1.2 Billion User Names and Passwords For Sale

Is it time to change your password?  Now that security researcher Alex Holden, of Hold Security in Milwaukee has uncovered a huge trove of stolen user credentials on the Dark Net, you might as well assume that yours are in this mammoth collection.

Alex Holden was born in the Ukraine, and his current surname is not the one he was given at birth.  But he discovered that Russian cyber-criminals had gathered 542 million email addresses and 1.2 billion unique email and ...

Continue Reading →
0

Removing Junk Programs From Your Computer

Bloatware, crapware, trialware, PUPs Potentially Unwanted Programs)  This stuff fills up our hard drive and usually has a component that starts automatically when we reboot our computer.  With all this unnecessary stuff running in the background, your computer runs slower. And a lot of this stuff pushes advertising, either as pop-up, search redirects, or on the web pages we are viewing.  Where does all this stuff come from?

If you bought your computer at retail, much of this stuff comes preinstalled. ...

Continue Reading →
0

Rogue Security Software – “Scareware”

One of the more common viral or spyware infections I see more of is the installation of rogue or fake anti-virus or anti-spyware programs. These have been called “scareware” programs by some, because they work by “scaring” you into purchasing their security “solution.” They generally start out as an e-mailed invitation (SPAM) to run a free security scan, with a link that takes you to a web site. When you go to this web site and run the ...
Continue Reading →
0

Drive-By Trojan Downloader Compromises Security

One of my collegues sent a link to a BBC article about the Sinowal Trojan horse , which is also known as Torpig and Mebroot. This trojan installs itself on victims’ computers when they simply visit certain web sites, and collects banking and credit card information and reports back to the what appear to be eastern European and Russian criminal gangs, such as the Russin Business Network. Links to the article are here.

Your best form of protection ...

Continue Reading →
0
Page 2 of 2 12