<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>online security Archives - CompuClever</title>
	<atom:link href="https://www.compuclever.com/posts/category/blog/online-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.compuclever.com/posts/category/blog/online-security/</link>
	<description></description>
	<lastBuildDate>Fri, 07 Aug 2020 18:38:31 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.1.1</generator>

<image>
	<url>https://www.compuclever.com/posts/wp-content/uploads/cropped-compuclever_128-1-32x32.png</url>
	<title>online security Archives - CompuClever</title>
	<link>https://www.compuclever.com/posts/category/blog/online-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to Protect Your Privacy &#038; Identity on Facebook &#8211; Part 2</title>
		<link>https://www.compuclever.com/posts/protect-your-privacy-identity-on-facebook/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=protect-your-privacy-identity-on-facebook</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Wed, 18 Apr 2018 17:21:35 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[Online Share]]></category>
		<category><![CDATA[Windows tips]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[online identity]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[security breach]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3939</guid>

					<description><![CDATA[<p>We began our two-part series by providing company background, highlighting recent news, and then describing the Facebook data collection machine, and the worldwide response.<br />
In Part 2, we’re going to look at what the response is from Facebook and Mark Zuckerberg.<br />
More than this – we will emphasize what you can do.  We’ll provided three best-practice recommendation for protecting your identity and privacy.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/protect-your-privacy-identity-on-facebook/">How to Protect Your Privacy &#038; Identity on Facebook &#8211; Part 2</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In our <a href="https://www.compuclever.com/posts/facing-truth-facebook-privacy/" target="_blank" rel="noopener noreferrer">Part 1 article</a> we covered news related to the Facebook privacy scandal. In Part 2, we will emphasize what you can do.  We’ll provided three best-practice recommendation for protecting your identity and privacy.</p>
<h1>Our Private Data</h1>
<p>As Facebook users we accept the privacy policies when we sign on.  For the most part we don’t even read over the extensive policy pages.  Instead we set up our account and enter data related to our personal lives.  We understand in the process this information gets recorded and stored.</p>
<h2><strong>Take Action:</strong></h2>
<p>We recommend that you get a clear idea of how much and what kind of data Facebook collects on you.  Check out the <a href="https://www.compuclever.com/posts/facing-truth-facebook-privacy/#download_fb_data" target="_blank" rel="noopener noreferrer">“Data In” section of our previous article</a> for directions on accessing the data Facebook has collected from you.</p>
<p>Facebook is a free service and we can expect that they make revenue by providing our data to advertisers.  What many of us are not aware of is that they pass on our data to third party developers and organizations.</p>
<p>This is why we can sign on to a new app or online service using our Facebook login.  Right away they can access our data so that it is easier for us to create a new account with the third party app rather than having to enter all the personal information they require once again.</p>
<p>But what kinds of control are in place once our data leaves the hands of Facebook?  What kind of regulations are there to protect our privacy and information?  This is what Facebook’s Mark Zuckerberg has to address.</p>
<h1>Facebook Updates</h1>
<p>In the past Facebook has revised its privacy policies.  However, these previous revisions have been toward openness and sharing rather than protection of privacy.  Unfortunately, “…they were optimizing for profitability rather than security and privacy of their members” says David Kirkpatrick author of the Facebook Effect.<a href="#_ftn1" name="_ftnref1">[1]</a></p>
<p>Zuckerberg’s promise at the beginning of this year was to fix Facebook in 2018 – this is no small task.  In fact, he has stated that fixing the company’s problems will take years.</p>
<p>Presently, users are informing users in their News Feed if they&#8217;re among the millions of people whose data was improperly harvested by Cambridge Analytica.</p>
<p>Other changes we can expect in the near future: <a href="#_ftn2" name="_ftnref2">[2]</a></p>
<ul>
<li>Users will receive notice of all apps they use and what data is shared with those apps.  They then have a chance to delete apps they no longer want.</li>
<li>Facebook will restrict access to certain data that applications can acquire.</li>
<li>The option to search for users by entering a phone number or an email address will be removed.</li>
<li>Facebook will set out to delete all logs after a year and only time of calls will be collected.</li>
<li>New policy will also make users aware that WhatsApp and Instagram are part of Facebook and that the companies share information about users.  WhatsApp will still have a separate policy while Facebook and Instagram continue to share one.</li>
</ul>
<h1>Free</h1>
<p>Whenever something is offered for free we need to ask: how is this business generating revenue?  Some companies offer a trial license for their software as a means to test drive the service.  Others rely on donation.</p>
<p>In the case of Facebook, it is free to users but there are associated costs.  Not only does Facebook sell data to advertisers who then place ads that are targeted to meet our purchasing preferences, they also harvests our data for app developers as well.</p>
<div class=".quick_facts">
<p style="padding-left: 30px;"><strong>Surveillance Capitalism:</strong></p>
<p style="padding-left: 30px;">One term being used in many news sources related to this Facebook scandal is “surveillance capitalism”.  Shoshana Zuboff, Harvard Business School professor states that it drives much of the internet.</p>
<p style="padding-left: 30px;">It&#8217;s behind most of the &#8220;free&#8221; services, and many of the paid ones as well.  It utilizes psychological manipulation in the form of personalized advertising to persuade you to buy something or do something, like vote for a candidate.</p>
<p style="padding-left: 30px;">“…while Facebook is one of the biggest players in this space, there are thousands of other companies that spy on and manipulate us for profit.” <a href="#_ftn3" name="_ftnref3">[3]</a></p>
</div>
<p>We need lawmakers to force these companies into the public spotlight and to enforce lawful conduct.</p>
<h1>Regulation</h1>
<p>Although Facebook is in the process of change and updates we need to ask: how is it possible to keep private data secure after it’s sold to third parties?  Facebook has admitted that it is impossible to monitor what these third parties do with the data once it is out of their hands.  However, Mark Zuckerberg has <a href="https://www.wired.com/story/mark-zuckerberg-talks-to-wired-about-facebooks-privacy-problem/">said</a> <a href="https://www.theverge.com/2018/3/21/17150270/mark-zuckerberg-facebook-regulated">that</a> his industry should be regulated.</p>
<p>At present he is facing Congress and has delivered an apology and is answering questions.  But what will be the outcome of this?  What about past regulation?  Zuckerberg has stated they regularly testify before Congress on a number of topics.</p>
<p>In 2011, Facebook offered privacy assurances in a settlement with the FTC (Federal Trade Commission).  Allowing Cambridge Analytica to harvest data could be a violation of that settlement.  The ability to transfer the data of users’ friends should have been banned with the 2011 consent.  But what is the FTC going to do to enforce existing regulations?</p>
<p style="padding-left: 30px;"><strong>Turning Up The Heat:</strong></p>
<p style="padding-left: 30px;">In 2016, the European Union passed the comprehensive General Data Protection Regulation, or GDPR.  One mandate restricts collection of personal data of EU citizens to be only saved for &#8220;specific, explicit, and legitimate purposes” and only with user consent.</p>
<p style="padding-left: 30px;">This means, consent cannot be buried in the terms and conditions.</p>
<p style="padding-left: 30px;">This law will take effect in May and companies worldwide are paying attention.  It is expected that this will expose the industry like nothing else.  In preparation for this law, PayPal published a list of companies it might share your personal data with – over 600 companies.</p>
<h1> Best Practices – Privacy at Stake</h1>
<p>There is no doubt that privacy of information is at stake.</p>
<p>It’s essential that we throttle back on what information we make available online and what data is stored on our PC.  Here are our recommendations.</p>
<ol>
<li style="list-style-type: none;">
<ol>
<li>We recommend the privacy functionality associated with <a href="https://www.compuclever.com/products/compuclever-pc-tuneup/">PC Cleaner</a>. By using the available functionality you can see all the personal and private data you have on your PC which could be accessed by illegitimate means.</li>
</ol>
</li>
</ol>
<ol>
<li style="list-style-type: none;">
<ol>
<li>When on a public Wi-Fi network, we highly recommend not sharing out any sensitive data. Even downloading records online from a public location or terminal can leave your data vulnerable to hacks.</li>
</ol>
</li>
</ol>
<ol>
<li>If you decide to delete your Facebook account, consider the following:
<ul>
<li>You will need to sever all ties with Facebook including Messenger, WhatsApp, and Instagram. Your data can be shared with these apps and policies are similar or, as with Facebook and Instagram, shared.</li>
<li>Any apps that you “log in using Facebook“ will no longer work and you will have to enter your log in credentials for these.</li>
<li>Delete all Facebook instances from all devices including your mobile ones. Make sure you delete and not deactivate.  <a href="https://www.facebook.com/help/contact.php?show_form=delete_account" target="_blank" rel="noopener noreferrer">Use this link from Facebook</a>.</li>
<li>Do not even attempt to log in to Facebook for at least two weeks or you will cancel the account deletion process.</li>
</ul>
</li>
</ol>
<h1>Last Comment</h1>
<p>We started out this two part series asking a question of what to do as a Facebook user.  Undoubtedly, the data breach has been the final straw for some and these users are choosing to delete.</p>
<p>Do we throw the baby out with the bath water?</p>
<p>We need to acknowledge that there are positive online developments, <em>and</em> we need to take an active role in shaping it.</p>
<p>With respect to the baby / bath water analogy – we certainly can agree the bath water is dirty!</p>
<p>As for the baby – in the case of social media technology – we need to closely examine if it’s being overfed.</p>
<p style="padding-left: 30px;">“…the thing we need to understand now,” Shoshana Zuboff states, “is that the online world, which used to be <em>our </em>world, is now where capitalism is developing in new ways.”</p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> <a href="http://money.cnn.com/2018/04/09/technology/facebook-data-tool-cambridge-analytica/index.html">http://money.cnn.com/2018/04/09/technology/</a></p>
<p><a href="#_ftnref2" name="_ftn2">[2]</a> <a href="https://www.ctvnews.ca/sci-tech/up-to-87-million-people-affected-in-facebook-privacy-scandal-1.3870656">https://www.ctvnews.ca/sci-tech/</a></p>
<p><a href="#_ftnref3" name="_ftn3">[3]</a> <a href="https://www.schneier.com/blog/archives/2018/03/facebook_and_ca.html">https://www.schneier.com/</a></p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/protect-your-privacy-identity-on-facebook/">How to Protect Your Privacy &#038; Identity on Facebook &#8211; Part 2</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Going Incognito &#8211; Browse Web in Privacy Mode</title>
		<link>https://www.compuclever.com/posts/going-incognito-browse-web-privacy-mode/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=going-incognito-browse-web-privacy-mode</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Fri, 04 Aug 2017 16:44:38 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[Protect online privacy]]></category>
		<category><![CDATA[Windows tips]]></category>
		<category><![CDATA[Firefox]]></category>
		<category><![CDATA[Icognito mode]]></category>
		<category><![CDATA[microsoft edge]]></category>
		<category><![CDATA[privacy mode]]></category>
		<category><![CDATA[vpn]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3746</guid>

					<description><![CDATA[<p>Who uses Incognito or Private browsing and why?  Do they have something to hide or are they being safe in terms of sensitive data such as login credentials?<br />
