Can An Attacker Use Your Company’s Own Employees Against It? Limit Network Access


Computer Security Tip of the Week

Scott Aurnou – Access to your company or firm’s computer network should be as limited as possible. That way, if a user’s account is compromised, the damage can be more easily contained.

If you enjoyed this video, you can see more on TheSecurityAdvocate YouTube channel (and subscribe if you like).

Tagged with: , , , , , , , , , , , , ,
Posted in Laptops & Desktops, Network Security, Security Tip of the Week, Smartphones & Tablets

What’s a Trojan (from a Computer Security Standpoint)?

Trojan Horse Post PicBy Scott Aurnou

In the security world, ‘Trojan’ is short for ‘Trojan horse.’ It’s a piece of hidden malicious software (aka ‘malware’) that – like the Trojan horse of Greek legend – isn’t what it appears to be.

Trojans are the majority of current malware, so it’s definitely wise to know where they can be found, what they can do and what you can do to protect your work network (and yourself) from them.

Among other places, Trojans can be lurking on infected websites or hidden in software downloads, email attachments, and mobile apps. They can hide inside nearly any type of file (audio, video, office documents, pictures, etc.) and will often be disguised as something fun, interesting or important, to tempt you to click on them.
Read more ›

Tagged with: , , , , , , , , , , , ,
Posted in Fraud & Scams, Laptops & Desktops, Network Security, Smartphones & Tablets

Beware Fake Web Browser Update Warnings

By Scott Aurnou

Hopefully you know how important it is to keep the software on your computer up-to-date. If not, please take two-and-half-minutes to watch this video. Unfortunately, online scam artists know this, too, and will try to trick you into clicking on web links for fake software updates. Rather than the promised updates, these links will download malware onto your computer.

One such scam targets users of various web-browsing programs, including Firefox and Google Chrome.

The first step in the attack begins when you unknowingly click on an infected or malicious ad. You are then taken to an infected web page that looks like an official page from your web browser. The page will warn you that your browsing software is out-of-date and offers links to ‘update’ it if you click on the ‘Install’ button. There are different versions of the page tailored to match the browser you’re using, though each one is still fake. The Firefox-themed page actually offers options with ‘service packs’ and built-in anti-virus protection, neither of which is actually offered by Firefox. Examples of various fake web browser update pages can be found on the Stop Malvertising blog.
Read more ›

Tagged with: , , , , , , ,
Posted in Fraud & Scams, Laptops & Desktops, Smartphones & Tablets, Uncategorized

What Is the Most Important Step To Protect Your Computer?


Computer Security Tip of the Week

Scott Aurnou – The vast majority of malware attacks by hackers target flaws in the software on your computer that have already been ‘patched’ (aka fixed) by the manufacturer. Update the software regularly to put those patches in place and safeguard your computer against those attacks.

Helpful websites referenced in this video include:
Secunia: http://secunia.com/
FileHippo: http://www.filehippo.com/
AppFresh for Mac: http://metaquark.de/appfresh/mac

If you enjoyed this video, you can see more on TheSecurityAdvocate YouTube channel.

Tagged with: , , , , , , , , , , , ,
Posted in Laptops & Desktops, Network Security, Security Tip of the Week, Smartphones & Tablets