Archive for the ‘Internet’ Category
Description of ‘Internet’ Category: Posts about The Internet, a global system of interconnected computer networks.
Friday, September 23rd, 2011
Identity theft is when a criminal illegally obtains and uses an individual’s personal information such as their social security number and driver’s license number, for fraudulent purposes. Once Identity theft criminals gain access to this private information they will pose as that person usually to acquire credit, merchandise, or services.
There are two main types of identity theft, account takeover and true name ID theft. Account takeover identify theft is when a thief uses the stolen personal data to gain access to existing bank accounts. True name identity theft they will use the personal information to open new accounts, credit cards, and services.
The Internet provides these types of criminal with a perfect hunting ground. It’s extremely easy to target Internet users because of the vast accumulation of information as well as the effortlessness of performing a transaction without verification. Although recently the number of database hacking attacks has dramatically increased, most identity thieves still obtain our information from spying over our shoulders or digging through our trash.
According to a recent survey from Javelin Research and Strategy
“In 2010, identity theft and fraud claimed fewer victims than in any other period since Javelin began conducting surveys in 2003. Driving that decrease was the reduced rate of existing account fraud, although incidents of all types of fraud dropped from 2009. Meanwhile, consumer costs, the average out?of?pocket dollar amount victims pay, increased, reversing a downward trend in recent years. This increase can be attributed to new account fraud, which showed longer periods of misuse and detection and therefore more dollar losses associated with it than any other type of fraud.”
The survey also identified account takeover, friendly fraud, and improper use of privacy settings on social media networks to be the growing problems. Several other issues include people not shredding important documents, using weak online passwords, and neglecting to use anti-malware software. The survey found that 48% of the reported identity theft cases were initially identified by the consumers. This statistic clearly expresses the dire need for individuals to routinely monitor their accounts and financial statements.
Everyone should also protect themselves by requesting their credit reports. You can obtain your free credit report three times a year from Annual Credit Report.com. Consumers can request to view their credit report up to three times a year because there are three different Nationwide Credit Reporting Agencies Equifax, Experian, and Trans Union.
How Identity theft can occur Online:
On the Internet, we are made of a digital identity. This identity groups information like our IP address, physical address, usernames, passwords, personal identification numbers, social security numbers, birth dates, account numbers and other personal information. Hackers and identity thieves’ main goals are to obtain this information. The Internet makes it extremely easy for these criminals to trick people into unwittingly handing over their information rather than having to dig through their trash. Some of the techniques that hackers use to obtain out information are
Phishing is when emails or websites falsely claim to be an existing organization that you do business with. These emails redirect users to websites that are created to look like the legitimate site. Users are then typically asked to update their personal information. Meanwhile the real company has no need to ask for updated information and you just supplied it all to a criminal. Be cautious of emails expressing urgency and avoid links or submission forms asking for financial information. Sensitive information like this should only be communicated using a secure webpage. (Learn more about protecting yourself against phishing!)
Pharming is a more sophisticated version of phishing. With pharming a cyber-criminal creates a vulnerable spot in an Internet Service Provider’s DNS server and then hijacks the domain name of a commercial site. When people visit the legitimate website they are immediately redirected without knowing. Unsuspecting users will enter their login information as usual, only this time they will be providing it to the pharmers. The personal information gained can be used at the website to purchase merchandise, clean out bank accounts, or open new ones.
Spyware is used to gather information like user ID’s or passwords. Once gathered it is then sent back to the intruder. Spyware can collect this information by logging keystrokes and using malware like Trojans. New malicious programs are created and discovered every day so it is important that you not only have Antivirus software but that you keep it up to date as well. Antivirus programs scan, track, and remove any problems from your hard drive. Anti-spyware programs can detect and eliminate any spyware that has made a home on your hard drive. Many Antivirus programs are bundled with an anti-Spyware.
Tips To Protect You From Identity Theft:
- Use your common sense.
- Check your credit reports.
- Check your bank statements.
- Compare your credit card charges against your receipts.
- Shred documents that contain personal information.