One thing is certain - surfing the web using Incognito or Private browsing DOES NOT keep you completely anonymous and stealthy.  Knowing the levels of privacy that this mode of browsing offers is necessary if you are concerned about how private and secure your online activities are</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/going-incognito-browse-web-privacy-mode/">Going Incognito &#8211; Browse Web in Privacy Mode</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p><b>Incognito</b>, <a href="https://en.wikipedia.org/wiki/Incognito" target="_blank" rel="noopener noreferrer">according to Wikipedia</a>, from the Latin <i>incognitus</i>, refers to a person who wants to remain anonymous to the world and others, in hiding or shut off from humanity.</p>
<p>Web surfers have the option to enable privacy mode or “Incognito” mode on their browser.  Each of the main browser type offers some level of private browsing.  It is known as Private Browsing, InPrivate Browsing, and Incognito depending on the type of browser used.</p>
<p>Basically &#8211; this is a privacy feature that quite simply provides some privacy on your local computing device but, DOES NOT provide hidden detection or stealth beyond that.  Your ISP (Internet Service Provider) and other agencies connected on the Internet can detect your activities via your unique IP address on the web servers.</p>
<p>Disabling functions such as the web cache and browsing history make this a relatively private way of browsing the web.  Cookies, the data holders sent by web sites to recognize or track your online activity, are also disabled.</p>
<h2>Items Deleted or Not Saved:</h2>
<p>The list  of items that are deleted or not saved when you browse during Incognito or Privacy  mode are:</p>
<ul>
<li>Website history.</li>
<li>The cache of files stored during your browse session.</li>
<li>History of files downloaded.</li>
<li>Search history stored by the browser.</li>
<li>Cookies from browsed sites.</li>
<li>Data on forms you have filled out.</li>
</ul>
<h2>Items That Are NOT Private:</h2>
<p>There are items that are not deleted and the ways you remain exposed to detection:</p>
<ul>
<li>Search histories stored from search providers like Google are not deleted.</li>
<li>Websites can identify you and keep a record of your visit.</li>
<li>Your ISP can detect your network traffic and identify your IP address.</li>
<li>Any malware on your PC or device can track your activities.</li>
</ul>
<p>Also, it is important that you keep in mind the browser does not likely perform a secure delete and items from your browsing session can be recovered.  Until that data is overwritten with other data it can be undeleted using special recovery software.</p>
<h1>Pros and Cons?</h1>
<p>So why would you want to use Incognito?  It doesn’t seem entirely private after all.</p>
<h2>Pros</h2>
<p>The reasons for using this more of browsing include:</p>
<ol>
<li>Reducing the history, browsing, and personal data stored on your PC or device.</li>
<li>You can prevent storage of sensitive data such as log-in credentials.</li>
<li>You can also use multiple accounts simultaneously using several tabs at once.<br />
<i>Tip</i>: You can let a friend check their email or log onto Facebook without you having to log out.  Just start up a new Incognito window.</li>
<li>You can perform searches that are not influenced by any prior browsing history.</li>
<li>Browser extensions are disabled so that Facebook and Google and other services can’t track you.</li>
</ol>
<p>One of the main reasons however is to hide your online interactions on the computing device you are using from those sharing the same device.</p>
<p>In a busy household full of people… using Incognito mode can prevent others from seeing potentially embarrassing items.  It also prevents others from revealing your search history or the cache of browsed files.</p>
<h2>Cons</h2>
<p>We’ll, conversely, you may want to monitor online activities on your PC or device.  You may be concerned that someone will incur a malware infection or that they are browsing to websites that could be considered risky, unethical, or harmful. This is when you would want to disable Privacy / Incognito functionality as described below.</p>
<p>Also, having a false sense of protection can lead to consequences.  ISPs pass data to copyright holders (such as music, videos, books, or games), who are cracking down on the downloading of copyright materials.  The ISP is required to forward notices from the copyright holder alleging infringement of that work.</p>
<p>And, as we have pointed out, you are not completely stealthy.</p>
<h1>How to Go Incognito</h1>
<p>So now that you have a better idea of what the limits and benefits of this mode of browsing are, you can follow the easy steps outlined below to activate it.  Of course it will depend on which browser you are using.</p>
<ul>
<li><strong>Chrome</strong>: Click on the ellipsis menu (<strong>…</strong>) at the right end of the menu bar, and select: “New Incognito Window”.</li>
<li><strong>Firefox</strong>: Click on the icon with three horizontal lines near the top right corner of the browser, and select: “New Private Window”.</li>
<li><strong>Internet Explorer</strong>: To change to an “InPrivate” session in Internet Explorer you would hold down Ctrl+Shift and press P (Ctrl+Shift+P).</li>
<li><strong>Microsoft Edge</strong>: Click the button with three dots (<strong>…</strong>), called the “More” button, and select: “New InPrivate Windows”.</li>
</ul>
<h2>Disabling It</h2>
<p>As we mentioned above, you may want to disable this function so that you can detect for yourself the online activities of others in your household. Click the links below to take you to the specific directions for your browser type.</p>
<ul>
<li><a href="https://community.spiceworks.com/how_to/75544-how-to-disable-incognito-mode-in-google-chrome" target="_blank" rel="noopener noreferrer">Chrome</a></li>
<li><a href="http://www.thewindowsclub.com/disable-private-browsing-internet-explorer-chrome-firefox" target="_blank" rel="noopener noreferrer">IE / Firefox / and a freeware tool for Chrome</a></li>
<li><a href="http://mywindowshub.com/enable-disable-microsoft-edge-inprivate-browsing-windows-10/" target="_blank" rel="noopener noreferrer">Microsoft Edge</a></li>
</ul>
<p><em>Warning</em>: most of these procedures require a change to the registry.  We recommend you do a backup beforehand and proceed with caution.</p>
<h2>For Parents:</h2>
<p>If you’re a parent worried about your kids and their private online activities (for example, pornography or social networking sites), then you can first try to disable the functionality as mentioned above.  That way you can check the search and browsing history items.</p>
<p>You can also take the next step and look at filtering software such as <a href="https://www.netnanny.com/" target="_blank" rel="noopener noreferrer">NetNanny</a> that will block porn and whatever else you want to filter even when the browser is in Incognito mode.  They have it for computers and mobile devices.  It&#8217;s not free but could be worth the peace of mind.</p>
<h1>Last Note</h1>
<p>We’re in favor of providing information that in the right hands is used with good intent.  To reach a higher level of stealth you would need to look at using a VPN solution.  A VPN masks your physical location and IP address so the website you’re visiting doesn’t really know who or where you are.</p>
<p>We hope this information has been of help to you and enhances your web browsing experiences.  For more information on this topic see our past posts:</p>
<ul>
<li><a href="https://www.compuclever.com/posts/privacy-dont-give-it-away/" target="_blank" rel="noopener noreferrer">Privacy – Don’t Give It Away</a></li>
<li><a href="https://www.compuclever.com/posts/vpn-need-one/" target="_blank" rel="noopener noreferrer">What Is a VPN, and Why Do You Need One?</a></li>
</ul>
<p>Feel free to contact us with any questions or comments on this and other subjects.  Simply send us an email at: newsletter@compuclever.com</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/going-incognito-browse-web-privacy-mode/">Going Incognito &#8211; Browse Web in Privacy Mode</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Don&#8217;t be Held at Ransomeware</title>
		<link>https://www.compuclever.com/posts/held-at-ransomeware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=held-at-ransomeware</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Fri, 14 Jul 2017 17:23:49 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[Windows 10]]></category>
		<category><![CDATA[Windows 7]]></category>
		<category><![CDATA[Windows 8]]></category>
		<category><![CDATA[antivirus]]></category>
		<category><![CDATA[PC Security]]></category>
		<category><![CDATA[Petya]]></category>
		<category><![CDATA[Ransomeware]]></category>
		<category><![CDATA[Wannacry]]></category>
		<category><![CDATA[Windows Update]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3718</guid>

					<description><![CDATA[<p>Ever get the feeling that computers have come a long way, yet… why are we still susceptible to PC virus attacks?  Recently there were two major worldwide attacks known as “ransomware”.  We’re going to offer information about these attacks and how you can be prepared to fend off a ransomware infection.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/held-at-ransomeware/">Don&#8217;t be Held at Ransomeware</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p>With two prominent malware attacks occurring back-to-back during the past two months, you&#8217;re likely familiar with the term  &#8211; &#8220;Ransomware&#8221; &#8211; a cyber-crime gaining worldwide attention. In this article we explore ransomware in depth and offer recommendations and instructions to prevent it from happening and to protect your PC.</p>
<h1>Ransomware defined:</h1>
<p>You can think of ransomware as &#8220;data kidnapping&#8221;. It is the result of a malware attack that blocks access to a user&#8217;s PC data. Once infected, the attackers try to force you into paying money so you can regain access. In some cases there is a threat to publish or delete the data unless the ransom is paid. Data and access is blocked by using strong file encryption.</p>
<p>Computers can be infected whether at home or in the work environment. This includes PCs on an enterprise network or government agency servers.</p>
<p>Some ways of infecting your PC include:</p>
<ul>
<li>Surfing to unsafe or fake websites.</li>
<li>Opening emails and email attachments from unknown sources.</li>
<li>Opening malicious links in emails, Facebook, Twitter, and from online chat apps such as Skype.</li>
</ul>
<p>The two main types of ransomware are: Lockscreen and Encryption.</p>
<ol>
<li>Lockscreen ransomware prevents you from accessing your PC or files and instead displays a full-screen message saying you have to pay a ransom to regain access.</li>
<li>Encryption ransomware prevents you from opening your files by encrypting them. The encryption is very strong (uses an AES-256 &#8220;military grade&#8221; cipher algorithm), and would take an estimated 3&#215;10<sup>51</sup> years to crack. Also, a unique encryption key is generated for each infected computer so you can&#8217;t just get someone else&#8217;s key.</li>
</ol>
<p>Note: There are older versions of ransomware that display false messages such as claiming you have performed an illegal activity with your PC. They then state you are being fined by a police force or government agency. We want to stress that these claims are false and can be considered a scare tactic designed to extort money from you.</p>
<h1>What is the result of the attack?</h1>
<p>While there are various forms of ransomware, all of them prevent you from performing normal PC functions. This includes:</p>
<ul>
<li>Getting locked out! Preventing you from accessing your operating system.</li>
<li>Blocked access to files! Files are now encrypted and you can&#8217;t access them.</li>
<li>Disabled apps! Certain programs (like your web browser), are no longer able to run.</li>
</ul>
<h1>What about the ransom?</h1>
<p>Some ransomware attacks involve the victim having to pay money while some make you complete a survey. Payment of money is performed online and sometimes involves the victim having to pay in Internet currency Bitcoins. Due to the nature of those that commit these cybercrimes &#8211; there is no guarantee that your data or PC will return to the pre-attack state.</p>
<h1>How much do they extort?</h1>
<p>Symantec gained access to a malware server in 2012. This provided them first hand insight of the ransoms that were paid out. In a single day 5,700 computers were infected and 2.9% paid the ransom. This comes out to approximately $33,600 for one day.</p>
<p>&#8220;Given the number of different gangs operating ransomware scams, a conservative estimate is that over $5 million dollars a year is being extorted from victims. The real number is, however, likely much higher.&#8221;<a href="#_ftn1" name="_ftnref1">[1]</a></p>
<h1>Recent Ransomware attacks&#8230;</h1>
