• Home
  • Products
  • Purchase
  • Support
  • Company

CompuClever Blog

A Personal Encounter with Ashley Madison

October 1, 2015 by Andy Thompson

What are the consequences to piracy that involves millions of users and personal information? We look at both the overall effect of the greatest hack in modern day as well as how it came to our attention through someone seeking our support and professional guidance. We offer here testimony and strategy.

Unless you have been living under a rock for the past few months, you must have heard about the Ashley Madison account hack. This was where hackers released the entire user database of names, email addresses, billing information, and account details of 38 million users tied to the site. Some described the historical hack episode as an extinction-level event for privacy.

Jeff Yang, a columnist for The Wall Street Journal, asked this simple but stern question in his CNN-syndicated commentary – Ashley Madison hack: privacy becomes extinct. Comparing the incident to the prehistoric planet-wide catastrophe that wiped out the Jurassic World, Yang declared that the data hack of the Toronto-based infidelity website was “an extinction-level event for privacy”.

Attack Aftermath

We were shocked when we first learned that hackers managed to steal close to 40 million users’ records from Ashley Madison, which made claims shortly after the incident that its members remained anonymous. Continue reading...

Filed Under: Antivirus, Blog, CompuClever Antivirus PLUS, Newsletter, online security, PC security, Protect online privacy, Windows tips

Surf with Confidence

September 2, 2015 by Andy Thompson

Unlike shark attacks, cyber-attacks are numerous, sophisticated, and ever-changing. Many cyber criminals who have managed to evade law enforcement are not only resourceful but also considered experts. To a certain extent they are even innovative. Compelled by the sinister desire of luring more victims while remaining undetected, hackers diligently invent new techniques and schemes to exploit systems of users who are even security-conscious.

Jaw-dropping

The cases presented below are a couple of example of classical cyber-attacks that are conniving, stealthy, and almost ingenious.

  • Case 1: While surfing the web at home, the user of a hacked PC was prompted to create new accounts in order to use her own Wireless Access Points (WAP). Not knowing what was happening behind the scenes, the victim would use a common username or email address along with a password that was used for several other online accounts.  The result: the hackers gained complete and unblocked access to her email, Facebook, Twitter, Pinterest, or even online banking site.
  • Case 2: On the premises of a Starbucks coffee shop, hackers positioned a Wi-Fi hotspot and disguise it so that it appears to belong to Starbucks. Attackers then redirect victims to frequently used websites that were actually modified or fake to capture login credentials or deploy keylogging malware to harvest personal identity information.
Continue reading...

Filed Under: Antivirus, CompuClever Antivirus PLUS, online security, PC security, Protect online privacy

Safeguard Your Online Banking

August 31, 2015 by Andy Thompson

Over the last few years Internet fraud has increased and is becoming a serious issue for online transactions. Using a variety of methods, online thieves can easily access important information like bank accounts and personal data. This article helps you to understand essential techniques hackers deploy to break into your bank account and how to nullify these hacking attempts by using tools that may already be available with your antivirus application.

How hackers infiltrate your bank account

To infiltrate your bank account hackers need exactly the same set of complete credentials you would supply to your online banking site. It is extremely rare, although not impossible, that a hacker would directly contact someone who would then voluntarily give away her bank account number, login name, and password over the phone or email. But it is very common that a compromised PC infested with malware can provide hackers with the necessary recorded keystrokes, mouse clicks, and even screenshots. By mimicking the procedures they’ve learned with the obtained credentials, hackers can digitally impersonate you and thus gain access to your bank accounts over the Internet with ease.

How to nullify online banking hacking attempts

You can defuse these attempts head-on by knowing the essential schemes used by hackers. Continue reading...

