<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Antivirus Archives - CompuClever</title>
	<atom:link href="https://www.compuclever.com/posts/category/antivirus/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.compuclever.com/posts/category/antivirus/</link>
	<description></description>
	<lastBuildDate>Fri, 14 Jul 2017 20:41:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.1.1</generator>

<image>
	<url>https://www.compuclever.com/posts/wp-content/uploads/cropped-compuclever_128-1-32x32.png</url>
	<title>Antivirus Archives - CompuClever</title>
	<link>https://www.compuclever.com/posts/category/antivirus/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Don&#8217;t be Held at Ransomeware</title>
		<link>https://www.compuclever.com/posts/held-at-ransomeware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=held-at-ransomeware</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Fri, 14 Jul 2017 17:23:49 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[Windows 10]]></category>
		<category><![CDATA[Windows 7]]></category>
		<category><![CDATA[Windows 8]]></category>
		<category><![CDATA[antivirus]]></category>
		<category><![CDATA[PC Security]]></category>
		<category><![CDATA[Petya]]></category>
		<category><![CDATA[Ransomeware]]></category>
		<category><![CDATA[Wannacry]]></category>
		<category><![CDATA[Windows Update]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3718</guid>

					<description><![CDATA[<p>Ever get the feeling that computers have come a long way, yet… why are we still susceptible to PC virus attacks?  Recently there were two major worldwide attacks known as “ransomware”.  We’re going to offer information about these attacks and how you can be prepared to fend off a ransomware infection.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/held-at-ransomeware/">Don&#8217;t be Held at Ransomeware</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p>With two prominent malware attacks occurring back-to-back during the past two months, you&#8217;re likely familiar with the term  &#8211; &#8220;Ransomware&#8221; &#8211; a cyber-crime gaining worldwide attention. In this article we explore ransomware in depth and offer recommendations and instructions to prevent it from happening and to protect your PC.</p>
<h1>Ransomware defined:</h1>
<p>You can think of ransomware as &#8220;data kidnapping&#8221;. It is the result of a malware attack that blocks access to a user&#8217;s PC data. Once infected, the attackers try to force you into paying money so you can regain access. In some cases there is a threat to publish or delete the data unless the ransom is paid. Data and access is blocked by using strong file encryption.</p>
<p>Computers can be infected whether at home or in the work environment. This includes PCs on an enterprise network or government agency servers.</p>
<p>Some ways of infecting your PC include:</p>
<ul>
<li>Surfing to unsafe or fake websites.</li>
<li>Opening emails and email attachments from unknown sources.</li>
<li>Opening malicious links in emails, Facebook, Twitter, and from online chat apps such as Skype.</li>
</ul>
<p>The two main types of ransomware are: Lockscreen and Encryption.</p>
<ol>
<li>Lockscreen ransomware prevents you from accessing your PC or files and instead displays a full-screen message saying you have to pay a ransom to regain access.</li>
<li>Encryption ransomware prevents you from opening your files by encrypting them. The encryption is very strong (uses an AES-256 &#8220;military grade&#8221; cipher algorithm), and would take an estimated 3&#215;10<sup>51</sup> years to crack. Also, a unique encryption key is generated for each infected computer so you can&#8217;t just get someone else&#8217;s key.</li>
</ol>
<p>Note: There are older versions of ransomware that display false messages such as claiming you have performed an illegal activity with your PC. They then state you are being fined by a police force or government agency. We want to stress that these claims are false and can be considered a scare tactic designed to extort money from you.</p>
<h1>What is the result of the attack?</h1>
<p>While there are various forms of ransomware, all of them prevent you from performing normal PC functions. This includes:</p>
<ul>
<li>Getting locked out! Preventing you from accessing your operating system.</li>
<li>Blocked access to files! Files are now encrypted and you can&#8217;t access them.</li>
<li>Disabled apps! Certain programs (like your web browser), are no longer able to run.</li>
</ul>
<h1>What about the ransom?</h1>
<p>Some ransomware attacks involve the victim having to pay money while some make you complete a survey. Payment of money is performed online and sometimes involves the victim having to pay in Internet currency Bitcoins. Due to the nature of those that commit these cybercrimes &#8211; there is no guarantee that your data or PC will return to the pre-attack state.</p>
<h1>How much do they extort?</h1>
<p>Symantec gained access to a malware server in 2012. This provided them first hand insight of the ransoms that were paid out. In a single day 5,700 computers were infected and 2.9% paid the ransom. This comes out to approximately $33,600 for one day.</p>
<p>&#8220;Given the number of different gangs operating ransomware scams, a conservative estimate is that over $5 million dollars a year is being extorted from victims. The real number is, however, likely much higher.&#8221;<a href="#_ftn1" name="_ftnref1">[1]</a></p>
<h1>Recent Ransomware attacks&#8230;</h1>
<h2>WannaCrypt; May 12, 2017:</h2>
<p>Many users around the world were victims of the malicious &#8220;WannaCrypt&#8221; software attack which has been considered one of the worst and most widespread cyber-attacks. More than 230,000 computers in over 150 countries were affected. All files on infected PCs were locked and the demanded ransom was 300 dollars in bitcoins.</p>
<p>Interestingly, people running Windows 10 were not targeted by the attack. Despite this, this attack was serious as evidenced in the steps Microsoft took. They took a highly unusual step in providing a security update for all customers to protect even the Windows platforms that are in custom support only. This includes Windows XP, Windows 8, and Windows Server 2003.</p>
<p>Supported versions of the operating system (Vista, Windows 7, 8.1, 10, etc.), have access to the security update MS17-010. If users have automatic updates enabled or have installed the update, they are protected. Microsoft states<a href="#_ftn2" name="_ftnref2">[2]</a>: &#8220;For those organizations who have not yet applied the security update, we suggest you immediately deploy <a href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx" target="_blank" rel="noopener noreferrer">Microsoft Security Bulletin MS17-010</a><u></u><em>&#8220;. </em>They go on to state that this attack may evolve over time and additional defense strategies are warranted.</p>
<h2>Petya; June 27, 2017:</h2>
<p>Companies across Europe and the US were affected by the &#8216;Petya&#8217; ransomware attacks. Infected computers displayed a message demanding a Bitcoin ransom of $300. Victims were unable to unlock their computers even if they paid the ransom.<a href="#_ftn3" name="_ftnref3">[3]</a> The instructions included sending confirmation of payment to an email address. However, that email address was shut down by the email provider and there was no way to contact the attacker for a decryption key to unlock their computer.</p>
<p>This ransomware attack exploited the same Microsoft exploit as WannaCry &#8211; the vulnerability known as EternalBlue. Even with the patch, this cyber-attack has two other ways to spread within an organization focusing on the network administrator&#8217;s tools. Experts believe the initial infection is suspected to have been delivered through email (as with WannaCry).</p>
<h1>If Infected With Ransomware:</h1>
<p>You are a victim of a ransomware infection once you see some form of ransom demand appearing in a dialog window, an app, or a full-screen message. Unfortunately, this demand is displayed after encrypting your files or disabling some part of your PC.</p>
<p>Before you try to recover your files, Microsoft suggests trying to fully clean your PC with <a href="https://support.microsoft.com/en-us/help/17466" target="_blank" rel="noopener noreferrer">Windows Defender Offline</a>. After this you can try to <a href="https://support.microsoft.com/en-us/instantanswers/62ed802d-7c8d-35d9-9b82-6cace4b08185/backup-and-restore-in-windows-10" target="_blank" rel="noopener noreferrer">Backup and Restore in Windows</a>.</p>
<p>We fully agree with Microsoft: &#8220;Do not pay any money to recover your files. Even if you were to pay the ransom, there is no guarantee that you will regain access to your PC or files.&#8221;</p>
<h1>If You Already Paid:</h1>
<p>If you paid the ransom, contact your bank and local authorities immediately. Your bank may be able to block the transaction and return your funds if you paid with a credit card. Inform your bank if you did submit credit card details to the cyber thieves.</p>
<p>We suggest you also contact the following government agencies that deal with fraud and scam reporting:</p>
<ul>
<li>In the United States, go to: <a href="http://www.onguardonline.gov/" target="_blank" rel="noopener noreferrer">On Guard Online</a>.</li>
<li>In Canada, go to: <a href="http://www.antifraudcentre-centreantifraude.ca/" target="_blank" rel="noopener noreferrer">Canadian Anti-Fraud Centre</a>.</li>
<li>For other countries: go to this <a href="https://support.microsoft.com/en-us/help/4013550/windows-protect-your-pc-from-ransomware" target="_blank" rel="noopener noreferrer">Microsoft site</a>.</li>
</ul>
<h1>Prevention:</h1>
<p>There are safe measures you can take to lessen the impact of attacks and failures and there are ways to prevent malicious attacks from crippling your PC and network.</p>
<ol>
<li>Keep a current back up of your data files (images, video, documents and music).</li>
<li>Keep your Windows install up-to-date with the latest Windows security updates.</li>
<li>Keep your antivirus program up-to-date. We highly recommend a reputable AV program with active subscription (one that keeps up to recent malicious attacks). We invite you to check out the performance and protection offered by <a href="https://www.compuclever.com/products/antivirus/" target="_blank" rel="noopener noreferrer">CompuClever Antivirus PLUS</a>.</li>
<li>Do not open email links or files from a sender you do not recognize. In many cases you can recognize a fake email and webpage because they have bad spelling or look unusual.</li>
<li>Be careful where you surf on the internet especially with less reputable sites. There is a greater chance of contracting a malware virus. Quite often unsafe sites can look convincing and have only subtle differences.</li>
</ol>
<p>Microsoft states<a href="#_ftn4" name="_ftnref4">[4]</a>: &#8220;Look out for strange spellings of company names (like &#8220;PayePal&#8221; instead of &#8220;PayPal&#8221;) or unusual spaces, symbols, or punctuation (like &#8220;iTunesCustomer Service&#8221; instead of &#8220;iTunes Customer Service&#8221;).&#8221;</p>
<h1>Stay Safe:</h1>
<p>Hundreds of millions of emails that include a ransomware attachment are being sent out every month. Many of these are being blocked and software vendors are working hard to shrink security holes and fix this ongoing cyber-crime.</p>
<p>As can be seen with the information provided here, staying informed, taking precautions, and using safe practices can help prevent you from getting an infection that could save you time and your data. If you require further information on this subject we recommend Microsoft&#8217;s <a href="https://www.microsoft.com/en-us/wdsi/threats/ransomware" target="_blank" rel="noopener noreferrer">Ransomware FAQ</a> page.</p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> <a href="http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/ransomware-a-growing-menace.pdf" target="_blank" rel="noopener noreferrer">http://www.symantec.com</a><br />
