<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CompuClever Antivirus PLUS Archives - CompuClever</title>
	<atom:link href="https://www.compuclever.com/posts/category/blog/compuclever-antivirus-plus/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.compuclever.com/posts/category/blog/compuclever-antivirus-plus/</link>
	<description></description>
	<lastBuildDate>Fri, 14 Jul 2017 20:41:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.1.1</generator>

<image>
	<url>https://www.compuclever.com/posts/wp-content/uploads/cropped-compuclever_128-1-32x32.png</url>
	<title>CompuClever Antivirus PLUS Archives - CompuClever</title>
	<link>https://www.compuclever.com/posts/category/blog/compuclever-antivirus-plus/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Don&#8217;t be Held at Ransomeware</title>
		<link>https://www.compuclever.com/posts/held-at-ransomeware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=held-at-ransomeware</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Fri, 14 Jul 2017 17:23:49 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[Windows 10]]></category>
		<category><![CDATA[Windows 7]]></category>
		<category><![CDATA[Windows 8]]></category>
		<category><![CDATA[antivirus]]></category>
		<category><![CDATA[PC Security]]></category>
		<category><![CDATA[Petya]]></category>
		<category><![CDATA[Ransomeware]]></category>
		<category><![CDATA[Wannacry]]></category>
		<category><![CDATA[Windows Update]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3718</guid>

					<description><![CDATA[<p>Ever get the feeling that computers have come a long way, yet… why are we still susceptible to PC virus attacks?  Recently there were two major worldwide attacks known as “ransomware”.  We’re going to offer information about these attacks and how you can be prepared to fend off a ransomware infection.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/held-at-ransomeware/">Don&#8217;t be Held at Ransomeware</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p>With two prominent malware attacks occurring back-to-back during the past two months, you&#8217;re likely familiar with the term  &#8211; &#8220;Ransomware&#8221; &#8211; a cyber-crime gaining worldwide attention. In this article we explore ransomware in depth and offer recommendations and instructions to prevent it from happening and to protect your PC.</p>
<h1>Ransomware defined:</h1>
<p>You can think of ransomware as &#8220;data kidnapping&#8221;. It is the result of a malware attack that blocks access to a user&#8217;s PC data. Once infected, the attackers try to force you into paying money so you can regain access. In some cases there is a threat to publish or delete the data unless the ransom is paid. Data and access is blocked by using strong file encryption.</p>
<p>Computers can be infected whether at home or in the work environment. This includes PCs on an enterprise network or government agency servers.</p>
<p>Some ways of infecting your PC include:</p>
<ul>
<li>Surfing to unsafe or fake websites.</li>
<li>Opening emails and email attachments from unknown sources.</li>
<li>Opening malicious links in emails, Facebook, Twitter, and from online chat apps such as Skype.</li>
</ul>
<p>The two main types of ransomware are: Lockscreen and Encryption.</p>
<ol>
<li>Lockscreen ransomware prevents you from accessing your PC or files and instead displays a full-screen message saying you have to pay a ransom to regain access.</li>
<li>Encryption ransomware prevents you from opening your files by encrypting them. The encryption is very strong (uses an AES-256 &#8220;military grade&#8221; cipher algorithm), and would take an estimated 3&#215;10<sup>51</sup> years to crack. Also, a unique encryption key is generated for each infected computer so you can&#8217;t just get someone else&#8217;s key.</li>
</ol>
<p>Note: There are older versions of ransomware that display false messages such as claiming you have performed an illegal activity with your PC. They then state you are being fined by a police force or government agency. We want to stress that these claims are false and can be considered a scare tactic designed to extort money from you.</p>
<h1>What is the result of the attack?</h1>
<p>While there are various forms of ransomware, all of them prevent you from performing normal PC functions. This includes:</p>
<ul>
<li>Getting locked out! Preventing you from accessing your operating system.</li>
<li>Blocked access to files! Files are now encrypted and you can&#8217;t access them.</li>
<li>Disabled apps! Certain programs (like your web browser), are no longer able to run.</li>
</ul>
<h1>What about the ransom?</h1>
<p>Some ransomware attacks involve the victim having to pay money while some make you complete a survey. Payment of money is performed online and sometimes involves the victim having to pay in Internet currency Bitcoins. Due to the nature of those that commit these cybercrimes &#8211; there is no guarantee that your data or PC will return to the pre-attack state.</p>
<h1>How much do they extort?</h1>
<p>Symantec gained access to a malware server in 2012. This provided them first hand insight of the ransoms that were paid out. In a single day 5,700 computers were infected and 2.9% paid the ransom. This comes out to approximately $33,600 for one day.</p>
<p>&#8220;Given the number of different gangs operating ransomware scams, a conservative estimate is that over $5 million dollars a year is being extorted from victims. The real number is, however, likely much higher.&#8221;<a href="#_ftn1" name="_ftnref1">[1]</a></p>
<h1>Recent Ransomware attacks&#8230;</h1>
<h2>WannaCrypt; May 12, 2017:</h2>
<p>Many users around the world were victims of the malicious &#8220;WannaCrypt&#8221; software attack which has been considered one of the worst and most widespread cyber-attacks. More than 230,000 computers in over 150 countries were affected. All files on infected PCs were locked and the demanded ransom was 300 dollars in bitcoins.</p>
<p>Interestingly, people running Windows 10 were not targeted by the attack. Despite this, this attack was serious as evidenced in the steps Microsoft took. They took a highly unusual step in providing a security update for all customers to protect even the Windows platforms that are in custom support only. This includes Windows XP, Windows 8, and Windows Server 2003.</p>
<p>Supported versions of the operating system (Vista, Windows 7, 8.1, 10, etc.), have access to the security update MS17-010. If users have automatic updates enabled or have installed the update, they are protected. Microsoft states<a href="#_ftn2" name="_ftnref2">[2]</a>: &#8220;For those organizations who have not yet applied the security update, we suggest you immediately deploy <a href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx" target="_blank" rel="noopener noreferrer">Microsoft Security Bulletin MS17-010</a><u></u><em>&#8220;. </em>They go on to state that this attack may evolve over time and additional defense strategies are warranted.</p>
<h2>Petya; June 27, 2017:</h2>
<p>Companies across Europe and the US were affected by the &#8216;Petya&#8217; ransomware attacks. Infected computers displayed a message demanding a Bitcoin ransom of $300. Victims were unable to unlock their computers even if they paid the ransom.<a href="#_ftn3" name="_ftnref3">[3]</a> The instructions included sending confirmation of payment to an email address. However, that email address was shut down by the email provider and there was no way to contact the attacker for a decryption key to unlock their computer.</p>
<p>This ransomware attack exploited the same Microsoft exploit as WannaCry &#8211; the vulnerability known as EternalBlue. Even with the patch, this cyber-attack has two other ways to spread within an organization focusing on the network administrator&#8217;s tools. Experts believe the initial infection is suspected to have been delivered through email (as with WannaCry).</p>
<h1>If Infected With Ransomware:</h1>
<p>You are a victim of a ransomware infection once you see some form of ransom demand appearing in a dialog window, an app, or a full-screen message. Unfortunately, this demand is displayed after encrypting your files or disabling some part of your PC.</p>
<p>Before you try to recover your files, Microsoft suggests trying to fully clean your PC with <a href="https://support.microsoft.com/en-us/help/17466" target="_blank" rel="noopener noreferrer">Windows Defender Offline</a>. After this you can try to <a href="https://support.microsoft.com/en-us/instantanswers/62ed802d-7c8d-35d9-9b82-6cace4b08185/backup-and-restore-in-windows-10" target="_blank" rel="noopener noreferrer">Backup and Restore in Windows</a>.</p>
<p>We fully agree with Microsoft: &#8220;Do not pay any money to recover your files. Even if you were to pay the ransom, there is no guarantee that you will regain access to your PC or files.&#8221;</p>
<h1>If You Already Paid:</h1>
<p>If you paid the ransom, contact your bank and local authorities immediately. Your bank may be able to block the transaction and return your funds if you paid with a credit card. Inform your bank if you did submit credit card details to the cyber thieves.</p>
<p>We suggest you also contact the following government agencies that deal with fraud and scam reporting:</p>
<ul>
<li>In the United States, go to: <a href="http://www.onguardonline.gov/" target="_blank" rel="noopener noreferrer">On Guard Online</a>.</li>
<li>In Canada, go to: <a href="http://www.antifraudcentre-centreantifraude.ca/" target="_blank" rel="noopener noreferrer">Canadian Anti-Fraud Centre</a>.</li>
<li>For other countries: go to this <a href="https://support.microsoft.com/en-us/help/4013550/windows-protect-your-pc-from-ransomware" target="_blank" rel="noopener noreferrer">Microsoft site</a>.</li>
</ul>
<h1>Prevention:</h1>
<p>There are safe measures you can take to lessen the impact of attacks and failures and there are ways to prevent malicious attacks from crippling your PC and network.</p>
<ol>
<li>Keep a current back up of your data files (images, video, documents and music).</li>
<li>Keep your Windows install up-to-date with the latest Windows security updates.</li>
<li>Keep your antivirus program up-to-date. We highly recommend a reputable AV program with active subscription (one that keeps up to recent malicious attacks). We invite you to check out the performance and protection offered by <a href="https://www.compuclever.com/products/antivirus/" target="_blank" rel="noopener noreferrer">CompuClever Antivirus PLUS</a>.</li>
