|
10/18/2011
What to do when Google/Yahoo/Bing results are redirecting A. Buy a MAC 
B. Learn Linux
OR 10/18/11 - For Windows users the redirect
virus is a browser hijacker. When a user surfs it redirects the browser to a different result (usually malicious URLs). As
soon as this hijacker gets inside a machine it disrupts a users Internet browsing services. It is propagated by
TDSS rootkit, Aluren, Tidserv, Backdoor.Tidserv, Trojan:WinNT/Alureon.D, TrojanSpy:Win32/Chadem and other threats
that can easily infiltrate poorly protected systems. Systems protected by licensed antimalware programs have a low
risk of infection. Systems suspected of infection should be scanned with a legitimate program (like pcTools Spyware Doctor)
to remove this parasite.
If you have been noticing some of these issues, here are some steps that will help you solve Google redirect
virus problem:
Step 1: Scan your computer with updated anti-spyware
programs:
1)
2) 
3)
4)
5) 6)
Step 2: Check Hosts file for malicious entries
Hosts file is on C:\Windows\System32\Drivers\etc\hosts where
Windows is your windows installation directory. On Windows 7/Vista, you should open your hosts file with administrative privileges.
 It will look like this: (open the file with Notepad)

Pay
attention to lines and IPs: if you see more, delete these, especially if they rewrite google or Microsoft subdomains.
Step 3: Check Domain Name Server (DNS)
settings
1) Go Control Panel->
Network Connections -> select Local Area Connection. Then you should right-click
the icon and choose Properties.

2) You should see
a window. Select Internet Protocol (TCP/IP) and click Properties as it is shown in
a picture below: 
3) New window
(Internet Protocol window) will show up. Click Obtain
an IP address automatically and Obtain DNS server address automatically. Finally, click
OK to save the changes:

Step 4: Check your proxy settings:
For Internet Explorer
1) Launch IE, then go Tools ->Internet
Options. Click Connections tab and press Local Area Network (LAN) Settings as
it is shown is a picture:

2) Unselect everything or enter parameters that were given by system administrator
and press OK.
For Mozilla Firefox
1) Launch Mozilla Firefox, then go Tools ->Options.
Additionally, press Advanced and open Network tab. Press Settings
button.

2)
Select No proxy or enter parameters that were given by system administrator and press OK.
Step 5: Check your Internet Explorer
add-ons:
1) Launch IE, then select
Tools->Manage Addons
2) Delete all ad-ons that look spammy/unknown or simple
are unverified (there might be some useful ones, but better re-install them after some time).
9:26 pm edt
Malwares Eradicator 10/18/11 - Malwares Eradicator is a misleading security application that reports non-existing system security threats and displays fake security alerts
to make you think your computer is seriously infected. The rogue program is related with Rapid Antivirus malware. Once
installed, this bogus software will display a variety of infections and ask you to buy a full version of the program
to remove computer threats which do not even exist. Do not purchase it! Instead, uninstall Malwares Eradicator from your
computer as soon as possible.
Malwares Eradicator is promoted through the use of Trojans, browser hijackers and
other malicious software. Usually, it enters the system secretly without your consent. Malwares Eradicator can be
downloaded and installed manually from its home pagemalwareseradicator.com too. The website is very unprofessional. Frequently
Asked Question section is full of Rapid Antivirus malware screen shots. This only proves that Malwares Eradicator
and Rapid Antivirus are crated by the same group of malware creators.
While running, Malwares Eradicator will
be automatically configured to scan your computer when Windows starts. To make things even worse, this infection will
constantly display fake or exaggerated security warnings and notifications form Windows task bar. It will state that
your computer is under attack or that your anti-virus software is disabled. Malwares Eradicator will then suggest
you to purchase the program to ensure full system protection. However, it's nothing more than a scam. Please use one
of the automatic removal programs listed below to remove Malwares Eradicator from your PC. Also scan your computer
with one of these reliable anti -malware applications to make sure there are no other malware installed on your
computer.
MalwaresEradicator properties: • Changes browser settings • Shows commercial adverts • Stays resident in background

9:04 pm edt
10/17/2011
Android Vulnerabilities 10/17/11 -
Security experts have announced two serious security vulnerabilities found in Android platform mobiles this
month. The first one allows the installation of apps without asking
a user’s permission, so attackers gain the capability to install malware (which is capable without any warning
to monitor phone’s contacts, location information and text messages and transmit data to a remote server). According
to some exploit researchers, The Android Market is still the most dangerous (full of bugs).
The second bug is in the Linux kernel (where
Android originates and where installed apps with limited privileges gain full control over the device). This vulnerability
attacks the security model created by Google developers to protect the smartphone against the damage any one application can do to the overall system. This vulnerability is in the code device manufacturer has put into some of Android’s
most popular products, including the Nexus S. To avoid various bugs that allow attackers to steal confidential data and other information always trust only
official Android markets. We also recommend you install an anti-virus program (like those listed above) on your
smartphone which will aid you in avoiding malware attacks.
6:56 pm edt
10/16/2011
Relevant Knowledge
4:29 pm edt
10/15/2011
Adidas trojan
10/15/11 - Aims of this trojan horse vary from causing different unexpected effects on the infected system to stealing
private data. Adidas trojan also has one typical for all trojans feature - it is constantly hiding from the user in background. Use
one of the automatic removal tools below to eradicate this parasite. Adidas
Trojan properties: • Hides from the user • Stays resident in background