<a href="#_ftnref2" name="_ftn2">[2]</a> <a href="https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/" target="_blank" rel="noopener noreferrer">https://blogs.technet.microsoft.com</a><br />
<a href="#_ftnref3" name="_ftn3">[3]</a> <a href="https://www.theguardian.com/world/2017/jun/27/petya-ransomware-attack-strikes-companies-across-europe" target="_blank" rel="noopener noreferrer">https://www.theguardian.com</a><br />
<a href="#_ftnref4" name="_ftn4">[4]</a> <a href="https://www.microsoft.com/en-us/security/portal/mmpc/shared/ransomware.aspx" target="_blank" rel="noopener noreferrer">General information on ransomware</a></p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/held-at-ransomeware/">Don&#8217;t be Held at Ransomeware</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CompuClever Antivirus PLUS &#8211; VB100 Award!</title>
		<link>https://www.compuclever.com/posts/compuclever-antivirus-plus-vb100-certification-explained/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=compuclever-antivirus-plus-vb100-certification-explained</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Tue, 31 Jan 2017 19:17:10 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[Protect online privacy]]></category>
		<category><![CDATA[antivirus]]></category>
		<category><![CDATA[pc performance]]></category>
		<category><![CDATA[VB100]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3256</guid>

					<description><![CDATA[<p>CompuClever is pleased to release the latest VB100 test results for CompuClever Antivirus PLUS.  We will present these results and help you to understand them as part of our ongoing testimony to the effectiveness of our AV product.  As is evident with these results… CompuClever Antivirus PLUS offers outstanding protection without slowing down your PC</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/compuclever-antivirus-plus-vb100-certification-explained/">CompuClever Antivirus PLUS &#8211; VB100 Award!</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;<br />
CompuClever is pleased to release the latest VB100 test results for <a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=vb100" target="_blank">CompuClever Antivirus PLUS</a>.  We will present these results and help you to understand them as part of our ongoing testimony to the effectiveness of our AV product.  As is evident with these results… CompuClever Antivirus PLUS offers outstanding protection without slowing down your PC!</p>
<h3>The Test Results</h3>
<p>We’ve had four positive test results from the VB100 test lab, one of the few independently operated testing facilities focused on providing comprehensive examination of security software and solutions.  Let’s start with an overview of these four tests that are available for <a href="https://www.virusbulletin.com/testing/results/recent/vb100-antimalware/compuclever-avplus" target="_blank">online viewing</a>.  These tests were conducted between August 2015 and October 2016 on various Windows platforms.</p>
<p><a href="https://www.virusbulletin.com/testing/results/recent/vb100-antimalware/compuclever-avplus" target="_blank"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%;" title="Click to view tests results..." src="https://www.compuclever.com/posts/wp-content/uploads/compuclever-vb-test-snapshot-1024x679.png" alt="" /></a></p>
<h3>Overview &amp; Breakdown</h3>
<p>The specific results of each test are based on test markers which you can get an idea of when you mouse over the column title (RAP Score, Performance impact %, etc.)  We define them here:</p>
<ul>
<li><strong>Platform</strong>:  This is the selected operating system that VB100 performs its test on. VB100 tries to cover a spectrum of the most popular Windows OS with their tests focusing on one version at a time.  Note:  CompuClever Antivirus PLUS supports Windows 10, Windows 8, 7, Vista, &amp; XP.</li>
<li><strong>Result</strong>:  This is the overall result; simply put, it reveals if the antivirus software passed or failed the test.</li>
<li><strong>RAP Overview</strong>:  “Chart shows RAP scores with weighted average overlaid.” Note: The difference in scores is explained below.</li>
<li><strong>RAP Score</strong>:  “Weighted average detection rate over recent malware samples, including retrospective coverage of new malware (Reactive and Proactive).”  Basically, this means the ability for the AV product to detect and react to malware threats.  This is the most important measure of how effective any AV product is; the higher the score, the more effective the product.</li>
<li><strong>Performance impact (%)</strong>:  “Increase in time taken to complete a set of common tasks.”  This is the impact to system performance by the AV product when in operation. A lower score is better here.</li>
<li><strong>Stability Rating</strong>:  “Rated on a five-level scale from Solid (no problems) to Flaky (severe issues).”  This is the rating given by VB100 based on the test results. This tells you the quality of the AV software apart from the previously mentioned effectiveness or performance impact measurements.</li>
</ul>
<p>What is evident in these results is a consistent pattern of high RAP Score – detection of AV threats – and a low performance impact.  Once again this means that CompuClever antivirus PLUS works to protect your PC from online malware threats all the while operating in the background.</p>
<p>In this way, you won’t notice it and it won’t have an impact to overall system performance – something CompuClever dedicates itself to accomplishing!</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=vb100" target="_blank"><img decoding="async" class="emailImage aligncenter" style="height: auto; max-width: 275px; width: 100%;" title="windows-10-compatible" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-box-left-640x480-1.png" alt="" /></a></p>
<h3>Overall Conclusions</h3>
<p>Based on analysis of detailed test data, we are very pleased with the results of the tests. These results are in line with our original goals:</p>
<ul>
<li>Total protection against any form of online threats: CompuClever Antivirus’s high RAP score is among the list of top security solution providers, like ESET, Kaspersky, Bitdefender, and AVG.</li>
<li>Minimum impact to PC performance: CompuClever Antivirus’s extremely low % in Performance Impact to PC performance outperforms most of our top competitors.</li>
<li>A solid and well-built antivirus product: It is easy to install without reboot, has an intuitive user interface, and is extremely intelligent and quiet. CompuClever Antivirus is regarded as a “solid” antivirus solution.</li>
</ul>
<p>This is what VB100 lab says about us in one of its test remarks:</p>
<div class="quick_facts">
<p><a href="#_ftn1" name="_ftnref1"></a>The design is slick and attractive, with a good range of options available and intuitive deployment of controls.</p>
<p>Stability was perfect throughout testing, with not the slightest shake even under heavy stress. Performance impact was decent too&#8230;</p>
<p>Detection was as excellent as one would expect, with good scores everywhere.<sup><a href="#_footnote">[1]</a></sup></p>
</div>
<h3>Check Your AV Product</h3>
<p>We invite you to examine the results for your AV product.  You can trust VB100 as it a free service that performs regular independent reviews of malware solutions and provides <a href="https://www.virusbulletin.com/testing/dates/vb100-antimalware" target="_blank">test results</a> for AV software that handle both known (reactive) and unknown (proactive) virus samples. You can see <a href="https://www.virusbulletin.com/testing/dates/vb100-antimalware" target="_blank">the latest test results</a> for any product or you can use the Search field to quickly find test results.</p>
<h3>CompuClever Antivirus PLUS</h3>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=vb100">CompuClever Antivirus PLUS</a> offers unparalleled security technology against malware threats. It is designed to deliver the best performance for your PC and it is built on the most advanced antivirus technology available today. Exceptional in its ease of use, it allows you to handle security with a single click. The intuitive technology also guards your online privacy and digital identity with specific protection when doing online banking and online shopping.</p>
<p>Browse the following topics to learn more about Antivirus PLUS:</p>
<ul>
<li><a href="https://www.compuclever.com/posts/protection-vs-speed/" target="_blank">Do you have to sacrifice PC speed for protection?</a></li>
<li><a href="https://www.compuclever.com/posts/safe-guard-your-online-banking/" target="_blank">How to safeguard online banking</a></li>
<li><a href="https://www.compuclever.com/posts/stay-safely-connected/" target="_blank">How to protect your personal identity</a></li>
<li><a href="https://www.compuclever.com/posts/silence-and-vigilance/" target="_blank">Does your antivirus bark all the time?</a></li>
<li><a href="https://www.compuclever.com/posts/surf-with-confidence/" target="_blank">How to surf the web safely</a></li>
</ul>
<div class="bottom_p">
<p>&nbsp;</p>
<hr size="1" />
<p>[1]<a href="https://www.virusbulletin.com/virusbulletin/2015/08/comparative-review-windows-7-pro-64-bit" target="_blank">https://www.virusbulletin.com/</a></p>
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/compuclever-antivirus-plus-vb100-certification-explained/">CompuClever Antivirus PLUS &#8211; VB100 Award!</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Breaking News – Yahoo Admits Breach of 500 Million Accounts</title>
		<link>https://www.compuclever.com/posts/yahoo-admitted-500-million-accounts-have-been-breached/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=yahoo-admitted-500-million-accounts-have-been-breached</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Thu, 22 Sep 2016 23:29:36 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[Protect online privacy]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[security breach]]></category>
		<category><![CDATA[Yahoo]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3004</guid>

					<description><![CDATA[<p>Yahoo confirmed today that data "associated with at least 500 million user accounts" has been stolen in what may be one of the largest cyber-security breaches ever.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/yahoo-admitted-500-million-accounts-have-been-breached/">Breaking News – Yahoo Admits Breach of 500 Million Accounts</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>My heart dropped when I was <a href="http://money.cnn.com/2016/09/22/technology/yahoo-data-breach/">alerted by CNN</a> that Yahoo admitted today that 500 million user accounts have been compromised. As a seasoned IT professional who has been involved with the security industry for the past decade, this is probably THE worse security breach that’s occurred since the inception of the Internet.</p>
<p>Here are the key facts that you should be aware of regarding this breach:</p>
<ul>
<li>In August 2016, a person codenamed “Peace” attempted to sell what he claimed to be 200 million Yahoo user information.</li>
<li>Back then, Yahoo only said they were investigating the legitimacy of the claim.</li>
<li>On Sept. 22<sup>nd </sup>2016, Yahoo issued a statement acknowledging the legitimacy of the claim. Furthermore, Yahoo confirmed the scale of the breach is actually 500 million accounts.</li>
<li>Yahoo also confirmed that the information stolen contains name, username, lightly encrypted passwords, date of birth, and for some accounts, security questions and answers.</li>
</ul>
<p>Nevertheless, till this moment, Yahoo hasn’t issued a notice to all of its users advising them to reset their passwords.</p>
<p>Here at CompuClever, we felt it is necessary to inform you about this event because there is a high possibility that either you or someone you know might be impacted by this incident.</p>