<li>Do not open email links or files from a sender you do not recognize. In many cases you can recognize a fake email and webpage because they have bad spelling or look unusual.</li>
<li>Be careful where you surf on the internet especially with less reputable sites. There is a greater chance of contracting a malware virus. Quite often unsafe sites can look convincing and have only subtle differences.</li>
</ol>
<p>Microsoft states<a href="#_ftn4" name="_ftnref4">[4]</a>: &#8220;Look out for strange spellings of company names (like &#8220;PayePal&#8221; instead of &#8220;PayPal&#8221;) or unusual spaces, symbols, or punctuation (like &#8220;iTunesCustomer Service&#8221; instead of &#8220;iTunes Customer Service&#8221;).&#8221;</p>
<h1>Stay Safe:</h1>
<p>Hundreds of millions of emails that include a ransomware attachment are being sent out every month. Many of these are being blocked and software vendors are working hard to shrink security holes and fix this ongoing cyber-crime.</p>
<p>As can be seen with the information provided here, staying informed, taking precautions, and using safe practices can help prevent you from getting an infection that could save you time and your data. If you require further information on this subject we recommend Microsoft&#8217;s <a href="https://www.microsoft.com/en-us/wdsi/threats/ransomware" target="_blank" rel="noopener noreferrer">Ransomware FAQ</a> page.</p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> <a href="http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/ransomware-a-growing-menace.pdf" target="_blank" rel="noopener noreferrer">http://www.symantec.com</a><br />
<a href="#_ftnref2" name="_ftn2">[2]</a> <a href="https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/" target="_blank" rel="noopener noreferrer">https://blogs.technet.microsoft.com</a><br />
<a href="#_ftnref3" name="_ftn3">[3]</a> <a href="https://www.theguardian.com/world/2017/jun/27/petya-ransomware-attack-strikes-companies-across-europe" target="_blank" rel="noopener noreferrer">https://www.theguardian.com</a><br />
<a href="#_ftnref4" name="_ftn4">[4]</a> <a href="https://www.microsoft.com/en-us/security/portal/mmpc/shared/ransomware.aspx" target="_blank" rel="noopener noreferrer">General information on ransomware</a></p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/held-at-ransomeware/">Don&#8217;t be Held at Ransomeware</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Breaking News – Yahoo Admits Breach of 500 Million Accounts</title>
		<link>https://www.compuclever.com/posts/yahoo-admitted-500-million-accounts-have-been-breached/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=yahoo-admitted-500-million-accounts-have-been-breached</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Thu, 22 Sep 2016 23:29:36 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[Protect online privacy]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[security breach]]></category>
		<category><![CDATA[Yahoo]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3004</guid>

					<description><![CDATA[<p>Yahoo confirmed today that data "associated with at least 500 million user accounts" has been stolen in what may be one of the largest cyber-security breaches ever.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/yahoo-admitted-500-million-accounts-have-been-breached/">Breaking News – Yahoo Admits Breach of 500 Million Accounts</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>My heart dropped when I was <a href="http://money.cnn.com/2016/09/22/technology/yahoo-data-breach/">alerted by CNN</a> that Yahoo admitted today that 500 million user accounts have been compromised. As a seasoned IT professional who has been involved with the security industry for the past decade, this is probably THE worse security breach that’s occurred since the inception of the Internet.</p>
<p>Here are the key facts that you should be aware of regarding this breach:</p>
<ul>
<li>In August 2016, a person codenamed “Peace” attempted to sell what he claimed to be 200 million Yahoo user information.</li>
<li>Back then, Yahoo only said they were investigating the legitimacy of the claim.</li>
<li>On Sept. 22<sup>nd </sup>2016, Yahoo issued a statement acknowledging the legitimacy of the claim. Furthermore, Yahoo confirmed the scale of the breach is actually 500 million accounts.</li>
<li>Yahoo also confirmed that the information stolen contains name, username, lightly encrypted passwords, date of birth, and for some accounts, security questions and answers.</li>
</ul>
<p>Nevertheless, till this moment, Yahoo hasn’t issued a notice to all of its users advising them to reset their passwords.</p>
<p>Here at CompuClever, we felt it is necessary to inform you about this event because there is a high possibility that either you or someone you know might be impacted by this incident.</p>
<p>Yahoo is currently working with law enforcement agencies, including the FBI, to deal with this breach. Nevertheless, we recommend you immediately take the following measures to protect your online security and personal privacy:</p>
<ul>
<li>Immediately change your Yahoo email password.</li>
<li>If you happen to be using the same combination of username and password across multiple (non-Yahoo) online accounts, change all of the passwords. Make sure that you use a different password for every account.</li>
<li>Ensure you have a legit and reputable antivirus protection with active subscription to protect your PC from any forms of cyberattack.</li>
</ul>
<p>Further readings:</p>
<ul>
<li><a href="https://www.compuclever.com/posts/how-to-protect-yourself-in-a-post-password-world/" target="_blank">How to protect yourself in a post-password world</a></li>
<li><a href="https://www.compuclever.com/posts/compuclever-antivirus-plus-vb100-certification/" target="_blank">How to create a good password</a></li>
<li><a href="https://www.compuclever.com/posts/safe-guard-your-online-banking/" target="_blank">Safe guard your online banking</a></li>
<li><a href="https://www.compuclever.com/posts/stay-safely-connected/" target="_blank">Stay safely connected</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/yahoo-admitted-500-million-accounts-have-been-breached/">Breaking News – Yahoo Admits Breach of 500 Million Accounts</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Antivirus Software – 7 Myths Debunked</title>
		<link>https://www.compuclever.com/posts/antivirus-software-7-myths-debunked/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=antivirus-software-7-myths-debunked</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Wed, 08 Jun 2016 19:27:59 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[PC security]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=2666</guid>

					<description><![CDATA[<p>Here are 7 myths about antivirus software that CompuClever get from interacting with users when dealing with security related support cases.  Let’s debunk the myths related to AV applications.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/antivirus-software-7-myths-debunked/">Antivirus Software – 7 Myths Debunked</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">Making use of an Antivirus application is commonly understood to be a prerequisite of operating your computer in a connected, online world. Generally speaking, it is unthinkable that one would run a PC without being actively protected by legitimate AV software with a valid subscription, whether paid or free. Nevertheless, there are some common myths about antivirus applications. Some of these myths prevent users from providing themselves with adequate protection while other myths perpetuate untruths and misinformation.</div>
</div>
<p>Here are 7 myths about antivirus software that we get from interacting with users when dealing with security related support cases.  Let’s debunk the myths related to AV applications.</p>
<h1>The Top 7:</h1>
<p>Here are the myths that we cover in this article along with the real truths about each.</p>
<h2>1. Authentication and encryption offers me all the protection I need.</h2>
<p>It’s true that authentication and encryption can make it challenging for a criminal to get to your confidential information but not impossible.  Some authentication systems use a One Time Passcode (OTP) and send a Simple Messaging System (SMS) or computer generated call back system.</p>
<p>Unfortunately, cyber criminals have already found ways to circumvent multi-factor authentication which was supposed to radically reduce online criminal activity.  New malware versions are now able to intercept authentication codes that are sent to your phone, so criminals can still get access to your OTP without you knowing about it.</p>
<p>Encryption scrambles your information to render it useless and requires you to use an encryption key to unlock the data.  However, it does not fully protect you from key-logging malware that can read your password used to access the encryption key.</p>
<p>While both of these technologies are useful in protecting sensitive data on your PC, they do not protect your PC from contracting malicious software.  In other words, your system can be hacked and be held hostage – you can fall victim to <a href="https://www.compuclever.com/posts/protect-computer-from-ransomware/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=newsletter" target="_blank">ransomware</a> and other debilitating viruses.</p>
<h2>2. I don’t download files so I am safe from virus attacks.</h2>
<p>You don’t have to actively download files to be the victim of virus attacks.  Browser based attacks are now much more common.  In fact, some of the most popular websites, including Yahoo, New York Times, Huffington Post, and CNN.com, have fallen prey to malware attacks that are integrated in display ads.  This is known as “malvertising”.</p>
<p>Malvertising is a common online criminal tactic which can easily spread among popular websites for maximum gain.  There are two types of malvertising attacks.  One is when a user clicks an ad and the malware infects their system.  The other type is not even triggered by user interaction as it uses embedded malware code within iframes that results in the ability to manipulate the browser to grab files from other malicious sources.  Simply browsing to a site can result in falling victim to malware attacks.</p>
<p>There are also attacks, referred to as “Man in the Middle” where an “…attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other”.<sup><a href="#_footnotes">[1]</a></sup> For example, the Man-in-the-Browser (MITB) attack utilizes a Trojan horse virus.</p>