<h2>WannaCrypt; May 12, 2017:</h2>
<p>Many users around the world were victims of the malicious &#8220;WannaCrypt&#8221; software attack which has been considered one of the worst and most widespread cyber-attacks. More than 230,000 computers in over 150 countries were affected. All files on infected PCs were locked and the demanded ransom was 300 dollars in bitcoins.</p>
<p>Interestingly, people running Windows 10 were not targeted by the attack. Despite this, this attack was serious as evidenced in the steps Microsoft took. They took a highly unusual step in providing a security update for all customers to protect even the Windows platforms that are in custom support only. This includes Windows XP, Windows 8, and Windows Server 2003.</p>
<p>Supported versions of the operating system (Vista, Windows 7, 8.1, 10, etc.), have access to the security update MS17-010. If users have automatic updates enabled or have installed the update, they are protected. Microsoft states<a href="#_ftn2" name="_ftnref2">[2]</a>: &#8220;For those organizations who have not yet applied the security update, we suggest you immediately deploy <a href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx" target="_blank" rel="noopener noreferrer">Microsoft Security Bulletin MS17-010</a><u></u><em>&#8220;. </em>They go on to state that this attack may evolve over time and additional defense strategies are warranted.</p>
<h2>Petya; June 27, 2017:</h2>
<p>Companies across Europe and the US were affected by the &#8216;Petya&#8217; ransomware attacks. Infected computers displayed a message demanding a Bitcoin ransom of $300. Victims were unable to unlock their computers even if they paid the ransom.<a href="#_ftn3" name="_ftnref3">[3]</a> The instructions included sending confirmation of payment to an email address. However, that email address was shut down by the email provider and there was no way to contact the attacker for a decryption key to unlock their computer.</p>
<p>This ransomware attack exploited the same Microsoft exploit as WannaCry &#8211; the vulnerability known as EternalBlue. Even with the patch, this cyber-attack has two other ways to spread within an organization focusing on the network administrator&#8217;s tools. Experts believe the initial infection is suspected to have been delivered through email (as with WannaCry).</p>
<h1>If Infected With Ransomware:</h1>
<p>You are a victim of a ransomware infection once you see some form of ransom demand appearing in a dialog window, an app, or a full-screen message. Unfortunately, this demand is displayed after encrypting your files or disabling some part of your PC.</p>
<p>Before you try to recover your files, Microsoft suggests trying to fully clean your PC with <a href="https://support.microsoft.com/en-us/help/17466" target="_blank" rel="noopener noreferrer">Windows Defender Offline</a>. After this you can try to <a href="https://support.microsoft.com/en-us/instantanswers/62ed802d-7c8d-35d9-9b82-6cace4b08185/backup-and-restore-in-windows-10" target="_blank" rel="noopener noreferrer">Backup and Restore in Windows</a>.</p>
<p>We fully agree with Microsoft: &#8220;Do not pay any money to recover your files. Even if you were to pay the ransom, there is no guarantee that you will regain access to your PC or files.&#8221;</p>
<h1>If You Already Paid:</h1>
<p>If you paid the ransom, contact your bank and local authorities immediately. Your bank may be able to block the transaction and return your funds if you paid with a credit card. Inform your bank if you did submit credit card details to the cyber thieves.</p>
<p>We suggest you also contact the following government agencies that deal with fraud and scam reporting:</p>
<ul>
<li>In the United States, go to: <a href="http://www.onguardonline.gov/" target="_blank" rel="noopener noreferrer">On Guard Online</a>.</li>
<li>In Canada, go to: <a href="http://www.antifraudcentre-centreantifraude.ca/" target="_blank" rel="noopener noreferrer">Canadian Anti-Fraud Centre</a>.</li>
<li>For other countries: go to this <a href="https://support.microsoft.com/en-us/help/4013550/windows-protect-your-pc-from-ransomware" target="_blank" rel="noopener noreferrer">Microsoft site</a>.</li>
</ul>
<h1>Prevention:</h1>
<p>There are safe measures you can take to lessen the impact of attacks and failures and there are ways to prevent malicious attacks from crippling your PC and network.</p>
<ol>
<li>Keep a current back up of your data files (images, video, documents and music).</li>
<li>Keep your Windows install up-to-date with the latest Windows security updates.</li>
<li>Keep your antivirus program up-to-date. We highly recommend a reputable AV program with active subscription (one that keeps up to recent malicious attacks). We invite you to check out the performance and protection offered by <a href="https://www.compuclever.com/products/antivirus/" target="_blank" rel="noopener noreferrer">CompuClever Antivirus PLUS</a>.</li>
<li>Do not open email links or files from a sender you do not recognize. In many cases you can recognize a fake email and webpage because they have bad spelling or look unusual.</li>
<li>Be careful where you surf on the internet especially with less reputable sites. There is a greater chance of contracting a malware virus. Quite often unsafe sites can look convincing and have only subtle differences.</li>
</ol>
<p>Microsoft states<a href="#_ftn4" name="_ftnref4">[4]</a>: &#8220;Look out for strange spellings of company names (like &#8220;PayePal&#8221; instead of &#8220;PayPal&#8221;) or unusual spaces, symbols, or punctuation (like &#8220;iTunesCustomer Service&#8221; instead of &#8220;iTunes Customer Service&#8221;).&#8221;</p>
<h1>Stay Safe:</h1>
<p>Hundreds of millions of emails that include a ransomware attachment are being sent out every month. Many of these are being blocked and software vendors are working hard to shrink security holes and fix this ongoing cyber-crime.</p>
<p>As can be seen with the information provided here, staying informed, taking precautions, and using safe practices can help prevent you from getting an infection that could save you time and your data. If you require further information on this subject we recommend Microsoft&#8217;s <a href="https://www.microsoft.com/en-us/wdsi/threats/ransomware" target="_blank" rel="noopener noreferrer">Ransomware FAQ</a> page.</p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> <a href="http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/ransomware-a-growing-menace.pdf" target="_blank" rel="noopener noreferrer">http://www.symantec.com</a><br />
<a href="#_ftnref2" name="_ftn2">[2]</a> <a href="https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/" target="_blank" rel="noopener noreferrer">https://blogs.technet.microsoft.com</a><br />
<a href="#_ftnref3" name="_ftn3">[3]</a> <a href="https://www.theguardian.com/world/2017/jun/27/petya-ransomware-attack-strikes-companies-across-europe" target="_blank" rel="noopener noreferrer">https://www.theguardian.com</a><br />
<a href="#_ftnref4" name="_ftn4">[4]</a> <a href="https://www.microsoft.com/en-us/security/portal/mmpc/shared/ransomware.aspx" target="_blank" rel="noopener noreferrer">General information on ransomware</a></p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/held-at-ransomeware/">Don&#8217;t be Held at Ransomeware</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What Is a VPN, and Why Do You Need One?</title>
		<link>https://www.compuclever.com/posts/vpn-need-one/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=vpn-need-one</link>
		
		<dc:creator><![CDATA[Charles Edward]]></dc:creator>
		<pubDate>Fri, 28 Apr 2017 19:29:54 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[online safety]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[vpn]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3586</guid>

					<description><![CDATA[<p>In March 2017, the US Congress voted to allow internet service providers (ISPs) to sell customer data. Anyone in the United States who connects to the Internet must rely on an ISP. This means your ISP now has knowledge of all of your browsing habits. While ISPs claim they will use your Internet history to [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/vpn-need-one/">What Is a VPN, and Why Do You Need One?</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In March 2017, the US Congress voted to allow internet service providers (ISPs) to sell customer data. Anyone in the United States who connects to the Internet must rely on an ISP. This means <a href="https://www.usatoday.com/story/tech/news/2017/04/04/isps-can-now-collect-and-sell-your-data-what-know-internet-privacy/100015356/" target="_blank" rel="noopener noreferrer">your ISP now has knowledge of all of your browsing habits</a>.</p>
<p>While ISPs claim they will use your Internet history<a href="https://www.wired.com/2017/03/big-cables-case-selling-data-doesnt-hold/" target="_blank" rel="noopener noreferrer"> to help sell you more relevant ads</a>, the decision by Congress has made many people deeply uncomfortable.</p>
<h3>WiFi Hotspots Are Also A Risk?</h3>
<p>It&#8217;s not just ISPs who are after your browsing data and personal information. For example, whenever you login to a WiFi hotspot in a coffee shop or at the airport you are potentially putting yourself at risk. WiFi hotspots may not protect your data as it is transmitted to and from your device. Even worse, some WiFi hotspots may want to steal your data, such as browsing history or even passwords and credit card information.</p>
<p>Luckily, something called a virtual private network (VPN) may help protect you from ISPs and anyone else who wants to snoop on your Internet habits.</p>
<h2>What Is a VPN?</h2>
<p>A VPN is essentially an online service that allows you to create a secure Internet connection. All of your browsing is encrypted, meaning that no one, including your ISP or even the government can determine what you are doing on the Internet.</p>
<h3>How Does It Work?</h3>
<p>When you connect to a VPN, you usually launch a VPN client on your computer (or click a link on a special website), log in with your credentials, and your computer exchanges trusted keys with a far away server. Once both computers have verified each other as authentic, all of your internet communication is encrypted and secured from eavesdropping.</p>
<p>There are two main advantages to using a VPN:</p>
<h2>Advantage #1: Browse Privately and Safely</h2>
<p>As mentioned, all of your browsing information is encrypted. This means that your ISP cannot sell your data to a third-party for advertising. VPNs also ensure that your passwords and banking information are kept safe, too.</p>
<p>For example, many journalists and businesspeople traveling abroad <a href="https://ssd.eff.org/en/glossary/vpn" target="_blank" rel="noopener noreferrer">use VPNs</a> to protect their privacy.</p>
<h2>Advantage #2: Browse Everywhere</h2>
<p>Businesspeople and journalists may also use VPNs just to be able to communicate. For example, the <a href="https://en.wikipedia.org/wiki/Great_Firewall" target="_blank" rel="noopener noreferrer">Great Firewall of China</a> prevents Internet users from accessing many useful websites from outside of China. Many people rely on VPNs to access indispensable online services for their jobs.</p>
<p>On the other hand, VPNs are also useful because they allow you to browse as though you were in any country. Many online content providers such as Netflix, Hulu and the BBC restrict access to content based on your country. You can use a VPN to get around these rules.</p>
<h2>What to Look For In a VPN</h2>
<p>Not all VPNs are created equally, so it&#8217;s important to look for the right one before making a choice.</p>
<p>Look for:</p>
<h3>Speed</h3>
<p>If you want to use a VPN in order to watch online content such as Netflix, make sure it has enough bandwidth to do so. Generally speaking, this bandwidth is a result of investments in server capacity and other technology. Some VPNs have more than others.</p>
<h3>Your Data Must Be Kept Safe</h3>
<p>Almost anyone with a little technical know-how can setup a VPN service and then sell it to consumers. The problem for you is: how do you know they&#8217;re going to protect your data?</p>
<p>Look for a VPN with a professional website and an active and responsive social media presence. And, if you&#8217;re really concerned with privacy, look for a VPN that has its servers in a country with strong data privacy laws. In countries such as the United States and the United Kingdom, <a href="http://www.theverge.com/2016/11/23/13718768/uk-surveillance-laws-explained-investigatory-powers-bill" target="_blank" rel="noopener noreferrer">government now has broad powers to access your data</a>.</p>
<p>Countries such as Canada, Germany and Switzerland have much stronger rules prohibiting government collection of personal data, so look for a VPN headquartered in one of those countries first.</p>
<h2>When Can a VPN Not Protect Your Privacy?</h2>
