Security updates are delivered on the second Tuesday of each month, which is called “Patch Tuesday”, but security updates can be delivered whenever a software update is required to prevent an exploit targeting Windows users. Windows Update can be configured to install updates automatically, to ensure that a computer is always up-to-date and not vulnerable to computer worms and other malware.Continue Reading
Unsolicited email was first considered a bit of joke earning the jocular name of spam. However, as the spam volumes rose to epidemic proportions what was a minor crisis in the life of an IT professional soon snowballed into a major crisis. Factual figures estimate that spam amounts to nearly 95 percent of all emails. According to Jupiter Research reports, the active email consumer received a shocking 3253Continue Reading
As Scareware threats are on rise, millions of Internet users are falling prey to the Scareware scams.
Scareware adopts bogus sales tactics that are designed to scare a user into believing that his or her computer contains critical errors or viruses that have to be fixed immediately. Scareware ads offer an instant solution to the so-called problems on the computer and come for a price. InContinue Reading
As we are aware of the recent issue with a few thousands of emails, lets see how some of these scammers have used the emails they hacked into.
The following email was sent to a small business support’s email id for financial gain from firstname.lastname@example.org – an email id belonging to their client.
“I’m sorry for this odd request because it mightContinue Reading
Email users can help reduce the spam outflows in the Internet. When a user signs up for something online, he should be careful while checking checkboxes and must not check checkboxes for additional offers. Else, he will receive email from partners of the site he signed up at. It is advisable to use freebie accounts to fight spam. Create a few freebie accounts, direct them to your mainContinue Reading
The criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication is known as Phishing.Continue Reading
The criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication is known as Phishing.
Types of Phishing
Phishing is usually carried out by email or instant messaging and it often directs users to enter details at a fake website, which is similar to the legitimate one
IBM’s X-Force 2009 Mid-Year Trend and Risk Report says that there has been a tremendous increase of 508% in malicious web links over Internet during first half of 2009. The malicious content was found even on trusted sites, including search engines, blogs, bulletin boards, personal websites, online magazines and mainstream news sites.
“There is no such thing as safe browsing today and it is noContinue Reading