Free Software Isn’t Free and Installing It Can Cost You Plenty

Freeware isn’t actually free software, and we’re all paying for it now. We regularly tell our customers to be very careful when installing free software because it generally caries a hidden payload of crappy software with it.

free-software-not-free

Most computer tune-ups we perform for our customers begin with the removal of a bunch of free, useless programs that are sapping the …

 

Bank Account Stealing Malware Returns

Malicious software used to steal millions from bank accounts has re-emerged a month after US authorities broke up a major hacker network using the scheme, security researchers say.

Bank Account Stealing Malware Returns

The security firm Malcovery said it identified a new trojan based on the Gameover Zeus malware, which officials said infected up to one million computers in 12 countries, and was blamed in …

 

Keyloggers – Keystroke Logging Software and Hardware Threats

A keylogger is a program that runs in your computer’s background secretly recording all your keystrokes. Once your keystrokes are logged, they are hidden away for later retrieval by the attacker. The attacker then carefully reviews the information in hopes of finding passwords or other information that would prove useful to them.

Keyloggers---Keystroke-Logging-Software-and-Hardware

For example, a keylogger can easily obtain confidential …

 

What is Phishing? Phishing and Identity Theft

Scammers and Hackers are Phishing For Your Identity

what is phishingWho hasn’t received an email directing them to visit a familiar website where they are being asked to update their personal information? The website needs you to verify or update your passwords, credit card numbers, social security number, or even your bank account number. You recognize the business name as one that …

 

Personal Computer Security, The Threats and Solutions

personalcomputersecurityWhen it comes to computer security, many of us live in a bubble of blissful ignorance. We might be vigilant and never open email attachments from people we don’t know, we might take care to make sure an eCommerce site is secure before entering our credit card information, or we might even go so far as to install a standard …