From the Visual Capitalist. Click through to read article.
Continue Reading →
Why am I, as a cybersecurity professional, posting an article on COVID-19? Cybersecurity covers more territory than many people realize. Of course, a cybersecurity professional is always focused on protecting systems, networks, data, and information. But any cybersecurity certification I have personally taken has ...Continue Reading →
You think you just got a malware infection on your computer, but you’re not sure, and you aren’t sure what to do. Take it to the Geek Squad or another qualified IT shop? If only there were simple things you could try on your own. The good news is there are, and we will show you some of them today.
I just finished helping a client with a strange issue that I thought might be malware related, and we successfully fixed his issue by email, without having to meet or even set up a remote support session. And it occurred to me that I have not covered the issue of malware remediation in ages. Since this can be a fairly easy DIY project for most computer users, I thought a fresh ...Continue Reading →
I recently read an article from Heimdal Security about online safety. In this article Heimdal had asked 18 experts in the field of cybersecurity for their top 3 ideas about how to stay secure. The contributors included top cybersecurity professionals from several anti-malware companies, security bloggers, and cybersecurity industry professionals. The original article is here.
What I found interesting were the ...Continue Reading →
There is a new encryption ransomware exploit hiding inside a spoofed copy of the popular Chinese game “King of Glory.” Right now, this malware is affecting users in China, but it is a matter of time before another cyber-criminal group modifies it for English speaking victims.
This game is available on international gaming forums, and is being spread when gamers download a copy to ...Continue Reading →
Originally this appeared to be a phishing campaign, but phishing emails are spoofed clever replicas. These emails were the genuine article, and were sent from Google mail servers, from the hijacked Google accounts of people you were likely to know. This made the exploit difficult to detect, ...Continue Reading →
We have been recommending Windows Defender as an acceptable anti-malware program. What we like about it is that it comes baked into the Windows 10 operating system, and gets its malware definitions updates with the other Windows security and feature updates that users are already receiving. And it is free. Plus it keeps your system a little less cluttered than adding a third party anti-malware product.
Sure, it is not top of ...Continue Reading →
On Wednesday we looked at the obvious, visual symptoms of a malware infection. Today we will explore some changes in performance that can indicate that your computer is infected.
Most malware writers are NOT interested in giving you easy visual clues, but the malware will create additional activity on your system that can tip you off to an infection.
Today we are going to look at the symptoms that your computer may be displaying that are indications of a malware infection.
These are signs that you will see on your computer display, and are the most obvious symptoms.