Here is the article menu du jour:
- Background: We’ll start with the background story of one man’s experience with a not-so-honest repair shop.
Here is the article menu du jour:
How could a PUP be unwanted? Well, in this case, we are not referring to a fluffy, playful dog or even Power Pup the Office Assistant. We’re referring to a term that is increasingly being used to describe Potentially Unwanted Programs. We are likely all too familiar with a virus infection; your PC becomes infected when opening something such as an email attachment or having something downloaded without your consent when visiting an infected website – even ones that are considered legitimate can be sabotaged. Continue reading...
This article begins with information about cookies: what they are and what we recommend you do about them. We will also be covering information related to using PC Clean Maestro. In this way you are more informed about remaining secure and keeping your information private.
A cookie is a file that is sent from a website when you browse to that site. Every time you visit the same site the Internet browser sends the cookie from your PC to a server to notify the website of the user’s previous activity. In this way it is easier to login in to some sites that you have previously visited because your name is already present so you only have to add in your password. Continue reading...
We’re going to start off with a description of how this scam works followed by legal action taken against the scammers, and recent activity. Following this we will offer advice in terms of what to do when getting called and what to do if you or someone you know has already had a call and been the victim of technical support fraud.
A tech support scam involves a variety of “confidence tricks” that include part-truths, outright lies, and some aggressive sales pitches. It typically involves someone calling you on the phone and posing as a computer support technician, quite often, from a well-known and reputable company. Continue reading...
There have been two recent hack attacks: one that compromised Yahoo mail users and another that targeted Target credit and debit card information. We will begin by looking at the Yahoo attack and provide some password recommendations.
On Jan 30th Yahoo, the second largest email provider with 273 million accounts, confirmed an attack and announced that malicious computer software was able to access a list of Yahoo Mail accounts’ usernames and passwords. Continue reading...