<p>Even if a VPN does not share your personal information, there are others who can. For example, Google and Facebook both use your profile data, which includes browsing history, to sell advertising. A VPN is not designed to prevent this from happening–protecting yourself from Facebook and Google&#8217;s efforts to collect data is best done using browser-based ad blocking tools.</p>
<p>Also, keep in mind that you typically choose to use Google and Facebook because you agree to trade some privacy for the convenience of their services.</p>
<p>However, since you pay ISPs directly, you should expect that your privacy be respected. But since ISPs and others are not respecting your privacy, it may be a good time to use a VPN.</p>
<p><a href="http://link.safecart.com/2hfmh3" target="_blank" rel="noopener noreferrer"><img decoding="async" class="aligncenter" style="width: 100%; height: auto;" src="https://www.compuclever.com/posts/wp-content/uploads/securevpn-banner.png" alt="" /></a></p>
<h2>What We Recommend: SecureVPN</h2>
<p><a href="http://link.safecart.com/2hfmh3" target="_blank" rel="noopener noreferrer">SecureVPN allows you to surf the web anonymously</a>, unlock websites, unlock VoIP services, secure any wifi hotspot, and protect your data &amp; privacy.</p>
<p>SecureVPN operates a self-managed VPN network with at least 750 servers in 141 countries, with plans to add more.</p>
<p>Since there are so many local servers, this means SecureVPN promises the fastest speed possible. SecureVPN also owns its own network–there are no third-parties that gather data, and SecureVPN keeps no logs of your activities.</p>
<h3>Why choosing SecureVPN?</h3>
<p><a href="http://link.safecart.com/2hfmh3" target="_blank" rel="noopener noreferrer">SecureVPN offers a variety of features</a>, including:</p>
<ul>
<li><strong>No 3rd Parties for Your Data</strong>: SecureVPN has a self-managed network. Your data is handled by SecureVPN only, without the intervention or interference of any third-parties.</li>
<li><strong>Military-grade Encryption</strong>: SecureVPN employs top-of-the-line military-grade up to 256-bit encryption to protect and safeguard user’s data from falling into the wrong hands.</li>
<li><strong>750+ Servers in 141 Countries</strong>: SecureVPN has servers in 141 Countries. So, no matter where you are or where you travel to, SecureVPN will connect you to your favorite content.</li>
<li><strong>99.99% Uptime</strong>: SecureVPN has its own network of servers and a team of highly professional experts who manage and host the network to guarantee 99.9% uptime.</li>
<li><strong>Powerful Software and Apps</strong>: SecureVPN wrote its own code for its proprietary software and apps for every major platform including Windows, Mac, iOS, Android, and Linux.</li>
<li><strong>Unlimited Data Transfer</strong>: Download, browse, stream or share, SecureVPN users are free to do whatever they want, how much they want since there is no bandwidth or data limit.</li>
</ul>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/vpn-need-one/">What Is a VPN, and Why Do You Need One?</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CompuClever Antivirus PLUS &#8211; VB100 Award!</title>
		<link>https://www.compuclever.com/posts/compuclever-antivirus-plus-vb100-certification-explained/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=compuclever-antivirus-plus-vb100-certification-explained</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Tue, 31 Jan 2017 19:17:10 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[Protect online privacy]]></category>
		<category><![CDATA[antivirus]]></category>
		<category><![CDATA[pc performance]]></category>
		<category><![CDATA[VB100]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3256</guid>

					<description><![CDATA[<p>CompuClever is pleased to release the latest VB100 test results for CompuClever Antivirus PLUS.  We will present these results and help you to understand them as part of our ongoing testimony to the effectiveness of our AV product.  As is evident with these results… CompuClever Antivirus PLUS offers outstanding protection without slowing down your PC</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/compuclever-antivirus-plus-vb100-certification-explained/">CompuClever Antivirus PLUS &#8211; VB100 Award!</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;<br />
CompuClever is pleased to release the latest VB100 test results for <a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=vb100" target="_blank">CompuClever Antivirus PLUS</a>.  We will present these results and help you to understand them as part of our ongoing testimony to the effectiveness of our AV product.  As is evident with these results… CompuClever Antivirus PLUS offers outstanding protection without slowing down your PC!</p>
<h3>The Test Results</h3>
<p>We’ve had four positive test results from the VB100 test lab, one of the few independently operated testing facilities focused on providing comprehensive examination of security software and solutions.  Let’s start with an overview of these four tests that are available for <a href="https://www.virusbulletin.com/testing/results/recent/vb100-antimalware/compuclever-avplus" target="_blank">online viewing</a>.  These tests were conducted between August 2015 and October 2016 on various Windows platforms.</p>
<p><a href="https://www.virusbulletin.com/testing/results/recent/vb100-antimalware/compuclever-avplus" target="_blank"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%;" title="Click to view tests results..." src="https://www.compuclever.com/posts/wp-content/uploads/compuclever-vb-test-snapshot-1024x679.png" alt="" /></a></p>
<h3>Overview &amp; Breakdown</h3>
<p>The specific results of each test are based on test markers which you can get an idea of when you mouse over the column title (RAP Score, Performance impact %, etc.)  We define them here:</p>
<ul>
<li><strong>Platform</strong>:  This is the selected operating system that VB100 performs its test on. VB100 tries to cover a spectrum of the most popular Windows OS with their tests focusing on one version at a time.  Note:  CompuClever Antivirus PLUS supports Windows 10, Windows 8, 7, Vista, &amp; XP.</li>
<li><strong>Result</strong>:  This is the overall result; simply put, it reveals if the antivirus software passed or failed the test.</li>
<li><strong>RAP Overview</strong>:  “Chart shows RAP scores with weighted average overlaid.” Note: The difference in scores is explained below.</li>
<li><strong>RAP Score</strong>:  “Weighted average detection rate over recent malware samples, including retrospective coverage of new malware (Reactive and Proactive).”  Basically, this means the ability for the AV product to detect and react to malware threats.  This is the most important measure of how effective any AV product is; the higher the score, the more effective the product.</li>
<li><strong>Performance impact (%)</strong>:  “Increase in time taken to complete a set of common tasks.”  This is the impact to system performance by the AV product when in operation. A lower score is better here.</li>
<li><strong>Stability Rating</strong>:  “Rated on a five-level scale from Solid (no problems) to Flaky (severe issues).”  This is the rating given by VB100 based on the test results. This tells you the quality of the AV software apart from the previously mentioned effectiveness or performance impact measurements.</li>
</ul>
<p>What is evident in these results is a consistent pattern of high RAP Score – detection of AV threats – and a low performance impact.  Once again this means that CompuClever antivirus PLUS works to protect your PC from online malware threats all the while operating in the background.</p>
<p>In this way, you won’t notice it and it won’t have an impact to overall system performance – something CompuClever dedicates itself to accomplishing!</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=vb100" target="_blank"><img decoding="async" class="emailImage aligncenter" style="height: auto; max-width: 275px; width: 100%;" title="windows-10-compatible" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-box-left-640x480-1.png" alt="" /></a></p>
<h3>Overall Conclusions</h3>
<p>Based on analysis of detailed test data, we are very pleased with the results of the tests. These results are in line with our original goals:</p>
<ul>
<li>Total protection against any form of online threats: CompuClever Antivirus’s high RAP score is among the list of top security solution providers, like ESET, Kaspersky, Bitdefender, and AVG.</li>
<li>Minimum impact to PC performance: CompuClever Antivirus’s extremely low % in Performance Impact to PC performance outperforms most of our top competitors.</li>
<li>A solid and well-built antivirus product: It is easy to install without reboot, has an intuitive user interface, and is extremely intelligent and quiet. CompuClever Antivirus is regarded as a “solid” antivirus solution.</li>
</ul>
<p>This is what VB100 lab says about us in one of its test remarks:</p>
<div class="quick_facts">
<p><a href="#_ftn1" name="_ftnref1"></a>The design is slick and attractive, with a good range of options available and intuitive deployment of controls.</p>
<p>Stability was perfect throughout testing, with not the slightest shake even under heavy stress. Performance impact was decent too&#8230;</p>
<p>Detection was as excellent as one would expect, with good scores everywhere.<sup><a href="#_footnote">[1]</a></sup></p>
</div>
<h3>Check Your AV Product</h3>
<p>We invite you to examine the results for your AV product.  You can trust VB100 as it a free service that performs regular independent reviews of malware solutions and provides <a href="https://www.virusbulletin.com/testing/dates/vb100-antimalware" target="_blank">test results</a> for AV software that handle both known (reactive) and unknown (proactive) virus samples. You can see <a href="https://www.virusbulletin.com/testing/dates/vb100-antimalware" target="_blank">the latest test results</a> for any product or you can use the Search field to quickly find test results.</p>
<h3>CompuClever Antivirus PLUS</h3>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=vb100">CompuClever Antivirus PLUS</a> offers unparalleled security technology against malware threats. It is designed to deliver the best performance for your PC and it is built on the most advanced antivirus technology available today. Exceptional in its ease of use, it allows you to handle security with a single click. The intuitive technology also guards your online privacy and digital identity with specific protection when doing online banking and online shopping.</p>
<p>Browse the following topics to learn more about Antivirus PLUS:</p>
<ul>
<li><a href="https://www.compuclever.com/posts/protection-vs-speed/" target="_blank">Do you have to sacrifice PC speed for protection?</a></li>
<li><a href="https://www.compuclever.com/posts/safe-guard-your-online-banking/" target="_blank">How to safeguard online banking</a></li>
<li><a href="https://www.compuclever.com/posts/stay-safely-connected/" target="_blank">How to protect your personal identity</a></li>
<li><a href="https://www.compuclever.com/posts/silence-and-vigilance/" target="_blank">Does your antivirus bark all the time?</a></li>
<li><a href="https://www.compuclever.com/posts/surf-with-confidence/" target="_blank">How to surf the web safely</a></li>
</ul>
<div class="bottom_p">
<p>&nbsp;</p>
<hr size="1" />
<p>[1]<a href="https://www.virusbulletin.com/virusbulletin/2015/08/comparative-review-windows-7-pro-64-bit" target="_blank">https://www.virusbulletin.com/</a></p>
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/compuclever-antivirus-plus-vb100-certification-explained/">CompuClever Antivirus PLUS &#8211; VB100 Award!</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How Antivirus Protects Your Computer From Hackers</title>
		<link>https://www.compuclever.com/posts/how-antivirus-protects-your-computer-from-hackers/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-antivirus-protects-your-computer-from-hackers</link>
		
		<dc:creator><![CDATA[Charles Edward]]></dc:creator>
		<pubDate>Mon, 07 Nov 2016 16:01:24 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[online security]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3098</guid>

					<description><![CDATA[<p>A few weeks ago a massive hack shut down much of the Internet. It&#8217;s widely believed the hack was carried out through internet devices—a good reminder to us all about taking care of our own security online. On Friday, October 21st, a lot of people were having a hard time accessing the Internet. First, Twitter [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/how-antivirus-protects-your-computer-from-hackers/">How Antivirus Protects Your Computer From Hackers</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="quick_facts">A few weeks ago a massive hack shut down much of the Internet. It&#8217;s widely believed the hack was carried out through internet devices—a good reminder to us all about taking care of our own security online.</div>