- Don’t carry unnecessary identification documents.
- Deposit outgoing mail at the post office on in a secure mailbox.
- Resist providing personal information unless you know that it is necessary.
- Watch out for phishing sites.
- Use an Anti-virus and Anti-malware software.
- Create strong and unique passwords for each website.
- Only shop at reputable websites.
- Only download software from reputable sources.
- Secure your wireless network.
What to do if you Suspect Identity Theft:
- Contact your credit card companies to notify them and request new account numbers.
- Contact your bank and request that an alert be placed on your account.
- Contact one of the three credit reporting bureaus and request that a fraud alert be placed on your file.
- Request a free credit report.
- Continuously monitor all of your accounts and credit reports.
- File an identity theft report with the local police or a State and Federal agency.
For more information visit The Effects of Identity Theft and The History Of Identity Theft!
Have a Great Day!
Dustin
ComputerFitness.com
Providing Tech Support to Businesses in Maryland
Tags: account protection, computer security, credit report, identity, identity theft, online identity theft, theft Posted in Information Security, Internet | No Comments »
Friday, May 27th, 2011
Recently the MacDefender Malware has created a lot of concerns for Mac users all around the world. Quickly spreading, the MacDefender Malware is a phishing scheme that presents a message that informs users that their system has been corrupted. The ploy goes on to tell Mac user that the only way to remove the viruses is to utilize the MacDefender app. The MacDefender malware can also appear as MacProtector and MacSecurity. The malware does not infect a user’s machines with viruses or monitor keystrokes. Their sole purpose is to frighten and persuade users to purchase the MacDefender application thus gaining access to the customer’s credit card information.
from http://www.Apple.com, May 2011
Mac has estimated that between 60,000 and 125,000 Mac users have already been exposed to this malware. Most users have encountered this problem through poisoned Google images. When users access a poisoned link, a page will launch and display a virus scan. After being transferred to the infected webpage the software begins to download and informs users of an infection. Previously the malware required permission to install but despite the efforts made by Mac a newer version of the malware has been created, which no longer needs the user’s permission. This MacDefender version automatically installs on a machine during the fake scan process.
Mac has yet to take action against the initial malware but has stated they will have a resolution with their next OS X Update. Mac states that they will “deliver a Mac OS X software update that will automatically find and remove Mac Defender malware and its known variants. Mac however has not addressed the new version of the malware and has also informed their support staff Not to assist users with MacDefender removal. Although the support staff has been instructed not to assist with its removal, Mac has provided the following on how to prevent the malware from installing and how to remove once installed.
Avoiding Installation:
- If users experience any notification concerning the mentioned security software, immediately exit the browser.
- If the browser fails to quit, perform a Forced Quit. To perform a force quit go to the Apple menu and choose force quit. Alternatively you can Force Quit by pressing Command+Option+Esc, and then choose unresponsive program followed by clicking force quit.
Removing the Application:
- In the event that the malware was automatically downloaded and launched, do not enter your administrator password.
- Do not provide your credit card information.
- Access your download folder and delete the application.
- Once the application is deleted make sure that you also permanently delete is in your trash folder.
- Close the Scan Window.
- Go to the Utilities folder in the Applications folder and launch Activity Monitor.
- Choose All Processes from the popup menu in the upper right corner of the window.
- Under the Process Name column, look for the name of the app and click to select it.
- Click the Quit Process button in the upper left corner of the window and select Quit.
- Quit the Activity Monitor application.
- Open the Applications folder, locate the app again, drag it to the trash, and permanently empty the Trash
In addition to the MacDefender app a login item is also placed in the user’s system preferences which can be removed by opening system preferences, selecting accounts, clicking login items, selecting remove and then clicking the minus button. Although it is not necessary it is advised that users to remove this login item.
Check back later as more details develop to learn more about the MacDefender malware and possible solutions.
Thanks for Reading and Have a Great Day!
