Our Blog

Tips and advice for maintenance, optimization, and daily computing tasks.

Our Blog


Stay Safely Connected

by Andy Thompson on September 3, 2015

Email and social networking are two primary means of communicating and stay connected with family and friends. Through social network sites and emails, you share updates, post photos, and reveal things that are sometimes very personal about you.  Examples include where you live, which company you work for, whom you are related to, when and where you are going on holiday, what food you like, what music you listen to, whom you have just met, etc. By piecing these bits of information together, it becomes easy for anyone to learn more about you. And that’s also how cyber criminals find out information they want from you. Personal identity theft and online scams are two primary threats that target email and social networking users.

Identity theft

A recent study conducted by Bitdefender, a leading European security technology provider, discovered that more than a quarter of a million email addresses, usernames, and passwords can be found easily through social networking platforms like Facebook, Twitter, personal blog postings, chat forums, and download sites. Surprisingly, 87% of these compromised credentials still provided valid access to personal email and social networking accounts. What’s more astonishing was that 75% of the people in this study use the same password for all their accounts. Hackers really didn’t have to look too hard to gain access to your identity and private information.

Online scams

Users of the social networking site Facebook are informed through a notification system and by e-mail that they have been made administrators of an unknown page and are directed to click on a link that takes them to a fake Facebook page. Once a user has landed on the fake Facebook page, they are re-directed to a different, malicious site where they are asked to provide their e-mail and shipping address in order to take part in a test session of the new Apple iPad. The scam states that Apple is giving away a total of 10,000 iPad2s for review. Making it even more believable, some of the notifications came from emails and posts sent by family members or friends whose PCs were also compromised. You trust your friends, but can you trust their computers as well?

Stay connected safely

Security experts recommend the following guidelines so that you can avoid security risks while staying connected online:

  • Avoid publishing any information that can be used to identify you, such as phone numbers; your home, school, or work address; your birthday; and your social security number.
  • Use different sets of username and passwords for email and social networking sites.
  • Avoid posting holiday dates, locations, or even pictures while you are away. Otherwise, you leave perfect “bread crumbs” for burglars to follow.
  • Never include bank or credit card information in emails or posts.
  • Install and deploy an effective and updated antivirus / anti-spyware solution that features a strong anti-phishing mechanism.

Click to learn more...Introducing – Data Protection

CompuClever Antivirus PLUS features an ironclad information safety mechanism called Data Protection. Data Protection prevents sensitive data leaks when you are online. Based on the rules you create, Data Protection scans the web, e-mail, and instant messaging traffic sent by your computer.  It looks for specific character strings, for example, your credit card number. If there is a match, the respective web page, e-mail, or instant message is blocked.

You can create rules to protect any piece of information you might consider personal or confidential, from your phone number or e-mail address to your bank account information. Multi-user support is provided so that more than one person can log on to Windows using different user accounts and can configure their own rules. If your Windows account is an administrator account, the rules you create can be configured to also apply when other users of the computer are logged on to their Windows accounts.

Define what data you want to protect

Define how you want the data be protected

Extra peace of mind

Rest assured, personal information provided to the Data Protection tool is encrypted and cannot be used by anyone else but you. Also for extra safety, you can just enter part of the information that you like to protect. For instance, if you want to prevent leakage of your credit card number, you can just enter the last four digits of the card number so that any web traffic leaving your computer with the same combination of digits will be blocked. It’s a smart way of safeguarding data without any compromise.


Surf with Confidence

by Andy Thompson on September 2, 2015

Unlike shark attacks, cyber-attacks are numerous, sophisticated, and ever-changing. Many cyber criminals who have managed to evade law enforcement are not only resourceful but also considered experts. To a certain extent they are even innovative. Compelled by the sinister desire of luring more victims while remaining undetected, hackers diligently invent new techniques and schemes to exploit systems of users who are even security-conscious.


The cases presented below are a couple of example of classical cyber-attacks that are conniving, stealthy, and almost ingenious.

  • Case 1: While surfing the web at home, the user of a hacked PC was prompted to create new accounts in order to use her own Wireless Access Points (WAP). Not knowing what was happening behind the scenes, the victim would use a common username or email address along with a password that was used for several other online accounts.  The result: the hackers gained complete and unblocked access to her email, Facebook, Twitter, Pinterest, or even online banking site.
  • Case 2: On the premises of a Starbucks coffee shop, hackers positioned a Wi-Fi hotspot and disguise it so that it appears to belong to Starbucks. Attackers then redirect victims to frequently used websites that were actually modified or fake to capture login credentials or deploy keylogging malware to harvest personal identity information. This type of cyber-attack even has a code name: waterholes.

Would you believe that the waterholes scheme was so effective it even captured victims from cafeterias inside high-tech companies such as Apple, Facebook, and Microsoft? More than likely, those techies have some sort of antivirus solution on their laptops. But the reality is harsher – a bare bones antivirus software without proper web protection is not going to cut it.

Proper web protection

So what types of web protection can help fend off and defy cyber-attacks? You need exactly two types of protection:

  1. Anti-phishing protection that alerts you of potential phishing websites. This prevents you from falling prey to the “honey traps” set up by hackers.
  2. Real-time web protection against malicious code or downloads embedded in the web. This prevents your computer from being infected or even controlled.

