Help each other out of non-Webroot technical jams and discuss tech-related stuff in general.
- 4,836 Topics
- 12,340 Replies
[b]Who sent the message?[/b] If you were not expecting something from a family member or friend, it may legitimately be from them, or it could be that their account was hijacked and the message is actually being sent by a cybercriminal hoping to infect your computer and/or steal your information. The easy way to discover whether it is actually from your friend or family member is to call, text, or email the sender and ask. Be especially wary of emails from friends and family that a) have no subject line, and b) only contain a link or attachment. This is usually evidence for a hijacked account. Be sure to call the person who purportedly sent you the link to discuss the message with them. If the message and attachments or link come from a company, there is a different set of questions to ask. [b]Do you use this company?[/b] [b][/b] If not it is probably junk, or worse, a scam. If you do use the company, were you expecting to receive an email, or other message
[b]Myth![/b] While “%14lugnut_(1776)-tutu” is better than “pass*word,” you’re still not completely safe. No matter how creative or intellectualized your password, there’s someone (or something) out there devoting 24 hours a day, 7 days a week, to breaking your weak code. Hackers also use [url=http://blog.webroot.com/category/malware/keyloggers/]keyloggers[/url], which can snatch and monitor keypad activity. Encrypt all you want – there’s still a chance your password will be passed along. [u][b]If you want some password help, check out these 3 options:[/b][/u] [b][/b] 1. Use phrases These examples let you use phrases that either mean something to you, or you associate with a type of website. For example: [i]2BorNot2B_ThatIsThe?[/i] (To be or not to be, that is the question – from Shakespeare) 2. Use your artistic side You don’t have to think of it just as the numbers you see, it can also be a canvas to draw on. [i]1qazdrfvgy7[/i], is really
Purchasing items through an internet classified site is a great way to find the items you’re looking for at a terrific price, but there are risks you take when you do. Your first line of defense is to use reputable services and follow closely any advice the site gives about buying safely. [b]How to respond to an ad[/b] [list] [*]If the ad seems too good to be true, it probably is. There is a fine line between a great deal, and getting scammed or stuck with stolen goods. If the site allows you to see seller reviews, check these out and avoid anyone with a questionable sales history. [*]If you want the convenience of allowing the seller to call you (as opposed to responding by email through the service), provide a free disposable phone number. You can get one easily by searching on ‘disposable phone number’ and selecting from one of several companies that provide this service. Don’t put your personal phone number in your response to an ad – you don’t want people to be able to har
[b]Myth! [/b] [url=http://www.webroot.com/En_US/consumer-products-antivirus.html]Antivirus protection[/url] is a slicker in the storm and it’s great that you have it for inclement “conditions.” However, a new virus enters the web-o-sphere quicker than you can say, “Trojan-says-what?” Buy software that updates definitions regularly, preferably automatically. Also, antivirus software only stops viruses from infecting your system while you browse, which is great, but it’s not going to save you from a hacker’s super-smart coding hat trick. Get a multilayered solution that sweeps, firewalls, and safeguards.
If your computer is connected to the internet, you have probably noticed Windows Update notifications in your system tray. While you may understand the necessity of Windows Updates, many people are unaware that Adobe and Java updates are just as important for your computer's function and security. In a recent post to the [url=http://blog.webroot.com/2012/01/11/adobe-issues-a-patch-for-critical-security-holes-in-reader-and-acrobat/]Webroot Threat Blog[/url], our Internet Security Experts recommended downloading Windows, Adobe, and Java updates as soon as they are available. Malware writers are always looking for easy ways to get around your computer’s security. According to a study by [url=http://www.theregister.co.uk/2011/09/28/window_malware_infection_exposed/]CSIS Security Group[/url], 99.8 % of all virus/malware infections can be attributed to un-patched Adobe, Java, QuickTime, Internet Explorer and Windows updates. They exploit common 3rd-party plugins, including those mention
[b]Myth![/b] [b][/b] [b][/b]So you don’t have major financial institution spreadsheets on your hard drive or a database of Beverly Hills socialites’ social security numbers. You probably do have an email password, access to at least one [url=http://protectme.webroot.com/articles/sure-footed-social-networking.html]social networking[/url] site and a resumé in your documents folder, which are all someone needs to steal your identity. Think about it – all your juicy lifespan details are listed: your alma mater, work timeline, etc. See, you do have something valuable on your computer – and it’s worth protecting.