Dustin
ComputerFitness.com
Providing Tech Support for Businesses in Maryland
Tags: Information Security, mac, MacDefender, MacDefender Malware, malicious software, Malware, malware removal, phishing, virus removal Posted in Information Security, Internet, Mac | No Comments »
Friday, April 1st, 2011
Last week we discussed the new features of Internet Explorer 9 and the enhancements Microsoft has made to the preexisting structure of the browser. Since the release of IE9 and Firefox 4 were only one week apart from each other, it was bound to initiate an increase in competition. Moments after the new version of Firefox was released the number of downloads quickly began to grow much to the chagrin of Microsoft. It became hard to miss all of the blogs and headlines that are emphasizing how the number of Firefox downloads outnumbered those of Internet Explorer 9.
Firefox 4 from mozilla.com April 2011
Although competition may sometimes seem like a tough aspect of business it can undoubtedly provide certain benefits. For example healthy competition between similar organizations keeps companies innovative, growing, updating their products, and always searching for the next big concept. Having this type of browser competition ensures that the customer will remain the primary focus and will always have the best options made available to them. With that being said choosing a browser shouldn’t be about how many numbers of downloads a browser has it should be about the features it offers and the preference of a user, which seems to be getting overlooked in order to emphasize competition.
Each browser has a particular following so it is not surprising that the users running Internet Explorer will continue to use IE9 and those running Firefox will upgrade to Firefox 4. Each of the browsers has made similar adjustments but at the same time they offer a few stand out and key differences. Comparable to the changes made with IE9 the adjustments made for Firefox 4 can be broken down into categories which include design and layout, security and performance, usability and organization, and personalization.
Design and Layout:
Again with this browser we see an interface that is less cluttered and less complicated. Firefox was able to create more space to view websites by consolidating everything into one main menu, which is now called the “Firefox Menu”. In addition they have also relocated the position of the tabs and are now located above the URL and search bar. This time around the bookmark, home, back, reload, and stop buttons have all been simplified, again to produce a cleaner user interface. Similar to Internet Explorer 9 the browser places more of an emphasis on the web page as opposed to the actual browser.
Usability and Organization:
Unlike Internet Explorer which has consolidated the address bar and search box into one location the Firefox browser has decided to keep both search boxes separated. The address bar which has been given the name “The Awesome Bar” learns and adapts as you use it, meaning if you decide to type only keyword in this space it will provide website suggestions based on both your previous search results and bookmarked locations. In order to receive search results users still need to either navigate to a search engine or do so via the quick search result box as opposed to in IE9 where users can simply search the term in one convenient and space saving search bar.
Tabs work similar to in the previous versions of Firefox but they are in the different location as previously mentioned and can be sorted into small groups using Panorama. Panorama takes small snapshots of your open pages and allows you to drag and drop them into a group. Firefox also lets users create App tabs similar to how IE9 lets users pin websites to the Windows 7 task bar. App tabs are for sites that a user wants to make a permanent fixture and remain in the actual browser as opposed to the Windows 7 task bar. These smaller tabs have a designated position located before the regular tabs along the top of the search bars. Firefox’s Application tab options seems more viable because although IE9’s pinning option can be more convenient it can also clutter a user’s desktop task bar and is only available to people who are using the Windows 7 operating system.
Security and Performance:
Firefox 4 allows its users to sync their mobile device browser with their desktop browser to preserve the continuity of their web browsing experience. The process of syncing will transfers any tabs, history, bookmarks, and passwords across any mobile platform. Similar to previous versions, Firefox 4 utilizes a pop-up blocker, password manager, download manager, spell checker, form assistant, and a session restore.
It is evident that one of the main priorities for the new version of Firefox was enhancing security. The following are some of the security features that Firefox 4 offers:
- Instant web session ID – Websites are highlighted as being secure or vulnerable
- Content security policy – Prevents cross site scripting
- Anti-Phishing – Firefox updates its records of counterfeit sites 48 times a day
- Customizable security
- Parental controls
- Secure updates
- Anti-malware
- Private browsing
- Antivirus integration
- Outdated plug-in detection
- Secure connections
- Automatic updates
- Clearing history
- Forget the site
- Custom no site tracking
Personalization:
Firefox has a tremendous collection of add-ons which is part of the reason why so many users are drawn to it. Their library now contains over 2,398,145,252 add-ons which make customizing a user experience quick and simple. Users can also personalize their browser by applying personas or skins to the browser window and can also add, re-arrange or eliminate the buttons located on Firefox.
