Crooks Go Phishing

"Phishing," the latest craze among online evil-doers, has nothing to... Read More

Secrets On Security: A Gentle Introduction To Cryptography

Let us take the example of scrambling an egg. First,... Read More

Social Engineering: You Have Been A Victim

Monday morning, 6am; the electric rooster is telling you it's... Read More

Viruses, Trojans, and Spyware - Oh My!

Have you ever had to call Symantec or McAfee to... Read More

Passwords or Pass Phrase? Protecting your Intellectual Property

Much has been said on the theory of password protection... Read More

Spyware, What It Is, What It Does, And How To Stop It

Spyware is software that runs on a personal computer without... Read More

Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge

Is your enterprise following the rules?The bulk of financial information... Read More

Its Time to Sing the Encryption Song - Again!

Yes, I'm wearing my encryption hat again. Why you may... Read More

Data Security; Are Your Company Assets Really Secure?

Is your data secure? Think again. Securing data is unlike... Read More

How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting... Read More

Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER

From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More

Criminals are Fishing For Your Identity

What is Phishing? In a typical Phishing attack, a criminal... Read More

Spyware Attacks! Windows Safe Mode is No Longer Safe

Many of us have run into an annoying and time-consuming... Read More

Instant Messaging ? Expressway for Identity Theft, Trojan Horses, Viruses, and Worms

Never before with Instant Messaging (IM) has a more vital... Read More