Let’s face it, parental control software can be a hassle sometimes. Blocking legitimate sites as well as letting explicit sites through without even a hint of trying to block it. Kids these days are smart. It doesn’t take much to bypass content filters. It can be as easy as doing Google searches until a site is found that is not blocked by the filter, to using using proxy servers to hide the actual website they are visiting.
Parents cannot sit back and expect software to handle their parental responsibilities. The term “parental controls” is quite deceiving seeing how it makes no More >
The world was recently attacked by malware that installed itself through the AutoPlay feature, and it is happening again. The previous attack placed a second AutoPlay option in the window that pops up when you insert a flash drive. Clicking on the wrong one would infect the computer. This new threat attacks shortcut icons. It targets USB sticks and other removable drives.
A security advisory issued by Microsoft warns users of targeted attacks against Windows Shell (that is the main interface that Windows uses to organize the desktop and file system). The attacks work on virtually all versions of Windows and More >
We trust our security software to keep us safe, but without service and support backing it up, our trust may be misplaced. According to a new report from NSS Labs, an independent product analysis company, security software vendors often miss the latest malware threats from hacked websites. As many as 50,000 malicious programs are released everyday. This report suggests that infection is inevitable; whether your software tells you or not is another issue.
Most security software vendors charge heavy fees to remove infections that their software should have prevented to begin with. Doesn’t that seem a bit strange? That’s like More >
I want you to think about the information you have on your computer. Think about your hundreds of family photos, the music that you paid for, your bills, your legal documents, business secrets and strategies, etc. Now I want you to imagine that you came home one day to find that your hard drive melted itself–its broken and unrecoverable. Is your stomach starting to turn? Are you getting nervous about losing all of the data on your computer?
The fact of the matter is, if you care about any of the information that you have on your computer(s), BACK IT UP!
It More >
The new attack comes in the form of a post from a friend saying: "This is without doubt the sexiest video ever!". The post also has a thumbnail showing a girl riding an exercise bike in a short skirt.
By clicking on the post to see it, you are sent to a site that explains you do not have the appropriate software to view the video. If you happen to install the “correct software”, you are actually installing adware on your computer. This adware will display annoying advertisements on your computer.
What You Need To Do:
- Do not click on any video with More >
Everyone will have to buy a computer sooner or later. That is the nature of technology…it keeps improving and gets outdated quickly; not to mention having to buy a new computer because your old one just flat out breaks with no warning. The chances of any one person having to buy a new computer in the next 3 years is very likely.
I have had many people ask me what kind of computer they should buy. There is no simple answer to that question, but I have put together some guidelines to make sure you are getting all the essentials that More >
A new threat has been discovered that is spreading rapidly though email. The email includes a message that asks the user to test their computer to see if it will be able to run Windows 7.
The email contains a .zip file which has the “Windows Upgrade Advisor” inside. If you run the program what you will actually get is a Trojan that steals passwords from your computer as well as other important information.
The Trojan will also open a backdoor to allow the download of other malicious software.
What You Need to Do:
- Do not open emails from people or organizations you do More >
So, you have your anti-virus, firewall and anti-spyware installed. You have a hardware firewall on your router. You computer is fully updated to prevent zero-day attacks. You keep your wallet chained to you at all times and never leave your credit cards anywhere. You shred ALL your important papers and documents and store the ones you can’t shred in a locked safe. Your identity is safe…right? Think again.
Just when you thought you knew all the ways thieves steal your information, something pops up that takes us all by surprise. Copy machines. That’s right, copy machines are your new threat. Since More >
It seems like over the years we have to buy new computers to keep up with the changing technology in our world. It’s actually quite nice to always have a new machine; the problem with getting a new computer is that you have to figure out what to do with the old one. If you are like me, then you end up with old computers in your basement just taking up space.
Should you just throw it away? No! There are actually a few general laws that state that you shouldn’t just throw out your old electronics because they can be More >
A malicious ad for greeting cards on Facebook redirects clickers to a page selling fake anti-virus software. The ad is intermittently displayed with a Farm Town ad which has over 9 million monthly users.
The website may tell you that you are infected and ask you to buy the removal software.
What You Need to Do:
- Don’t install anti-virus software without researching it first.
- If a site or program is saying that you are infected with something, call your technicians at INVISUS to have them investigate. They will remove any infections that may be on your computer. Remember, it is free to call if More >