Conclusion:
Firefox 4 adds to the already great reputation of the Firefox name and certainly lives up to the standards of its users. Like anything new it may take some time for users to get comfortable with the display and features but because the browser offers a much better user experience it is well worth the adjustment period. Although the latest versions of IE and Firefox browsers offer a few varying differences both browsers seem to have implemented changes based on similar criteria, making recommending one over the other difficult. Both browsers concentrated on browser simplification, user interaction, tab management, security, and search capability. Whether you are partial to Internet Explorer or Firefox it is clear that they have both delivered new versions that provide a higher performance, better usability, enhanced security, and an overall improved user experience.
These are just a few of the features that Firefox 4 has to offer, to download the latest versions or learn more about Mozilla Firefox 4 or Internet Explorer 9 visit the links below!
Download Firefox 4
Firefox 4 Features
Download Microsoft IE 9
Internet Explorer 9 Features
Have a Great Day!
Dustin
ComputerFitness.com
Providing Tech Support for Businesses in Maryland
Tags: browser, features, Firefox, Firefox 4, internet, internet explorer, search, users, web browser Posted in Browser Modifications, Internet | No Comments »
Friday, March 25th, 2011
Monday March 14, 2011 marked the release of the 9th version of Internet Explorer (IE). This time around Microsoft stated that they have placed more of an emphasis on user feedback. During the IE 9 Beta testing period the company had received a lot of suggestions that they really took to heart and implemented. With these suggestions and implementation their goal was to make Internet Explorer 9 the best version possible.
from www.microsoft.com March 2011
The number of people using the Internet Explorer web browser is not as solid as it once was because users now have the options of other browsers like Google Chrome and Mozilla Firefox. Causing the number of IE users to slowly decline over the past couple years, each of the other browsers offers its users certain benefits and has elements that customers gravitate toward. For example Firefox has an enormous collection of add-ons that allows a user to customize their browser environment and web experience.
Although the new release of Internet Explorer offers some pretty cool and exciting features it’s unlikely that the users that have already jumped ship will return. However the elements of IE9 may prevent future users from switching browsers which could be crucial since Firefox 4 was released on March 22, 2011. Regardless of the advantages and disadvantages of the other available browsers it is safe to say that this new version of Internet Explorer is better than any of its predecessors.
So, what are the new features of Internet Explorer 9?
Increased performance, enhanced design, better usability, and stronger safety are just a few of the features that the new version has to offer. The following is a closer look at some of the key elements that make IE9 the best version of Internet Explorer thus far.
Power and Performance:
Internet Explorer 9 offers a faster installation process that requires fewer customer based decisions during the process. The browser launches faster than ever and with the improved JavaScript engine web pages load much faster than before and still maintain rich smooth graphics. This version incorporates better graphic capabilities and when combined with Windows 7 it is said to provide the best web experience for viewers.
Design and Usability:
- Initially the new stripped down design may require some time to get acquainted with.
- The layout is similar to earlier versions of IE but much of the unnecessary distractions have been relocated or completely removed.
- The new tab page allows you to manage your favorite sites and gives you the option to open one of your most visited sites or continue with a site that has not yet been stored.
- The color coded customizable tabs create a quick identification and navigation process.
- The ability to pin your favorite sites to the Windows 7 task bar just like Windows 7 programs adds an easier method of accessing your favorite sites and makes them a convenient fixture to your desktop.
- The new notification bar consolidate your messages, displays them at the bottom of the screen, and no longer interrupts your browsing experience until you decide when it is time to acknowledge them.
- The message that a user encounters within the notification bar is clearer, incorporates more information, and makes the notifications easier to address.