<p>On Friday, October 21st, a lot of people were having a hard time accessing the Internet. First, <a href="http://www.reuters.com/article/us-usa-cyber-idUSKCN12L1ME" target="_blank">Twitter went down</a>. Then PayPal no longer worked. Later on cloud storage sites such as Dropbox went offline. For most of the day tens of millions of people could not access some of the most important and most useful websites on the Internet. <a href="https://www.theguardian.com/technology/2016/oct/26/ddos-attack-dyn-mirai-botnet" target="_blank">Reddit, CNN and Netflix were all affected</a>.</p>
<p>Was it a Russian hack? Could it be the Chinese? Nobody could say for sure. The only thing that was certain was that massive Distributed Denial of Service (DDoS) attack had occurred. The <a href="http://www.pcworld.com/article/3135273/security/fridays-ddos-attack-came-from-100000-infected-devices.html" target="_blank">target</a> of the attack was DNS service provider Dyn.</p>
<h2>What is a DNS provider?</h2>
<p>As as DNS provider and as a company, Dyn&#8217;s job is to convert human-readable website names such as www.facebook.com into computer-readable numerical IP addresses (for example, 192.168.0.1)—humans prefer to use easy-to-remember-addresses such as www.facebook.com rather than the long, insanely complicated numerical strings favored by our machine servants.</p>
<p>Websites like Twitter and Dropbox rely on Dyn to help resolve and translate the various kinds of links each company uses as part of their product. For example, you post a link to your Twitter account, Dyn will make sure that whoever clicks on it will get sent to the right website. Dyn does this by having a massive database of domain names it can &#8220;point&#8221; web browsers to. If Dyn goes offline, Twitter, Dropbox and other web services can no longer &#8220;point&#8221; people about where to go.</p>
<p>The October 21 hack forced Dyn&#8217;s domain name servers to go offline so nobody could use them. This pushed Twitter, Dropbox and other websites offline. It was alarming for any company who relies on Dropbox to store and access important files. The outage was also alarming to journalists, who rely on Twitter to share information and generally gossip with their colleagues.</p>
<p>The fact that Twitter went offline, then, ensured the DDoS attack would receive immediate and comprehensive coverage.</p>
<h2>Were the Russians behind the October 21st hack?</h2>
<p>But nobody knew exactly what happened. Thanks to the <a href="http://www.cnn.com/2016/10/13/politics/russia-us-election/" target="_blank">supposed role</a> Russia has played in providing Wikileaks with hacked Hillary Clinton emails, there were rumors that <a href="http://heavy.com/news/2016/10/ddos-attack-cyber-russia-false-flag-us-putin-trump-obama-cia-north-korea-poodlecorp-netflix-twitter/" target="_blank">Vladmir Putin was behind the massive hack</a>.</p>
<p>But the real story was much weirder.</p>
<p>For one thing, <a href="https://www.theguardian.com/technology/2016/oct/26/ddos-attack-dyn-mirai-botnet" target="_blank">the hack was the largest one in history</a>.</p>
<p>It turned out the October 21st hack was not the work of Russia. Instead, it was largely orchestrated by amateurs. They used a weapon called the <a href="http://qz.com/820003/dyn-dns-ddos-the-mirai-botnet-is-smaller-than-originally-thought/" target="_blank">Mirai botnet</a> as the ‘primary source of malicious attack.’</p>
<p>Unlike other botnets, which are typically made up of computers, the Mirai botnet is largely made up of so-called “internet of things” (IoT) devices such as digital cameras and DVR players. Dyn estimated that the attack had involved “100,000 malicious endpoints.”</p>
<h2>Internet-connected devices made the hack inevitable</h2>
<p>Basically, any device with an internet connection could initiate an attack against Dyn. All the attacker had to do was instruct an unsecured, internet-connected device to make a request to Dyn. The sheer volume of requests, made by millions of devices located around the world, from web cams to DVR players to, theoretically, at least, toasters, overwhelmed Dyn&#8217;s DNS servers, shutting them down.</p>
<p>There&#8217;s a theory that <a href="http://www.networkworld.com/article/3135097/security/was-the-dyn-ddos-attack-actually-a-script-kiddie-v-psn.html" target="_blank">the massive attack on Octover 21st was targeted at the PlayStation Network</a> and that Dyn was hit because it provides DNS services to PSN.</p>
<p>It could have been a few kids who brought down the Internet for a day in October.</p>
<h2>Why every computer user should care about this attack</h2>
<p id="E182"><span id="E183" class="qowt-font1-Georgia">What lesson does this even have for the average computer user? </span></p>
<h3>There are more ways to get hacked than ever before</h3>
<p>In the case of the October 21st hack, the attackers may have been searching for &#8220;open&#8221; Internet-connected devices they could use to perform an attack. It could be your internet-connected toaster, or it could more likely be your computer.</p>
<h3 id="E189" class="qowt-stl-Normal"><span id="E190" class="qowt-font1-Georgia">2) You have bigger things than Internet-connected devices to worry about</span></h3>
<p id="E191"><span id="E192" class="qowt-font1-Georgia">Most of us do not own an Internet-connected toaster or even a &#8220;connected home&#8221; you can monitor remotely over the Internet.</span></p>
<p id="E193" class="qowt-stl-Normal"><span id="E194" class="qowt-font1-Georgia">But we all have computers, and people are getting infected by malware every day. </span><span id="E195" class="qowt-font1-Georgia">Your computer is fundamentally insecure unless you do something about it. </span></p>
<p id="E196" class="qowt-stl-Normal"><span id="E197" class="qowt-font1-Georgia">Luckily an antivirus program can provide powerful protection against this.</span></p>
<h2 id="E198" class="qowt-stl-Heading2"><span id="E201" class="qowt-font1-Georgia">How antivirus keeps you</span><span id="E202" class="qowt-font1-Georgia"> </span><span id="E203" class="qowt-font1-Georgia">safe</span></h2>
<p id="E204"><span id="E205">Antivirus software has long been recognized as a way to prevent your computer from being infected by viruses, malware, trojans and other harmful programs. But, by &#8220;locking down&#8221; specific ports and other access gateways, antivirus programs can prevent computer from being hijacked by a hacker.</span><span id="E206"></span></p>
<p id="E207"><span id="E208" class="qowt-font1-Georgia">The intuitive technology also guards online privacy and digital identity, including banking and credit card details, as well as email passwords and social media information.</span></p>
<div id="contentsContainer">
<div id="contents">
<h2 id="E209" class="qowt-stl-Heading2"><span id="E212" class="qowt-font1-Georgia">How to avoid comprising on security</span></h2>
<p id="E213">Having received a rating of &#8220;SOLID&#8221; from the prestigious <a href="https://www.compuclever.com/posts/compuclever-antivirus-plus-vb100-certification/" target="_blank">VB100 Antivirus testing lab</a> and awarded Windows 10 logo certification by Microsoft, <a id="E214" contenteditable="false" href="https://www.compuclever.com/products/antivirus/" target="_blank"><span id="E215" class="qowt-font1-Georgia">CompuClever Antivirus PLUS</span></a><span id="E216" class="qowt-font1-Georgia"> is accurate, stable and responsive. </span></p>
<p><span id="E216" class="qowt-font1-Georgia">As an antivirus program, it provides a range of powerful PC optimization tools and other software alongside its anti-malware offering, including a browser plug-in wallet system. You get security without having to compromise on computer performance.</span></p>
<p><a href="https://www.compuclever.com/products/antivirus/"><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-3117" src="https://www.compuclever.com/posts/wp-content/uploads/unnamed.png" alt="stable antivirus program" width="650" height="400" srcset="https://www.compuclever.com/posts/wp-content/uploads/unnamed.png 650w, https://www.compuclever.com/posts/wp-content/uploads/unnamed-300x185.png 300w, https://www.compuclever.com/posts/wp-content/uploads/unnamed-610x375.png 610w, https://www.compuclever.com/posts/wp-content/uploads/unnamed-24x15.png 24w, https://www.compuclever.com/posts/wp-content/uploads/unnamed-36x22.png 36w, https://www.compuclever.com/posts/wp-content/uploads/unnamed-48x30.png 48w" sizes="(max-width: 650px) 100vw, 650px" /></a></p>
<p>&nbsp;</p>
<h3 id="E217"><span id="E218">It&#8217;s e</span><span id="E219">asy to u</span><span id="E220">se</span></h3>
<p id="E221" class="qowt-stl-Normal"><span id="E222" class="qowt-font1-Georgia">Compu</span><span id="E223" class="qowt-font1-Georgia">Clever</span><span id="E224" class="qowt-font1-Georgia"> Antivirus PLUS is designed to be easy to install and use right away. There are no settings to configure, so your computer is protected automatically, at the touch of a button.</span></p>
<p id="E225" class="qowt-stl-Normal"><span id="E226" class="qowt-stl-Strong">Shield your o</span><span id="E227" class="qowt-stl-Strong">nline p</span><span id="E228" class="qowt-stl-Strong">rivacy and p</span><span id="E229" class="qowt-stl-Strong">ersonal i</span><span id="E230" class="qowt-stl-Strong">dentity</span></p>
<p id="E231" class="qowt-stl-Normal"><span id="E232" class="qowt-font1-Georgia">Antivirus PLUS allows you to s</span><span id="E233" class="qowt-font1-Georgia">afeguard your o</span><span id="E234" class="qowt-font1-Georgia">nline b</span><span id="E235" class="qowt-font1-Georgia">anking, s</span><span id="E236" class="qowt-font1-Georgia">hopping, e</span><span id="E237" class="qowt-font1-Georgia">mail and social media login information, making it impossible for malware, trojans or Internet hackers to get it off your computer.</span></p>
<h3 id="E238" class="qowt-stl-Normal"><span id="E239" class="qowt-font1-Georgia">Low</span><span id="E240" class="qowt-font1-Georgia"> i</span><span id="E241" class="qowt-font1-Georgia">mpact on p</span><span id="E242" class="qowt-font1-Georgia">erformance</span></h3>
<p id="E243"><span id="E244" class="qowt-font1-Georgia">Compuclever Antivirus PLUS is </span><span id="E245" class="qowt-font1-Georgia">designed to deliver the best performance for your PC. Many antivirus programs are &#8220;</span><span id="E246" class="qowt-font1-Georgia">resource hogs&#8221;, slowing everything down. You typically can&#8217;t watch movies or use other programs. </span></p>
<p id="E247"><span id="E248" class="qowt-font1-Georgia">However, Compuclever Antivirus PLUS is specially designed to work quietly in the background, while you enjoy using your computer.</span><span id="E249" class="qowt-font1-Georgia"> </span><span id="E250" class="qowt-font1-Georgia"> </span></p>
<p id="E251" class="qowt-stl-Normal"><span id="E252" class="qowt-font1-Georgia">This it’s built on the most advanced antivirus technology available today. Exceptional in its ease of use, it allows you to handle security</span><span id="E252"> with a</span><span id="E252" class="qowt-font1-Georgia"> single click. The intuitive technology also guards your online privacy and digital identity.</span></p>
<p id="E253"><span id="E254" class="qowt-font1-Georgia">This means you would never have to worry about your computer being taken over by hackers.</span></p>
</div>
</div>
<p><a href="https://www.compuclever.com/products/antivirus/" target="_blank"> Learn more</a> about <a id="E214" contenteditable="false" href="https://www.compuclever.com/products/antivirus/" target="_blank"><span id="E215" class="qowt-font1-Georgia">CompuClever Antivirus PLUS</span></a>.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/how-antivirus-protects-your-computer-from-hackers/">How Antivirus Protects Your Computer From Hackers</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Breaking News – Yahoo Admits Breach of 500 Million Accounts</title>
		<link>https://www.compuclever.com/posts/yahoo-admitted-500-million-accounts-have-been-breached/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=yahoo-admitted-500-million-accounts-have-been-breached</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Thu, 22 Sep 2016 23:29:36 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[Protect online privacy]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[security breach]]></category>
		<category><![CDATA[Yahoo]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3004</guid>

					<description><![CDATA[<p>Yahoo confirmed today that data "associated with at least 500 million user accounts" has been stolen in what may be one of the largest cyber-security breaches ever.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/yahoo-admitted-500-million-accounts-have-been-breached/">Breaking News – Yahoo Admits Breach of 500 Million Accounts</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>My heart dropped when I was <a href="http://money.cnn.com/2016/09/22/technology/yahoo-data-breach/">alerted by CNN</a> that Yahoo admitted today that 500 million user accounts have been compromised. As a seasoned IT professional who has been involved with the security industry for the past decade, this is probably THE worse security breach that’s occurred since the inception of the Internet.</p>