8:00 pm edt
10/12/2011
Cloud Protection
10/12/11 - Cloud Protection is a rogue anti-virus program from the same family as Guard Online. It claims that your computer is compromised and directs you to purchase the full version of the program to remove the
alleged malware. When running, this parasite will restrict access to certain websites primarily in an effort to
protect itself from being deleted and block legitmate anti -spyware software. To make this scam even more effective,
Cloud Protection will flood your computer with very annoying and of course fake security alerts and notifications about
serious security problems and system exploits. If you are infected with this malicious software, please remove Cloud
Protection from your computer as soon as possible. If you have already purchased it, you should contact your credit card
company and dispute the charges. Although, Cloud Protection doesn't look like a regular Windows application, it
may still trick many users into thinking that their PCs are infected by malware.
Once Cloud Protection
is installed and running, it will perform a fake system scan and find non -existent viruses, to inform the user that
his computer is infected with spyware and other viruses. The rogue also displays fake security alerts. These alerts are
very similar to genuine Wiindows alerts, so the user can be easily confused. Cloud Protection then suggest the user purchase
the software in order to remove those infections. However, as you may already guess, you shouldn't pay for it. Cloud
Protection cannot remove any infections and viruses. It was designed to steal money from people. That's why we strongly
recommend you to use one of the automatic removal tools below because this rogue is usually bundled with rootkits. 
8:45 pm edt
AV Guard Online 10/12/11 - AV Guard Online is a rogue program from the same family as Security Guard 2012 malware.
It tries to scare you into paying for bogus software by making you think that your computer is infected with viruses.
AV Guard Onlines is installed through the use of Trojans that display fake security alerts and pop-ups on the computer
and infected web sites. When running, this parasite will pretend to scan your computer and detect numerous files as malware
(but will not allow you to remove them until you purchase the program). Furthermore, this fake program will block
legitimate anti-virus and anti-spyware programs or in some cases it may block nearly all legitimate software on your
computer and disable certain system tools (such as Task Manager and Registry editor). This can be very annoying so you
should uninstall AV Guard Online from yourt computer as soon as possible. While AV Guard Online is running, you will
be constantly shown fake security alerts and pop-ups on your computer. Those alerts will state that there is some
type of security risk on your computer and then prompt you to purchase fake antivirus. The rogue program will also display
fake security alerts and pop-ups. Some of the fake security alerts you may see on your computer screen:
Windows Security Alert To help protect your computer, Windows Firewall has blocked some features of this program. Do you want to keep blocking this program? Name: Zeus Trojan Publisher: Unauthorized
Security Warning There are critical system files on your computer that were modified by malicious software. It may cause permanent data
loss. Click here to remove malicious software Just like the false scan results, these
security alerts are just another trick to make you pay for scareware. You shouldn't purchase it, because otherwise, you
will lose your money. As you can see, AV Guard Online is nothing more than a scam. If you have already purchased
AV Guard Online, then we suggest that you contact your credit card company and dispute the charges. Then you should
remove AV Guard Online on your computer as soon as possible following the removal guide below. We strongly recommend
you to scan your PC with at least one legitimate and reliable anti-spyware program, such as Spyware Doctor. Try one of
the automatic removal tools listed below. 
7:27 pm edt
Widgi Toolbar 10/11/11
- Widgi Toolbar is potentially unwanted program categorized as adware. Presented as one of Internet Explorer components
and, in most cases, downloaded together with IE updates, it starts messing affected PC up by slowing it down, letting
more malware inside or interrupting with meaningless alerts. As soon as it manages to get on the system, Widgi Toolbar
creates some entries in your Registry what ends up with continuous its launch. Note that it will work on your computer
unless and until you will not remove it. When you remove Widgi Toolbar, it’s important to eliminate all infected
files and folders because this scam tends to hide some of its files. We recommend you using a reputable anti-spyware
to remove Widgi Toolbar.

4:03 am edt
Virus Doctor 10/11/11 - Virus Doctor is another rogue anti-spyware application. Usually, this parasite is advertised by trojan viruses. They constantly load
pop-up windows with fake information about system security risks. When user tries to close those bothersome pop-up windows
he is automatically redirected to a fake online anti-spyware scan page. Counterfeit online scan also states that
user's system has numerous security threats that has to be removed quickly. They suggest to use Virus Doctor anti-spyware
as reliable and effective spyware removal tool. Once installed, Virus Doctor is configured to run automatically
when computer starts up. Then it performs fast system scan without user's permission and reports numerous infections. Virus Doctor claims that these infections can not be removed with trial version. User has to purchase a full copy of
Virus Doctor if he is willing to have a clean system. Don't be simple- hearted and reject this scam. Full version of
this rogue won't help you to remove infections, because the only infection that are present on the system is Virus Doctor
itself and should be removed as soon as possible. Use one
of the removal tools below. 
3:58 am edt
THG Trojan 10/11/11 - THG Trojan is a very versatile and dangerous password stealer, which has also several other destructive actions available to it.
THG Trojan acts by writing itself into system registry and deleting several critically important files (like regedit.exe),
which could help the user to get rid of this infection. After this happens, parasite starts logging user's keystrokes
and stealing various pieces of confidential data, such as ICQ logins or Internet access passwords. Please use one of the automatic removal tools below to eradicate this parasite. THG
Trojan properties: • Sends out logs by FTP or email • Logs keystrokes • Connects itself
to the internet • Hides from the user • Stays resident in background

3:51 am edt
10/9/2011
Data Restore10/09/11 - Data Restore is a fake disk defragmentation applicaton that uses misleading methods such as displaying fake error messages and pop-ups to make you think that your computer has some serious hard drive
problems and system errors. It's from the same family as Data Recovery and numerous other malware. The rogue program
asks the user to pay for a pro version to fix the errors and clean your computer as well as restore default HDD
sectors. If you choose to purchase this bogus program, you will lose your money and give your credit card details
to scammers who push the rogue programs. . Please use one of the automatic removal removal tools listed below to eradicate
this parasite from your system.

2:45 pm edt
10/8/2011
(Fake) System Restore
10:33 pm edt
10/7/2011
YouPorn 10/06/11 - YouPorn is a browser hijacker that might occasionally redirect users to websites designated for adult entertainment.
Redirects may accour any time when surfing the web. Users may experience occasional pop ups once in a while
too. Most of the time, that's a sign of Malware infection. Certain malware promote adult and other websites using very
shady methods. Malware, usually involves rootkits and similar malcode, may create an icon on your desktop called YouPorn.
If you want to stop YouPorn redirects, you have to remove malware that causes them in the first place. Running
several anti-malware programs should be enough but if there's a rookit involved then you'll have to use TDSSKiller and
similar tools to remove rootkits and the associated malware. YouPorn related malware does not automatically link
it to the famous adult website called YouPorn.com. This website was criticized because of a tracking
cookie it used to drop on visitors' machines. But that's an old issue... this website does not use such methods to track
users' browsing habits. If you are redirected to YouPorn and orther similar adult sites, scan your computer
with anti-spyware program. You should remove YouPorn (as soon as possible) using one of the automated removal tools
listed below.

5:40 am edt
10/5/2011
Google redirect
6:14 am edt
Advanced PC Shield 2012 10/05/11 - Advanced PC Shield 2012 is a corrupted antivirus, rogue anti-spyware, that is distributed by using illegal and offensive techniques, like faked
flash updates, infected webpages, spam emails and other. Typically, this rogue installs using various vulnerabilities
in your browser, OS or just because one uses no anti-virus programs. Of course, Advanced PC Shield 2012 won't get
through reputable anti-virus and anti-spyware programs, so make sure your PC is protected as it should be. In addition,
you must remember that this threat is extremely dangerous, as it asks for user to pay for invented viruses removal. In
most cases, viruses detected by Advanced PC Shield 2012 are harmless system files dropped by the same malware after its
secret intrusion.
Advanced PC Shield 2012 will act just like
any other program released by scammers - it will start scanning your system for viruses and then will aggressively offer
to purchase the licensed version which is shown to be the only one capable of eliminating them. Additionally, Advanced PC Shield 2012 will bomb you with popups and alerts. These alerts will make claims about serious infections as well,
however the user can ignore everything this malware says.To make you think your PC is infected, it will report: Application has been attacked with the virus! Advanced PC Shield 2012 detect "GMER"
corrupted by "Backdoor.Destroy" Click here for immediately Security Scan. Severe system damage! Spyware and viruses detected in the background. Sensitive system components under attack! Data loss, identity theft and system corruption are possible. Act now, click here for a free security scan.
Traffic Software found! Your PC activity is being monitor. Possible spyware infection. Your data security may be compromised. Sensitive data can be stolen. Prevent damage now by completing a security scan.
Virus Infection - System security was fount to be compromised. Your computer is now infected. Attention, irreversible
changes may occur. Private data may be stolen. Click here now for an instant anti-virus scan.
When trying to launch your anti-spyware to remove Advanced PC Shield, it will block legitimate programs from being
executed. Besides, your anti-virus will also be listed as an "infection" (with various kinds of malware). Keep
in mind that this is just another scam to force users to try to fix the PC by using the full version of this scareware.
No detection of Advanced PC Shield 2012 is real, and you should not pay for it under any circumstance. Make sure you
remove Advanced PC Shield 2012 immediately after you see the first sights of this infection. Also, you can use this code to manually register the rogue program: 8945315-6548431 in case it blocks your anti -spyware software. You
can also use one of the sautomatic removal tools below to eradicate this parasite.
To uninstall Advanced PC Shield 2012 follow our guide.
1. Download TDSS Killer and Process explorer on safe
PC.
2. Move them to infected PC and launch them
just after system reboots (process explorer first).
3.
Kill Advanced PC Shield 2012 processes.
4. Scan
with TDSS Killer to remove Zeroaccess or TDSS rootkit from the system that comes preinstalled with Advanced PC Shield
2012
5. Scan PC with reputable anti-malware programs and
delete Advanced PC Shield 2012 files.

