Help each other out of non-Webroot technical jams and discuss tech-related stuff in general.
- 4,836 Topics
- 12,340 Replies
Anyone know how to get rid of the search browser hijacker? It is search-milk.net. I downloaded Webroot Anywhere 2012 last week, but I can't get it to find it...wondering if it I need an additional program from Webroot? The reading I have done thus far, has said this is a bad malware/spyware program. Help.
[b]Fact![/b] According to our partners at the Juniper Networks Mobile Threat Center, there was a 3,325 percent jump in malware targeting the Android platform over the last 7 months. To find out where the majority of malicious apps were found and which malware type was the most popular, read the full story from the Webroot Threat Blog. [url=http://blog.webroot.com/2012/02/17/report-3325-increase-in-malware-targeting-the-android-os/]>> Read More[/url]
Online browsing and social media sites [url=http://www.pewinternet.org/Reports/2010/Reputation-Management.aspx]play a central role[/url] in building your identity online. This means that kids are especially susceptible to publishing regrettable content online. If you have a teen who is active online, here are some way to keep them from crossing over to the proverbial Dark Side: [b][u]Teach them that they are searchable online[/u] [/b]The Pew Internet Project found that “two thirds of online teens are content creators–meaning they create videos, post photos, write blogs and message boards." While these activities serve as a way to participate in social networking, teens run the risk of posting something they might later regret. According to one study, 19% of adults use search engines to discover a person's professional contacts (coworkers, competition, etc), and 11% use Google as a tool to weed out applicants for jobs. The bottom lin
Purchasing items through an internet classified site is a great way to find the items you’re looking for at a terrific price, but there are risks you take when you do. Your first line of defense is to use reputable services and follow closely any advice the site gives about buying safely. [b]How to respond to an ad[/b] [list] [*]If the ad seems too good to be true, it probably is. There is a fine line between a great deal, and getting scammed or stuck with stolen goods. If the site allows you to see seller reviews, check these out and avoid anyone with a questionable sales history. [*]If you want the convenience of allowing the seller to call you (as opposed to responding by email through the service), provide a free disposable phone number. You can get one easily by searching on ‘disposable phone number’ and selecting from one of several companies that provide this service. Don’t put your personal phone number in your response to an ad – you don’t want people to be able to har
[list=1] [*]Stick to the facts of the item being sold. Leave out personal information, including your email and phone number, if you can help it [*]Look hard at any photo you post. You don’t want it to include house numbers in the background, or license plate numbers, family members, etc. [*]Understand that many out-of-area buyers are associated with fraudulent deals [*]If anything feels “off,” stop contact. It’s always a good idea to chat on the phone for a bit about the item for sale and be wary of erratic or nonsensical behavior on the phone [*]Make it clear that you will only accept cash for the item. Other forms of payment are highly likely to be fraudulent [*]Don’t accept partial payment or anything other than cash for the transaction. If the method of payment changes from your previous agreement, walk away from the deal [*]Agree to meet during daylight hours in a public place and bring a friend to accompany you. With high profile items, it’s okay to ask for proof of identity suc
People ask us all the time, "What are some basic ways to keep my personal data safe on my smartphone or tablet?" And it's a great question, since mobile devices are exploding in popularity. To that end, here are some basic, need-to-know tips for securing your mobile device: [b]Know your apps:[/b] Download apps only from a trusted source, like the Google Market, Apple App Store or Amazon App Store. Closely scrutinize the permissions the app requests, and don't install it if it wants to access certain functions that it doesn't need, such as the ability to send SMS messages. User reviews are also helpful. [b]Lock your device:[/b] Most smartphones and tablets give you a choice of locking the device with a password, numeric code or pattern. Take advantage of this – if nothing else, you'll prevent practical jokesters from emailing your boss if you leave your device unattended. [b]Explore mobile security services:[/b] Mobile security apps provide lost de
Apart from grounding your kids or having the awkward “we need to talk” talk, there are some serious risks for kids who are connected all the time. The truth is, even if parents trust that their kids are making the right decisions online, threats such as online predators, inappropriate content, and cyberbullies are real. The Internet safety for children advocacy group, [i]ikeepsafe.org[/i], brings to light three main risks associated with all connected technology: [b]Inappropriate Contact[/b],[b] Content[/b], and [b]Conduct[/b] (the 3 C’s). [b]Inappropriate contact[/b] occurs when strangers or predators online reach out to kids to establish new relationships or to engage in regular communication. “The Internet is a place to enhance existing relationships, not a place to meet new people,” warns the organization. And it happens more than we would like to think. A recent study done by [url=http://www.redorbit.com/news/technology/2065158/study_examines_online_beha
[b]Fact![/b] Back in simpler times, you had to keep a close watch on .exe files. Now, malware infections can occur through “[url=http://en.wikipedia.org/wiki/Drive-by_download]drive-by[/url]” downloads. The malicious code lurks on seemingly innocent content, which then executes automatically via vulnerabilities in your browser without your knowledge. In other words, you never know what hit you. Cybercriminals are even using advanced distribution platforms to deliver their drive-by exploits. Webroot Threat Researcher, Dancho Danchev, recently gave us a glimpse into one of these platforms, a Java-based platform called AnonJDB, which you can read about [url=http://blog.webroot.com/2012/01/17/inside-anonjdb-a-java-based-malware-distribution-platforms-for-drive-by-downloads/]here.[/url] [url=http://www.infosecurity-magazine.com/view/19909/black-hat-2011-google-android-as-vulnerable-to-driveby-downloads-as-pcs-claims-dasient-research/]Research[/url] also suggest
[b]Myth![/b] [b][/b] [b][/b]So you don’t have major financial institution spreadsheets on your hard drive or a database of Beverly Hills socialites’ social security numbers. You probably do have an email password, access to at least one [url=http://protectme.webroot.com/articles/sure-footed-social-networking.html]social networking[/url] site and a resumé in your documents folder, which are all someone needs to steal your identity. Think about it – all your juicy lifespan details are listed: your alma mater, work timeline, etc. See, you do have something valuable on your computer – and it’s worth protecting.
Online tax season is rife with phishing scams as cybercriminals try to fool us into giving away our private information. Make sure you stick to the following 5 tips, before you file, to outsmart their antics: [b]1. Outsmart email scams[/b] Imposters might solicit information from you through email. Scam messages typically contain dire warnings or outrageously large promises for a refund. The messages often are presented as if they originate from the IRS, HMRC, or the Social Security Administration but contain links leading to phishing Web pages (where your banking, credit card, and personal details are stolen), or malicious attached files instead. It’s important to know that the IRS does not discuss tax information via email, nor do they ever send warnings, advice, links to their website, or ask for information through email. [b]Tip: [/b]If you receive such a message, don’t reply to the sender, don’t open any attachments, don’t email your personal informatio
Here are 4 simple ways to backup your music (and prevent headaches down the road): [b]1. Use External hard drives[/b] This portable storage device gives you the freedom to back up more than one computer. It’s user-friendly and you can get 1 Terabyte (about 250,000 or more songs) for way less than you paid for your [url=http://www.8-track-shack.com/blog/2009/12/worlds-largest-8-track-tape-collection/]8-track collection[/url]. However, external hard drives, like the hard drive on your computer, can crash; you may also lose the device as it’s quite sleek and inconspicuous these days. [b][/b] [b]2.[/b] [b]Use CDs/DVDs[/b] This is another convenient and popular backup option for digital files. If you have the time, you can burn your entire collection to discs and keep them in a safe place. The challenge with this method is that they can get scratched easily, and it’s kind of like taking a step back, frankly. A major advantage to owning digital files is that they create less dis
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.