<p>Here are the key facts that you should be aware of regarding this breach:</p>
<ul>
<li>In August 2016, a person codenamed “Peace” attempted to sell what he claimed to be 200 million Yahoo user information.</li>
<li>Back then, Yahoo only said they were investigating the legitimacy of the claim.</li>
<li>On Sept. 22<sup>nd </sup>2016, Yahoo issued a statement acknowledging the legitimacy of the claim. Furthermore, Yahoo confirmed the scale of the breach is actually 500 million accounts.</li>
<li>Yahoo also confirmed that the information stolen contains name, username, lightly encrypted passwords, date of birth, and for some accounts, security questions and answers.</li>
</ul>
<p>Nevertheless, till this moment, Yahoo hasn’t issued a notice to all of its users advising them to reset their passwords.</p>
<p>Here at CompuClever, we felt it is necessary to inform you about this event because there is a high possibility that either you or someone you know might be impacted by this incident.</p>
<p>Yahoo is currently working with law enforcement agencies, including the FBI, to deal with this breach. Nevertheless, we recommend you immediately take the following measures to protect your online security and personal privacy:</p>
<ul>
<li>Immediately change your Yahoo email password.</li>
<li>If you happen to be using the same combination of username and password across multiple (non-Yahoo) online accounts, change all of the passwords. Make sure that you use a different password for every account.</li>
<li>Ensure you have a legit and reputable antivirus protection with active subscription to protect your PC from any forms of cyberattack.</li>
</ul>
<p>Further readings:</p>
<ul>
<li><a href="https://www.compuclever.com/posts/how-to-protect-yourself-in-a-post-password-world/" target="_blank">How to protect yourself in a post-password world</a></li>
<li><a href="https://www.compuclever.com/posts/compuclever-antivirus-plus-vb100-certification/" target="_blank">How to create a good password</a></li>
<li><a href="https://www.compuclever.com/posts/safe-guard-your-online-banking/" target="_blank">Safe guard your online banking</a></li>
<li><a href="https://www.compuclever.com/posts/stay-safely-connected/" target="_blank">Stay safely connected</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/yahoo-admitted-500-million-accounts-have-been-breached/">Breaking News – Yahoo Admits Breach of 500 Million Accounts</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Firewalls &#8211; First Line Filtration</title>
		<link>https://www.compuclever.com/posts/what-is-firewall/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=what-is-firewall</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Tue, 28 Jun 2016 22:36:15 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[Windows tips]]></category>
		<category><![CDATA[antivirus]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[windows tips]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=2706</guid>

					<description><![CDATA[<p>If our PC could be considered a well-protected fortress, we would think of the firewall as an essential part of the moat and drawbridge system – it monitors and controls entry.  Most of us associate firewalls with large network corporations and sophisticated security systems.  You might, however, be surprised to find your PC and personal devices have security issues similar to large corporate networks.   This is why firewall technology is built into your PC and offers the first line of protection from offensive web sites and potential hackers.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/what-is-firewall/">Firewalls &#8211; First Line Filtration</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">If our PC could be considered a well-protected fortress, we would think of the firewall as an essential part of the moat and drawbridge system – it monitors and controls entry. Most of us associate firewalls with large network corporations and sophisticated security systems. You might, however, be surprised to find your PC and personal devices have security issues similar to large corporate networks. This is why firewall technology is built into your PC and offers the first line of protection from offensive web sites and potential hackers.</div>
</div>
<p>We’ll begin with a definition of what a firewall is and then move into some basic questions and answers.  After that we’re going to provide information for those that might want to beef up their firewall protection.</p>
<h2><strong>The Firewall Basics</strong></h2>
<p>Effectively a firewall is a filter.  It is designed to prevent dubious programs and Internet services from establishing a connection or gaining access to your computer.</p>
<p><img decoding="async" class="emailImage aligncenter" style="height: auto; max-width: 484px; width: 100%;" title="What is a firewall" src="https://www.compuclever.com/posts/wp-content/uploads/firewall-diagram.jpg" alt="" /></p>
<div class="quick_facts">
<p><strong>Firewall Defined</strong>: A firewall is hardware or software technology designed to monitor and filter incoming and outgoing traffic to your PC.  It is a network security function that effectively acts as a barrier.  The data that passes through depends on the pre-determined set of rules which are configured in the firewall settings.</p>
</div>
<h2><strong>A Little Q and A</strong></h2>
<p>Now that we know basically what it is, we can answer some questions.</p>
<ol>
<li><strong>Why do I need one?</strong></li>
</ol>
<p>A firewall tries to screen out incoming Internet streams of data from unwanted sources and it also prevents programs on your PC to access the Internet without authorization.  The purpose is to prevent unwanted and malicious programs from communicating to, or from, your computer.</p>
<ol start="2">
<li><strong>Who makes firewalls?</strong></li>
</ol>
<p>Microsoft includes a firewall with Windows – we’ll cover this in more detail below.  There are also a significant number of known makers of free and paid solutions.  The best known names would include Norton, McAfee, BitDefender, Kaspersky, as well as Zone Alarm, Webroot, and Comodo.  Some routers also have firewalls built into them.  While we are not recommending any specific option, selecting one of the manufacturers listed above should provide greater security.</p>
<ol start="3">
<li><strong>When do I need one?</strong></li>
</ol>
<p>Quite simply – you need a firewall when you connect to the Internet. This is why you should also consider a solution for your smart phone or mobile device.  Most malware programs these days attempt to get money from you and your mobile devices are also targets of malware attacks and cyber crime.</p>
<ol start="4">
<li><strong>Doesn&#8217;t Windows already come with a firewall?</strong></li>
</ol>
<p>Yes, it does, and it may be all you need.   It blocks unwanted connections and will prompt you if you want to allow a connection or not.  There is a list of programs to block and you can enter exceptions to identify programs you deem safe.</p>
<p>Windows Firewall is equipped to monitor traffic, but lacks in the area of program control.  Despite shortcomings, Windows Firewall may be all you need.   Other tools will provide additional functions such as the ability to create activity logs.  In this way you can review what was happening in terms of attempted connections so you can fine tune the security parameters.  The bottom line is that the Windows Firewall will suffice for most users and should not be regarded as providing insufficient security.</p>
<p>If you find surfing the net is slow, begin by optimizing the browsers and Windows configuration for accessing the Internet.  We recommend looking at the articles: <a href="https://www.compuclever.com/posts/improve-internet-speed/" target="_blank">Improve Internet Speed</a> and <a href="https://www.compuclever.com/posts/restore-internet-browser/" target="_blank">Restore Browser Speed</a>.  After this, if you are more certain that the firewall is affecting performance, you may want to replace it.  If your PC is encountering issues with viral infections then first look at your antivirus protection, and if you have a top notch AV solution and are still getting breaches, that too would be a reason for looking for a new firewall.</p>
<ol start="5">
<li><strong>Is a firewall all the protection I need?</strong></li>
</ol>
<p>In a previous article we covered some <a href="https://www.compuclever.com/posts/antivirus-software-7-myths-debunked/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=newsletter" target="_blank">myths about antivirus protection</a> and this came up.  We can review briefly here.  As we have described, firewalls can filter nefarious traffic.  However, they cannot protect your PC from files that contain a virus or Trojan.  The reason for this is that firewalls are not able to scan for infected files – you need an antivirus solution specific to this purpose.</p>
<p>Cyber criminals exploit potential security holes and look for ways to openly connect with your PC.  A firewall can minimize this risk and offer the first line of defense.  However, it is not sufficient in blocking the myriad of virus and malware threats that are prevalent.  Malware creators are very clever in disguising data and can even disable your firewall in an effort to steal private or personal data.</p>
<div class="quick_facts">
<p><strong>Antivirus Protection</strong>:In a nutshell… we are pleased to offer <a href="https://www.compuclever.com/products/antivirus/" target="_blank">CompuClever Antivirus PLUS</a>, an AV solution that delivers 100% protection against both known and unknown viruses, comparable to any first-tier antivirus software like Norton, Kaspersky, Bitdefender, and MacAfee.  As a matter of fact, an independent <a href="https://www.virusbulletin.com/testing/results/test_from/2015-08/vb100-antimalware" target="_blank">third-party lab test</a> revealed that our antivirus product not only delivers a high level of protection, it also creates a very low impact to PC performance.</p>
<p>For more information about CompuClever Antivirus PLUS click here: <a href="https://www.compuclever.com/posts/are-you-well-protected/" target="_blank">Are You Well Protected?</a></p>
</div>
<h2><strong>Turning Windows Firewall On and Off</strong></h2>
<p>Microsoft states: “You only need one firewall app on your PC (in addition to the firewall that&#8217;s probably built into your network router).  Having more than one firewall app on your PC can cause conflicts and problems.” <sup><a href="#_footnote">[1]</a></sup>  It is also good practice to NOT turn off a firewall unless you have another one turned on.</p>
<p>With these safe practices in mind, you can view the status of Windows Firewall and you can turn it off or on.  The easiest way to begin is to type “firewall” in the Search field located in the Start menu.  For more information and instructions specific to your operating system follow one of these links:</p>
<p><a href="http://windows.microsoft.com/en-us/windows-10/turn-windows-firewall-on-or-off" target="_blank">Windows 10</a>  / <a href="http://windows.microsoft.com/en-US/windows-8/Windows-Firewall-from-start-to-finish" target="_blank">Windows 8</a> / <a href="http://windows.microsoft.com/en-us/windows/turn-windows-firewall-on-off#turn-windows-firewall-on-off=windows-7" target="_blank">Windows 7</a> / <a href="http://windows.microsoft.com/en-us/windows/turn-windows-firewall-on-off#turn-windows-firewall-on-off=windows-vista" target="_blank">Windows Vista</a> / <a href="https://support.microsoft.com/en-ca/kb/875356" target="_blank">Windows XP</a></p>
<h2><strong>What to Consider if Seeking an Alternative</strong></h2>
<p>Here is our list to help you better decide on alternatives to the built-in firewall for Windows.</p>
<ol>
<li>You need to consider how accurately a firewall solution will identify threats to your system. You do not want it to miss threats but you also do not want it blackball safe and known programs.  No one wants an unending stream of warnings from their firewall for no valid reason.  The very best firewalls handle unknown programs by monitoring them closely for suspicious activity and signs of improper network activity behaviour.</li>
<li>The fewer resources it requires the better. This will allow your system to run programs faster and dedicate resources to perform duties related to regular day-to-day activities.</li>
<li>Supply only the functions you need. Some &#8220;suite&#8221; applications will include antivirus and performance tools.  If you already have these areas covered by other applications there is no need to pay for bloated software that is inadequate in these other areas.</li>
<li>You will also need to know what kind of coverage you require in terms of the devices you are needing to protect (desktop, laptop, tablet, or phone), and if your solution will suffice.</li>
</ol>