6:04 am edt
10/4/2011
The Brontok worm 10/03/11 - The Brontok worm is a parasite that spreads across the internet by sending infected email attachments to potential host systems. Usually, the message contained in these emails is an offer to check
out a particular photo, contained in the "Photo.zip" archive attachment.
The ability to remove the Brontok
worm will be disabled immediately after infection, as the parasite will modify your registry entries and security settings.
It can also shut down your anti -virus software, which speaks nothing but danger to your system. Be sure not to open suspicious email attachments, especially those with "Photo.zip" names on them. Please
use one of the automatic removal tools below to eradicate this parasite as soon as possible.
Brontok worm properties: • Hides from the user • Stays resident in background
1:20 am edt
10/2/2011
Keygenguru
5:15 pm edt
Security Sphere 2012 10/02/11 - Security Sphere 2012 is a rogue anti-spyware application that displays fake security alerts and reports non-existent infections to scare
you into thinking that your computer is infected with malware. It's is a clone of the widely spread Personal Shield Pro and System Tool scarware.
The rogue program simulates a system scan and asks the user to
pay for a full version of Security Sphere 2012 in order to remove viruses from the system. In fact, the reported security threats or infections are actually either non-existing/harmless files or legitimate software. This malware
will likely block real security software to protect itself from being
deleted. Most importantly, do not purchase this bogus application and uninstall Security Sphere from your computer
immediately. It is promoted via spam e-mails, malicious or hacked Web pages, peer-to-peer networks. The scammers
also use social engineering to distribute Security Sphere 2012 malware. You shouldn't install anything (on your systems) from
suspicious websites.
To make this scam look more
realistic, it states that your computer is not protected and that you should activate Security Sphere 2012 to ensure
full system protection. As you may know, the legitimate one does not promote particular anti-virus software. That's the
main difference. The rogue application displays the same infections on every computer randomly. To make things even more complicated, Security Sphere 2012 will hijack Internet Explorer and other web browsers and displays fake notifications about possible threats or unsafe websites. Use one of the automatic removal tools listed below to remove this parasite.
9:42 am edt
Gimmiv. 10/02/11 - Gimmiv is a worm that threatens victim’s privacy. It hides its activities, so it can only be detected and stopped
if reputable security tools are used on the infected machine.
The Gimmiv worm is also known as Win32/Gimmiv. Its
mission is collecting diverse information about a compromised system. Once it gathers needed material, Gimmiv sends the
data to remote servers. It usually delivers information to 59.106.145.58, summertime.1gokurimu.com, doradora.atzend.com
and perlbody.t35.com.
Win32/Gimmiv uses the MS08-067 exploit to copy itself to other computers. This exploit is related to Microsoft server service remote code execution. It allows the Gimmiv worm to reach and infect other machines.
The worm sends a few files to the potential victims and those files then download the missing parts of Gimmiv. ... It
updates itself using 59.106.145.58 server.
Gimmiv doesn’t target personal data, but the information it records
can be used for malicious actions. The Gimmiv worm logs machine’s name, local adapter details and Windows version.
It also gathers names of all programs installed on a computer and steals usernames and passwords for MSN Messenger
and other applications. Please use one of the automatic removal tools below to eradicate this rogue software as
soon as possible. Gimmiv properties: • Sends out logs by FTP
or email • Connects itself to the internet • Hides from the user • Stays resident in background 
9:28 am edt
10/1/2011
Crawler 10/01/11 - Crawler is an Internet Explorer
toolbar that provides a pop-up blocker, additional search functions,
links and other useful features. However, it also redirects web searches and changes the Internet Explorer default error
page. Crawler must be manually installed. It runs every time the
user launches Internet Explorer. Please remove this rogue software with one of the automatic removal tools listed
below. Crawler properties: • Changes browser settings •
Connects itself to the internet • Stays resident in background

7:44 pm edt
Redirecting Google Searches 10/01/11 - Redirecting Google
Searches is one of many signs clearly saying that your computer is
infected with malware. Search redirects are usually caused by malicious software that has modules designed to monetize
botnet traffic. Recently, two major rootkit families where found to be related to Google search redirects. Rootkits from
the TDSS family and another very similar rootkit called ZeroAccess. Both are advanced rootkits with well developed sel-defence components. What is interesting about the ZAccess rookit is the module that checks if the system is infected with TDSS
rootkit before installing itself into the system. If the TDSS rootkit exists, ZAccess removes it from the computer. Redirecting
Google Searches is not the only sign of Google redirect virus. If your computer is infected with ZeroAccess rootkit,
you probably won't be able to run your antivirus software and
certain Windows system tools or utilities (for example Process Explorer). To remove the annoying Redirecting Google
Searches you should use TDSSKiller and ZeroAccess removal tool. Both are free. Even if you don't experience search redirects it is still a good idea to check whether your PC is infected
with rootkits or not. Redirecting Google Searches and related problems can be caused by other malware too. It might
be modified web browser and LAN settings as well. If your antivirus
software and tools mentioned above do not help, please search for and use the Google redirect virus removal guide 'What to do when Google/Yahoo/Bing results are redirecting'? Last, but not least, install good antivirus and antispyware software; for
example, pcTools' Spyware Doctor (or one of the automatic removal tools listed below) to remove malware from your computer,
including the redirect virus, and to protect the system against new threats.