<p>Yahoo is currently working with law enforcement agencies, including the FBI, to deal with this breach. Nevertheless, we recommend you immediately take the following measures to protect your online security and personal privacy:</p>
<ul>
<li>Immediately change your Yahoo email password.</li>
<li>If you happen to be using the same combination of username and password across multiple (non-Yahoo) online accounts, change all of the passwords. Make sure that you use a different password for every account.</li>
<li>Ensure you have a legit and reputable antivirus protection with active subscription to protect your PC from any forms of cyberattack.</li>
</ul>
<p>Further readings:</p>
<ul>
<li><a href="https://www.compuclever.com/posts/how-to-protect-yourself-in-a-post-password-world/" target="_blank">How to protect yourself in a post-password world</a></li>
<li><a href="https://www.compuclever.com/posts/compuclever-antivirus-plus-vb100-certification/" target="_blank">How to create a good password</a></li>
<li><a href="https://www.compuclever.com/posts/safe-guard-your-online-banking/" target="_blank">Safe guard your online banking</a></li>
<li><a href="https://www.compuclever.com/posts/stay-safely-connected/" target="_blank">Stay safely connected</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/yahoo-admitted-500-million-accounts-have-been-breached/">Breaking News – Yahoo Admits Breach of 500 Million Accounts</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Firewalls &#8211; First Line Filtration</title>
		<link>https://www.compuclever.com/posts/what-is-firewall/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=what-is-firewall</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Tue, 28 Jun 2016 22:36:15 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[Windows tips]]></category>
		<category><![CDATA[antivirus]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[windows tips]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=2706</guid>

					<description><![CDATA[<p>If our PC could be considered a well-protected fortress, we would think of the firewall as an essential part of the moat and drawbridge system – it monitors and controls entry.  Most of us associate firewalls with large network corporations and sophisticated security systems.  You might, however, be surprised to find your PC and personal devices have security issues similar to large corporate networks.   This is why firewall technology is built into your PC and offers the first line of protection from offensive web sites and potential hackers.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/what-is-firewall/">Firewalls &#8211; First Line Filtration</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">If our PC could be considered a well-protected fortress, we would think of the firewall as an essential part of the moat and drawbridge system – it monitors and controls entry. Most of us associate firewalls with large network corporations and sophisticated security systems. You might, however, be surprised to find your PC and personal devices have security issues similar to large corporate networks. This is why firewall technology is built into your PC and offers the first line of protection from offensive web sites and potential hackers.</div>
</div>
<p>We’ll begin with a definition of what a firewall is and then move into some basic questions and answers.  After that we’re going to provide information for those that might want to beef up their firewall protection.</p>
<h2><strong>The Firewall Basics</strong></h2>
<p>Effectively a firewall is a filter.  It is designed to prevent dubious programs and Internet services from establishing a connection or gaining access to your computer.</p>
<p><img decoding="async" class="emailImage aligncenter" style="height: auto; max-width: 484px; width: 100%;" title="What is a firewall" src="https://www.compuclever.com/posts/wp-content/uploads/firewall-diagram.jpg" alt="" /></p>
<div class="quick_facts">
<p><strong>Firewall Defined</strong>: A firewall is hardware or software technology designed to monitor and filter incoming and outgoing traffic to your PC.  It is a network security function that effectively acts as a barrier.  The data that passes through depends on the pre-determined set of rules which are configured in the firewall settings.</p>
</div>
<h2><strong>A Little Q and A</strong></h2>
<p>Now that we know basically what it is, we can answer some questions.</p>
<ol>
<li><strong>Why do I need one?</strong></li>
</ol>
<p>A firewall tries to screen out incoming Internet streams of data from unwanted sources and it also prevents programs on your PC to access the Internet without authorization.  The purpose is to prevent unwanted and malicious programs from communicating to, or from, your computer.</p>
<ol start="2">
<li><strong>Who makes firewalls?</strong></li>
</ol>
<p>Microsoft includes a firewall with Windows – we’ll cover this in more detail below.  There are also a significant number of known makers of free and paid solutions.  The best known names would include Norton, McAfee, BitDefender, Kaspersky, as well as Zone Alarm, Webroot, and Comodo.  Some routers also have firewalls built into them.  While we are not recommending any specific option, selecting one of the manufacturers listed above should provide greater security.</p>
<ol start="3">
<li><strong>When do I need one?</strong></li>
</ol>
<p>Quite simply – you need a firewall when you connect to the Internet. This is why you should also consider a solution for your smart phone or mobile device.  Most malware programs these days attempt to get money from you and your mobile devices are also targets of malware attacks and cyber crime.</p>
<ol start="4">
<li><strong>Doesn&#8217;t Windows already come with a firewall?</strong></li>
</ol>
<p>Yes, it does, and it may be all you need.   It blocks unwanted connections and will prompt you if you want to allow a connection or not.  There is a list of programs to block and you can enter exceptions to identify programs you deem safe.</p>
<p>Windows Firewall is equipped to monitor traffic, but lacks in the area of program control.  Despite shortcomings, Windows Firewall may be all you need.   Other tools will provide additional functions such as the ability to create activity logs.  In this way you can review what was happening in terms of attempted connections so you can fine tune the security parameters.  The bottom line is that the Windows Firewall will suffice for most users and should not be regarded as providing insufficient security.</p>
<p>If you find surfing the net is slow, begin by optimizing the browsers and Windows configuration for accessing the Internet.  We recommend looking at the articles: <a href="https://www.compuclever.com/posts/improve-internet-speed/" target="_blank">Improve Internet Speed</a> and <a href="https://www.compuclever.com/posts/restore-internet-browser/" target="_blank">Restore Browser Speed</a>.  After this, if you are more certain that the firewall is affecting performance, you may want to replace it.  If your PC is encountering issues with viral infections then first look at your antivirus protection, and if you have a top notch AV solution and are still getting breaches, that too would be a reason for looking for a new firewall.</p>
<ol start="5">
<li><strong>Is a firewall all the protection I need?</strong></li>
</ol>
<p>In a previous article we covered some <a href="https://www.compuclever.com/posts/antivirus-software-7-myths-debunked/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=newsletter" target="_blank">myths about antivirus protection</a> and this came up.  We can review briefly here.  As we have described, firewalls can filter nefarious traffic.  However, they cannot protect your PC from files that contain a virus or Trojan.  The reason for this is that firewalls are not able to scan for infected files – you need an antivirus solution specific to this purpose.</p>
<p>Cyber criminals exploit potential security holes and look for ways to openly connect with your PC.  A firewall can minimize this risk and offer the first line of defense.  However, it is not sufficient in blocking the myriad of virus and malware threats that are prevalent.  Malware creators are very clever in disguising data and can even disable your firewall in an effort to steal private or personal data.</p>
<div class="quick_facts">
<p><strong>Antivirus Protection</strong>:In a nutshell… we are pleased to offer <a href="https://www.compuclever.com/products/antivirus/" target="_blank">CompuClever Antivirus PLUS</a>, an AV solution that delivers 100% protection against both known and unknown viruses, comparable to any first-tier antivirus software like Norton, Kaspersky, Bitdefender, and MacAfee.  As a matter of fact, an independent <a href="https://www.virusbulletin.com/testing/results/test_from/2015-08/vb100-antimalware" target="_blank">third-party lab test</a> revealed that our antivirus product not only delivers a high level of protection, it also creates a very low impact to PC performance.</p>
<p>For more information about CompuClever Antivirus PLUS click here: <a href="https://www.compuclever.com/posts/are-you-well-protected/" target="_blank">Are You Well Protected?</a></p>
</div>
<h2><strong>Turning Windows Firewall On and Off</strong></h2>
<p>Microsoft states: “You only need one firewall app on your PC (in addition to the firewall that&#8217;s probably built into your network router).  Having more than one firewall app on your PC can cause conflicts and problems.” <sup><a href="#_footnote">[1]</a></sup>  It is also good practice to NOT turn off a firewall unless you have another one turned on.</p>
<p>With these safe practices in mind, you can view the status of Windows Firewall and you can turn it off or on.  The easiest way to begin is to type “firewall” in the Search field located in the Start menu.  For more information and instructions specific to your operating system follow one of these links:</p>
<p><a href="http://windows.microsoft.com/en-us/windows-10/turn-windows-firewall-on-or-off" target="_blank">Windows 10</a>  / <a href="http://windows.microsoft.com/en-US/windows-8/Windows-Firewall-from-start-to-finish" target="_blank">Windows 8</a> / <a href="http://windows.microsoft.com/en-us/windows/turn-windows-firewall-on-off#turn-windows-firewall-on-off=windows-7" target="_blank">Windows 7</a> / <a href="http://windows.microsoft.com/en-us/windows/turn-windows-firewall-on-off#turn-windows-firewall-on-off=windows-vista" target="_blank">Windows Vista</a> / <a href="https://support.microsoft.com/en-ca/kb/875356" target="_blank">Windows XP</a></p>
<h2><strong>What to Consider if Seeking an Alternative</strong></h2>
<p>Here is our list to help you better decide on alternatives to the built-in firewall for Windows.</p>
<ol>
<li>You need to consider how accurately a firewall solution will identify threats to your system. You do not want it to miss threats but you also do not want it blackball safe and known programs.  No one wants an unending stream of warnings from their firewall for no valid reason.  The very best firewalls handle unknown programs by monitoring them closely for suspicious activity and signs of improper network activity behaviour.</li>
<li>The fewer resources it requires the better. This will allow your system to run programs faster and dedicate resources to perform duties related to regular day-to-day activities.</li>
<li>Supply only the functions you need. Some &#8220;suite&#8221; applications will include antivirus and performance tools.  If you already have these areas covered by other applications there is no need to pay for bloated software that is inadequate in these other areas.</li>
<li>You will also need to know what kind of coverage you require in terms of the devices you are needing to protect (desktop, laptop, tablet, or phone), and if your solution will suffice.</li>
