Spybot Evalutation
Here’s an evaluation of Spybot Search and Destroy. I’ve also found the tool useful, but not as one’s sole protection.
Here’s an evaluation of Spybot Search and Destroy. I’ve also found the tool useful, but not as one’s sole protection.
There was a time when cars were few and far between and when car theft was essentially unknown. You could leave your car sitting out in your yard or on the street and generally expect to find it there in the morning. Then the automobile came into its own. Many people owned them, and many…
… along with other annoying things. But today I was reminded of these emails when Jody showed me one she got that purported to be from Amazon. The folks who do this stuff know that a whole bunch of people shop on Amazon, so they create a fake email and choose a price that many…
I recommend Malwarebytes Anti-Malware regularly. I like to call it the “biggest broom” for sweeping out a computer that has been infected. I want to alert you to a new tool from the same company, Malwarebytes Anti-Rootkit (HT: TechRepublic). It’s still in Beta, but is quite well along in that testing. Be sure to read…
Wordfence is providing another excellent public service announcement, this time regarding hijacked extensions. While the method of attack is interesting, there are a number of important actions recommended in the post. I’d like to call your attention to a few: Don’t trust links in e-mails. As we become used to search bars being combined with…
… consider yourself warned. I have encountered several machines recently on which people were either running without anti-virus protection or had allowed the anti-virus subscription to lapse, sometimes for long periods of time. I know it’s tempting to avoid that little expense, but the protection is critical. You also need to let those scans run,…
From the SmarterMSP.com blog – Threat Spotlight: Phishing emails using Adobe InDesign on the rise. I use InDesign for book layouts and cover designs, and others may use it for similar graphics needs. Always be on the lookout for these kinds of emails. They may exploit a variety of software.
(Note: Page author Henry Neufeld is compensated for sales made through links on this page.)