7:34 pm edt
|
|
Q. How do I avoid rogue antispyware and antivirus software?
A. Make sure you 'Choose Industry Certified "Security Program"
Solutions'!
If your PC is connected to
the internet, uses e-mail, has software of an unknown
origin
installed and comes into contact with recordable media (jump drives, dvd's,
cd's, etc) Antispyware and Antivirus protection is a requirement. They help prevent
attacks through e-mail (and/or attachments sent with e-mail) and surfing the web.
They also help you eradicate infections which are the result
of security holes and
bugs in software. (The e-mail, web surfing
and software holes and bugs result in
the most serious internet
attacks).
One
way to know you're purchasing a trustworthy application is to confirm that
the program
you choose has earned certification from the leading labs.
Industry certification
from ICSA Labs, Virus Bulletin, West Coast Labs, the National
Association
of Specialist Computer Retailers, and others all require antispyware/
antivirus programs to meet stringent requirements to receive certification.
Smartphone and Tablet Tips to create a safe passcode.
Smartphones and tablets open the
door to your Work, friends, family, bank details, etc... No matter which device you use, follow these tips to keep your data secure.
1. Always use a passcode. If someone gets hold of your device, the person has immediate access to your apps and
data.
2. Make your passcode difficult to guess. Codes such as 1234 or 2580 can be cracked in seconds. Go for something that’s
unique but easy for you to remember.
3. Longer is stronger. The longer the passcode, the harder it is to crack. Make yours a minimum of six
digits.
4. Mix numbers and letters. If your device allows, use a passcode that combines numbers, letters and punctuation. Avoid dictionary words and
choose a memorable combination.
5. Make it unique. Don’t use the same passcode for anything else, including other devices,
bank cards or online accounts. That way, if one passcode gets hacked the rest stay secure.
6. Be discreet. Look around and make sure no one is watching you enter your passcode, just as
you would protect your PIN at the ATM machine.
Q. What steps need to be taken to secure
mobile devices (smartphones) for
personal/work phones and
tablets.
A. Follow these steps to secure your mobile
devices.
1. Secure your device
a.
Always lock it
b. Apply a complex passcode
c. Shield your passcode
d. Apply the latest patches
2.
Prevent Malware Infections
a.
Don't click on unsolicited links
b. Think before downloading apps
c. Don't "jailbreak" or "root" your mobile
3.
Be data aware
a.
Be careful what you share
b. Encrypt sensitive data
4. Stay compliant
a. Know and follow your organizations
security
policies
Q. Do you have an example of an Organizational 'Mobile Device Security Policy'
A. Here is EZMobilePC's policy.
1.
Introduction
Mobile devices, such as smartphones and tablet computers, are important tools for the
organization and their use
is supported to achieve business goals.
However, mobile devices
also represent a significant risk to information security and
data security as, if the
appropriate security applications and procedures are not applied,
they can be a conduit for
unauthorized access to the organization’s data and IT
infrastructure.
This can subsequently lead to data leakage and system infection.
EZMoblePC has a requirement to protect its information assets in order to safeguard
its customers, intellectual property and reputation. This document outlines a set of
practices and requirements for the safe use of mobile devices.
2.
Scope
1. All mobile devices, whether owned by EZMoblePC or owned by employees, that have
access to corporate networks, data and systems, not including corporate IT-managed
laptops. This includes smartphones and
tablet computers.
2. Exemptions: Where there is a business need to be exempted from this
policy
(too costly, too complex, adversely impacting other business requirements) a risk
assessment
must be conducted being authorized by security management.
3. Policy - Technical Requirements
1.
Devices must use the following Operating Systems: Android 2.2 or later,
iOS 4.x or later.
2. Devices must store all user-saved passwords in an encrypted password store.
3. Devices must be configured with a secure password that complies with EZMoblePC's
password policy. This password must not be the same as any other credentials used
within the organization.
4.
With the exception of those devices managed by IT, devices are not allowed to be
connected directly to the internal corporate network.
3.1 User Requirements
1.
Users must only load data essential to their role onto
their mobile device(s).
2.
Users must report all lost or stolen devices to EZMoblePC
IT immediately.
3.
If a user suspects that unauthorized access to company
data has taken place
via a mobile device, they must report the incident in alignment
with EZMoblePC’s
incident handling process.
4. Devices must not be “jailbroken”* or have any software/firmware installed
which
is designed to gain access to functionality not intended to be
exposed to the user.
5.
Users must not load pirated software or illegal content
onto their devices.
6.
Applications must only be installed from official platform-owner
approved sources.
Installation of code from un-trusted sources is forbidden.
If you are unsure if an
application is from an approved source contact EZMoblePC IT.
7. Devices must be kept up to date with manufacturer or network provided patches.
As a minimum patches should be checked for weekly
and applied at least once a month.
8.
Devices must not be connected to a PC which does not
have up to date and enabled
anti-malware protection and which does not comply with corporate
policy.
9.
Devices must be encrypted in line with EZMoblePC’s
compliance standards.
10.
Users may must be cautious about the merging of personal
and work email accounts on
their devices. They must take particular care
to ensure that company data is only sent
through the corporate email
system. If a user suspects that company data has been sent
from a personal email account, either in body text or as an attachment, they must notify
EZMoblePC IT immediately.
11.
(If applicable to your organization) Users must not
use corporate workstations to backup
or synchronize device content such as media files, unless such content is required
for
legitimate business purposes.
*To jailbreak a mobile device is to remove the limitations imposed by the manufacturer.
This gives access to the operating system, thereby unlocking all its features and enabling
the installation of unauthorized software.
Q. What is the first thing I should
do when I turn on my computer.
A. Back up important files
If you follow these tips, you're more likely to be free of interference from
hackers,
viruses,
and spammers. But no system is completely secure. If you have important
files stored on your computer, copy them onto a removable disc or
an external
hard
drive, and store it in a safe place.