<p>Online banking is very susceptible to the MITB attack.  In these cases the infected web browser uses altered web pages and content without the user knowing it.  The information is exchanged between the user and the host bank and the confirmation screens are all the same.  However, in the background, the criminal can be altering the data so as to change the transaction destination and the amount.</p>
<p>These examples illustrate that files do not have to be downloaded in order for you to be compromised.  Fortunately, Trojan viruses can be detected and removed by effective AV engines.</p>
<h2>3. Firewalls protect me from malicious activities.</h2>
<div class="quick_facts">A Firewall… is a network security feature that   can allow or deny incoming and outgoing PC communications based on a   predetermined set of rules.  The firewall rules are a standard preset   configuration or can be modified by you or your administrator.  The Windows firewall is by default   configured to block incoming threats – you need to change the settings to   deal with outgoing threats.</div>
<p>Firewalls block certain nefarious traffic but they cannot protect your PC from files that contain a virus or Trojan.  The reason for this is that firewalls are not designed to scan for infected files – you need an AV engine specific to this purpose.</p>
<p>It is crucial to eliminate potential security holes.  Port scanning can be problematic as criminals look for ways to openly connect with your PC.  A properly configured firewall can minimize this risk and new Windows operating systems come with firewall functionality.  While this is the first line of defense… it is not sufficient in blocking the myriad of virus and malware threats that are out there.</p>
<p>A firewall can be configured to block outbound traffic as well.  However, malware writers have been able to disable a firewall so traffic can escape from your system.  AV vendors have already created mechanisms to minimize this problem, but cyber criminals have proven themselves to be very clever in being able to hide the information within normal http traffic so as to disguise the data as innocent web requests.</p>
<h2>4. Viruses and malware are written by AV companies.</h2>
<p>There is no shortage of conspiracy theories.  So… is there any truth to AV companies creating malware?</p>
<p>There is an old technique that Firefighters use known as back burning.  Firemen create a controlled fire to burn up all of the debris that can fuel a fire which leaves a black zone. This method reduces the chance of a wildfire from jumping across the black line of defense.  This is similar to a strategy that Antivirus companies employ with viral attacks.  They use existing malware or create viruses to test their AV engine so they can understand the limits of their program, improve their software, and eliminate the vulnerability associated with such attacks that are known and encountered in the real world.</p>
<p>The real and full truth here is that there have been billions of dollars in loss suffered by companies and private individuals as a result of cyber criminals utilizing malware for profit.  There are in fact real criminals that focus their energies and skill on a variety of heinous activities such as stealing money, selling stolen credit card information, hiring other malicious code writers, selling malware to other cyber criminals, <a href="https://www.compuclever.com/posts/protect-computer-from-ransomware/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=newsletter" target="_blank">holding an infected PC ransom</a>, and more.  Cyber crime is a billion dollar industry and it will continue to grow as long as criminals see an opportunity to make money.</p>
<h2>5. You can get good protection from free AV programs.</h2>
<p>There are free antivirus programs that provide a basic level of protection, like Microsoft Windows Defender.  However, many of these lack key security features to reduce exposure to attacks, some have slower scanning speeds, others do not provide technical support, several do not respond quickly to emergencies, and some do not detect new threat categories effectively.</p>
<p>Free AV programs generally do not provide web protection.  This fundamental security feature is designed to block malicious links, prevent phishing attempts, and stop fraudulent links from compromising your system.  As we stated previously, online criminals want to make money and they will target personal or financial information.</p>
<p>Some free antivirus products offer a personal firewall that can block unauthorized communication.  You will need to verify your AV solution is equipped with this and activate it during the enrollment process.  And keep in mind, if your PC is already infected, cyber criminals could be actively stealing your information.</p>
<p>Choosing a free or paid antivirus program can be a difficult challenge as you need to weigh out your own privacy concerns along with getting full protection.  Third party publications can help narrow down your choices so we recommend that you review articles from publications such as: PC Magazine, Cnet, AV-Test, AV Comparatives, or Virus Bulletin.</p>
<div class="quick_facts">We are pleased that CompuClever AV PLUS has been   certified by Virus Bulletin (VB100).  You   can find the review on this <a href="https://www.virusbulletin.com/virusbulletin/2015/08/comparative-review-windows-7-pro-64-bit/" target="_blank">virus bulletin site</a> (search   for “CompuClever”).  More on this   later…</div>
<h2>6. AV applications are not equipped to deal with APT attacks.</h2>
<p>Advanced Persistent Threat (APT) is a recently used term spoken in such a way as to conjure up dark and scary creatures that we can speak of when gathering around a campfire at night.  In reality, APT is not dramatically different from malware that was launched ten years ago.  It’s quite common for cyber criminals to use similar tactics in new ways when launching their latest PC threats.</p>
<div class="quick_facts">APT   attacks are generally designed to target and penetrate companies, government   agencies, or even political organizations.  If you want additional insights about APTs,   please read the article: <a href="http://oemhub.bitdefender.com/what-is-an-advanced-persistent-threat" target="_blank">Setting   the Record Straight: What’s an Advanced Persistent Threat?</a></div>
<p>Malware writers are very innovative as they quickly change their attack methods while still leveraging criminal underground networks and strategies all the while remaining focused at absconding funds or making their mark.  Case in point: <a href="https://www.compuclever.com/posts/signs-of-a-pc-attack/" target="_blank">Ashley Madison hackers</a> were motivated as a result of outrage due to the activities of the targeted website.</p>
<p>AV companies have evolved by using a combination of malware signatures, heuristics, and behavior techniques to capture new and unknown threats.  They will not however detect all malware attacks.  Some AV companies detect unknown threats better and more consistently than others.</p>
<p>Let’s turn our focus on third party testing companies that specifically test for unknown and zero-day malware threats.  Companies that specialize in preventing APT attacks generate a lot of revenue, but it is surprising to see that these vendors have not submitted their products for testing by a third party organization.  Why is that?</p>
<p>For most users, the most affordable and best option is a reputable AV program along with using common sense.  It also helps to get recent and frequent software updates.</p>
<h2>7. I can get good information about AV app comparisons from the AV vendor.</h2>
<p>The simple answer to this is: make sure you get independent reviews.</p>
<p>Often times, AV test reports sponsored by a company range from being biased to blatantly skewed.  These reports typically highlight specific detection techniques and compare a limited number of vendors.  On the other hand, third party, non-profit malware testing organizations publicly provide their testing methodology to be scrutinized by all participating vendors.</p>
<p>All AV vendors are allowed to participate in third party tests and reviews, compared to being selected and tested by a vendor who is paying for the report.  There are different testing scenarios to help understand efficacy characteristics.</p>
<p>One test, involves capturing malware for a specific period of time and preventing the update mechanism from fetching the latest files from the AV vendor.  This particular test determines whether the AV engine can proactively prevent new or unknown threats from infecting a PC without file updates.<sup><a href="#_footnotes">[2]</a></sup> Another test involves speed performance tests which measure the impact of the AV program on the performance of a computer system.</p>
<h1>An Independent Review: CompuClever Antivirus PLUS</h1>
<p>We are pleased to report that we were tested and received a glowing review by VB100, “…a world-renowned independent testing and certification body, active in testing, reviewing and benchmarking security solutions for over 20 years.”<sup><a href="#_footnotes">[3]</a></sup></p>
<div class="quick_facts">
<p><strong>VB100 had   this to say about CompuClever Antivirus PLUS:</strong></p>
<p>“The   design is slick and attractive, with a good range of options available and   intuitive deployment of controls.”</p>
<p>“Stability   was perfect throughout testing, with not the slightest shake even under heavy   stress. Performance impact was decent too, with RAM use perhaps a little   above average but CPU usage and impact on our set of tasks both pretty low.”</p>
<p>“Detection   was as excellent as one would expect, with good scores everywhere. The   WildList and clean sets were handled with pinpoint accuracy, earning <em>CompuClever</em> its first VB100 award on its debut.”</p>
<p>Check out the <a href="https://www.virusbulletin.com/testing/results/test_from/2015-08/vb100-antimalware" target="_target">virus bulletin full review</a>.</p>
</div>
<p>For more information about CompuClever AV PLUS click here: <a href="https://www.compuclever.com/posts/are-you-well-protected/" target="_blank">Are You Well Protected?</a></p>
<h1>Summary:</h1>
<p>With the information provided in this article we feel you now have a much clearer understanding of AV applications and virus attacks.  We strongly recommend that you protect your PC from viral dangers that are prevalent in our daily computing world.</p>