</ol>
<h2><strong>Other Considerations</strong></h2>
<p>Now to finish off with some final points related to installing a new firewall solution.</p>
<h3><strong>Install Your Firewall  </strong></h3>
<p>There isn’t any one &#8220;right&#8221; place to install a firewall; it comes down to the devices you use and the programs you run.  If you are looking for a firewall for your business then the normal firewall is not what you need; you need what is known as a &#8220;Next Generation Firewall&#8221; or, &#8220;NGFW&#8217;.  These are more sophisticated and expensive, ranging from $500 to $80,000, and are beyond what we will discuss here.</p>
<p>Also, some routers have firewalls built right into them, meaning any system behind them does not need a firewall.  This is useful as it means that there is no performance loss for Windows as a result of a firewall performing checks on data streams.  However, if you have a portable device (like a laptop, tablet, or phone), then you need a firewall installed to the device that can be turned on whenever you connect to the Internet when away from home.</p>
<h3><strong>Common Problems</strong></h3>
<p>The most common problem in using a firewall is blocking a program you know is good.  When this happens you need to create an &#8220;exclusion&#8221; or &#8220;exception&#8221; (search the program help files for those terms).  Effectively, this provides you the ability to override what the firewall would normally do.  Firewalls are designed to run in the background so most people have little to no interaction with these programs once they are installed and exceptions are generated.</p>
<h2><strong>Summary</strong></h2>
<p>While we haven’t gone into detail about hardware and software firewall technologies and the various viral threats to firewalls, we have covered the basics.  Standard coverage should get you started and you have the option of customizing the onboard Windows Firewall.  As an alternative to Windows, you can follow our introductory guidelines for taking on an alternative firewall solution.  In either event, remember that an effective antivirus solution is part of your fortress of protection.</p>
<p>We would like to thank Richard from our Tech Support team for his first wave of research on this subject.  We will continue to provide story lines like this and we will describe them in a manner that is within reach of everyday computer users.  If you have some ideas of topics you would like us to cover, email us at: <a href="mailto:newsletter@compuclever.co">newsletter@compuclever.com</a></p>
<p><a name="_footnote"></a></p>
<div class="bottom_p">
<hr size="1" />
<p>[1] <a href="http://windows.microsoft.com/en-US/windows-8/Windows-Firewall-from-start-to-finish" target="_blank">http://windows.microsoft.com/en-US/windows-8/Windows-Firewall-from-start-to-finish</a></p>
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/what-is-firewall/">Firewalls &#8211; First Line Filtration</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Antivirus Software – 7 Myths Debunked</title>
		<link>https://www.compuclever.com/posts/antivirus-software-7-myths-debunked/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=antivirus-software-7-myths-debunked</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Wed, 08 Jun 2016 19:27:59 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[PC security]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=2666</guid>

					<description><![CDATA[<p>Here are 7 myths about antivirus software that CompuClever get from interacting with users when dealing with security related support cases.  Let’s debunk the myths related to AV applications.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/antivirus-software-7-myths-debunked/">Antivirus Software – 7 Myths Debunked</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">Making use of an Antivirus application is commonly understood to be a prerequisite of operating your computer in a connected, online world. Generally speaking, it is unthinkable that one would run a PC without being actively protected by legitimate AV software with a valid subscription, whether paid or free. Nevertheless, there are some common myths about antivirus applications. Some of these myths prevent users from providing themselves with adequate protection while other myths perpetuate untruths and misinformation.</div>
</div>
<p>Here are 7 myths about antivirus software that we get from interacting with users when dealing with security related support cases.  Let’s debunk the myths related to AV applications.</p>
<h1>The Top 7:</h1>
<p>Here are the myths that we cover in this article along with the real truths about each.</p>
<h2>1. Authentication and encryption offers me all the protection I need.</h2>
<p>It’s true that authentication and encryption can make it challenging for a criminal to get to your confidential information but not impossible.  Some authentication systems use a One Time Passcode (OTP) and send a Simple Messaging System (SMS) or computer generated call back system.</p>
<p>Unfortunately, cyber criminals have already found ways to circumvent multi-factor authentication which was supposed to radically reduce online criminal activity.  New malware versions are now able to intercept authentication codes that are sent to your phone, so criminals can still get access to your OTP without you knowing about it.</p>
<p>Encryption scrambles your information to render it useless and requires you to use an encryption key to unlock the data.  However, it does not fully protect you from key-logging malware that can read your password used to access the encryption key.</p>
<p>While both of these technologies are useful in protecting sensitive data on your PC, they do not protect your PC from contracting malicious software.  In other words, your system can be hacked and be held hostage – you can fall victim to <a href="https://www.compuclever.com/posts/protect-computer-from-ransomware/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=newsletter" target="_blank">ransomware</a> and other debilitating viruses.</p>
<h2>2. I don’t download files so I am safe from virus attacks.</h2>
<p>You don’t have to actively download files to be the victim of virus attacks.  Browser based attacks are now much more common.  In fact, some of the most popular websites, including Yahoo, New York Times, Huffington Post, and CNN.com, have fallen prey to malware attacks that are integrated in display ads.  This is known as “malvertising”.</p>
<p>Malvertising is a common online criminal tactic which can easily spread among popular websites for maximum gain.  There are two types of malvertising attacks.  One is when a user clicks an ad and the malware infects their system.  The other type is not even triggered by user interaction as it uses embedded malware code within iframes that results in the ability to manipulate the browser to grab files from other malicious sources.  Simply browsing to a site can result in falling victim to malware attacks.</p>
<p>There are also attacks, referred to as “Man in the Middle” where an “…attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other”.<sup><a href="#_footnotes">[1]</a></sup> For example, the Man-in-the-Browser (MITB) attack utilizes a Trojan horse virus.</p>
<p>Online banking is very susceptible to the MITB attack.  In these cases the infected web browser uses altered web pages and content without the user knowing it.  The information is exchanged between the user and the host bank and the confirmation screens are all the same.  However, in the background, the criminal can be altering the data so as to change the transaction destination and the amount.</p>
<p>These examples illustrate that files do not have to be downloaded in order for you to be compromised.  Fortunately, Trojan viruses can be detected and removed by effective AV engines.</p>
<h2>3. Firewalls protect me from malicious activities.</h2>
<div class="quick_facts">A Firewall… is a network security feature that   can allow or deny incoming and outgoing PC communications based on a   predetermined set of rules.  The firewall rules are a standard preset   configuration or can be modified by you or your administrator.  The Windows firewall is by default   configured to block incoming threats – you need to change the settings to   deal with outgoing threats.</div>
<p>Firewalls block certain nefarious traffic but they cannot protect your PC from files that contain a virus or Trojan.  The reason for this is that firewalls are not designed to scan for infected files – you need an AV engine specific to this purpose.</p>
<p>It is crucial to eliminate potential security holes.  Port scanning can be problematic as criminals look for ways to openly connect with your PC.  A properly configured firewall can minimize this risk and new Windows operating systems come with firewall functionality.  While this is the first line of defense… it is not sufficient in blocking the myriad of virus and malware threats that are out there.</p>
<p>A firewall can be configured to block outbound traffic as well.  However, malware writers have been able to disable a firewall so traffic can escape from your system.  AV vendors have already created mechanisms to minimize this problem, but cyber criminals have proven themselves to be very clever in being able to hide the information within normal http traffic so as to disguise the data as innocent web requests.</p>
<h2>4. Viruses and malware are written by AV companies.</h2>
<p>There is no shortage of conspiracy theories.  So… is there any truth to AV companies creating malware?</p>
<p>There is an old technique that Firefighters use known as back burning.  Firemen create a controlled fire to burn up all of the debris that can fuel a fire which leaves a black zone. This method reduces the chance of a wildfire from jumping across the black line of defense.  This is similar to a strategy that Antivirus companies employ with viral attacks.  They use existing malware or create viruses to test their AV engine so they can understand the limits of their program, improve their software, and eliminate the vulnerability associated with such attacks that are known and encountered in the real world.</p>
<p>The real and full truth here is that there have been billions of dollars in loss suffered by companies and private individuals as a result of cyber criminals utilizing malware for profit.  There are in fact real criminals that focus their energies and skill on a variety of heinous activities such as stealing money, selling stolen credit card information, hiring other malicious code writers, selling malware to other cyber criminals, <a href="https://www.compuclever.com/posts/protect-computer-from-ransomware/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=newsletter" target="_blank">holding an infected PC ransom</a>, and more.  Cyber crime is a billion dollar industry and it will continue to grow as long as criminals see an opportunity to make money.</p>
<h2>5. You can get good protection from free AV programs.</h2>
<p>There are free antivirus programs that provide a basic level of protection, like Microsoft Windows Defender.  However, many of these lack key security features to reduce exposure to attacks, some have slower scanning speeds, others do not provide technical support, several do not respond quickly to emergencies, and some do not detect new threat categories effectively.</p>
<p>Free AV programs generally do not provide web protection.  This fundamental security feature is designed to block malicious links, prevent phishing attempts, and stop fraudulent links from compromising your system.  As we stated previously, online criminals want to make money and they will target personal or financial information.</p>
<p>Some free antivirus products offer a personal firewall that can block unauthorized communication.  You will need to verify your AV solution is equipped with this and activate it during the enrollment process.  And keep in mind, if your PC is already infected, cyber criminals could be actively stealing your information.</p>