Q. How do I protect my password?
A. Protect your passwords
Keep your passwords in a secure place, and out of plain sight. Don't share them
on the Internet, over email, or on the phone. Your Internet Service Provider (ISP)
should never ask for your password. In addition, hackers
may try to figure out your
passwords to gain access to your computer. To make it tougher for
them:
Use passwords that have at least eight characters and include numbers or symbols.
The longer the password,
the tougher it is to crack. A 12-character password is
stronger than one with eight characters.
Avoid common word: some hackers
use programs that can try every word in the
dictionary.
Don't use your personal information, your login name, or adjacent keys on the
keyboard as passwords.
Change your passwords regularly (at a minimum, every 90 days).
Don't use the same password for each online account you access.
Q. What steps need to be taken when
setting up Wireless Home Network Security.
1) Change Default Administrator Passwords (and Usernames)
Changing the default password is important because everyone
that purchases the same
Wireless access device, knows your password.
2) Turn on (Compatible) WPA / WEP Encryption
By default, your Wireless device comes
without the encryption enables. WPA / WEP are
security programs that forced your computer to provide
an encrypted password before
you are allowed access
to the wireless access point.
3) Change the Default SSID
SSID is the network name of your wireless network;
most people leave the default name,
such as, Linksys or NetGear. By changing the name, intruders have a more difficult time
identifying your system and use known vulnerabilities. (And
of course, use the unchanged
default password.) One
mistake people make is naming their home network their family
name and or address. When cruising a neighborhood of wireless devices, its always
scary to see Bobsnet444.
4) Disable SSID Broadcast
In Wi-Fi networking, the access point or router typically broadcasts
the network name
(SSID) over the air at
regular intervals. This feature was designed for businesses and
mobile hotspots where Wi-Fi clients may come and go. In the home, this feature is
unnecessary, and
it increases the likelihood an unwelcome neighbor or hacker will try
to
log in to your home network.
5) Assign Static IP Addresses to Devices
Most home networkers gravitate toward using dynamic IP addresses.
This means that
the IP Address, (the IP
Address is needed to participate on a network.) is typically
assigned automatically. A dynamic IP address on an unsecure system can also supply
a hacker with a IP Address.
6) Enable MAC Address Filtering
Each piece of Wi-Fi gear possesses a unique identifier called the "physical address"
or "MAC address." Access points and routers keep
track of the MAC addresses of all
devices that connect to them. Many such products offer the owner an option to key in the
MAC addresses of
their home equipment that restricts the network to only allow
connections from those devices. Do this, but also know that the feature is not so powerful
as it may seem. Hacker software programs
can fake MAC addresses easily.
7) Turn Off the Network During Extended Periods of Non-Use
The ultimate in security measures for any wireless network
is to shut down, or turn office
your wireless access point
when you are not using. You are the most vulnerable at work
or asleep, and mischief minded people know it.
8) Position the Router or Access Point Safely
Wi-Fi signals normally reach to the exterior of a home. A small amount
of "leakage"
outdoors is not a problem,
but the further this signal reaches, the easier it is for others
to detect and exploit. Wi-Fi signals often reach across streets and through neighboring
homes. When installing a wireless home network, the position
of the access point or
router determines it's reach. Try to position these devices near the center of the home
rather than near windows to minimize
this leakage.
Q: What are the first security steps I should take before I connect my computer to the internet?
A: Practices Before You Connect a New Computer to the Internet
We advise home users to download and install software patches
as soon as possible after connecting a
new computer to the
Internet. However, since the background intruder scanning activity
is constant, it may not be possible for the user to complete the
download and installation of software
patches before the vulner-
abilities they are trying to fix are exploited. We recommend the
following actions 'before' connecting computers to the Internet
so
that
users can complete the patching process without incident.
Q. Where do I report
Hacking or Malware activity?
A. Here is where to report:
Hacking or a Computer Virus
Alert the appropriate authorities by contacting: Your ISP and the hacker's ISP (if you can tell what it is). You can
usually find an ISP's email
address on its website. Include information on the
incident from your firewall's log file. By alerting the ISP to the
problem on its system,
you can help it prevent similar problems in the future. The FBI at www.ic3.gov. To
fight computer criminals, they need to hear from you.
Internet
Fraud If a scammer takes advantage of you through an
Internet auction,
when you're shopping
online, or in any other way, report it to the Federal Trade
Commission, at ftc.gov. The FTC enters Internet, identity theft, and other fraud-related complaints into Consumer Sentinel, a secure, online database available to hundreds
of civil and criminal law enforcement agencies in the U.S. and abroad.
Deceptive
Spam If you get deceptive spam, including email phishing
for your
information, forward it
to spam@uce.gov. Be sure to include the full header of the email, including all routing information. You also may report phishing email to
of ISPs, security vendors, financial institutions and law enforcement agencies,
uses these reports to fight phishing.
Divulged
Personal Information If you believe you have mistakenly
given your
personal information to
a fraudster, file a complaint at ftc.gov, and then visit the Federal Trade
Commission's Identity Theft website at ftc.gov/idtheft to learn how to minimize your risk
of damage from a potential theft of your identity.
Parents Parents sometimes can feel outpaced by their technologically savvy
kids. Technology aside, there are lessons that parents can teach to help kids
stay safer as they socialize online. Most ISPs provide parental
controls, or you
can buy separate
software. But no software can substitute for parental supervision.
Talk to your kids about safe computing practices, as well as the things they're
seeing and doing online.
Social Networking
Sites Many adults, teens, and tweens use social networking
sites to exchange information about themselves, share pictures and
videos, and
use blogs and private
messaging to communicate with friends, others who share
interests, and sometimes even the world-at-large. Here are some tips for parents
who want their kids to use these sites safely:
Use privacy settings to restrict who can access and post on your
child's website. Some social networking sites have strong privacy
settings. Show
your child how to
use these settings to limit who can view their online profile, and
explain to them why this is important.
Encourage your child to think about the language used in a blog,
and to think before posting pictures and videos. Employers, college
admissions
officers, team coaches,
and teachers may view your child's postings. Even a kid's
screen name could make a difference. Encourage teens to think about the
impression that screen names could make.
Remind your kids that once they post information online, they can't
take it back. Even if they delete the information from a site, older
versions may
exist on other people's
computers and be circulated online.
Talk to your kids about bullying. Online bullying can take many forms,
from spreading rumors online and posting or forwarding private messages
without
the sender's OK, to sending
threatening messages. Tell your kids that the words
they type and the images they post can have real-world consequences. They can
make the target of the bullying feel bad, make the sender look bad
— and, some-
times, can bring
on punishment from the authorities. Encourage your kids to talk to
you if they feel targeted by a bully.
Talk to your kids about avoiding sex talk online. Recent research
shows that teens who don't talk about sex with strangers online
are less likely to
come in contact
with a predator.
Tell your kids to trust their instincts if they have suspicions. If they feel threatened by
someone or uncomfortable because of something online, encourage
them to tell you.
You can then help
them report concerns to the police and to the social networking
site. Most sites have links where users can immediately report abusive, suspicious,
or inappropriate activity.