Filed Under: Antivirus, Blog, CompuClever Antivirus PLUS, online security, PC security, Windows tips

Antivirus Solutions

July 31, 2015 by Andy Thompson

Too frequently PC users suffer the consequences of a virus or malware attack.  Once becoming a victim of an attack it seems the only choices available is to take it to a repair technician or try to re-install the entire operating system yourself.  With all these situations you could face loss of data and you definitely have to wait for your PC to be up and running.  Then there is the cost factor if you have to get someone to do it for you.  It’s no wonder that security tools such as antivirus (AV) products get a lot of attention.  But… as many of us can attest, there are programs that can take over your PC and slow down overall functioning as well as your own workflow when taking into account a constant barrage of popup messages.  We examine here AV solutions and focus on what we need and how we can avoid to some degree malicious attacks from occurring.

In a recent article we touched on the topic of safe PC practices – especially when installing bundled software packages or opening unknown attachments.  Considering many applications contain built-in security and many operating systems also have on-board security tools, what do we actually require from independent AV programs?  Continue reading...

Filed Under: Antivirus, Blog, CompuClever Antivirus PLUS, increasing speed, online security

Browser Repair

February 13, 2015 by Andy Thompson

We have touched on the subject of web browsers in recent articles but have not given full attention to one particularly naughty and crafty unwanted program that many have had the misfortune of experiencing.  How frustrating is it when we take the time to uninstall or re-adjust something on our computer and we find our efforts become undone.  We frequently see many people in need of our support services as they have lost the ability to restore their web home page and regain the overall functionality, look, and feel of their web browser.  The fundamental feeling to this is that their computer is no longer their own but is to some degree, controlled by someone else for another purpose or gain.  This is not right and we need to reclaim our PC and restore the ability to customize the web browser.  We’ll describe the situation to some degree and then point out the steps to take to uninstall the unwanted items and recover your browser once again.

Installing unwanted items to your computer can happen quickly and easily to the point of not knowing what you are getting.  The recent trend is to more easily accept free apps for our PC and because of this, distributors are packaging third-party and other, sometime questionable, software into bundles.  Continue reading...

Filed Under: Blog, Internet Explorer, Newsletter, online security, PC Clean Maestro, PC security

  • « Previous Page
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next Page »

Don't miss out

Get a copy of "5 Tips for a Fast PC" when you sign up for our free "PC Tips" newsletter.

Subscribe Now
Archive Newsletter

Recent Posts

  • Ultra File Opener 5.7 Release Note

    Ultra File Opener 5.7 Release Note

    July 24, 2018
  • How Blue Light Affects Your Health and What to Do About It

    How Blue Light Affects Your Health and What to Do About It

    May 11, 2018
  • How to Protect Your Privacy & Identity on Facebook – Part 2

    How to Protect Your Privacy & Identity on Facebook – Part 2

    April 18, 2018
  • Facing the Truth – Facebook & Privacy

    Facing the Truth – Facebook & Privacy

    April 7, 2018
  • Spectre and Meltdown:  Massive Security Holes Impacting All Mac and PC devices

    Spectre and Meltdown: Massive Security Holes Impacting All Mac and PC devices

    January 12, 2018
  • How to Fix Computer Sound Problems

    How to Fix Computer Sound Problems

    December 19, 2017
  • Correct Ergonomics Sitting at a Computer Desk

    Correct Ergonomics Sitting at a Computer Desk

    November 17, 2017
  • Five Useful Tips and Tricks for Windows 10

    Five Useful Tips and Tricks for Windows 10

    August 27, 2017
  • Going Incognito – Browse Web in Privacy Mode

    Going Incognito – Browse Web in Privacy Mode

    August 4, 2017
  • Don’t be Held at Ransomeware

    Don’t be Held at Ransomeware

    July 14, 2017
Contact Us | Privacy Statement | Terms of Use | EULA | Partner With Us | Uninstall | Blog
CompuClever© Systems Inc. 2023 All rights reserved.
Microsoft is a trademark of the Microsoft group of companies. All other trademarks are the property of their respective owners.