<p>We will continue to provide story lines like this and we will describe them in a manner that is within reach of everyday computer users.  If you have some ideas of topics you would like us to cover, email us at: <a href="mailto:newsletter@compuclever.co">newsletter@compuclever.com</a></p>
<div class="bottom_p">
<p><a id="_footnotes"></a></p>
<hr size="1" />
<p>&nbsp;</p>
<p>[1] <a href="https://en.wikipedia.org/wiki/Man-in-the-middle_attack" target="_blank">https://en.wikipedia.org/wiki/Man-in-the-middle_attack</a><br />
[2] <a href="http://oemhub.bitdefender.com/how-to-properly-evaluate-an-advanced-persistent-threat-security-solution" target="_blank">How to Properly Evaluate an APT Security Solution</a><br />
[3] <a href="https://www.virusbulletin.com/testing/" target="_blank">https://www.virusbulletin.com/testing/</a></p>
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/antivirus-software-7-myths-debunked/">Antivirus Software – 7 Myths Debunked</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Personal Encounter with Ashley Madison</title>
		<link>https://www.compuclever.com/posts/a-personal-encounter-with-ashley-madison/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=a-personal-encounter-with-ashley-madison</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Thu, 01 Oct 2015 16:54:44 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[Protect online privacy]]></category>
		<category><![CDATA[Windows tips]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=2186</guid>

					<description><![CDATA[<p>What are the consequences to piracy that involves millions of users and personal information?  We look at both the overall effect of the greatest hack in modern day as well as how it came to our attention through someone seeking our support and professional guidance.  We offer here testimony and strategy. </p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/a-personal-encounter-with-ashley-madison/">A Personal Encounter with Ashley Madison</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">What are the consequences to piracy that involves millions of users and personal information?  We look at both the overall effect of the greatest hack in modern day as well as how it came to our attention through someone seeking our support and professional guidance.  We offer here testimony and strategy.</div>
</div>
<p>Unless you have been living under a rock for the past few months, you must have heard about the Ashley Madison account hack.  This was where hackers released the entire user database of names, email addresses, billing information, and account details of 38 million users tied to the site.  Some described the historical hack episode as an extinction-level event for privacy.</p>
<div class="quick_facts">Jeff Yang, a columnist for The Wall Street Journal, asked this simple but stern question in his CNN-syndicated commentary &#8211; Ashley Madison hack: privacy becomes extinct.  Comparing the incident to the prehistoric planet-wide catastrophe that wiped out the Jurassic World, Yang declared that the data hack of the Toronto-based infidelity website was “an extinction-level event for privacy”.</div>
<h1>Attack Aftermath</h1>
<p>We were shocked when we first learned that hackers managed to steal close to 40 million users’ records from Ashley Madison, which made claims shortly after the incident that its members remained anonymous.  However, in early August 2015 it was clear that this was not the case as hackers released details of millions of email addresses, billing information, and account details tied to the site<sup><a href="#_footnote">[1]</a></sup>.</p>
<p>As a group of seasoned IT professionals who have been actively involved with security R&amp;D for a number of years, we can tell this hack event was different from all previous data leakages that impacted large corporations and national-level government agencies.  This time, the privacy of many ordinary people – with repercussions to job, relationships, family life, marriage, and personal life – was exploited, ripped apart, and taken away.</p>
<p>What was the impact to this?  Heartless spammers sent extortion emails to people demanding ransom in return of “wiping records clean”<sup><a href="#_footnote">[2]</a></sup>.  Adding salt to the wound, class action lawsuit experts and divorce lawyers are circling victims smelling hefty legal fees in the air.  The rippling effect of the biggest privacy invasion in human history will be felt for a long time to come.  Sadly, we CANNOT be fooled by those spamming extortionists; data leakage is just like waste water leakage &#8211; there is no way to retract or wipe absolutely clean what’s already there.</p>
<h1>A Personal Encounter</h1>
<p>Just a few weeks ago, the core group here at CompuClever was caught in a “personal” encounter with the Ashley Madison aftermath.  A seemly normal support email came from a user requesting help with opening a very large (approximately 10 GB), compressed file.  The technical support specialist who was dealing with the ticket noticed something abnormal – the origin of the file resides on “The Pirate Bay”, a controversial pirate website usually referred to as part of the “darker side of the web”.  Due to the security concern, this case was quickly escalated to our co-founder and Chief Product Officer Yida Mao, who is also our in-house security expert.</p>
<p>Using an isolated environment, Yida led our security analysts to identify the contents of the large compressed file which actually contained the entire dataset of the Ashley Madison user account database.  Due to security pre-cautions and with suspicion of possible computer virus contamination within the compressed file, we immediately notified the user to delete and quarantine the file without her having to opening it.  We were told by this user that she had strong feelings that her partner had been active on the Ashley Madison site and wanted confirmation. We utilized alternative and safe methods to fulfill her queries and she was grateful.</p>
<p>When global-scale security breaches like that of Ashley Madison happen, we always have mixed feelings of horror and sympathy, along with a sense of responsibility.  The magnitude of the hack, for both the number of people involved and the level of impact is HUGE.  Can you imagine if the privacy and secrecy of the entire nation of Canada (approximately 36 million) was hacked, exposed, and ripped apart?  Meanwhile, as IT professionals who are actively involved with R&amp;D in the realm of PC security and optimization, we also feel deeply compelled to reach out to our families, friends, and to our users and readers in order to awake their sense of online security.  Cyber security breach and privacy invasion is no longer something you only read about in cold war novels or watch in Jason Bourne movies, it is happening to people around us or may have already impacted you and your family.</p>
<p style="text-align: center;"><a href="https://www.compuclever.com/products/antivirus/" target="_blank"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%;" title="CompuClever Antivirus - Best Protection. Best Performance." src="https://www.compuclever.com/posts/wp-content/uploads/ccav-windows10-general.jpg" alt="" width="650" height="363" /></a></p>
<h1>Recommendations</h1>
<p>So what can you do instead of just being paranoid?  “Be vigilant and aware of your digital surroundings, just as you should be aware of your physical surroundings” says Yida Mao who has managed multiple R&amp;D teams in the cyber security field and published research findings at several international software consortiums.  He offers three core principles for protecting your cyber security and privacy:</p>
<div class="indent_left">
<ul>
<li><strong>Be aware of what’s already on your PC</strong>:  Your PC has a lot of information to tell about you, including your personal data, financial records, photos, tax filings, family tree information, and more.  Anything that physically reside on your PC can be stolen and exposed.  Read more about <a href="https://www.compuclever.com/posts/cookie-time/" target="_blank">how to safely remove sensitive information from your PC…</a></li>
<li><strong>Be aware of what’s getting stored on your PC</strong>:  Unless your PC is never connected to the Internet, you always face the risk of cyber-attacks or privacy intrusions.  Your PC is not designed to battle any of these attacks alone and neither should you.  <a href="https://www.compuclever.com/posts/surf-with-confidence/" target="_blank">Get comprehensive security software like CompuClever Antivirus PLUS to fend off cyber-attacks</a>.</li>
<li><strong>Be aware of what’s being sent from your PC</strong>:  Frequently you, or your PC, will send out sensitive information or data without your full permission or intent.  Do you have a data filtering mechanism to prevent information like your credit card numbers or social security numbers from being leaked out?  If not, you should use something equivalent to the <a href="https://www.compuclever.com/posts/stay-safely-connected/" target="_blank">Data Protection function in CompuClever Antivirus PLUS</a> to safeguard your personal data.</li>
</ul>
</div>
<p>We urge you to take time and assess what protective measures you have put in place to safeguard your information and your privacy, regardless what software or tools you choose to use.  Do not delay or procrastinate, cyberattacks do not wait for you – instead, they catch you off-guard.</p>
<h1>In Summary</h1>
<p>We are excited to be able to provide an AV product that can equip you with tools designed to safeguard you from cyber attacks.  Together with our prior technologies such as PC Clean Maestro you can be more proactive in protecting your privacy and securing your personal information in order to safely enjoy your PC computing practices.  We plan to continue covering this theme of protection and security in upcoming articles and welcome your feedback.</p>
<p>Please keep in mind… if you have some ideas of topics you would like us to cover or have other feedback to offer, email us at: <a href="mailto:newsletter@compuclever.co" target="_blank">newsletter@compuclever.com</a></p>
<div class="bottom_p">
<p><a id="_footnote"></a></p>
<hr size="1" />
<p>&nbsp;</p>
<p>[1] <a href="http://money.cnn.com/2015/08/19/technology/ashley-madison-search/index.html">CNN: Hackers released details of hacked Ashley Madison accounts.</a><br />
[2] <a href="http://money.cnn.com/2015/08/21/technology/ashley-madison-users-extorted/">CNN: Spammers sent extortion emails to Ashley Madison users.</a></p>