<p>Choosing a free or paid antivirus program can be a difficult challenge as you need to weigh out your own privacy concerns along with getting full protection.  Third party publications can help narrow down your choices so we recommend that you review articles from publications such as: PC Magazine, Cnet, AV-Test, AV Comparatives, or Virus Bulletin.</p>
<div class="quick_facts">We are pleased that CompuClever AV PLUS has been   certified by Virus Bulletin (VB100).  You   can find the review on this <a href="https://www.virusbulletin.com/virusbulletin/2015/08/comparative-review-windows-7-pro-64-bit/" target="_blank">virus bulletin site</a> (search   for “CompuClever”).  More on this   later…</div>
<h2>6. AV applications are not equipped to deal with APT attacks.</h2>
<p>Advanced Persistent Threat (APT) is a recently used term spoken in such a way as to conjure up dark and scary creatures that we can speak of when gathering around a campfire at night.  In reality, APT is not dramatically different from malware that was launched ten years ago.  It’s quite common for cyber criminals to use similar tactics in new ways when launching their latest PC threats.</p>
<div class="quick_facts">APT   attacks are generally designed to target and penetrate companies, government   agencies, or even political organizations.  If you want additional insights about APTs,   please read the article: <a href="http://oemhub.bitdefender.com/what-is-an-advanced-persistent-threat" target="_blank">Setting   the Record Straight: What’s an Advanced Persistent Threat?</a></div>
<p>Malware writers are very innovative as they quickly change their attack methods while still leveraging criminal underground networks and strategies all the while remaining focused at absconding funds or making their mark.  Case in point: <a href="https://www.compuclever.com/posts/signs-of-a-pc-attack/" target="_blank">Ashley Madison hackers</a> were motivated as a result of outrage due to the activities of the targeted website.</p>
<p>AV companies have evolved by using a combination of malware signatures, heuristics, and behavior techniques to capture new and unknown threats.  They will not however detect all malware attacks.  Some AV companies detect unknown threats better and more consistently than others.</p>
<p>Let’s turn our focus on third party testing companies that specifically test for unknown and zero-day malware threats.  Companies that specialize in preventing APT attacks generate a lot of revenue, but it is surprising to see that these vendors have not submitted their products for testing by a third party organization.  Why is that?</p>
<p>For most users, the most affordable and best option is a reputable AV program along with using common sense.  It also helps to get recent and frequent software updates.</p>
<h2>7. I can get good information about AV app comparisons from the AV vendor.</h2>
<p>The simple answer to this is: make sure you get independent reviews.</p>
<p>Often times, AV test reports sponsored by a company range from being biased to blatantly skewed.  These reports typically highlight specific detection techniques and compare a limited number of vendors.  On the other hand, third party, non-profit malware testing organizations publicly provide their testing methodology to be scrutinized by all participating vendors.</p>
<p>All AV vendors are allowed to participate in third party tests and reviews, compared to being selected and tested by a vendor who is paying for the report.  There are different testing scenarios to help understand efficacy characteristics.</p>
<p>One test, involves capturing malware for a specific period of time and preventing the update mechanism from fetching the latest files from the AV vendor.  This particular test determines whether the AV engine can proactively prevent new or unknown threats from infecting a PC without file updates.<sup><a href="#_footnotes">[2]</a></sup> Another test involves speed performance tests which measure the impact of the AV program on the performance of a computer system.</p>
<h1>An Independent Review: CompuClever Antivirus PLUS</h1>
<p>We are pleased to report that we were tested and received a glowing review by VB100, “…a world-renowned independent testing and certification body, active in testing, reviewing and benchmarking security solutions for over 20 years.”<sup><a href="#_footnotes">[3]</a></sup></p>
<div class="quick_facts">
<p><strong>VB100 had   this to say about CompuClever Antivirus PLUS:</strong></p>
<p>“The   design is slick and attractive, with a good range of options available and   intuitive deployment of controls.”</p>
<p>“Stability   was perfect throughout testing, with not the slightest shake even under heavy   stress. Performance impact was decent too, with RAM use perhaps a little   above average but CPU usage and impact on our set of tasks both pretty low.”</p>
<p>“Detection   was as excellent as one would expect, with good scores everywhere. The   WildList and clean sets were handled with pinpoint accuracy, earning <em>CompuClever</em> its first VB100 award on its debut.”</p>
<p>Check out the <a href="https://www.virusbulletin.com/testing/results/test_from/2015-08/vb100-antimalware" target="_target">virus bulletin full review</a>.</p>
</div>
<p>For more information about CompuClever AV PLUS click here: <a href="https://www.compuclever.com/posts/are-you-well-protected/" target="_blank">Are You Well Protected?</a></p>
<h1>Summary:</h1>
<p>With the information provided in this article we feel you now have a much clearer understanding of AV applications and virus attacks.  We strongly recommend that you protect your PC from viral dangers that are prevalent in our daily computing world.</p>
<p>We will continue to provide story lines like this and we will describe them in a manner that is within reach of everyday computer users.  If you have some ideas of topics you would like us to cover, email us at: <a href="mailto:newsletter@compuclever.co">newsletter@compuclever.com</a></p>
<div class="bottom_p">
<p><a id="_footnotes"></a></p>
<hr size="1" />
<p>&nbsp;</p>
<p>[1] <a href="https://en.wikipedia.org/wiki/Man-in-the-middle_attack" target="_blank">https://en.wikipedia.org/wiki/Man-in-the-middle_attack</a><br />
[2] <a href="http://oemhub.bitdefender.com/how-to-properly-evaluate-an-advanced-persistent-threat-security-solution" target="_blank">How to Properly Evaluate an APT Security Solution</a><br />
[3] <a href="https://www.virusbulletin.com/testing/" target="_blank">https://www.virusbulletin.com/testing/</a></p>
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/antivirus-software-7-myths-debunked/">Antivirus Software – 7 Myths Debunked</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Personal Encounter with Ashley Madison</title>
		<link>https://www.compuclever.com/posts/a-personal-encounter-with-ashley-madison/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=a-personal-encounter-with-ashley-madison</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Thu, 01 Oct 2015 16:54:44 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[Protect online privacy]]></category>
		<category><![CDATA[Windows tips]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=2186</guid>

					<description><![CDATA[<p>What are the consequences to piracy that involves millions of users and personal information?  We look at both the overall effect of the greatest hack in modern day as well as how it came to our attention through someone seeking our support and professional guidance.  We offer here testimony and strategy. </p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/a-personal-encounter-with-ashley-madison/">A Personal Encounter with Ashley Madison</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">What are the consequences to piracy that involves millions of users and personal information?  We look at both the overall effect of the greatest hack in modern day as well as how it came to our attention through someone seeking our support and professional guidance.  We offer here testimony and strategy.</div>
</div>
<p>Unless you have been living under a rock for the past few months, you must have heard about the Ashley Madison account hack.  This was where hackers released the entire user database of names, email addresses, billing information, and account details of 38 million users tied to the site.  Some described the historical hack episode as an extinction-level event for privacy.</p>
<div class="quick_facts">Jeff Yang, a columnist for The Wall Street Journal, asked this simple but stern question in his CNN-syndicated commentary &#8211; Ashley Madison hack: privacy becomes extinct.  Comparing the incident to the prehistoric planet-wide catastrophe that wiped out the Jurassic World, Yang declared that the data hack of the Toronto-based infidelity website was “an extinction-level event for privacy”.</div>
<h1>Attack Aftermath</h1>
<p>We were shocked when we first learned that hackers managed to steal close to 40 million users’ records from Ashley Madison, which made claims shortly after the incident that its members remained anonymous.  However, in early August 2015 it was clear that this was not the case as hackers released details of millions of email addresses, billing information, and account details tied to the site<sup><a href="#_footnote">[1]</a></sup>.</p>
<p>As a group of seasoned IT professionals who have been actively involved with security R&amp;D for a number of years, we can tell this hack event was different from all previous data leakages that impacted large corporations and national-level government agencies.  This time, the privacy of many ordinary people – with repercussions to job, relationships, family life, marriage, and personal life – was exploited, ripped apart, and taken away.</p>
<p>What was the impact to this?  Heartless spammers sent extortion emails to people demanding ransom in return of “wiping records clean”<sup><a href="#_footnote">[2]</a></sup>.  Adding salt to the wound, class action lawsuit experts and divorce lawyers are circling victims smelling hefty legal fees in the air.  The rippling effect of the biggest privacy invasion in human history will be felt for a long time to come.  Sadly, we CANNOT be fooled by those spamming extortionists; data leakage is just like waste water leakage &#8211; there is no way to retract or wipe absolutely clean what’s already there.</p>
<h1>A Personal Encounter</h1>
<p>Just a few weeks ago, the core group here at CompuClever was caught in a “personal” encounter with the Ashley Madison aftermath.  A seemly normal support email came from a user requesting help with opening a very large (approximately 10 GB), compressed file.  The technical support specialist who was dealing with the ticket noticed something abnormal – the origin of the file resides on “The Pirate Bay”, a controversial pirate website usually referred to as part of the “darker side of the web”.  Due to the security concern, this case was quickly escalated to our co-founder and Chief Product Officer Yida Mao, who is also our in-house security expert.</p>
<p>Using an isolated environment, Yida led our security analysts to identify the contents of the large compressed file which actually contained the entire dataset of the Ashley Madison user account database.  Due to security pre-cautions and with suspicion of possible computer virus contamination within the compressed file, we immediately notified the user to delete and quarantine the file without her having to opening it.  We were told by this user that she had strong feelings that her partner had been active on the Ashley Madison site and wanted confirmation. We utilized alternative and safe methods to fulfill her queries and she was grateful.</p>