Q. What is the best way to keep malware
out.
A.
Try to minimize the threat.
Minimizing
the Effects of Malware on Your Computer
Malware is short for “malicious software;” it includes viruses —
programs that copy
themselves without your permission — and spyware, programs installed without
your consent to monitor or control your
computer activity. Criminals are hard at work
thinking up creative ways to get malware on your computer. They create appealing
web sites, desirable downloads, and compelling
stories to lure you to links that will
download malware, especially on computers that don’t use adequate security
software. Then, they use the malware to
steal personal information, send spam,
and commit fraud.It doesn’t have to be that way.
So says a website with tips from
the federal government and the technology industry that is helping consumers be on
guard against Internet fraud, secure their
computers, and protect their personal
malware can wreak, and reclaim their computers and their electronic information.
Computers may be infected with malware if they:
-
slow down, malfunction, or display repeated error messages;
- wont shut down or restart;
-
serve up a lot of pop-up ads, or display them when youre not surfing
the web;
or
-
display web pages or programs you didnt intend to use, or send emails
you
didnt write.
If you suspect malware
is on your computer
If you suspect malware is lurking on your computer, stop shopping, banking, and
other online activities that involve user names, passwords, or other
sensitive inform-
ation.
Malware on your computer could be sending your personal information to
identity thieves.
Then, confirm that your security software is active and current:
at a minimum, your
computer
should have anti-virus and anti-spyware software, and a firewall. You can
buy stand-alone programs for each element or a security suite that
includes these
programs
from a variety of sources, including commercial vendors or from your
Internet Service Provider. Security software that comes pre-installed on a computer
generally works
for a short time unless you pay a subscription fee to keep it in effect.
In any case, security software protects against the newest threats
only if it is up-to-
date.
Thats why it is critical to set your security software and operating system (like
Windows or Apples OS) to update automatically.
Some scam artists distribute malware disguised as anti-spyware software. Resist
buying software in response to unexpected pop-up messages or emails,
especially
ads
that claim to have scanned your computer and detected malware. Thats a tactic
scammers have used to spread malware, and that has attracted the attention
of the
Federal
Trade Commission, the nations consumer protection agency, as well as a
security tools from legitimate security vendors selected by GetNetWise, a project
of
the Internet
Education Foundation.
Once you confirm that
your security software is up-to-date, run it to scan your compu-
ter for viruses and spyware. Delete everything the program identifies as a problem.
You
may have to restart your computer for the changes to take effect.If you suspect
that your computer still is infected, you may want to run a second anti-spyware
or
anti-virus
program. Some computer security experts recommend installing one
program for real-time protection, and another for periodic scans of your machine
as
a
way to stop malware that might have slipped past the first program.
Finally, if the problem persists after you exhaust your own ability to diagnose and
treat it, you might want to call for professional
help. If your computer is covered by a
warranty that offers free tech support, contact the manufacturer. Before you call,
write down the model and serial number of
your computer, the name of any software
you’ve installed, and a short description of the problem. Your notes will help you give
an accurate description to the technician.If you need professional help, if your
machine isn’t covered by a warranty, or if your security software isn’t
doing the job
properly, you may need to pay for technical support. Many companies — including
some affiliated with retail stores —
offer tech support via the phone, online, at their
store, or in your home. Telephone or online help generally are the least expensive
ways
to access support services — especially if there’s a toll-free helpline — but you
may have to do some of the work yourself.
Taking your computer to a store usually is
less expensive than hiring a technician or repair person to come into your home.
Once your computer is back
up and running, think about how malware could have
been downloaded to your machine, and what you could do to avoid it in the future. If
your security software or operating system was
out-of-date, download the newest
version and set it to update automatically. Use the opportunity to back up important
files by copying them onto a removable disc. Other
ways to minimize the chances
of a malware download in the future:
-
Don’t click on a link in an email or open an attachment unless you
know who sent it and what it is. Links in email can send you to sites
that automatically download malware to your machine. Opening
attachments — even those that appear to come from a friend or
co-worker — also can install malware on your computer.
-
Download and install software only from websites you know and trust.
Downloading free games, file-sharing programs, and customized
toolbars may sound appealing, but free software can come with
malware.
-
Talk about safe computing. Tell your kids that some online activity
can
put a computer at risk: clicking on pop-ups, downloading free games or
programs, or posting personal information.
Finally, monitor your computer
for unusual behavior. If you suspect your machine
has been exposed to malware, take action immediately. Report problems with
malware to your ISP so it can try to prevent similar problems and
alert other