Click to learn more...Web protection in CompuClever Antivirus PLUS

CompuClever Antivirus PLUS Web protection ensures a safe browsing experience by alerting you about potential phishing web pages. It provides real-time web protection for popular web browsers including:

  • Internet Explorer
  • Firefox
  • Google Chrome

The web protection feature provides two functions:

  • Web Toolbar, which automatically blocks you from accidentally visiting a phishing or compromised website.

    Web toolbar blocking a suspicious site

  • Search Adviser, a component that rates the results of search engine queries and links posted on social networking websites by placing an icon next to every result.  Working like a traffic light, the Search Advisor tells you if a site, as recommended by a search engine, is safe, suspicious, or dangerous.

    Search Advisor

The web protection feature is seamlessly embedded with your default web browser. It is always at your side protecting your web surfing experience without being in the way.

Check out the detailed information about CompuClever Antivirus PLUS Web Protection:

If your antivirus solution doesn’t provide web protection specifically, you should still follow these best-practices to protect yourself against cyber attacks:

  • Do not provide your personal information via e-mail.
  • Do not click any links you receive from senders you do not know.
  • Do not download attachments from unknown senders.
  • Download files only from trusted websites.
  • Check if the final price is the same with the price displayed at the start of a transaction.
  • Keep your antivirus solution updated. If you are not using an antivirus solution, we recommend you install one as soon as possible.
  • Do not log in to your financial account from unknown networks.

Safe Guard Your Online Banking

by Andy Thompson August 31, 2015

Over the last few years Internet fraud has increased and is becoming a serious issue for online transactions. Using a variety of methods, online thieves can easily access important information like bank accounts and personal data. This article helps you to understand essential techniques hackers deploy to break into your bank account and how to nullify these hacking attempts by using tools that may already be available with your antivirus application.

Read the full article →

Are you well protected

by Andy Thompson August 27, 2015

No two security products are created equal and there are similarities and important differences among antivirus software when it comes to evaluating the level of sufficiency and effectiveness of protection. This article shows you what to look for and how to tell if your antivirus software provides you enough protection.

Read the full article →

Antivirus Solutions

by Andy Thompson July 31, 2015

Too frequently PC users suffer the consequences of a virus or malware attack. Once becoming a victim of an attack it seems the only choices available is to take it to a repair technician or try to re-install the entire operating system yourself. With all these situations you could face loss of data and you definitely have to wait for your PC to be up and running. Then there is the cost factor if you have to get someone to do it for you. It’s no wonder that security tools such as antivirus (AV) products get a lot of attention. But… as many of us can attest, there are programs that can take over your PC and slow down overall functioning as well as your own workflow when taking into account a constant barrage of popup messages. We examine here AV solutions and focus on what we need and how we can avoid to some degree malicious attacks from occurring.

Read the full article →

Introducing Windows 10

by Andy Thompson July 10, 2015

Microsoft is coming out with a new operating system. There is a lot of “love” going out for this release. That is to say… much of the feedback is that users love the features. And the icing on the cake, like Apple OS X and mobile operating systems, Windows 10 upgrade is free. As many of our readers know… free sometimes comes at a cost. We will examine the fine print and give our recommendations.

Read the full article →

Malwarebytes Mistakenly Flags and Disables CompuClever Applications

by Andy Thompson June 29, 2015

Malwarebytes overextended its authority by categorizing Compuclever PCTuenUpMaestro and PCCleanMaestro, both of which are Microsoft Windows 8 Logo certified applications as PUP. CompuClever is engaging Malwarebytes team regarding this false-positive categorization, meanwhile continuing its endeavor of providing excellent software and service striving to improve its customers’ computing experience.

Read the full article →

Restore Browser Speed

by Andy Thompson June 12, 2015

We’ve introduced very good information about the various causes of slow connectivity and the PC conditions we face. Maybe you know firsthand or secondhand what it is like to be overtaken by something on your PC that cripples the overall functionality. In extreme cases it means a trip to a PC repair shop and having the computer wiped and re-installed. It’s very similar to the effects of a computer virus with only one exception – you may have installed it yourself rather than being attacked. This condition is happening frequently among beginner PC users and it is this group of PC users that are being targeted. We’re going to help you restore the previous condition of your web browser and provide some recommendations on how to prevent similar occurrences.

Read the full article →

Bogged Down

by Andy Thompson May 12, 2015

A major factor in Internet slow down that can result in your PC being bogged down is: software running in the background which can also bring about web browser overload. Your PC is a great at multitasking. Despite this, there are instances when it can suffer the consequences of being bogged down.

Read the full article →

Improve Internet Speed

by Andy Thompson April 15, 2015

With demanding schedules is it any wonder we become easily frustrated when we are held up in traffic? Whether it is out on the road or on the Internet, we want uninhibited passage. In our previous article we began to introduce you to Internet speed tests by reviewing four popular testing tools that are available. The caveat is that each of these is different and results vary. So… how do we equip ourselves to: a) determine if the fault is at our end and b) if not, to better be able to present some real data to our Internet provider? First we are going to offer more information on the speed tests in case you have given up hope on them. The key to using them is: create a history! Next, we are going to examine and better understand how slowdowns and bottlenecks occur and what the impacts are. By doing this you can better assess if the issue is within your home and network or outside and due to poor conditions. Finally, if the issue is due to your PC, we will show you a very easy method of improving your Internet speed.

Read the full article →