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/a-personal-encounter-with-ashley-madison/">A Personal Encounter with Ashley Madison</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Windows 10 and Antivirus</title>
		<link>https://www.compuclever.com/posts/windows-10-and-antivirus/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=windows-10-and-antivirus</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Fri, 18 Sep 2015 18:04:33 +0000</pubDate>
				<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Windows 10]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=2156</guid>

					<description><![CDATA[<p>Windows 10 imposes new standard for antivirus programs. CompuClever Antivirus PLUS is now Windows 10 compatible. </p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/windows-10-and-antivirus/">Windows 10 and Antivirus</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>During the launch event of our newly released security product &#8211;   CompuClever Antivirus PLUS 2016 back in August, many keen users have  contacted us about Windows 10 support. I am very excited to announce, as  of today, CompuClever Antivirus PLUS 2016 officially supports Windows  10.</p>
<p><a href="https://www.compuclever.com/products/antivirus/" target="_blank">&gt;&gt; Learn more about CompuClever Antivirus PLUS<br />
</a></p>
<p>Now, with Windows 10, Microsoft imposes stringent requirements  for antivirus software to ensure they are fully compliant to the  enhanced security Application Programming Interface (API) specification  for Windows 10, AND that the antivirus program also contributes  positively to the user experience especially in terms of impact to PC  performance. CompuClever Antivirus PLUS 2016 fully meets these new and  heightened standards. The antivirus software has been officially  approved by Microsoft as being compatible with Windows 10.</p>
<p><a href="https://www.compuclever.com/products/antivirus/" target="_blank">&gt;&gt; CompuClever Antivirus PLUS 2016 Now Supports Windows 10</a></p>
<p>If you are upgrading to Windows 10, please be aware that  Microsoft said: “If your anti-malware subscription is not current  (expired), Windows will uninstall your application and enable Windows  Defender”. We have expressed our concerns about Windows Defender stating  that it is not the best antivirus protection you can get, free or paid,  even according to <a href="http://www.pcmag.com/article2/0,2817,2480487,00.asp" target="_blank">PC Magazine</a>.  We recommend anyone upgrading to Windows 10 should check what antivirus protection is running after making the switch.</p>
<p><a href="https://www.compuclever.com/posts/are-you-well-protected/" target="_blank">&gt;&gt; How to tell if your antivirus provides you enough protection</a></p>
<p>With CompuClever Antivirus PLUS, you can  protect a PC with the best antivirus technology trusted by over 500  million users around the world. Still not convinced? No worries, take a FREE 7-day trial for a  spin and we guarantee that you will see the difference between your  current antivirus program and CompuClever Antivirus PLUS 2016, which  offers total security protection with no compromise of PC speed.</p>
<div class="bottom_p">
Give you and your family the best PC security protection available!
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/windows-10-and-antivirus/">Windows 10 and Antivirus</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Vigilance and Silence</title>
		<link>https://www.compuclever.com/posts/silence-and-vigilance/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=silence-and-vigilance</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Thu, 10 Sep 2015 17:40:27 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[improving performance]]></category>
		<category><![CDATA[increasing speed]]></category>
		<category><![CDATA[PC security]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=2128</guid>

					<description><![CDATA[<p>Learn how CompuClever Antivirus PLUS' Autopilot and Profiles feature delivers the best security protection in absolute silence. Better yet, with Real-Time Optimization, it even makes your PC faster.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/silence-and-vigilance/">Vigilance and Silence</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">In a previous article discussing <a href="https://www.compuclever.com/posts/protection-vs-speed/" target="_blank">whether we really need to compromise PC performance in exchange for security</a>, we presented the CompuClever Photon technology – an innovative feature that adapts security protection to the uniqueness of your PC. Photon makes CompuClever Antivirus light and fast, imposing almost no overhead to system resources. But how should an antivirus react to a true threat when it detects an intrusion? We are often presented with popups and reminders, like the one shown below, that most of us, even including those who work in the IT industry, don’t know how to respond to, which may result in taking the wrong action.</div>
</div>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=v_and_silence">CompuClever Antivirus PLUS</a> works differently and better than this. It is essentially a silent security solution that only communicates useful information in language you can understand, keeping you informed and, keeping you in the driver seat. This is achieved through the combination of two features: Autopilot and Profiles.</p>
<h1>Introducing Autopilot and Profiles</h1>
<p>What makes CompuClever Antivirus’ user-centric approach possible is the Autopilot and Profiles features, which work hand-in-hand to deliver silent security 24/7.</p>
<h2>Autopilot</h2>
<p>Autopilot makes the best security decisions for users, without user interaction, while eliminating notifications and popups. When Autopilot is switched on and CompuClever Antivirus detects any type of threats, it will automatically block it. Users do NOT need to define their protection levels or what actions to take whenever a threat is detected. It is automatically enabled and can be simply disabled.</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=v_and_silence"><img decoding="async" loading="lazy" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%; max-width: 650px;" title="CompuClever Antivirus Autopilot" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-autopilot.png" alt="" width="760" height="198" /></a></p>
<p>The “secret sauce” of Autopilot is another cool technology: CompuClever Profiles – an intelligent technology that determines what you are doing with your PC and makes the right decisions for PC security! Additionally, with Profiles, CompuClever Antivirus not only works silently but also optimizes your PC for its best performance.</p>
<h2>Profiles</h2>
<p>The Profiles technology is designed to automatically detect when users work, play, or watch movies, and it prevents other apps from slowing down the system. Beside the standard profile, there are three profiles that fit most of our day-to-day PC usage patterns: “Work”, “Game”, or “Movie”. CompuClever Antivirus PLUS will identify whenever the user is engaged in one of these activities and will maximize PC performance by directing more of the system resources to those particular applications. In addition, Profiles offers users an uninterrupted experience by postponing resource-consuming operations such as scheduled scans, automatic product updates, system maintenance tasks, Windows updates, and other third-party operations. It also suspends unnecessary background programs, eliminates pop-ups, and adjusts visual effects according to activities users are currently engaged in. Here are some behavioral description of each profile:</p>
<div class="indent_left">
<ul>
<li><strong>Work</strong>: postpone scheduled scans, initiate automatic product and signature updates every two hours, activate the anti-spam module, deactivate Search Advisor, and block product notifications.</li>
<li><strong>Game</strong>: postpone scheduled scans, initiate automatic product and signature updates every twelve hours, deactivate Search Advisor, and block product notifications.</li>
<li><strong>Movie</strong>: perform the same operations as the Game profile, but start product and signature updates every eight hours.</li>
</ul>
</div>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=v_and_silence"><img decoding="async" loading="lazy" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%; max-width: 650px;" title="CompuClever Antivirus Profiles" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-profiles.png" alt="" width="759" height="514" /></a></p>
<p>You can manually set your PC to one of these profiles or let Autopilot take over the control and make the best decision for you. Either way, CompuClever Antivirus PLUS ensures you are completely protected while you enjoy the best of what your PC is designed to deliver.</p>
<h2>Real-Time Optimization</h2>
<p>CompuClever Antivirus PLUS Real-Time Optimization is a plugin that improves your system performance silently in the background, making sure that you are not interrupted while you are in a Profile mode. Depending on the CPU load, the plugin monitors all processes, focuses on those that take up a higher load, and adjusts them to your needs.</p>
<p>The system is optimized by increasing the Profile’s application performance, postponing system updates and Windows automatic updates, suspending unnecessary background programs, and eliminating popups in order to provide the best movie or game experience.</p>
<h2>Security Report</h2>
<p>Although CompuClever Antivirus is considered completely silent, it still reports to you once a week by delivering an easy-to-understand Security Report.</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=v_and_silence"><img decoding="async" loading="lazy" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%; max-width: 650px;" title="Security Report" src="https://www.compuclever.com/posts/wp-content/uploads/security-report.png" alt="" width="1209" height="1040" /></a></p>
<p>The Security Report presents the security status for the past week including scans, disinfections, an events timeline, and feature recommendations. These tips are important in managing the overall protection and users can easily see actions to be taken on their PC. The overall security score is calculated based on the critical protection used previously and other conditions that might represent a security risk. The Security Report uses an issue tracking system to detect and inform users about issues that may have impacted the security of the system and the data on it.</p>
