Virus & Spyware Protection

5
Aug

Watch out for this costly hoax from ‘Microsoft’

[Taken from IT Security News and the news.com.au website] Further to my warning a few weeks ago about the Ransomware Trojan / Virus which could cripple your entire network, here’s a serious warning just published in IT Security Reports I subscribe to, as well as on some news sites. Note that this warning / heads up is also valid to

Read more

21
Jul

A tip explaining how to avoid common email traps..

Ransom Ware – Crypto Locker Infections Recent events prompted this blog post to remind everyone about the traps when dealing with email and attachments. Those who are interested in learning more, please see the end of this post for links to web sites that explain the destruction this type of infection causes and how it works. DO NOT OPEN ATTACHMENTS in email unless

Read more

30
Jun

A great tip about securing your online accounts..

This is something I’ve been doing for years. Many sites offer you the opportunity to save a set of questions and answers in the event that you lose access to your web site account, online email account or whatever. There’s been a bit of press lately about folks accounts being hacked because Hackers managed to guess the answers to their

Read more

25
Nov

Poodle Vulnerability – Are you protected?

Most would by now have heard of the SSL 3.0 Vulnerability, but have you tested if you’re at risk? How to test your browser’s TLS/SSL protection Several websites test whether your currently open browser supports SSL 3.0. For a simple test, Poodletest.com displays a poodle dog if your browser still supports SSL 3.0, and a Springfield terrier if it doesn’t.

Read more

18
Sep

Serious Internet Explorer Vulnerability Discovered in IE Versions 7, 8 and 9..

Security Alert News sites around the world are reporting a serious “Zero-Day-Exploit” security flaw just discovered (in the wild) involving Microsoft’s Internet Explorer Web Browser. The exploit affects Versions 7, 8 and 9 of Internet Explorer running on Windows XP, Windows Vista or Windows 7.   Microsoft have confirmed the problem exists and are working on patching it up, however you

Read more

12
Jul

Don’t become a statistic – How NOT to get hacked online..

The Scenario.. Sadly, one of my clients (identity withheld for privacy reasons) recently had a Hotmail email account hacked into. The hacker guessed the account password. By reading emails in the account, the hacker discovered other websites often visited. What made the whole scenario worse was that the person used the same password on just about every website they needed

Read more

21
May

Tips on Detecting Fake Emails..

I’ve cleaned many PC’s over the years from infections people got by opening an attachment. Scammers / Spammers and Virus writers use typical human nature “curiosity” to get folks to open their idiotic creations, so I decided I’d write a short piece with a few tips on how to spot the fakes. I’m going to use a recent “real life”

Read more

20
Jan

Check out our new security page – created due to popular demand!

Due to popular demand from clients and web site visitors emailing us to request a page be created which lists all our recommended security related products in one spot, we’ve gone ahead and done just that! Check out our new “Recommended Security and Backup Solutions” page by clicking this link.. Alternatively, go to our home page and just click on

Read more

5
Dec

Adobe Reader 2012 SCAM Alert

Hi Folks.. There is an email circulating claiming to Introduce “Adobe Acrobat Reader 2012” The email is BOGUS and not from Adobe.  There is no such thing as “Adobe Reader 2012 – it IS a scam. The email you receive will look something similar to this; – – – – – – – – – – – – 8< – –

Read more

14
Nov

Compliment your Antivirus Protection with MalwareBytes PRO..

Compliment your Computer’s Antivirus Protection with MalwareBytes PRO Just a quick note to let you all know about our latest tests on Securing your computers. Here at Andrew’s Computer Help Zone, computer security is always at the top of our priority list. As a result, I’m always looking out for protective software that not only does what it claims, but

Read more