Skip to main contentdfsdf

Kelly Longrich's List: Malware, Viruses, and How to Stay Safe in Cyberspace

    • Spyware, viruses, & security forum
    • CNET's Forum on viruses and spyware is the best source for finding the latest news, help, and troubleshooting advice from a community of experts. Discussions cover how to detect, fix, and remove viruses, spyware, adware, malware, and other vulnerabilities on Windows, Mac OS X, and Linux.
  • Oct 14, 13

    Links to how to protect your pc or mac from viruses and malware and how to harden your configuration.

    •  
        <!--gc-->  

      Secure Windows and Mac

    • If you are seeking articles and other resources on how to secure your Windows PC or Mac, you've come to the right place. We'll show you how to harden your configuration and give you other tips to make your computer as secure as possible

    4 more annotations...

  • Oct 14, 13

    Easy how-to guide for Mac users to help harden their computer against threats.

    • How to Enable Mac OS X’s Built-in Security Features
    • Mac OS X is capable of providing robust security right out of the box; however, some of OS X’s best security features are disabled by default, requiring the user to set them up. This guide will walk you through configuration of the most important settings you need to make your Mac more secure
  • Oct 14, 13

    Articles about cybercrime and the latest scams.

    1 more annotation...

    • 5 Ways to Stealth Yourself Online
    • Invoke the cloak of online invisibility.

    13 more annotations...

  • Oct 14, 13

    How some hackers can access your info when using a wireless access point.

    • 4 Secrets Wireless Hackers Don't Want You to Know

      Hacker: Nothing to see here. Please don't bother reading this.

    • You're using a wireless access point that has encryption so you're safe, right? Wrong! Hackers want you to believe that you are protected so you will remain vulnerable to their attacks. Here are 4 things that wireless hackers hope you won't find out, otherwise they might not be able to break into your network and/or computer:

    4 more annotations...

  • Oct 14, 13

    Even though you have a strong password, hackers are using rainbow tables to hack them.

    • Rainbow Tables: Your Password's Worst Nightmare

      Don't let their cute name fool you, these things are scary.

    • The Rainbow Tables that we are talking about are used to crack passwords and are yet another tool in the hacker's ever growing arsenal.

    10 more annotations...

  • Oct 14, 13

    How hackers are making money installing malware on your computer and how to get rid of it.

    • The Shadowy World of Malware Affiliate Marketing
    • Is your computer being sold into slavery without you even knowing it?

    15 more annotations...

  • Oct 14, 13

    Clickjacking is a scam and this article shows when you might be vulnerable to it.

    • How to Protect Yourself From Clickjacking Attacks

      Keeping an eye out for an invisible enemy.

    • What is Clickjacking?

    5 more annotations...

  • Oct 14, 13

    How hackers use scareware to get you to download their malware or virus.

    • Should you be Afraid of Scareware?

      It's not a slasher movie. It's much worse.

      By Andy O'Donnel

    • Scareware is a term used to describe an application that is usually associated with a scam to trick unsuspecting users into thinking that they have a computer virus or some other kind of major computer issue that only the Scareware application can fix.

    9 more annotations...

  • Oct 14, 13

    Describes what a bot net is, symptoms that your computer may be infected, and what you can do.

    • ave you noticed that your PC has suddenly slowed to a crawl for no apparent reason? It might be nothing, but it could be that your computer is busy doing other things, and by other things I mean attacking other computers as part of a bot net controlled by hackers, or other assorted bad guys.
    • Bot net software is usually installed on computers by users who are tricked into loading it. The software might pass itself off as a legitimate product claiming to be an anti-virus scanner, when in reality it is malicious Scareware that, once installed, provides a gateway into your system for malware software developers to install things like rootkits and bot net-enabling software.

    10 more annotations...

  • Oct 14, 13

    Why Macs are not going to become targeted heavily anytime soon with malware, viruses and such.

    • Don't Panic Over the Latest Mac Malware Story
    • I mention Safire because I suspect he would be amused to read about the recent wave of attacks on the Mac, or perhaps I should say, the current wave of predictions about attacks on the Mac. Longtime Microsoft columnist Ed Bott made national news on May 2nd, when he asserted categorically that “serious malware is coming soon to a Mac near you.” As evidence, Ed pointed to a video made by a Danish IT security company named the CSIS eCrime Unit, a company I have never heard of. That video describes a “crimeware” program that can build Mac-compatible Trojan-horse programs for capturing keystrokes and passwords. To lure customers into installing the Trojan, customers that visit poisoned websites are shown native-looking dialogs that try to scare them into downloading fake security software. Ed has since followed up his initial column with four more posts on the same subject. The most recent one describes a large increase in customers who are complaining about malware in Apple support forums. All of these posts are meant to persuade readers that, indeed, the Mac is becoming just like Windows: malware-laden and dangerous.

    7 more annotations...

    • Difference Between A Virus, A Worm, A Trojan Horse And Malware
    • Virus- or computer virus refers to a computer program that infects another program. Technically a true computer virus attaches itself or a part of it into another program or a file. Computer virus, like its biological counter part needs a 'host' to infect and spread. It primarily attaches itself to an executable (.exe) or command (.com) files.

    5 more annotations...

  • Oct 14, 13

    Blog that has updated information about malware and viruses.

    • Malware and Viruses
    • TechNet Blogs

    1 more annotation...

    • How to protect yourself from malware
    • What is the threat?

    22 more annotations...

  • Oct 14, 13

    Article describes what phishing is and how it works.

    • Gone Phishing!

      Experts Weigh In On Why Phishing "Works"

    • "Phishing attacks use “spoofed” e-mails and fraudulent websites with the attempt to trick unsuspecting Internet users into divulging confidential personal information such as credit card numbers, account usernames and passwords, social security numbers, etc. By hijacking the trusted brands of well-known institutions, phishers are able to convince a small percentage of recipients to respond to them."

    2 more annotations...

  • Oct 14, 13

    Virus, worm, and Trojan Horse explained, differentiated, and how to protect computer against them.

    •  
       
        Home > Did You Know > The Difference Between a Computer Virus, Worm and Trojan Horse
         
       
       
       
       
       

      The Difference Between a Computer Virus, Worm and Trojan Horse

    • What Is a Virus?

    8 more annotations...

  • Oct 14, 13

    Blog explains what a botnet is and how computers can be infected.

    • What is a Botnet?
    • Botnet Definition

    5 more annotations...

  • Oct 16, 13

    Online resource to teach online safety to kids in grades K-12.

  • Oct 16, 13

    Webonauts Internet Academy is a web original game for PBS KIDS GO! that gives kids 8- to 10-year-old an opportunity to have some fun while exploring what it means to be a citizen in a web-infused‚ information-rich world. It is an engaging experience on its own but becomes all the more powerful when parents and teachers use game play as a springboard for conversations about media literacy and citizenship in the 21st Century.

1 - 20 of 22 Next ›
20 items/page
List Comments (0)