<p>When global-scale security breaches like that of Ashley Madison happen, we always have mixed feelings of horror and sympathy, along with a sense of responsibility.  The magnitude of the hack, for both the number of people involved and the level of impact is HUGE.  Can you imagine if the privacy and secrecy of the entire nation of Canada (approximately 36 million) was hacked, exposed, and ripped apart?  Meanwhile, as IT professionals who are actively involved with R&amp;D in the realm of PC security and optimization, we also feel deeply compelled to reach out to our families, friends, and to our users and readers in order to awake their sense of online security.  Cyber security breach and privacy invasion is no longer something you only read about in cold war novels or watch in Jason Bourne movies, it is happening to people around us or may have already impacted you and your family.</p>
<p style="text-align: center;"><a href="https://www.compuclever.com/products/antivirus/" target="_blank"><img decoding="async" loading="lazy" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%;" title="CompuClever Antivirus - Best Protection. Best Performance." src="https://www.compuclever.com/posts/wp-content/uploads/ccav-windows10-general.jpg" alt="" width="650" height="363" /></a></p>
<h1>Recommendations</h1>
<p>So what can you do instead of just being paranoid?  “Be vigilant and aware of your digital surroundings, just as you should be aware of your physical surroundings” says Yida Mao who has managed multiple R&amp;D teams in the cyber security field and published research findings at several international software consortiums.  He offers three core principles for protecting your cyber security and privacy:</p>
<div class="indent_left">
<ul>
<li><strong>Be aware of what’s already on your PC</strong>:  Your PC has a lot of information to tell about you, including your personal data, financial records, photos, tax filings, family tree information, and more.  Anything that physically reside on your PC can be stolen and exposed.  Read more about <a href="https://www.compuclever.com/posts/cookie-time/" target="_blank">how to safely remove sensitive information from your PC…</a></li>
<li><strong>Be aware of what’s getting stored on your PC</strong>:  Unless your PC is never connected to the Internet, you always face the risk of cyber-attacks or privacy intrusions.  Your PC is not designed to battle any of these attacks alone and neither should you.  <a href="https://www.compuclever.com/posts/surf-with-confidence/" target="_blank">Get comprehensive security software like CompuClever Antivirus PLUS to fend off cyber-attacks</a>.</li>
<li><strong>Be aware of what’s being sent from your PC</strong>:  Frequently you, or your PC, will send out sensitive information or data without your full permission or intent.  Do you have a data filtering mechanism to prevent information like your credit card numbers or social security numbers from being leaked out?  If not, you should use something equivalent to the <a href="https://www.compuclever.com/posts/stay-safely-connected/" target="_blank">Data Protection function in CompuClever Antivirus PLUS</a> to safeguard your personal data.</li>
</ul>
</div>
<p>We urge you to take time and assess what protective measures you have put in place to safeguard your information and your privacy, regardless what software or tools you choose to use.  Do not delay or procrastinate, cyberattacks do not wait for you – instead, they catch you off-guard.</p>
<h1>In Summary</h1>
<p>We are excited to be able to provide an AV product that can equip you with tools designed to safeguard you from cyber attacks.  Together with our prior technologies such as PC Clean Maestro you can be more proactive in protecting your privacy and securing your personal information in order to safely enjoy your PC computing practices.  We plan to continue covering this theme of protection and security in upcoming articles and welcome your feedback.</p>
<p>Please keep in mind… if you have some ideas of topics you would like us to cover or have other feedback to offer, email us at: <a href="mailto:newsletter@compuclever.co" target="_blank">newsletter@compuclever.com</a></p>
<div class="bottom_p">
<p><a id="_footnote"></a></p>
<hr size="1" />
<p>&nbsp;</p>
<p>[1] <a href="http://money.cnn.com/2015/08/19/technology/ashley-madison-search/index.html">CNN: Hackers released details of hacked Ashley Madison accounts.</a><br />
[2] <a href="http://money.cnn.com/2015/08/21/technology/ashley-madison-users-extorted/">CNN: Spammers sent extortion emails to Ashley Madison users.</a></p>
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/a-personal-encounter-with-ashley-madison/">A Personal Encounter with Ashley Madison</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Vigilance and Silence</title>
		<link>https://www.compuclever.com/posts/silence-and-vigilance/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=silence-and-vigilance</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Thu, 10 Sep 2015 17:40:27 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[improving performance]]></category>
		<category><![CDATA[increasing speed]]></category>
		<category><![CDATA[PC security]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=2128</guid>

					<description><![CDATA[<p>Learn how CompuClever Antivirus PLUS' Autopilot and Profiles feature delivers the best security protection in absolute silence. Better yet, with Real-Time Optimization, it even makes your PC faster.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/silence-and-vigilance/">Vigilance and Silence</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">In a previous article discussing <a href="https://www.compuclever.com/posts/protection-vs-speed/" target="_blank">whether we really need to compromise PC performance in exchange for security</a>, we presented the CompuClever Photon technology – an innovative feature that adapts security protection to the uniqueness of your PC. Photon makes CompuClever Antivirus light and fast, imposing almost no overhead to system resources. But how should an antivirus react to a true threat when it detects an intrusion? We are often presented with popups and reminders, like the one shown below, that most of us, even including those who work in the IT industry, don’t know how to respond to, which may result in taking the wrong action.</div>
</div>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=v_and_silence">CompuClever Antivirus PLUS</a> works differently and better than this. It is essentially a silent security solution that only communicates useful information in language you can understand, keeping you informed and, keeping you in the driver seat. This is achieved through the combination of two features: Autopilot and Profiles.</p>
<h1>Introducing Autopilot and Profiles</h1>
<p>What makes CompuClever Antivirus’ user-centric approach possible is the Autopilot and Profiles features, which work hand-in-hand to deliver silent security 24/7.</p>
<h2>Autopilot</h2>
<p>Autopilot makes the best security decisions for users, without user interaction, while eliminating notifications and popups. When Autopilot is switched on and CompuClever Antivirus detects any type of threats, it will automatically block it. Users do NOT need to define their protection levels or what actions to take whenever a threat is detected. It is automatically enabled and can be simply disabled.</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=v_and_silence"><img decoding="async" loading="lazy" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%; max-width: 650px;" title="CompuClever Antivirus Autopilot" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-autopilot.png" alt="" width="760" height="198" /></a></p>
<p>The “secret sauce” of Autopilot is another cool technology: CompuClever Profiles – an intelligent technology that determines what you are doing with your PC and makes the right decisions for PC security! Additionally, with Profiles, CompuClever Antivirus not only works silently but also optimizes your PC for its best performance.</p>
<h2>Profiles</h2>
<p>The Profiles technology is designed to automatically detect when users work, play, or watch movies, and it prevents other apps from slowing down the system. Beside the standard profile, there are three profiles that fit most of our day-to-day PC usage patterns: “Work”, “Game”, or “Movie”. CompuClever Antivirus PLUS will identify whenever the user is engaged in one of these activities and will maximize PC performance by directing more of the system resources to those particular applications. In addition, Profiles offers users an uninterrupted experience by postponing resource-consuming operations such as scheduled scans, automatic product updates, system maintenance tasks, Windows updates, and other third-party operations. It also suspends unnecessary background programs, eliminates pop-ups, and adjusts visual effects according to activities users are currently engaged in. Here are some behavioral description of each profile:</p>
<div class="indent_left">
<ul>
<li><strong>Work</strong>: postpone scheduled scans, initiate automatic product and signature updates every two hours, activate the anti-spam module, deactivate Search Advisor, and block product notifications.</li>
<li><strong>Game</strong>: postpone scheduled scans, initiate automatic product and signature updates every twelve hours, deactivate Search Advisor, and block product notifications.</li>
<li><strong>Movie</strong>: perform the same operations as the Game profile, but start product and signature updates every eight hours.</li>
</ul>
</div>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=v_and_silence"><img decoding="async" loading="lazy" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%; max-width: 650px;" title="CompuClever Antivirus Profiles" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-profiles.png" alt="" width="759" height="514" /></a></p>
<p>You can manually set your PC to one of these profiles or let Autopilot take over the control and make the best decision for you. Either way, CompuClever Antivirus PLUS ensures you are completely protected while you enjoy the best of what your PC is designed to deliver.</p>
<h2>Real-Time Optimization</h2>
<p>CompuClever Antivirus PLUS Real-Time Optimization is a plugin that improves your system performance silently in the background, making sure that you are not interrupted while you are in a Profile mode. Depending on the CPU load, the plugin monitors all processes, focuses on those that take up a higher load, and adjusts them to your needs.</p>
<p>The system is optimized by increasing the Profile’s application performance, postponing system updates and Windows automatic updates, suspending unnecessary background programs, and eliminating popups in order to provide the best movie or game experience.</p>
<h2>Security Report</h2>
<p>Although CompuClever Antivirus is considered completely silent, it still reports to you once a week by delivering an easy-to-understand Security Report.</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=v_and_silence"><img decoding="async" loading="lazy" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%; max-width: 650px;" title="Security Report" src="https://www.compuclever.com/posts/wp-content/uploads/security-report.png" alt="" width="1209" height="1040" /></a></p>
<p>The Security Report presents the security status for the past week including scans, disinfections, an events timeline, and feature recommendations. These tips are important in managing the overall protection and users can easily see actions to be taken on their PC. The overall security score is calculated based on the critical protection used previously and other conditions that might represent a security risk. The Security Report uses an issue tracking system to detect and inform users about issues that may have impacted the security of the system and the data on it.</p>
<h1>Conclusion</h1>
<p>To learn more about the features and benefits covered in this article:</p>
<div class="indent_left">