Q. What Should Parents know about Social
Networking Sites?
A. Social Networking
Sites
"It's 10 p.m. Do you know where your
children are?
"Remember that phrase from your own childhood? It's still a valid question, but now, it comes with a twist:
"Do you know where your kids are — and who they're chatting with online?
"Social networking sites have morphed into
a mainstream medium for teens and adults. These sites
encourage and enable people to exchange information
about themselves, share pictures and videos,
and
use blogs and private messaging to communicate with friends,
others who share interests, and
sometimes
even the world-at-large. And that's why it's important
to be aware of the possible pitfalls that
come
with networking online.
Some social networking
sites attract pre-teens – even kids as young as 5 or 6. These younger-focused
sites don't allow the same kinds of communication
that teens and adults have, but there are still things
that parents can do to help young kids socialize
safely online. In fact, when it comes to young kids, the
law provides some protections – and gives parents some control over the type of information that
children can disclose online. For sites directed to children under age 13, and for general audience sites
that know
they're dealing with kids younger than 13, there's the Children's Online Privacy Protection Act
(COPPA). It requires
these sites to get parental consent before they collect, maintain, or use kids'
Information. COPPA also allows parents to review their child's online profiles and blog pages.
Parents sometimes can feel outpaced by their technologically savvy kids.
Technology aside, there are
lessons that parents
can teach to help kids stay safer as they socialize online.
Help Kids Socialize Safely OnlineOnGuard Online shares these tips for safe social networking:
Help
your kids understand what information should be private. Tell them why it's important to
keep some things – about themselves, family members and friends
– to themselves.
Information like their full name, Social Security number, street address, phone number,
and
family financial information — like bank or credit card Account numbers
— is private and
should stay that way. Tell them not to choose a screen name that gives away too
much
personal information.
Use privacy settings to restrict who can access and post on your child's website. Some
social networking sites have strong privacy settings.
Show your child how to use these settings to limit who can view their online profile,
and
explain to them why this is important.
Explain that kids should post only information that you — and they — are comfortable
with others seeing. Even If privacy settings are turned on, some — or even all
— of your
child's profile may be seen by a broader audience Than you're comfortable with.
Encourage your child to think about the language used in a blog, and to think before
Posting pictures and videos. Employers, college admissions officers, team coaches,
and teachers may view your child's postings.
Even a kid's screen name could make a difference. Encourage teens to think about the
impression that screen names could make.
Remind your kids that once they post information online, they can't take it back.
Even if they delete the Information from a site, older versions may exist on other
people's computers and be circulated online.
Know how your kids are getting online. More and more, kids are accessing the Internet
through their cell phones.
Find out about what limits you can place on your child's cell phone. Some cellular
companies have plans that limit downloads, Internet access, and texting; other plans
allow kids to use those features only at certain times of day.
Talk to your kids about bullying. Online bullying can take many forms, from spreading
rumors online and posting or forwarding private messages without the sender's
OK, to
sending threatening messages. Tell your kids that the words they type and the
images
they post can have real-world consequences. They can make the target of the
bullying feel bad, make the sender look bad – and, sometimes, can bring on
punishment from the authorities.
Encourage your kids to talk to you if they feel targeted by a bully.
Talk to your kids about avoiding sex talk online. Recent research shows that teens who
don't talk about sex with strangers online are less likely to come in contact with
a
predator.If you're concerned that your child is engaging in risky online behavior,
you can
search the blog sites they visit to see whatinformation they're posting. Try searching
by their name, nickname, school, hobbies, grade, or area where you live.
Tell your kids to trust their gut if they have suspicions. If they feel threatened by someone
or uncomfortable because of something online, encourage them to tell you. You
can then
help them report concerns to the police and to the social networking site. Most
sites have
links where users can immediately report abusive, suspicious, or inappropriate
online
behavior.
Read sites'
privacy policies. Spend some time with a site's privacy policy, FAQs, and
parent sections to Understand its features and privacy controls. The site should
spell out
your rights as a parent to review and delete your child's profile if your child
is younger
than 13.
A Few More Tips to Protect Pre-TeensMany of the tips above apply for pre-teens, but
parents of younger children also can:
Take
extra steps to protect younger kids. Keep the computer in an open area like the
kitchen or family room, so you can keep an eye on what your kids are doing online.
Use the Internet with them to help develop safe surfing habits.
Consider taking advantage of parental control features on some operating systems
that let you manage your kids' computer use, including what sites they can visit,
whether they can download items, or what time of day they can be online.
Go where your kids go online. Sign up for – and use – the social networking spaces
that your kids visit. Let them know that you're there, and help teach them how to act
as they socialize online.
Review your child's friends list. You may want to limit your child's online “friends” to
people your child actually knows and is friendly with in real life.
Understand sites' privacy policies. Sites should spell out your rights as a parent to
review and delete your child's profile if your child is younger than 13.
For More InformationTo learn more about staying safe online, visit the websites of the following organizations:
Federal Trade Commission — www.OnGuardOnline.gov The FTC works for the consumer to prevent fraudulent, deceptive, and unfair business
practices in the marketplace and toprovide information to help consumers spot, stop, and avoid them.
To file a complaint or to get free information onconsumer issues, visit ftc.gov or call toll-free, 1-877-FTC-HELP
(1-877-382-4357); TTY: 1-866-653-4261.The FTC manages OnGuardOnline.gov, which provides practical tips
from the federal government and the technologyindustry to help you be on guard against Internet fraud,
secure your computer, and protect your personal information. ConnectSafely — www.connectsafely.org ConnectSafely is a forum for parents, teens, educators, and advocates designed
to give teens and parents a voice in thepublic discussion about youth online safety, and has tips, as
well as other resources, for safe blogging and socialnetworking. Along with NetFamilyNews.org, it is
a project of the non- profit Tech Parenting Group. Cyberbully411 — www.cyberbully411.org Cyberbully411 provides resources and opportunities for discussion and sharing
for youth - and their parents - who havequestions about or may have been targeted by online harassment.
The website was created by the non-profit Internet Solutions for Kids, Inc., with funding from the Community
Technology Foundation of California. GetNetWise — www.getnetwise.org GetNetWise is a public service sponsored by Internet industry corporations and
public interest organizations to helpensure that Internet users have safe, constructive, and educational
or entertaining online experiences. The GetNetWise coalition works to provide Internet users with the
resources they need to make informed decisions about their and theirfamily's use of the Internet.
iKeepSafe.org is a coalition of 49 governors/first spouses, law enforcement,
the American Medical Association, the American Academy of Pediatrics, and other associations dedicated
to helping parents, educators, and caregivers byproviding tools and guidelines to promote safe Internet
and technology use among children.
NCMEC is a private, non-profit organization that helps prevent child abduction
and sexual exploitation; helps find missingchildren; and assists victims of child abduction and sexual
exploitation, their families, and the professionals who serve them. staysafe —
www.staysafe.org staysafe.org is an educational site intended to help
consumers understand both the positive aspects of the Internet aswell as how to manage a variety of
safety and security issues that exist online.
WiredSafety.org is an Internet safety and help group. WiredSafety.org provides
education, assistance, and awareness on cybercrime and abuse, privacy, security, and responsible technology
use. It is also the parent group of Teenangels.org, FBI-trained teens and preteens who promote Internet
safety. See also: Social Networking Sites: Safety Tips for Tweens and Teens What to Do if There's a ProblemTrust your gut if you have
suspicions. If you feel threatened by someone or uncomfortable because of something online,Tell an adult
you trust, and report it to the police and the social networking site.The Children's Online Privacy
Protection Act (COPPA) requires websites to obtain parental consent before collecting, using,or disclosing
personal information from children under age 13.
Q. What are
Nigerian con-men or internet scams?
A.
Phony Lotteries, Nigerian 419s, Advanced Fee Fraud, and Scams
While you're online:
Know who you're
dealing with.
In any electronic transaction, independently confirm the other party's name, street
address, and telephone number.
Resist the urge to enter foreign lotteries. These solicitations are phony
and illegal.
Delete requests that claim to be from foreign nationals
asking you to help transfer their money through your bank account. They're fraudulent.
Ignore unsolicited
emails that request your money, credit card or account numbers, or other personal information.
If you are selling something over the Internet, don't accept a potential buyer's offer to send you a check
for more than the purchase price, no matter how tempting the plea or convincing the story. End the transaction immediately
if someone insists that you wire back funds.The Internet gives buyers access to a world of goods and services, and gives sellers access to a world of customers.
Unfortunately, the Internet also gives con artists the very same access. But being on guard online can help you maximize the
global benefits of electronic commerce and minimize your chance of being defrauded. OnGuard Online wants you to know how to
spot some cross-border scams — including foreign lotteries, money offers, and check overpayment schemes — and
report them to the appropriate authorities.
Foreign Lotteries
For years, scam operators have used the telephone and direct mail to entice U.S. consumers into buying chances in supposedly
high-stakes foreign lotteries. Now they're using email, too — either to sell tickets or suggest that a large cash prize
has your name on it. No matter what country's name is used to promote a lottery, the pitch follows a pattern: you should send
money to pay for taxes, insurance, or processing or customs fees. The amount may seem small at first, but as long as you keep
paying, the requests for funds will keep coming — for higher and higher amounts. Some victims have lost thousands of
dollars.Most scam operators never buy the lottery tickets on your behalf. Others buy some tickets, but keep the "winnings"
for themselves. In any case, lottery hustlers generally try to get you to share your bank account or credit card numbers,