<h2><strong>Other Considerations</strong></h2>
<p>Now to finish off with some final points related to installing a new firewall solution.</p>
<h3><strong>Install Your Firewall  </strong></h3>
<p>There isn’t any one &#8220;right&#8221; place to install a firewall; it comes down to the devices you use and the programs you run.  If you are looking for a firewall for your business then the normal firewall is not what you need; you need what is known as a &#8220;Next Generation Firewall&#8221; or, &#8220;NGFW&#8217;.  These are more sophisticated and expensive, ranging from $500 to $80,000, and are beyond what we will discuss here.</p>
<p>Also, some routers have firewalls built right into them, meaning any system behind them does not need a firewall.  This is useful as it means that there is no performance loss for Windows as a result of a firewall performing checks on data streams.  However, if you have a portable device (like a laptop, tablet, or phone), then you need a firewall installed to the device that can be turned on whenever you connect to the Internet when away from home.</p>
<h3><strong>Common Problems</strong></h3>
<p>The most common problem in using a firewall is blocking a program you know is good.  When this happens you need to create an &#8220;exclusion&#8221; or &#8220;exception&#8221; (search the program help files for those terms).  Effectively, this provides you the ability to override what the firewall would normally do.  Firewalls are designed to run in the background so most people have little to no interaction with these programs once they are installed and exceptions are generated.</p>
<h2><strong>Summary</strong></h2>
<p>While we haven’t gone into detail about hardware and software firewall technologies and the various viral threats to firewalls, we have covered the basics.  Standard coverage should get you started and you have the option of customizing the onboard Windows Firewall.  As an alternative to Windows, you can follow our introductory guidelines for taking on an alternative firewall solution.  In either event, remember that an effective antivirus solution is part of your fortress of protection.</p>
<p>We would like to thank Richard from our Tech Support team for his first wave of research on this subject.  We will continue to provide story lines like this and we will describe them in a manner that is within reach of everyday computer users.  If you have some ideas of topics you would like us to cover, email us at: <a href="mailto:newsletter@compuclever.co">newsletter@compuclever.com</a></p>
<p><a name="_footnote"></a></p>
<div class="bottom_p">
<hr size="1" />
<p>[1] <a href="http://windows.microsoft.com/en-US/windows-8/Windows-Firewall-from-start-to-finish" target="_blank">http://windows.microsoft.com/en-US/windows-8/Windows-Firewall-from-start-to-finish</a></p>
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/what-is-firewall/">Firewalls &#8211; First Line Filtration</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Antivirus Software – 7 Myths Debunked</title>
		<link>https://www.compuclever.com/posts/antivirus-software-7-myths-debunked/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=antivirus-software-7-myths-debunked</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Wed, 08 Jun 2016 19:27:59 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[PC security]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=2666</guid>

					<description><![CDATA[<p>Here are 7 myths about antivirus software that CompuClever get from interacting with users when dealing with security related support cases.  Let’s debunk the myths related to AV applications.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/antivirus-software-7-myths-debunked/">Antivirus Software – 7 Myths Debunked</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">Making use of an Antivirus application is commonly understood to be a prerequisite of operating your computer in a connected, online world. Generally speaking, it is unthinkable that one would run a PC without being actively protected by legitimate AV software with a valid subscription, whether paid or free. Nevertheless, there are some common myths about antivirus applications. Some of these myths prevent users from providing themselves with adequate protection while other myths perpetuate untruths and misinformation.</div>
</div>
<p>Here are 7 myths about antivirus software that we get from interacting with users when dealing with security related support cases.  Let’s debunk the myths related to AV applications.</p>
<h1>The Top 7:</h1>
<p>Here are the myths that we cover in this article along with the real truths about each.</p>
<h2>1. Authentication and encryption offers me all the protection I need.</h2>
<p>It’s true that authentication and encryption can make it challenging for a criminal to get to your confidential information but not impossible.  Some authentication systems use a One Time Passcode (OTP) and send a Simple Messaging System (SMS) or computer generated call back system.</p>
<p>Unfortunately, cyber criminals have already found ways to circumvent multi-factor authentication which was supposed to radically reduce online criminal activity.  New malware versions are now able to intercept authentication codes that are sent to your phone, so criminals can still get access to your OTP without you knowing about it.</p>
<p>Encryption scrambles your information to render it useless and requires you to use an encryption key to unlock the data.  However, it does not fully protect you from key-logging malware that can read your password used to access the encryption key.</p>
<p>While both of these technologies are useful in protecting sensitive data on your PC, they do not protect your PC from contracting malicious software.  In other words, your system can be hacked and be held hostage – you can fall victim to <a href="https://www.compuclever.com/posts/protect-computer-from-ransomware/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=newsletter" target="_blank">ransomware</a> and other debilitating viruses.</p>
<h2>2. I don’t download files so I am safe from virus attacks.</h2>
<p>You don’t have to actively download files to be the victim of virus attacks.  Browser based attacks are now much more common.  In fact, some of the most popular websites, including Yahoo, New York Times, Huffington Post, and CNN.com, have fallen prey to malware attacks that are integrated in display ads.  This is known as “malvertising”.</p>
<p>Malvertising is a common online criminal tactic which can easily spread among popular websites for maximum gain.  There are two types of malvertising attacks.  One is when a user clicks an ad and the malware infects their system.  The other type is not even triggered by user interaction as it uses embedded malware code within iframes that results in the ability to manipulate the browser to grab files from other malicious sources.  Simply browsing to a site can result in falling victim to malware attacks.</p>
<p>There are also attacks, referred to as “Man in the Middle” where an “…attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other”.<sup><a href="#_footnotes">[1]</a></sup> For example, the Man-in-the-Browser (MITB) attack utilizes a Trojan horse virus.</p>
<p>Online banking is very susceptible to the MITB attack.  In these cases the infected web browser uses altered web pages and content without the user knowing it.  The information is exchanged between the user and the host bank and the confirmation screens are all the same.  However, in the background, the criminal can be altering the data so as to change the transaction destination and the amount.</p>
<p>These examples illustrate that files do not have to be downloaded in order for you to be compromised.  Fortunately, Trojan viruses can be detected and removed by effective AV engines.</p>
<h2>3. Firewalls protect me from malicious activities.</h2>
<div class="quick_facts">A Firewall… is a network security feature that   can allow or deny incoming and outgoing PC communications based on a   predetermined set of rules.  The firewall rules are a standard preset   configuration or can be modified by you or your administrator.  The Windows firewall is by default   configured to block incoming threats – you need to change the settings to   deal with outgoing threats.</div>
<p>Firewalls block certain nefarious traffic but they cannot protect your PC from files that contain a virus or Trojan.  The reason for this is that firewalls are not designed to scan for infected files – you need an AV engine specific to this purpose.</p>
<p>It is crucial to eliminate potential security holes.  Port scanning can be problematic as criminals look for ways to openly connect with your PC.  A properly configured firewall can minimize this risk and new Windows operating systems come with firewall functionality.  While this is the first line of defense… it is not sufficient in blocking the myriad of virus and malware threats that are out there.</p>
<p>A firewall can be configured to block outbound traffic as well.  However, malware writers have been able to disable a firewall so traffic can escape from your system.  AV vendors have already created mechanisms to minimize this problem, but cyber criminals have proven themselves to be very clever in being able to hide the information within normal http traffic so as to disguise the data as innocent web requests.</p>
<h2>4. Viruses and malware are written by AV companies.</h2>
<p>There is no shortage of conspiracy theories.  So… is there any truth to AV companies creating malware?</p>
<p>There is an old technique that Firefighters use known as back burning.  Firemen create a controlled fire to burn up all of the debris that can fuel a fire which leaves a black zone. This method reduces the chance of a wildfire from jumping across the black line of defense.  This is similar to a strategy that Antivirus companies employ with viral attacks.  They use existing malware or create viruses to test their AV engine so they can understand the limits of their program, improve their software, and eliminate the vulnerability associated with such attacks that are known and encountered in the real world.</p>
<p>The real and full truth here is that there have been billions of dollars in loss suffered by companies and private individuals as a result of cyber criminals utilizing malware for profit.  There are in fact real criminals that focus their energies and skill on a variety of heinous activities such as stealing money, selling stolen credit card information, hiring other malicious code writers, selling malware to other cyber criminals, <a href="https://www.compuclever.com/posts/protect-computer-from-ransomware/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=newsletter" target="_blank">holding an infected PC ransom</a>, and more.  Cyber crime is a billion dollar industry and it will continue to grow as long as criminals see an opportunity to make money.</p>
<h2>5. You can get good protection from free AV programs.</h2>
<p>There are free antivirus programs that provide a basic level of protection, like Microsoft Windows Defender.  However, many of these lack key security features to reduce exposure to attacks, some have slower scanning speeds, others do not provide technical support, several do not respond quickly to emergencies, and some do not detect new threat categories effectively.</p>
<p>Free AV programs generally do not provide web protection.  This fundamental security feature is designed to block malicious links, prevent phishing attempts, and stop fraudulent links from compromising your system.  As we stated previously, online criminals want to make money and they will target personal or financial information.</p>
<p>Some free antivirus products offer a personal firewall that can block unauthorized communication.  You will need to verify your AV solution is equipped with this and activate it during the enrollment process.  And keep in mind, if your PC is already infected, cyber criminals could be actively stealing your information.</p>
<p>Choosing a free or paid antivirus program can be a difficult challenge as you need to weigh out your own privacy concerns along with getting full protection.  Third party publications can help narrow down your choices so we recommend that you review articles from publications such as: PC Magazine, Cnet, AV-Test, AV Comparatives, or Virus Bulletin.</p>
<div class="quick_facts">We are pleased that CompuClever AV PLUS has been   certified by Virus Bulletin (VB100).  You   can find the review on this <a href="https://www.virusbulletin.com/virusbulletin/2015/08/comparative-review-windows-7-pro-64-bit/" target="_blank">virus bulletin site</a> (search   for “CompuClever”).  More on this   later…</div>
<h2>6. AV applications are not equipped to deal with APT attacks.</h2>
<p>Advanced Persistent Threat (APT) is a recently used term spoken in such a way as to conjure up dark and scary creatures that we can speak of when gathering around a campfire at night.  In reality, APT is not dramatically different from malware that was launched ten years ago.  It’s quite common for cyber criminals to use similar tactics in new ways when launching their latest PC threats.</p>