<ul>
<li><a href="https://www.compuclever.com/support/antivirus/help-file/html/start.get.autopilot.html" target="_blank">CompuClever Autopilot</a></li>
<li><a href="https://www.compuclever.com/support/antivirus/help-file/html/optimization.profiles.html" target="_blank">CompuClever Profiles</a></li>
<li><a href="https://www.compuclever.com/support/antivirus/help-file/html/optimization.profiles.real_time.html" target="_blank">Real-Time Optimization</a></li>
<li><a href="https://www.compuclever.com/support/antivirus/help-file/html/start.gui.report.html" target="_blank">Security Report</a></li>
</ul>
</div>
<div class="bottom_p">
<p>Be still and know you are in control of your PC security with the help of CompuClever Antivirus PLUS!</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=v_and_silence"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%;" title="windows-10-compatible" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-windows-10-compatible.jpg" alt="" /></a></p>
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/silence-and-vigilance/">Vigilance and Silence</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Protection vs. Speed</title>
		<link>https://www.compuclever.com/posts/protection-vs-speed/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=protection-vs-speed</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Sun, 06 Sep 2015 07:33:00 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[improving performance]]></category>
		<category><![CDATA[increasing speed]]></category>
		<category><![CDATA[PC security]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=2111</guid>

					<description><![CDATA[<p>Does antivirus software slow down PCs? The answer is a definite Yes; but, a conditional one depending on which security software you’ve chosen to run on your PC. According to an extensive endurance test, performed by AV-Test.org, the evidence of PC performance impacted by antivirus software was more than convincing. An antivirus solution that does a mediocre job on reducing its impact on PC performance slows down your PC by taking too much resource like CPU, hard disc, and RAM. As a result, you were forced to make a compromise for speed in exchange for security.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/protection-vs-speed/">Protection vs. Speed</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">Does antivirus software slow down PCs? The answer is a definite Yes; but, a conditional one depending on which security software you’ve chosen to run on your PC. According to <a href="http://www.av-test.org/en/news/news-single-view/endurance-test-does-antivirus-software-slow-down-pcs/" target="_blank">an extensive endurance test</a>, performed by AV-Test.org, the evidence of PC performance impacted by antivirus software was more than convincing. An antivirus solution that does a mediocre job on reducing its impact on PC performance slows down your PC by taking too much resource like CPU, hard disc, and RAM. As a result, you were forced to make a compromise for speed in exchange for security.</div>
</div>
<p>But, is it really necessary to choose between protection and speed? A well designed antivirus program should impose minimum or no impact to PC performance while still delivering the best protection against malware and online threats. This is how CompuClever Antivirus was designed and made. Let’s dive into some details.</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&#038;utm_medium=email&#038;utm_campaign=protection_vs_speed"><img decoding="async" class="emailImage aligncenter" style="height: auto; max-width: 275px; width: 100%;" title="windows-10-compatible" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-box-left-640x480-1.png" alt="" /></a></p>
<h1>CompuClever Photon technology</h1>
<p>The core technology is called “Photon” and it makes CompuClever Antivirus the lightest antivirus ever. It is an innovative antivirus technology that takes the weight of the system and accelerates scanning speed by gradually adapting to each user’s PC.</p>
<h1>How it works</h1>
<p>Built with the same type of artificial intelligence technology used by the robotic industry, Photon goes through the following cycle to adapt to your PC:</p>
<figure id="attachment_2114" aria-describedby="caption-attachment-2114" style="width: 250px" class="wp-caption aligncenter"><a href="https://www.compuclever.com/posts/wp-content/uploads/photon.png"><img decoding="async" loading="lazy" class="size-medium wp-image-2114 " title="CompuClever Photon" src="https://www.compuclever.com/posts/wp-content/uploads/photon-250x300.png" alt="" width="250" height="300" srcset="https://www.compuclever.com/posts/wp-content/uploads/photon-250x300.png 250w, https://www.compuclever.com/posts/wp-content/uploads/photon.png 823w" sizes="(max-width: 250px) 100vw, 250px" /></a><figcaption id="caption-attachment-2114" class="wp-caption-text">Click to see a larger diagram: How Photon works</figcaption></figure>
<div class="indent_left">
<ol>
<li><em>Fingerprinting</em>: performed early in the installation a unique “fingerprint” was built for your system.</li>
<li>Pre-training: a scanning pattern based on the fingerprint is then formed by querying the reputation of each application and system process from Cloud intelligence, maintaining a precise list of everything loaded in the system based on reputation.</li>
<li><em>Active monitoring</em>: whenever your system “fingerprint” changes, Photon immediately checks the reputation list and alerts the antivirus engine to take prompt and appropriate action.</li>
<li><em>Continued training</em>: when new “intel” is added to the Cloud intelligence, the reputation list will be instantly updated as it pertains to the relevancy of your system’s unique “fingerprint”.</li>
<li><em>Adaptive scanning</em>: Photon directs the antivirus engine to pay more attention to suspicious applications rather than trusted ones.</li>
</ol>
</div>
<h1>The result</h1>
<p>Photon technology enables <a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=protection_vs_speed" target="_blank">CompuClever Antivirus</a> to reduce its footprint by minimizing the requirement of computing resource like CPU power, hard drive access, and memory usage. The result is obvious:</p>
<div class="indent_left">
<ul>
<li>The antivirus is quiet and non-intrusive.</li>
<li>It brings low or no impact on system performance.</li>
<li>Your PC enjoys faster boot time.</li>
<li>Your applications runs smoothly.</li>
</ul>
</div>
<p style="text-align: center;"><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&#038;utm_medium=email&#038;utm_campaign=protection_vs_speed" target="_blank"><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-2059" title="Best Protection Against Viruses" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-best-protection.png" alt="" width="371" height="238" srcset="https://www.compuclever.com/posts/wp-content/uploads/ccav-best-protection.png 371w, https://www.compuclever.com/posts/wp-content/uploads/ccav-best-protection-300x192.png 300w" sizes="(max-width: 371px) 100vw, 371px" /></a><a href="https://www.compuclever.com/products/antivirus/newsletter-early-launch/" target="_blank"><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-2060" title="Lowest Impact on Performance" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-lowest-impact.png" alt="" width="371" height="238" srcset="https://www.compuclever.com/posts/wp-content/uploads/ccav-lowest-impact.png 371w, https://www.compuclever.com/posts/wp-content/uploads/ccav-lowest-impact-300x192.png 300w" sizes="(max-width: 371px) 100vw, 371px" /></a></p>
<p>Better yet, there is nothing you need to do or configure in order to enjoy the benefit of Photon – it’s built-in and pre-configured and self-adapting. Just relax and enjoy, knowing that you are both well protected and your PC is still as fast as it was before installing the program.</p>
<h1>Recommendation</h1>
<p>If your PC is sluggish, we recommend the following actions:</p>
<div class="indent_left">
<ul>
<li>Follow <a href="https://www.compuclever.com/products/antivirus/optimize/" target="_blank">this step-by-step optimization guide</a> to tune and optimize your PC</li>
<li>Consider replacing your existing antivirus solution with <a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=protection_vs_speed" target="_blank">CompuClever Antivirus PLUS</a></li>
</ul>
</div>
<p>Remember, an effective security protection doesn’t have to come at the price of degraded PC performance.</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=protection_vs_speed"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%;" title="CompuClever Antivirus PLUS" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-windows-10-compatible.jpg"/></a></p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/protection-vs-speed/">Protection vs. Speed</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Stay Safely Connected</title>
		<link>https://www.compuclever.com/posts/stay-safely-connected/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=stay-safely-connected</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Thu, 03 Sep 2015 18:27:18 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[Protect online privacy]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=2087</guid>

					<description><![CDATA[<p>Email and social networking are two primary means of communicating and stay connected with family and friends. Through social network sites and emails, you share updates, post photos, and reveal things that are sometimes very personal about you.  Examples include where you live, which company you work for, whom you are related to, when and where you are going on holiday, what food you like, what music you listen to, whom you have just met, etc. By piecing these bits of information together, it becomes easy for anyone to learn more about you. And that’s also how cyber criminals find out information they want from you. Personal identity theft and online scams are two primary threats that target email and social networking users.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/stay-safely-connected/">Stay Safely Connected</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">Email and social networking are two primary means of communicating and stay connected with family and friends. Through social network sites and emails, you share updates, post photos, and reveal things that are sometimes very personal about you.  Examples include where you live, which company you work for, whom you are related to, when and where you are going on holiday, what food you like, what music you listen to, whom you have just met, etc. By piecing these bits of information together, it becomes easy for anyone to learn more about you. And that’s also how cyber criminals find out information they want from you. <strong>Personal identity theft and online scams are two primary threats that target email and social networking users</strong>.</div>
<h1>Identity theft</h1>
<p>A recent study conducted by Bitdefender, a leading European security technology provider, discovered that more than a quarter of a million email addresses, usernames, and passwords can be found easily through social networking platforms like Facebook, Twitter, personal blog postings, chat forums, and download sites. Surprisingly, 87% of these compromised credentials still provided valid access to personal email and social networking accounts. What’s more astonishing was that 75% of the people in this study use the same password for all their accounts. Hackers really didn’t have to look too hard to gain access to your identity and private information.</p>
<h1>Online scams</h1>