- The Navigation buttons and tasks are clearly visible due to the minimal yet efficient interface. The back button is not emphasized and even displays the icon for the last visited web page.
- The search and navigation are all located in the same box. The one box is located at the top of your browser and allows you to navigate to a webpage or perform a search just as you would in an actual search engine. The Address bar accepts URL’s as well as keywords or phrase. Uses can change which search engine they want their results to appear from by selecting the drop down arrow in the search box.
- The simple and clean design emphasizes the website rather than the web browser. Most of the screen space is devoted to view a website with only the search bar and tabs located at the very top of the browser.
Maintenance and Security:
- The ActiveX Filtering guide enables you to block all sites requiring it and allows you to grant permission as you see fit.
- The add-on performance advisor monitors and identifies and alerts you to any add-ons that may be slowing down your user experience.
- The Compatibility View option enables the browser to view pages as an older version. If a page is not compatible or displays incorrectly the broken page button by the search box gives users the option to view the page in the IE older format. Once viewed in the older format the browser will remember this action and always display the page correctly from then on.
- The Cross Site Scripting Filter prevents cross-site scripting attacks which are the leading online threat.
- The Domain Highlighting feature alerts you to malicious sites by highlighting the sites URL in red.
- The new Download Manager lets you monitor and interact with all of your current downloads. In addition it also acts as a SmartScreen filter to protect your computer from harmful downloads.
- The SmartScreen Filter alerts you to any possible threats and provides Anti-Phishing protection, Application reputation, and Anti-Malware protection.
- The In-Private browsing feature allows you to avoid leaving a trail of your search history.
- In the event of a lost connection your browser will automatically restore itself with the previous sessions in tacked. In addition if an individual website crashes the incident will only affect that isolated tab and will not interfere with any of the other open tabs.
Although some of these features have been seen before in the other browsers like Firefox and Chrome, Internet Explorer 9 has still managed to introduce a few elements that the others don’t offer. To see a full list of comparisons visit Chrome vs. Firefox vs. IE9. Whether this version is better than the competition depends on the preferences of the individual user but there is no denying that this version of IE is a major improvement over the past Internet Explorers. Check back with us next week as we review the new features of Firefox 4 and see how it measures up to the latest IE9.
Download and experience all of these great features at Microsoft IE 9 Download.
Explore the links below to learn more about IE9
IE9 compared to previous versions
Internet Explorer 9 -Features
Have a Great Day!
Dustin
ComputerFitness.com
Providing Tech Support for Businesses in Maryland
Tags: browser, explorer, improved features, internet, internet explorer 9, site, user, version Posted in Browser Modifications, Internet | No Comments »
Friday, March 18th, 2011
When natural disasters occur many people and groups across the world feel sympathetic to those that have to endure through the hard times. Whether it is through donations, prayer, or assisting in reconstruction, people usually come together and offer their support in one form or another. However, this of course is not always the case and where good hearted people may see an opportunity to help out there are others out there that are looking to take advantage of the situation.
Although the Internet has greatly advanced over the past years it still remains vulnerable to cyber criminals. Even with the number of safety and security precautions established on the Internet the number of threats has nearly doubled within the last two years. Social media may be partly responsible for the growing number of threats because as the number of web users increases so does the number of these attacks.
Taking into consideration how much the Internet has evolved and the number of security features that have been implemented one thing remains the same and that is the human factor. Not all people are good and this is evident with cyber hackers, criminals, and the other individuals that only see the negative opportunity when tragedy occurs.
There are a number of ways cyber criminals take advantage of the Internet and web users. Among the most frequently used methods is phishing. These websites and emails are designed not so much to take advantage of the people impacted by a tragedy but the sympathy and compassion others express following the disaster. These sites and emails are created to make them appear as a legitimate company, meanwhile they have no connection to that company whatsoever nor do they have any intention of offering the support they are promising. Their only purpose is to gain access to your information and money. Following the devastation in Japan or any of the other natural disasters like the Indian Ocean Tsunami and Hurricane Katrina , most the time people want to help which makes them a perfect target for online scammers.
