Archive for the ‘Internet Services’ Category

Advice For Parents Of Teen Cell Phone Users

Tuesday, July 16th, 2013

Today’s technology has made it incredibly easy for us to get online and surf the web from anywhere, and no matter where we happen to be. But this can also pose a threat for teens, who seem to be on their phones constantly. With almost all cell phones having internet capability, there are many more possibilities for your child to run into unpleasant situations as they surf.  SO how can you increase their safety when they use their phone? Although nothing can keep anyone 100% safe, there are a few tricks to apply.

Bluetooth being enabled on your child’s phone can mean the receipt of many unwanted messages. It can also leave their personal information vulnerable to intruders. Many phones, when registered as a child and not an adult user, will automatically block any internet content made for adults of 18 years and over, according to The Internet Safety Guide. As well, you may wish to consider whether or not to switch on location services. Because while this can allow you to see where your child’s phone is at any given time, it also opens up this information to anyone your child may link to via social networking.

The Internet Safety Guide Talks XP Defender

Wednesday, July 10th, 2013

Safety while using the internet is not something most of us worry about. This is mainly due to the fact that many of us have firewall and antivirus software installed. But what about the threat of fake security programs? One of these is XP Defender, a program which looks like a computer security program, but that is actually a carefully-designed product with the goal of taking users’ money. XP Defender has been helping hackers to do this for a number of years now. The malware begins trying to obtain user money from the point of installation, at which point windows pop up to alert the user to false infections.

Once alerted, the user is prompted to purchase the program in order to remove all of the falsely-detected threats, as well as eliminate the often-annoying pop-up windows. The Internet Safety Guide warns that XP Defender installs itself most often unbeknownst to the user, and as a Trojan-style installation, where the user gives no permission to install the program. This type of malware can be downloaded from any online location, such as a web page or perhaps even an image that the user has opened on their computer.

The Internet Safety Guide And Cyber Dating

Monday, July 8th, 2013

For single adults over the age of 18, online dating can represent a scary yet intriguing way to meet people. But as many horror stories you’ve heard may attest to, dating online can be dangerous. There are many things about online dating that are nothing like the real-world dating experience. First of all, a first date after having met someone online can leave you feeling as though you already know a person really well. But it’s important to realize that the person you have been talking to may not look or behave at all like you expect them to.

The best advice is to not give any personal or otherwise sensitive information to your cyber date when you finally meet them offline. Another tip according to The Internet Safety Guide is to not believe everything you may have read about your cyber date online. Another is to take your time getting to know the person, just as you might with someone you met offline. And although it may not seem very nice to do, keep all communications from those you meet online so that you can compare notes once in awhile to make sure the person is telling you the truth.

Internet Threat Types And How To Tell Them Apart, Courtesy Of The Internet Safety Guide

Thursday, June 27th, 2013

There are many threats out there on the internet. And keeping them all straight may seem like a difficult task. But the truth is that each threat has its own characteristics. Each is obtained differently, executes in its own unique way and can do specific kinds of damage to your system. And all it takes is to understand the differences between them.

Spyware has been around for years. Included in this kind of malicious software can be programs like keyloggers, which can record your keystrokes and then send that information to a remote server. Spyware can be downloaded just about anywhere online, and a user may not even know that it’s been activated, as this threat usually runs quietly in the background and doesn’t register the use of many additional resources.

Malware is actually the definition for several programs, which have been classified as such due to the fact that they have similar characteristics. Malware can cause a computer to act as though it’s been possessed; your computer may be performing sluggishly due to additional resources being used by the malware. Or, it may change the start page of your browser to a page you didn’t specify. Malware can also cause the appearance of pop-up advertisements, which can quickly become annoying if they start opening up several times during a session. You may also notice the appearance of new icons on your desktop that you don’t remember installing the programs for.

Many of those who enjoy playing games on their computers may have encountered adware. This type of threat is most often downloaded with games offered at no cost. But it can also be installed on a computer when things like free screensavers or other no-cost software. Adware may seem harmless, but it can actually collect information about you, such as the software you use and the email addresses in your contact list.

Adware is perhaps the most prevalent type of threat in the wild today. This is because most computer users will agree to the end-user license agreement of software without reading it. Most often, information about adware and the fact that it will be installed with the software is included in the EULA section of a program. But because most users don’t read the EULA, the adware is often installed without their knowledge.

If you were ever contacted by a company claiming to have your personal information and then demanding that you pay for its return, you are likely a victim of ransomware. This threat type can originate from just about anywhere online, including in email attachments that appear to be legitimate and web sites.

Ransomware will often encrypt the data it collects so that it’s completely inaccessible, and then demand monetary payment from the user in order to obtain the decryption key. Luckily, ransomware is not a common occurrence, according to The Internet Safety Guide. However, it’s a good idea to become familiar with all computer and internet threats that are out there.