<p>Users of the social networking site Facebook are informed through a notification system and by e-mail that they have been made administrators of an unknown page and are directed to click on a link that takes them to a fake Facebook page. Once a user has landed on the fake Facebook page, they are re-directed to a different, malicious site where they are asked to provide their e-mail and shipping address in order to take part in a test session of the new Apple iPad. The scam states that Apple is giving away a total of 10,000 iPad2s for review. Making it even more believable, some of the notifications came from emails and posts sent by family members or friends whose PCs were also compromised. You trust your friends, but can you trust their computers as well?</p>
<h1>Stay connected safely</h1>
<p>Security experts recommend the following guidelines so that you can avoid security risks while staying connected online:</p>
<div class="indent_left">
<ul>
<li>Avoid publishing any information that can be used to identify you, such as phone numbers; your home, school, or work address; your birthday; and your social security number.</li>
<li>Use different sets of username and passwords for email and social networking sites.</li>
<li>Avoid posting holiday dates, locations, or even pictures while you are away. Otherwise, you leave perfect “bread crumbs” for burglars to follow.</li>
<li>Never include bank or credit card information in emails or posts.</li>
<li>Install and deploy an effective and updated antivirus / anti-spyware solution that features a strong anti-phishing mechanism.</li>
</ul>
</div>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=safely_connected"><img decoding="async" class="emailImage aligncenter" style="height: auto; max-width: 275px; width: 100%;" title="windows-10-compatible" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-box-left-640x480-1.png" alt="" /></a></p>
<h1>Introducing &#8211; Data Protection</h1>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=safely_connected">CompuClever Antivirus PLUS</a> features an ironclad information safety mechanism called <strong>Data Protection</strong>. Data Protection prevents sensitive data leaks when you are online. Based on the rules you create, Data Protection scans the web, e-mail, and instant messaging traffic sent by your computer.  It looks for specific character strings, for example, your credit card number. If there is a match, the respective web page, e-mail, or instant message is blocked.</p>
<p>You can create rules to protect any piece of information you might consider personal or confidential, from your phone number or e-mail address to your bank account information. Multi-user support is provided so that more than one person can log on to Windows using different user accounts and can configure their own rules. If your Windows account is an administrator account, the rules you create can be configured to also apply when other users of the computer are logged on to their Windows accounts.</p>
<p style="text-align: center;">Define what data you want to protect</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=safely_connected"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%; max-width: 737px;" title="CompuClever Antivirus PLUS" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-data-protection-rule.png" /></a></p>
<p style="text-align: center;">Define how you want the data be protected</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=safely_connected"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%; max-width: 737px;" title="CompuClever Antivirus PLUS" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-data-protection-apply.png" /></a></p>
<h1>Extra peace of mind</h1>
<p>Rest assured, personal information provided to the Data Protection tool is encrypted and cannot be used by anyone else but you. Also for extra safety, you can just enter part of the information that you like to protect. For instance, if you want to prevent leakage of your credit card number, you can just enter the last four digits of the card number so that any web traffic leaving your computer with the same combination of digits will be blocked. It’s a smart way of safeguarding data without any compromise.</p>
<div class="bottom_p">
<h1>Recommendation</h1>
<ul>
<li><a href="https://www.compuclever.com/support/antivirus/help-file/html/identity.html" target="_blank">Learn more about Data Protection</a></li>
<li>Try Data Protection by <a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=safely_connected" target="_blank">CompuClever Antivirus PLUS</a></li>
</ul>
</div>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=safely_connected"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%;" title="CompuClever Antivirus PLUS" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-windows-10-compatible.jpg" /></a></p>
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/stay-safely-connected/">Stay Safely Connected</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Surf with Confidence</title>
		<link>https://www.compuclever.com/posts/surf-with-confidence/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=surf-with-confidence</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Wed, 02 Sep 2015 17:55:07 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[Protect online privacy]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=2074</guid>

					<description><![CDATA[<p>nlike shark attacks, cyber-attacks are numerous, sophisticated, and ever-changing. Many cyber criminals who have managed to evade law enforcement are not only resourceful but also considered experts. To a certain extent they are even innovative. Compelled by the sinister desire of luring more victims while remaining undetected, hackers diligently invent new techniques and schemes to exploit systems of users who are even security-conscious.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/surf-with-confidence/">Surf with Confidence</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">Unlike shark attacks, cyber-attacks are numerous, sophisticated, and ever-changing. Many cyber criminals who have managed to evade law enforcement are not only resourceful but also considered experts. To a certain extent they are even innovative. Compelled by the sinister desire of luring more victims while remaining undetected, hackers diligently invent new techniques and schemes to exploit systems of users who are even security-conscious.</div>
</div>
<h1>Jaw-dropping</h1>
<p>The cases presented below are a couple of example of classical cyber-attacks that are conniving, stealthy, and almost ingenious.</p>
<div class="indent_left">
<ul>
<li>Case 1: While surfing the web at home, the user of a hacked PC was prompted to create new accounts in order to use her own Wireless Access Points (WAP). Not knowing what was happening behind the scenes, the victim would use a common username or email address along with a password that was used for several other online accounts.  The result: the hackers gained complete and unblocked access to her email, Facebook, Twitter, Pinterest, or even online banking site.</li>
<li>Case 2: On the premises of a Starbucks coffee shop, hackers positioned a Wi-Fi hotspot and disguise it so that it appears to belong to Starbucks. Attackers then redirect victims to frequently used websites that were actually modified or fake to capture login credentials or deploy keylogging malware to harvest personal identity information. This type of cyber-attack even has a code name: <em>waterholes</em>.</li>
</ul>
</div>
<p>Would you believe that the waterholes scheme was so effective it even captured victims from cafeterias inside high-tech companies such as Apple, Facebook, and Microsoft? More than likely, those techies have some sort of antivirus solution on their laptops. But the reality is harsher – a bare bones antivirus software without proper web protection is not going to cut it.</p>
<h1>Proper web protection</h1>
<p>So what types of web protection can help fend off and defy cyber-attacks? You need exactly two types of protection:</p>
<div class="indent_left">
<ol>
<li><strong>Anti-phishing protection</strong> that alerts you of potential phishing websites. This prevents you from falling prey to the “honey traps” set up by hackers.</li>
<li><strong>Real-time web protection</strong> against malicious code or downloads embedded in the web. This prevents your computer from being infected or even controlled.</li>
</ol>
</div>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=surf_confidence"><img decoding="async" class="emailImage aligncenter" style="height: auto; max-width: 275px; width: 100%;" title="windows-10-compatible" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-box-left-640x480-1.png" alt="" /></a></p>
<h1>Web protection in CompuClever Antivirus PLUS</h1>
<p>CompuClever Antivirus PLUS Web protection ensures a safe browsing experience by alerting you about potential phishing web pages. It provides real-time web protection for popular web browsers including:</p>
<div class="indent_left">
<ul>
<li>Internet Explorer</li>
<li>Firefox</li>
<li>Google Chrome</li>
</ul>
</div>
<p>The web protection feature provides two functions:</p>
<div class="indent_left">
<ul>
<li><strong>Web Toolbar</strong>, which automatically blocks you from accidentally visiting a phishing or compromised website.
<p style="text-align: center;">Web toolbar blocking a suspicious site</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=surf_confidence"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%; max-width: 703px;" title="CompuClever Antivirus PLUS" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-web-toolbar.png" /></a></li>
<li><strong>Search Adviser</strong>, a component that rates the results of search engine queries and links posted on social networking websites by placing an icon next to every result.  Working like a traffic light, the Search Advisor tells you if a site, as recommended by a search engine, is safe, suspicious, or dangerous.
<p style="text-align: center;">Search Advisor</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=surf_confidence"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%; max-width: 773px;" title="CompuClever Antivirus PLUS" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-search-advisor.png" /></a></li>
</ul>
</div>
<p>The web protection feature is seamlessly embedded with your default web browser. It is always at your side protecting your web surfing experience without being in the way.</p>
<p>Check out the detailed information about CompuClever Antivirus PLUS Web Protection:</p>
<div class="indent_left">
<ul>
<li><a href="https://www.compuclever.com/support/antivirus/help-file/html/web_protection.toolbar.html" target="_blank">Web Protection in web browsers</a></li>
<li><a href="https://www.compuclever.com/support/antivirus/help-file/html/web_protection.html" target="_blank">Search Advisor</a></li>
</ul>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=surf_confidence" target="_blank">Click here to learn more about CompuClever Antivirus PLUS</a>.</p>
</div>
<p>If your antivirus solution doesn’t provide web protection specifically, you should still follow these best-practices to protect yourself against cyber attacks:</p>
<div class="indent_left">
<ul>
<li>Do not provide your personal information via e-mail.</li>
<li>Do not click any links you receive from senders you do not know.</li>
<li>Do not download attachments from unknown senders.</li>
<li>Download files only from trusted websites.</li>
<li>Check if the final price is the same with the price displayed at the start of a transaction.</li>
<li>Keep your antivirus solution updated. If you are not using an antivirus solution, we recommend you install one as soon as possible.</li>
<li>Do not log in to your financial account from unknown networks.</li>
</ul>
</div>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=surf_confidence"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%;" title="CompuClever Antivirus PLUS" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-windows-10-compatible.jpg" /></a></p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/surf-with-confidence/">Surf with Confidence</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