so they can make unauthorized withdrawals.If you're thinking about responding to a foreign lottery, OnGuard Online wants you to remember:
Playing
a foreign lottery is against the law.
There are no secret systems for winning foreign lotteries. Your chances of getting any money back are
slim to none.
If you buy even one foreign lottery ticket, you can expect many more bogus offers
for lottery or investment "opportunities." Your name will be placed on "sucker lists" that fraudsters
buy and sell.
Keep your
credit card and bank account numbers to yourself. Scam artists often ask for them during an unsolicited sales pitch. Once
they get your account numbers, they may use them to commit identity theft.Resist solicitations for foreign lottery promotions. Report them to the appropriate government officials, then hit delete.View a sample fraudulent foreign lottery solicitation.
"Nigerian" Foreign Money Offers
The "Nigerian" scam got its name from emails that supposedly came
from Nigerian "officials" who needed your help getting at their money — which was tied up due to strife in
their country. Today, people claiming to be officials, businesspeople, or the surviving relatives of former government honchos
in countries around the world send countless offers via email to transfer thousands of dollars into your bank account if you
will just pay a fee or "taxes" to help them access their money. If you respond to the initial offer, you may receive
documents that look "official." But then, you will get more email asking you to send more money to cover transaction
and transfer costs, attorney's fees, blank letterhead, and your bank account numbers, among other information. Subsequent
emails will encourage you to travel to another country to complete the transaction. Some fraudsters have even produced trunks
of dyed or stamped money to verify their claims.The emails are from crooks trying to steal your money or commit identity
theft. Victims of this scam report that emergencies arise that require more money and delay the "transfer" of funds;
in the end, you lose your money, and the scam artist vanishes. According to the U.S. State Department, people who have responded
to these solicitations have been beaten, subjected to threats and extortion, and in some cases, murdered.If you receive an
email from someone claiming to need your help getting money out of another country, don't respond. After all, why would a stranger from another country pick you out at random to share thousands of
dollars? Report the solicitation to the appropriate government officials, and then hit delete.View a sample fraudulent foreign money offer.
Check Overpayment Schemes
Say
no to a check for more than your selling price, no matter how tempting the plea or convincing the story. Check overpayment
schemes generally target people who have posted an item for sale online. The con artist, posing as a potential buyer from
a foreign country (or a distant part of the U.S.), emails the seller and offers to buy the item with a cashier's check, money
order, personal check, or corporate check. Or the scammer may pretend to be a business owner from a foreign country, needing
"financial agents" to process payments for their U.S. orders; in exchange, they promise a commission.Regardless of the cover, here's what happens:
The scammer sends you a check that looks authentic — complete with watermarks — made payable for more money than
you expected. They ask you to deposit it in your bank account, and then wire-transfer some portion of the funds to a foreign
account. They provide convincing reasons why the check is for more than the necessary amount, and why the funds must be transferred
quickly. Sometimes, the counterfeit checks fool a bank teller, but be aware that the check still can bounce. The scammer vanishes
with the money you wired from your own account and you are on the hook for the entire amount of the worthless check. In addition,
a scammer who has your bank account number is likely to use it to withdraw more money from your account.
Reporting a Cross-Border Scam
If you think you may have responded to a cross-border scam, file a complaint at www.econsumer.gov, a project of 20 countries of the International Consumer Protection and Enforcement
Network. Then visit the FTC's identity theft website at www.ftc.gov/idtheft. While you can't completely control whether you will become a victim
of identity theft, you can take some steps to minimize your risk.If you've responded to a "Nigerian" scheme, contact your
local Secret Service field office using contact information from the Blue Pages of your telephone directory, or from www.secretservice.gov/field_offices.shtml.In addition, report telemarketing fraud and check overpayment scams to your state
Attorney General, using contact information at www.naag.org.Report unsolicited email offers to spam@uce.gov — including offers inviting you to participate in a foreign
lottery, looking for help getting money out of a foreign country, or asking you to wire back extra funds from a check you
received.If you receive what looks like lottery material from a foreign country through the postal mail, give it to your local
postmaster.
For More InformationForeign Lottery Scams
U.S. Federal Trade Commission — The FTC works for the consumer to prevent fraudulent, deceptive,
and unfair business practices in the marketplace and to provide information to help consumers spot, stop, and avoid them.
To file a complaint or to get free information on consumer issues, visit www.ftc.gov or call toll-free, 1-877-FTC-HELP (1-877-382-4357); TTY: 1-866-653-4261.
The FTC enters Internet, telemarketing, identity theft, and other fraud-related complaints into Consumer Sentinel, a secure,
online database available to hundreds of civil and criminal law enforcement agencies in the U.S. and abroad.Competition Bureau in Canada — The Competition Bureau is an independent law enforcement agency
in Canada that investigates anti-competitive practices and promotes compliance with the
laws under its jurisdiction. To file a complaint or to get free information, visit www.competitionbureau.gc.ca or call toll-free, 1-800-348-5358. The Bureau has the ability to refer criminal matters to the Attorney General of Canada,
who then decides whether to prosecute before the courts.United Kingdom's Office of Fair Trading — The United Kingdom's
Office of Fair Trading is responsible for making markets work well for consumers. They protect and promote consumer interests
throughout the United Kingdom, while ensuring that businesses are fair and competitive. To file a complaint or to get free information,
visit www.oft.gov.uk or send an email to enquiries@oft.gsi.gov.uk.Australian Competition and Consumer Commission — The Australian Competition and Consumer Commission encourages vigorous
competition in the marketplace and enforces consumer protection and fair trading laws. To file a complaint or to get more
information, visit www.accc.gov.au. The ACCC advocates consultation and negotiation as the first and
best option to settle disputes, but once the ACCC pursues legal action any sort of mediation becomes less likely.
"Nigerian" Advance-Fee Scams
U.S. Secret Service — The Secret Service investigates violations of laws relating to financial
crimes, including access device fraud, financial institution fraud, identity theft, and computer fraud. To file a complaint
or to get free information, visit www.secretservice.gov or call 202-406-5708.U.S. Department of State — The Department of State's mission is to create a more secure, democratic,
and prosperous world for the benefit of the American people and the international community. As part of that mission, the
Department of State seeks to minimize the impact of international crime, including cross-border internet scams, on the United States and its citizens. To get free information, visit www.state.gov.
Q. What should I do prior to disposing of an old computer?
A. Computer Disposal
Once you have a “clean” computer,
consider recycling, donating, or reselling it – and keep the environment in mind when
disposing of your computer.If you want to get rid of your old computer, options include recycling,
reselling, and donating.
But before
you log off for thelast time, there are important
things to do to prepare it for disposal. Computers
often hold
personal and financial
information, including passwords, account numbers, license keys or registration numbers for software
programs, addresses and phone numbers, medical and prescription information, tax returns, and other personal documents.
Before getting rid of your old computer, it’s a good idea to use software to “wipe”the hard drive clean. If you don’t, consider
your old hard drive a 21st century treasure chest for identity thieves
and information pirates. The Federal Trade Commission
(FTC), the nation’s consumer
protection agency, says you can deter identity theft and information piracy by taking a few
preventive steps.
Understanding Hard Drives
A computer’s hard
drive stores data, and maintains an index of files. When you save a file, especially a large one, it is
scattered around the hard drive in bits and
pieces. Files also are automatically created by browsers
and operating
systems. When you open a file, the hard drive checks the index, then gathers
the bits and pieces and reconstructs them.
When you
delete a file, the links between the index and the file disappear, signaling to your system that the file isn’t needed
any longer and that hard drive space
can be overwritten. But the bits and pieces of the deleted file stay on your computer
until they’re overwritten, and they can be retrieved with a data recovery program.
To remove data from your hard drive
permanently,
it needs to be wiped clean.
Cleaning Hard Dives
Before you clean your hard
drive, save the files that are important to you on an external storage device – for example,
a USB drive, a CDRom, or an external
hard drive – or transfer them to a new computer. Check your owner’s manual, the
manufacturer’s website, or its customer support line for information on how to
save data and transfer it to a new
computer. Utility programs to wipe your hard drive are available both online and in stores where computers are
sold.
They’re generally inexpensive; some are available on the Internet for free. Wipe utility
programs vary in their capabilities:
some
erase the entire disk, while others allow you
to select files or folders to erase. They also vary in their effectiveness:
programs that overwrite
or wipe the hard drive many times are very effective; those that overwrite or wipe the drive only once
may not prevent information being wiped from being recovered later.
If your old computer contains sensitive information
that would be valuable to an identity
thief, consider using a program that overwrites or wipes the hard drive many times. Or,
remove the hard
drive, and physically destroy it. One more thing to keep in mind: If you use your home or personal
computer
for business purposes, check with your employer about how to manage information on your computer that’s business-related.
The law requires businesses to follow
data security and disposal requirements for certain information that’s related to
customers.
Disposal
Options
Once you have a “clean”
computer, here’s how to dispose of it:
Recycle it. Many computer manufacturers have programs to recycle computers
and components. Check their
websites or call their toll-free numbers
for more information. The Environmental Protection Agency (EPA) has
information on electronic product recycling
programs at
program. Check with your county or local government,
including the local landfill office for regulations.
Donate it. Many organizations collect old computers and donate them to charities.
Resell it. Some people and organizations buy old computers.
Check online. Keep
the environment in mind when disposing of your computer.
Most computer equipment contains hazardous materialsthat don’t belong in a landfill.
For example, many computers have heavy metals that can contaminate the earth.
The EPA recommends that you check with your local health and sanitation agencies for ways to dispose
of electronics safely.
www.hypersmash.com
hostgator promo