Often times it is amazing how quickly support efforts are rallied. It is shocking but not surprising that just as fast as support efforts are gathered the same is being done for fraudulent swindles. As if the catastrophe wasn’t bad enough now the people who are trying to do something to help and make a difference now have the misfortune of being mislead and cheated as well. Not only are these individuals cheated out of money but the group of people facing the tragedy is not receiving the help and support they were meant to have.
Already a number of fraudulent relief efforts have been reported and there are probably many more that are yet to be discovered. Its important to remember that there always has been and most likely always will be someone trying to profit from the kindness of someone else and not to fall victim to their attempts. Remember that these criminals seek out these opportunities and take every advantage to exploit them. Some key tips include not providing your information through email and making sure that you are doing your research before donating. If you wish to help make sure you locate a secure, legitimate and reputable organization for which to offer your support with.
Learn more by going to the links below
Current situation in Japan
CBS News, Disaster in Japan
Have a Great Day!
Dustin
ComputerFitness.com
Providing Tech Support for Businesses in Maryland
Tags: cyber, cyber criminals, Email, internet, phishing, support, tragedy, website Posted in Information Security, Internet | No Comments »
Friday, October 8th, 2010
Hey, everyone, Josh from Computer Fitness back with another award-winning article to help you with your computer conundrums.
Cyber criminals are out there; there´s no denying it. More and more we hear about attacks in the US or abroad against networks, companies, and governments. This is the same as it ever was, people trying to take from others. The methodology has changed and that is what we´re going to talk about today. One of the more common ways that attackers will go after a network is a DDoS, or Distributed Denial of Service.
When you contact a website, send an email, etc. You are exchanging data. That´s how this whole thing works. Various pieces of hardware route the data and make sure it gets divided up and sent to the right places. Now, have you ever seen a website that was “just taking forever today”? That´s an example of too much traffic being funneled through too small of an area. What a DDoS does, is a play on this weakness and flood the target with traffic.
Now, rather than some of the other methods of attack where a single user is the culprit, DDoS relies on hundreds of thousands of machines all forcing their way in at once. This leaves the routers et al. with far too much traffic to handle and they crash under the weight; the attackers now have what they want, a denial of service to anyone who uses the site.
Further reading:
-Josh
ComputerFitness.com
Tags: Attackers, DDoS, denial, Hackers, Information Security, internet, traffic Posted in Internet | No Comments »
Friday, October 1st, 2010
Image from http://ie.microsoft.com/testdrive/ October 2010
Hey, everyone, Josh from Computer Fitness back with another award-winning article to help you with your computer conundrums.
Microsoft is releasing a new version of Internet Explorer, version 9 to be specific. Now, there are a lot of claims about how fast and amazing this new version of IE is. Currently, IE9 is in beta, which means it is out for public testing. Users can relay their experience with Microsoft and inform them of bugs and other issues they’ve come across.
Hardware Acceleration is a big part of many websites looking to use HTML5 and make their websites look and feel even better. Hardware Acceleration means that IE9 can use your graphics card and more to make the browser run smoother and do more impressive things. This is a cool proposition for programmers looking to create exciting content like interactive games.
IE9 will load quicker and run faster. According to their website, it will start up quicker and handle updates quicker. Microsoft is working to take the updates out of your hands so you don’t have to worry about them.
Popular Sites is something that is a part of most web browsers these days, and IE9 will support it. When you open a new tab in your browser, you will see tiny boxes with images on your most visited websites. This is handy for when you use the web for a few select sites and frequent them often. .
All in all, IE9 is promising an improvement over past versions of IE as well as over other browsers in general. It will be interesting to see how this plays out, considering that while IE has a large share of the market, that piece is slipping. IE9 might be just what Microsoft needs to breathe life back into the software, or it could be the final iteration of the series. For more info check out Microsoft’s IE9 website.
-Josh
ComputerFitness.com
Tags: IE 9, IE9, internet, internet explorer, microsoft, pc, Software, Windows Posted in Internet, PC | 2 Comments »
|