<h1>Conclusion</h1>
<p>To learn more about the features and benefits covered in this article:</p>
<div class="indent_left">
<ul>
<li><a href="https://www.compuclever.com/support/antivirus/help-file/html/start.get.autopilot.html" target="_blank">CompuClever Autopilot</a></li>
<li><a href="https://www.compuclever.com/support/antivirus/help-file/html/optimization.profiles.html" target="_blank">CompuClever Profiles</a></li>
<li><a href="https://www.compuclever.com/support/antivirus/help-file/html/optimization.profiles.real_time.html" target="_blank">Real-Time Optimization</a></li>
<li><a href="https://www.compuclever.com/support/antivirus/help-file/html/start.gui.report.html" target="_blank">Security Report</a></li>
</ul>
</div>
<div class="bottom_p">
<p>Be still and know you are in control of your PC security with the help of CompuClever Antivirus PLUS!</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=v_and_silence"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%;" title="windows-10-compatible" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-windows-10-compatible.jpg" alt="" /></a></p>
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/silence-and-vigilance/">Vigilance and Silence</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Protection vs. Speed</title>
		<link>https://www.compuclever.com/posts/protection-vs-speed/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=protection-vs-speed</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Sun, 06 Sep 2015 07:33:00 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[improving performance]]></category>
		<category><![CDATA[increasing speed]]></category>
		<category><![CDATA[PC security]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=2111</guid>

					<description><![CDATA[<p>Does antivirus software slow down PCs? The answer is a definite Yes; but, a conditional one depending on which security software you’ve chosen to run on your PC. According to an extensive endurance test, performed by AV-Test.org, the evidence of PC performance impacted by antivirus software was more than convincing. An antivirus solution that does a mediocre job on reducing its impact on PC performance slows down your PC by taking too much resource like CPU, hard disc, and RAM. As a result, you were forced to make a compromise for speed in exchange for security.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/protection-vs-speed/">Protection vs. Speed</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">Does antivirus software slow down PCs? The answer is a definite Yes; but, a conditional one depending on which security software you’ve chosen to run on your PC. According to <a href="http://www.av-test.org/en/news/news-single-view/endurance-test-does-antivirus-software-slow-down-pcs/" target="_blank">an extensive endurance test</a>, performed by AV-Test.org, the evidence of PC performance impacted by antivirus software was more than convincing. An antivirus solution that does a mediocre job on reducing its impact on PC performance slows down your PC by taking too much resource like CPU, hard disc, and RAM. As a result, you were forced to make a compromise for speed in exchange for security.</div>
</div>
<p>But, is it really necessary to choose between protection and speed? A well designed antivirus program should impose minimum or no impact to PC performance while still delivering the best protection against malware and online threats. This is how CompuClever Antivirus was designed and made. Let’s dive into some details.</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&#038;utm_medium=email&#038;utm_campaign=protection_vs_speed"><img decoding="async" class="emailImage aligncenter" style="height: auto; max-width: 275px; width: 100%;" title="windows-10-compatible" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-box-left-640x480-1.png" alt="" /></a></p>
<h1>CompuClever Photon technology</h1>
<p>The core technology is called “Photon” and it makes CompuClever Antivirus the lightest antivirus ever. It is an innovative antivirus technology that takes the weight of the system and accelerates scanning speed by gradually adapting to each user’s PC.</p>
<h1>How it works</h1>
<p>Built with the same type of artificial intelligence technology used by the robotic industry, Photon goes through the following cycle to adapt to your PC:</p>
<figure id="attachment_2114" aria-describedby="caption-attachment-2114" style="width: 250px" class="wp-caption aligncenter"><a href="https://www.compuclever.com/posts/wp-content/uploads/photon.png"><img decoding="async" loading="lazy" class="size-medium wp-image-2114 " title="CompuClever Photon" src="https://www.compuclever.com/posts/wp-content/uploads/photon-250x300.png" alt="" width="250" height="300" srcset="https://www.compuclever.com/posts/wp-content/uploads/photon-250x300.png 250w, https://www.compuclever.com/posts/wp-content/uploads/photon.png 823w" sizes="(max-width: 250px) 100vw, 250px" /></a><figcaption id="caption-attachment-2114" class="wp-caption-text">Click to see a larger diagram: How Photon works</figcaption></figure>
<div class="indent_left">
<ol>
<li><em>Fingerprinting</em>: performed early in the installation a unique “fingerprint” was built for your system.</li>
<li>Pre-training: a scanning pattern based on the fingerprint is then formed by querying the reputation of each application and system process from Cloud intelligence, maintaining a precise list of everything loaded in the system based on reputation.</li>
<li><em>Active monitoring</em>: whenever your system “fingerprint” changes, Photon immediately checks the reputation list and alerts the antivirus engine to take prompt and appropriate action.</li>
<li><em>Continued training</em>: when new “intel” is added to the Cloud intelligence, the reputation list will be instantly updated as it pertains to the relevancy of your system’s unique “fingerprint”.</li>
<li><em>Adaptive scanning</em>: Photon directs the antivirus engine to pay more attention to suspicious applications rather than trusted ones.</li>
</ol>
</div>
<h1>The result</h1>
<p>Photon technology enables <a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=protection_vs_speed" target="_blank">CompuClever Antivirus</a> to reduce its footprint by minimizing the requirement of computing resource like CPU power, hard drive access, and memory usage. The result is obvious:</p>
<div class="indent_left">
<ul>
<li>The antivirus is quiet and non-intrusive.</li>
<li>It brings low or no impact on system performance.</li>
<li>Your PC enjoys faster boot time.</li>
<li>Your applications runs smoothly.</li>
</ul>
</div>
<p style="text-align: center;"><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&#038;utm_medium=email&#038;utm_campaign=protection_vs_speed" target="_blank"><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-2059" title="Best Protection Against Viruses" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-best-protection.png" alt="" width="371" height="238" srcset="https://www.compuclever.com/posts/wp-content/uploads/ccav-best-protection.png 371w, https://www.compuclever.com/posts/wp-content/uploads/ccav-best-protection-300x192.png 300w" sizes="(max-width: 371px) 100vw, 371px" /></a><a href="https://www.compuclever.com/products/antivirus/newsletter-early-launch/" target="_blank"><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-2060" title="Lowest Impact on Performance" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-lowest-impact.png" alt="" width="371" height="238" srcset="https://www.compuclever.com/posts/wp-content/uploads/ccav-lowest-impact.png 371w, https://www.compuclever.com/posts/wp-content/uploads/ccav-lowest-impact-300x192.png 300w" sizes="(max-width: 371px) 100vw, 371px" /></a></p>
<p>Better yet, there is nothing you need to do or configure in order to enjoy the benefit of Photon – it’s built-in and pre-configured and self-adapting. Just relax and enjoy, knowing that you are both well protected and your PC is still as fast as it was before installing the program.</p>
<h1>Recommendation</h1>
<p>If your PC is sluggish, we recommend the following actions:</p>
<div class="indent_left">
<ul>
<li>Follow <a href="https://www.compuclever.com/products/antivirus/optimize/" target="_blank">this step-by-step optimization guide</a> to tune and optimize your PC</li>
<li>Consider replacing your existing antivirus solution with <a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=protection_vs_speed" target="_blank">CompuClever Antivirus PLUS</a></li>
</ul>
</div>
<p>Remember, an effective security protection doesn’t have to come at the price of degraded PC performance.</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=protection_vs_speed"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%;" title="CompuClever Antivirus PLUS" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-windows-10-compatible.jpg"/></a></p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/protection-vs-speed/">Protection vs. Speed</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Stay Safely Connected</title>
		<link>https://www.compuclever.com/posts/stay-safely-connected/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=stay-safely-connected</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Thu, 03 Sep 2015 18:27:18 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[Protect online privacy]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=2087</guid>

					<description><![CDATA[<p>Email and social networking are two primary means of communicating and stay connected with family and friends. Through social network sites and emails, you share updates, post photos, and reveal things that are sometimes very personal about you.  Examples include where you live, which company you work for, whom you are related to, when and where you are going on holiday, what food you like, what music you listen to, whom you have just met, etc. By piecing these bits of information together, it becomes easy for anyone to learn more about you. And that’s also how cyber criminals find out information they want from you. Personal identity theft and online scams are two primary threats that target email and social networking users.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/stay-safely-connected/">Stay Safely Connected</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">Email and social networking are two primary means of communicating and stay connected with family and friends. Through social network sites and emails, you share updates, post photos, and reveal things that are sometimes very personal about you.  Examples include where you live, which company you work for, whom you are related to, when and where you are going on holiday, what food you like, what music you listen to, whom you have just met, etc. By piecing these bits of information together, it becomes easy for anyone to learn more about you. And that’s also how cyber criminals find out information they want from you. <strong>Personal identity theft and online scams are two primary threats that target email and social networking users</strong>.</div>