<div class="quick_facts">APT   attacks are generally designed to target and penetrate companies, government   agencies, or even political organizations.  If you want additional insights about APTs,   please read the article: <a href="http://oemhub.bitdefender.com/what-is-an-advanced-persistent-threat" target="_blank">Setting   the Record Straight: What’s an Advanced Persistent Threat?</a></div>
<p>Malware writers are very innovative as they quickly change their attack methods while still leveraging criminal underground networks and strategies all the while remaining focused at absconding funds or making their mark.  Case in point: <a href="https://www.compuclever.com/posts/signs-of-a-pc-attack/" target="_blank">Ashley Madison hackers</a> were motivated as a result of outrage due to the activities of the targeted website.</p>
<p>AV companies have evolved by using a combination of malware signatures, heuristics, and behavior techniques to capture new and unknown threats.  They will not however detect all malware attacks.  Some AV companies detect unknown threats better and more consistently than others.</p>
<p>Let’s turn our focus on third party testing companies that specifically test for unknown and zero-day malware threats.  Companies that specialize in preventing APT attacks generate a lot of revenue, but it is surprising to see that these vendors have not submitted their products for testing by a third party organization.  Why is that?</p>
<p>For most users, the most affordable and best option is a reputable AV program along with using common sense.  It also helps to get recent and frequent software updates.</p>
<h2>7. I can get good information about AV app comparisons from the AV vendor.</h2>
<p>The simple answer to this is: make sure you get independent reviews.</p>
<p>Often times, AV test reports sponsored by a company range from being biased to blatantly skewed.  These reports typically highlight specific detection techniques and compare a limited number of vendors.  On the other hand, third party, non-profit malware testing organizations publicly provide their testing methodology to be scrutinized by all participating vendors.</p>
<p>All AV vendors are allowed to participate in third party tests and reviews, compared to being selected and tested by a vendor who is paying for the report.  There are different testing scenarios to help understand efficacy characteristics.</p>
<p>One test, involves capturing malware for a specific period of time and preventing the update mechanism from fetching the latest files from the AV vendor.  This particular test determines whether the AV engine can proactively prevent new or unknown threats from infecting a PC without file updates.<sup><a href="#_footnotes">[2]</a></sup> Another test involves speed performance tests which measure the impact of the AV program on the performance of a computer system.</p>
<h1>An Independent Review: CompuClever Antivirus PLUS</h1>
<p>We are pleased to report that we were tested and received a glowing review by VB100, “…a world-renowned independent testing and certification body, active in testing, reviewing and benchmarking security solutions for over 20 years.”<sup><a href="#_footnotes">[3]</a></sup></p>
<div class="quick_facts">
<p><strong>VB100 had   this to say about CompuClever Antivirus PLUS:</strong></p>
<p>“The   design is slick and attractive, with a good range of options available and   intuitive deployment of controls.”</p>
<p>“Stability   was perfect throughout testing, with not the slightest shake even under heavy   stress. Performance impact was decent too, with RAM use perhaps a little   above average but CPU usage and impact on our set of tasks both pretty low.”</p>
<p>“Detection   was as excellent as one would expect, with good scores everywhere. The   WildList and clean sets were handled with pinpoint accuracy, earning <em>CompuClever</em> its first VB100 award on its debut.”</p>
<p>Check out the <a href="https://www.virusbulletin.com/testing/results/test_from/2015-08/vb100-antimalware" target="_target">virus bulletin full review</a>.</p>
</div>
<p>For more information about CompuClever AV PLUS click here: <a href="https://www.compuclever.com/posts/are-you-well-protected/" target="_blank">Are You Well Protected?</a></p>
<h1>Summary:</h1>
<p>With the information provided in this article we feel you now have a much clearer understanding of AV applications and virus attacks.  We strongly recommend that you protect your PC from viral dangers that are prevalent in our daily computing world.</p>
<p>We will continue to provide story lines like this and we will describe them in a manner that is within reach of everyday computer users.  If you have some ideas of topics you would like us to cover, email us at: <a href="mailto:newsletter@compuclever.co">newsletter@compuclever.com</a></p>
<div class="bottom_p">
<p><a id="_footnotes"></a></p>
<hr size="1" />
<p>&nbsp;</p>
<p>[1] <a href="https://en.wikipedia.org/wiki/Man-in-the-middle_attack" target="_blank">https://en.wikipedia.org/wiki/Man-in-the-middle_attack</a><br />
[2] <a href="http://oemhub.bitdefender.com/how-to-properly-evaluate-an-advanced-persistent-threat-security-solution" target="_blank">How to Properly Evaluate an APT Security Solution</a><br />
[3] <a href="https://www.virusbulletin.com/testing/" target="_blank">https://www.virusbulletin.com/testing/</a></p>
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/antivirus-software-7-myths-debunked/">Antivirus Software – 7 Myths Debunked</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Protect Your Computer from Ransomware</title>
		<link>https://www.compuclever.com/posts/protect-computer-from-ransomware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=protect-computer-from-ransomware</link>
		
		<dc:creator><![CDATA[Charles Edward]]></dc:creator>
		<pubDate>Fri, 29 Apr 2016 16:54:52 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[computer scam]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[how to]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[online identity]]></category>
		<category><![CDATA[pc tips]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=2566</guid>

					<description><![CDATA[<p>Ransomware is the latest threat to afflict millions of computer users worldwide. What&#8217;s really startling is that even police departments are being affected. Let&#8217;s take a look at what ransomware is, and how you can protect yourself against it. Cyber-criminals have so far collected more than $200 million in the first three months of 2016, [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/protect-computer-from-ransomware/">How to Protect Your Computer from Ransomware</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">
<p>Ransomware is the latest threat to afflict millions of computer users worldwide. What&#8217;s really startling is that even police departments are being affected. Let&#8217;s take a look at what ransomware is, and how you can protect yourself against it.</p>
</div>
<p>Cyber-criminals have so far collected <a href="http://money.cnn.com/2016/04/15/technology/ransomware-cyber-security/index.html">more than $200 million</a> in the first three months of 2016, and are on track to steal $1 billion by the end of the year.</p>
<p>How?</p>
<p>By tricking regular people, as well as businesses and institutions, to download &#8220;ransomware&#8221; that takes control of computers and servers. If you want to unlock your computer data, you have to pay the crooks.</p>
<p>It&#8217;s a lucrative scam and no one is safe: hospitals, school boards and <a href="http://www.nbcnews.com/news/us-news/ransomware-hackers-blackmail-u-s-police-departments-n561746">even police departments</a> have all been blackmailed by ransomware criminals so far this year.</p>
<h2>You Don&#8217;t Even Have to Download Ransomware to Infect Your Computer</h2>
<p>Most recently, <a href="http://www.cbronline.com/news/cybersecurity/data/game-of-thrones-fans-targeted-with-ransomware-in-pirate-bay-malvertising-attack-4876796">Game of Thrones fans were targeted by ransomware</a> just by visiting the Pirate Bay video downloading site.</p>
<p>What&#8217;s most frightening about this example is that the visitors to the Pirate Bay didn&#8217;t actually download any malicious files.</p>
<p>Instead, all they did was get secretly redirected to a webpage that exploited common security holes in their Internet browser. Ransomware was &#8220;injected&#8221; into their computer before they knew what was happening.</p>
<h2>What is &#8220;Ransomware&#8221;?</h2>
<p>Ransomware is a type of malware—a malicious software program—that, once installed, takes over your computer. Ransomware may prevent your computer from working properly. It can also encrypt or lock away important data, including photos and music files.</p>
<p>The only way to regain control of your computer is to pay off the ransomers, usually by wire transfer or some other untraceable payment method.</p>
<h2>How Does Ransomware Get Installed In the First Place?</h2>
<p>Sometimes <a href="http://www.theglobeandmail.com/report-on-business/rob-commentary/ransomware-poses-complex-legal-and-reputational-risks/article29761516/">ransomware is downloaded and opened by accident</a>. You may think you are downloading a video file or a useful software program, but in reality you are installing ransomware on your computer.</p>
<p>Sometimes people claiming to be <a href="https://threatpost.com/ftc-shutters-120-million-tech-support-bogus-software-scam/109533/">&#8220;MS tech support&#8221;</a> call you up, and persuade you to download what they claim is some sort of computer utility program.</p>
<p>They walk you through the process, step-by-step, over the phone, to download the ransomware.</p>
<p>Still, what is the most common ransomware &#8220;exploit&#8221;?</p>
<p>Your Internet browser. Thanks to weak coding, Internet browser security vulnerabilities are being found by cyber-crooks all the time. Visit the wrong web page by mistake and ransomware is downloaded automatically onto your computer.</p>
<p>Once downloaded, a common ruse to complete installation of the ransomware is for a pop-up screen with an <a href="http://www.dailytech.com/FTC+Announces+Crackdown+on+Computer+SpeedupTech+Support+Scams/article36916.htm">&#8220;FBI warning&#8221;</a> to appear on your computer. Push any button on the popup and the ransomware installation process gets finished, and your computer is hijacked.</p>
<p>Police departments and other government agencies can&#8217;t provide much help—they are overwhelmed by other problems and simply cannot track down the cyber-criminals.</p>
<p>So, to get rid of the ransomware and regain control of your computer, the only thing you can do is pay off your hijacker.</p>
<p>Or, you can take steps to avoid downloading the ransomware in the first place.</p>
<h2>How to Protect Your Computer from Ransomware</h2>
<h3>1) Make sure you have antivirus installed</h3>
<p>Make sure you have a current, legitimate antivirus program installed on your computer. Antivirus continuously scans for Internet attacks and malicious web pages that try to download ransomware without you knowing it.</p>
<p>Did you know CompuClever offers a comprehensive Internet security solution that continuously blocks Internet attacks and malicious web pages that try to download ransomware without you knowing it?</p>
<p>Check out <a href="https://www.compuclever.com/products/antivirus/" target="_blank">CompuClever Antivirus PLUS</a>, an innovative security software. CompuClever Antivirus PLUS has received a full mark with a rating of &#8220;SOLID&#8221; from the prestigious <a href="https://www.virusbulletin.com/testing/results/recent/vb100-antimalware/compuclever-avplus" target="_blank">VB100 antivirus testing lab</a>.</p>
<h3>2) Hang up the phone on &#8220;Microsoft tech support&#8221;</h3>
<p>Microsoft or any other software company never, ever phones (or emails), offering to help fix a problem they have identified on your computer. If someone claiming to be from tech support phones you up, hang up the phone immediately.</p>
<h3>3) Backup your files on an external disk</h3>
<p>Make sure important such as photos, music and videos are stored on an external backup drive. Backing up data is easy to do, thanks to cheap USB drives that now have more storage space than some laptops.</p>
<p>If you do download ransomware, before paying the cyber-crooks a single cent, ask a computer-savvy friend for help or obtain professional tech support.</p>
<p>There are many reputable programs and utilities that can help you gain control of your computer.</p>
<p><em>Have a request for Tech Corner? Email me at <a href="mailto:newsletter@compuclever.com" target="_blank">newsletter@compuclever.com</a>.</em></p>
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/protect-computer-from-ransomware/">How to Protect Your Computer from Ransomware</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