People ask us all the time, "What are some basic ways to keep my personal data safe on my smartphone or tablet?" And it's a great question, since mobile devices are exploding in popularity. To that end, here are some basic, need-to-know tips for securing your mobile device: [b]Know your apps:[/b] Download apps only from a trusted source, like the Google Market, Apple App Store or Amazon App Store. Closely scrutinize the permissions the app requests, and don't install it if it wants to access certain functions that it doesn't need, such as the ability to send SMS messages. User reviews are also helpful. [b]Lock your device:[/b] Most smartphones and tablets give you a choice of locking the device with a password, numeric code or pattern. Take advantage of this – if nothing else, you'll prevent practical jokesters from emailing your boss if you leave your device unattended. [b]Explore mobile security services:[/b] Mobile security apps provide lost de
Here are 4 simple ways to backup your music (and prevent headaches down the road): [b]1. Use External hard drives[/b] This portable storage device gives you the freedom to back up more than one computer. It’s user-friendly and you can get 1 Terabyte (about 250,000 or more songs) for way less than you paid for your [url=http://www.8-track-shack.com/blog/2009/12/worlds-largest-8-track-tape-collection/]8-track collection[/url]. However, external hard drives, like the hard drive on your computer, can crash; you may also lose the device as it’s quite sleek and inconspicuous these days. [b][/b] [b]2.[/b] [b]Use CDs/DVDs[/b] This is another convenient and popular backup option for digital files. If you have the time, you can burn your entire collection to discs and keep them in a safe place. The challenge with this method is that they can get scratched easily, and it’s kind of like taking a step back, frankly. A major advantage to owning digital files is that they create less dis
[b]Myth![/b] More than [url=http://www.sophos.com/medialibrary/Gated%20Assets/white%20papers/sophosmythsforsafewebbrowsingwpna.pdf]83 percent of malware hosting sites[/url] are “trusted.” You’re more likely to be attacked by visiting a legit shopping or general lifestyle site than you are an adult or gambling site. Go ahead and do whatever you need to do with this information, but do it safely. If you're in need of protection, click on that fancy Webroot logo at the top of your screen and view our products.
Online tax season is rife with phishing scams as cybercriminals try to fool us into giving away our private information. Make sure you stick to the following 5 tips, before you file, to outsmart their antics: [b]1. Outsmart email scams[/b] Imposters might solicit information from you through email. Scam messages typically contain dire warnings or outrageously large promises for a refund. The messages often are presented as if they originate from the IRS, HMRC, or the Social Security Administration but contain links leading to phishing Web pages (where your banking, credit card, and personal details are stolen), or malicious attached files instead. It’s important to know that the IRS does not discuss tax information via email, nor do they ever send warnings, advice, links to their website, or ask for information through email. [b]Tip: [/b]If you receive such a message, don’t reply to the sender, don’t open any attachments, don’t email your personal informatio
[b]Myth![/b] Before you go online and purchase that batch of glow sticks for your emergency preparedness kit, you look for that little padlock in the browser bar. Although your instinct tells you to beware, that lock is the mark of the Internet Security God, right? That would be a big, fat fail. All that the padlock icon means is that there is a secure connection between your computer and the web server: You’re still not protected from malware. That secure connection is going to help prevent someone from hacking into your home network, but it won't stop the traps that are found on phishing sites or sites with poor reputations, for example. Also, some hackers are quite good at faking [url=http://www.sslshopper.com/what-is-ssl.html]an SSL certificate[/url] – or buying one for a spell – and throwing in some padlock clip art. Many people have been fooled into thinking a page is legit when in fact it’s not. It's a great idea to have effective an effective [url=http://www.webr
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.