<h1>Identity theft</h1>
<p>A recent study conducted by Bitdefender, a leading European security technology provider, discovered that more than a quarter of a million email addresses, usernames, and passwords can be found easily through social networking platforms like Facebook, Twitter, personal blog postings, chat forums, and download sites. Surprisingly, 87% of these compromised credentials still provided valid access to personal email and social networking accounts. What’s more astonishing was that 75% of the people in this study use the same password for all their accounts. Hackers really didn’t have to look too hard to gain access to your identity and private information.</p>
<h1>Online scams</h1>
<p>Users of the social networking site Facebook are informed through a notification system and by e-mail that they have been made administrators of an unknown page and are directed to click on a link that takes them to a fake Facebook page. Once a user has landed on the fake Facebook page, they are re-directed to a different, malicious site where they are asked to provide their e-mail and shipping address in order to take part in a test session of the new Apple iPad. The scam states that Apple is giving away a total of 10,000 iPad2s for review. Making it even more believable, some of the notifications came from emails and posts sent by family members or friends whose PCs were also compromised. You trust your friends, but can you trust their computers as well?</p>
<h1>Stay connected safely</h1>
<p>Security experts recommend the following guidelines so that you can avoid security risks while staying connected online:</p>
<div class="indent_left">
<ul>
<li>Avoid publishing any information that can be used to identify you, such as phone numbers; your home, school, or work address; your birthday; and your social security number.</li>
<li>Use different sets of username and passwords for email and social networking sites.</li>
<li>Avoid posting holiday dates, locations, or even pictures while you are away. Otherwise, you leave perfect “bread crumbs” for burglars to follow.</li>
<li>Never include bank or credit card information in emails or posts.</li>
<li>Install and deploy an effective and updated antivirus / anti-spyware solution that features a strong anti-phishing mechanism.</li>
</ul>
</div>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=safely_connected"><img decoding="async" class="emailImage aligncenter" style="height: auto; max-width: 275px; width: 100%;" title="windows-10-compatible" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-box-left-640x480-1.png" alt="" /></a></p>
<h1>Introducing &#8211; Data Protection</h1>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=safely_connected">CompuClever Antivirus PLUS</a> features an ironclad information safety mechanism called <strong>Data Protection</strong>. Data Protection prevents sensitive data leaks when you are online. Based on the rules you create, Data Protection scans the web, e-mail, and instant messaging traffic sent by your computer.  It looks for specific character strings, for example, your credit card number. If there is a match, the respective web page, e-mail, or instant message is blocked.</p>
<p>You can create rules to protect any piece of information you might consider personal or confidential, from your phone number or e-mail address to your bank account information. Multi-user support is provided so that more than one person can log on to Windows using different user accounts and can configure their own rules. If your Windows account is an administrator account, the rules you create can be configured to also apply when other users of the computer are logged on to their Windows accounts.</p>
<p style="text-align: center;">Define what data you want to protect</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=safely_connected"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%; max-width: 737px;" title="CompuClever Antivirus PLUS" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-data-protection-rule.png" /></a></p>
<p style="text-align: center;">Define how you want the data be protected</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=safely_connected"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%; max-width: 737px;" title="CompuClever Antivirus PLUS" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-data-protection-apply.png" /></a></p>
<h1>Extra peace of mind</h1>
<p>Rest assured, personal information provided to the Data Protection tool is encrypted and cannot be used by anyone else but you. Also for extra safety, you can just enter part of the information that you like to protect. For instance, if you want to prevent leakage of your credit card number, you can just enter the last four digits of the card number so that any web traffic leaving your computer with the same combination of digits will be blocked. It’s a smart way of safeguarding data without any compromise.</p>
<div class="bottom_p">
<h1>Recommendation</h1>
<ul>
<li><a href="https://www.compuclever.com/support/antivirus/help-file/html/identity.html" target="_blank">Learn more about Data Protection</a></li>
<li>Try Data Protection by <a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=safely_connected" target="_blank">CompuClever Antivirus PLUS</a></li>
</ul>
</div>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=safely_connected"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%;" title="CompuClever Antivirus PLUS" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-windows-10-compatible.jpg" /></a></p>
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/stay-safely-connected/">Stay Safely Connected</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Surf with Confidence</title>
		<link>https://www.compuclever.com/posts/surf-with-confidence/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=surf-with-confidence</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Wed, 02 Sep 2015 17:55:07 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[Protect online privacy]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=2074</guid>

					<description><![CDATA[<p>nlike shark attacks, cyber-attacks are numerous, sophisticated, and ever-changing. Many cyber criminals who have managed to evade law enforcement are not only resourceful but also considered experts. To a certain extent they are even innovative. Compelled by the sinister desire of luring more victims while remaining undetected, hackers diligently invent new techniques and schemes to exploit systems of users who are even security-conscious.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/surf-with-confidence/">Surf with Confidence</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">Unlike shark attacks, cyber-attacks are numerous, sophisticated, and ever-changing. Many cyber criminals who have managed to evade law enforcement are not only resourceful but also considered experts. To a certain extent they are even innovative. Compelled by the sinister desire of luring more victims while remaining undetected, hackers diligently invent new techniques and schemes to exploit systems of users who are even security-conscious.</div>
</div>
<h1>Jaw-dropping</h1>
<p>The cases presented below are a couple of example of classical cyber-attacks that are conniving, stealthy, and almost ingenious.</p>
<div class="indent_left">
<ul>
<li>Case 1: While surfing the web at home, the user of a hacked PC was prompted to create new accounts in order to use her own Wireless Access Points (WAP). Not knowing what was happening behind the scenes, the victim would use a common username or email address along with a password that was used for several other online accounts.  The result: the hackers gained complete and unblocked access to her email, Facebook, Twitter, Pinterest, or even online banking site.</li>
<li>Case 2: On the premises of a Starbucks coffee shop, hackers positioned a Wi-Fi hotspot and disguise it so that it appears to belong to Starbucks. Attackers then redirect victims to frequently used websites that were actually modified or fake to capture login credentials or deploy keylogging malware to harvest personal identity information. This type of cyber-attack even has a code name: <em>waterholes</em>.</li>
</ul>
</div>
<p>Would you believe that the waterholes scheme was so effective it even captured victims from cafeterias inside high-tech companies such as Apple, Facebook, and Microsoft? More than likely, those techies have some sort of antivirus solution on their laptops. But the reality is harsher – a bare bones antivirus software without proper web protection is not going to cut it.</p>
<h1>Proper web protection</h1>
<p>So what types of web protection can help fend off and defy cyber-attacks? You need exactly two types of protection:</p>
<div class="indent_left">
<ol>
<li><strong>Anti-phishing protection</strong> that alerts you of potential phishing websites. This prevents you from falling prey to the “honey traps” set up by hackers.</li>
<li><strong>Real-time web protection</strong> against malicious code or downloads embedded in the web. This prevents your computer from being infected or even controlled.</li>
</ol>
</div>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=surf_confidence"><img decoding="async" class="emailImage aligncenter" style="height: auto; max-width: 275px; width: 100%;" title="windows-10-compatible" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-box-left-640x480-1.png" alt="" /></a></p>
<h1>Web protection in CompuClever Antivirus PLUS</h1>
<p>CompuClever Antivirus PLUS Web protection ensures a safe browsing experience by alerting you about potential phishing web pages. It provides real-time web protection for popular web browsers including:</p>
<div class="indent_left">
<ul>
<li>Internet Explorer</li>
<li>Firefox</li>
<li>Google Chrome</li>
</ul>
</div>
<p>The web protection feature provides two functions:</p>
<div class="indent_left">
<ul>
<li><strong>Web Toolbar</strong>, which automatically blocks you from accidentally visiting a phishing or compromised website.
<p style="text-align: center;">Web toolbar blocking a suspicious site</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=surf_confidence"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%; max-width: 703px;" title="CompuClever Antivirus PLUS" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-web-toolbar.png" /></a></li>
<li><strong>Search Adviser</strong>, a component that rates the results of search engine queries and links posted on social networking websites by placing an icon next to every result.  Working like a traffic light, the Search Advisor tells you if a site, as recommended by a search engine, is safe, suspicious, or dangerous.
<p style="text-align: center;">Search Advisor</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=surf_confidence"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%; max-width: 773px;" title="CompuClever Antivirus PLUS" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-search-advisor.png" /></a></li>
</ul>
</div>
<p>The web protection feature is seamlessly embedded with your default web browser. It is always at your side protecting your web surfing experience without being in the way.</p>
<p>Check out the detailed information about CompuClever Antivirus PLUS Web Protection:</p>
<div class="indent_left">
<ul>
<li><a href="https://www.compuclever.com/support/antivirus/help-file/html/web_protection.toolbar.html" target="_blank">Web Protection in web browsers</a></li>
<li><a href="https://www.compuclever.com/support/antivirus/help-file/html/web_protection.html" target="_blank">Search Advisor</a></li>
</ul>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=surf_confidence" target="_blank">Click here to learn more about CompuClever Antivirus PLUS</a>.</p>
</div>
<p>If your antivirus solution doesn’t provide web protection specifically, you should still follow these best-practices to protect yourself against cyber attacks:</p>
<div class="indent_left">
<ul>
<li>Do not provide your personal information via e-mail.</li>
<li>Do not click any links you receive from senders you do not know.</li>
<li>Do not download attachments from unknown senders.</li>
<li>Download files only from trusted websites.</li>
<li>Check if the final price is the same with the price displayed at the start of a transaction.</li>
<li>Keep your antivirus solution updated. If you are not using an antivirus solution, we recommend you install one as soon as possible.</li>
<li>Do not log in to your financial account from unknown networks.</li>
</ul>
</div>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=surf_confidence"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%;" title="CompuClever Antivirus PLUS" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-windows-10-compatible.jpg" /></a></p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/surf-with-confidence/">Surf with Confidence</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Safeguard Your Online Banking</title>
		<link>https://www.compuclever.com/posts/safe-guard-your-online-banking/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=safe-guard-your-online-banking</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Mon, 31 Aug 2015 23:58:45 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[Windows tips]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=2063</guid>

					<description><![CDATA[<p>Over the last few years Internet fraud has increased and is becoming a serious issue for online transactions. Using a variety of methods, online thieves can easily access important information like bank accounts and personal data. This article helps you to understand essential techniques hackers deploy to break into your bank account and how to nullify these hacking attempts by using tools that may already be available with your antivirus application.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/safe-guard-your-online-banking/">Safeguard Your Online Banking</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">Over the last few years Internet fraud has increased and is becoming a serious issue for online transactions. Using a variety of methods, online thieves can easily access important information like bank accounts and personal data. This article helps you to understand essential techniques hackers deploy to break into your bank account and how to nullify these hacking attempts by using tools that may already be available with your antivirus application.</div>
</div>
<h1>How hackers infiltrate your bank account</h1>
<p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-2065" title="How hackers infiltrate your bank account" src="https://www.compuclever.com/posts/wp-content/uploads/hackers-and-you.png" alt="" width="332" height="148" srcset="https://www.compuclever.com/posts/wp-content/uploads/hackers-and-you.png 332w, https://www.compuclever.com/posts/wp-content/uploads/hackers-and-you-300x133.png 300w" sizes="(max-width: 332px) 100vw, 332px" />To infiltrate your bank account hackers need exactly the same set of complete credentials you would supply to your online banking site. It is extremely rare, although not impossible, that a hacker would directly contact someone who would then voluntarily give away her bank account number, login name, and password over the phone or email. But it is very common that a compromised PC infested with malware can provide hackers with the necessary recorded keystrokes, mouse clicks, and even screenshots. By mimicking the procedures they’ve learned with the obtained credentials, hackers can digitally impersonate you and thus gain access to your bank accounts over the Internet with ease.</p>
<h1>How to nullify online banking hacking attempts</h1>
<p>You can defuse these attempts head-on by knowing the essential schemes used by hackers. First and foremost, guard your PC with an effective antivirus program and prevent any malware from landing on your computer. But that’s not enough, remember we talked about <a href="https://www.compuclever.com/posts/are-you-well-protected/" target="_blank">known and unknown malware</a>? What if a new and unknown malware has made its way through the first layer of defense of detection? That’s when the second layer of defense comes to the rescue. To effectively nullify online banking hacks, you also need to:</p>
<div class="indent_left">
<ul>
<li>Secure your web browser and data transaction: The web browser is the weakest link of the entire online banking infrastructure and can be hijacked by third-party add-ons / toolbars / extensions and is also susceptible to phishing attempts.</li>
<li>Disable logging of your keyboard and mouse movements: Make your keyboard and mouse movement virtually invisible and un-recordable.</li>
<li>Disable screenshots: prevent your PC’s screen from being digitally captured or copied.</li>
</ul>
</div>
<p>They all sound theoretically and logically fine but there is no trivial way to configure your PC to take these measures without having software specifically designed to achieve such purposes.</p>
<h1>Features that you should demand from security software</h1>
<p>As stated above, your security software should provide you with extra measures to protect you from online banking hacks. Let’s illustrate how these features work using CompuClever Antivirus PLUS as an example.</p>
<p><a href="https://www.compuclever.com/products/antivirus/" target="_blank"><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-2003" title="CompuClever Antivirus PLUS" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-box-big-275x377.png" alt="Click to learn more..." width="275" height="377" /></a><br />
<strong>CompuClever Safepay<sup>TM</sup></strong></p>
<p><a href="https://www.compuclever.com/products/antivirus/newsletter-early-launch/" target="_blank">CompuClever Safepay</a> is a proprietary and dedicated browser designed specifically for online banking. It creates a sealed environment, shielded from third party intrusions. Compared to products that use browser extensions, CompuClever Safepay offers superior protection because it doesn&#8217;t rely on browsers with known vulnerabilities to a large array of attacks.</p>
<p style="text-align: center;"><a href="https://www.compuclever.com/posts/wp-content/uploads/ccav-safepay.png" target="_blank"><img decoding="async" loading="lazy" class="aligncenter size-medium wp-image-2066" title="CompuClever Antivirus PLUS - SafePay(TM)" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-safepay-300x232.png" alt="" width="300" height="232" srcset="https://www.compuclever.com/posts/wp-content/uploads/ccav-safepay-300x232.png 300w, https://www.compuclever.com/posts/wp-content/uploads/ccav-safepay.png 856w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p>The dedicated Safepay environment gives you the following benefits:</p>
<div class="indent_left">
<ul>
<li>It uses its own browser to avoid malware attacks.</li>
<li>It blocks add-ons and extensions which are the weakest link with browser security.</li>
<li>It scans all URLs for signs of malware and phishing compromise.</li>
</ul>
</div>
<p>More importantly, CompuClever Safepay also:</p>
<div class="indent_left">
<ul>
<li>Completely disables any key logging or mouse tracking attempts, and</li>
<li>Prevents any screen information from being captured or recorded – even   the [Print Screen] key is disabled during your session.</li>
</ul>
<p>You can <a href="https://www.compuclever.com/support/antivirus/help-file/html/safepay.html" target="_blank">visit the online help file</a> to learn more about how to maximize the benefit using CompuClever Safepay for online banking protection.</p>
<div class="bottom_p">
<p>We recommend you check and discover if your existing security product provides equivalent functionality. If it doesn’t or you are in doubt, we recommend you try <a href="https://www.compuclever.com/products/antivirus/newsletter-early-launch/" target="_blank">CompuClever Antivirus PLUS</a> for secure online banking.</p>
<p><a href="https://www.compuclever.com/products/antivirus/"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; max-width: 650px; width: 100%;" title="windows-10-compatible" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-windows-10-compatible.jpg" alt="" /></a></p>
</div>
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/safe-guard-your-online-banking/">Safeguard Your Online Banking</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
