Tech Tips Home
The Best Tech Tips And Daily Deals
Newsletter On The Internet!

Shop online 24hrs a day or call us Mon-Fri
8:30AM-4:30PM EST - 1-800-915-2088
WorldStart Tech Tip And Store Search
Email: Password: Login Remember Me
Buy Worldstarts Internet security survial guide

Archive for the ‘Security Help’ Category



AIM Bots

Friday, September 22nd, 2006

AIM Bots

FaceTime Communications recently discovered a worm that uses America Online Instant Messenger, otherwise known as AIM, to create a network of controlled PCs or also known as a bot network. It’s called the “Pipeline Worm” and it is revolutionary.

Bot networks are networks of PCs controlled by an outside entity. This entity gains control of these PCs by infecting them by using one of several procedures… Continue reading

Find My Credit Card

Friday, September 15th, 2006

Find My Credit Card

How long do you think you have had your PC? Two to three years? Maybe longer? Well, in that time, might it be safe to say that you have probably ordered a thing or two online? Maybe you have registered with a Web site or two? The holidays will be upon us before we know it and will anyone in your house be using the PC… Continue reading

Privacy and Cell Phones

Friday, September 8th, 2006

Privacy and Cell Phones

Cell phones and PDAs (personal digital assistants) have really become more than simply phones. People rely on them and consequently, they become warehouses of personal data. People use their cellular devices as their personal assistant for storing addresses, contacts, event reminders and even things as business negotiations. The cell phone’s versatility and remarkable capabilities are making people more dependent on them than ever.

With these devices… Continue reading

This Week in Security

Friday, September 1st, 2006

This Week in Security

There sure was a lot going on in the past couple of days in the world of cyber security. Let’s see, we have a fix for the fix and a new free phishing protection service from a major online player, all while another online giant gets criticized for its client software. So, read on and get the low down on what’s going on this week in… Continue reading

Lost in the Crowd

Friday, August 25th, 2006

Lost in the Crowd

I don’t know how many of you are familiar with what happened over at AOL during the first week of August, but it was some pretty big news. Apparently, two AOL employees released information on over twenty million private online search records. Although AOL states that the information was stripped of any identifying information, ensuring that none of this information would compromise any of the individual… Continue reading

Patch Day

Friday, August 11th, 2006

Patch Day

This week seemed to be the week for the patching of holes. There has been a number of security vulnerabilities discovered as of late, forcing companies like Microsoft and Intel to fix the problems. So, I thought I would take some time this week and inform everyone of some important downloads that could play a major role in keeping you and your system safe.

Microsoft’s Monthly Update

First… Continue reading

Ebay Feedback Scam

Friday, August 4th, 2006

Ebay Feedback Scam

I have good news and bad news. The good news is that reports for July by certain security experts claim that e-mail viruses are actually down. The bad news, on the other hand, is that the rise of a whole new genre of scams is coming quickly over the horizon, with the newest meaning to separate Ebay customers from their hard earned money.

The Feedback Scam, as… Continue reading

Hide Files

Friday, July 21st, 2006

Hide Files

What’s the best way to keep people out of your personal data? You know, those important documents or incriminating pictures. Well, you can encrypt it, you can burry it in some unsuspecting location on your PC, use dummy folder names, etc. The list goes on and on. Well, with the help of Hide Files by Spydex Inc., you can take your protection to the next level… Continue reading

Phone Phishing

Friday, June 30th, 2006

Phone Phishing

There’s a new type of phishing scam on the horizon. It’s one that mixes the traditional methods, such as sending bogus e-mails, with social engineering techniques. Don’t let it catch you off guard!

As you probably know by now, the term phishing refers to an attempt to gain personal information from end users by spoofing legitimate companies and financial institutions such as PayPal or Ebay. In order to… Continue reading

Worm Attacks Yahoo! Mail

Friday, June 16th, 2006

Worm Attacks Yahoo! Mail

Early Monday, June 12, 2006, it was discovered that the most popular Web based e-mail of Yahoo! was being exploited. The threat is a mass mailing worm that uses a vulnerability within JavaScript to allow itself into unsuspecting PCs. J.S.Yomanner@m is the name given to it by the Symantec corporation, and I could think of a few myself, but my professionalism restrains… Continue reading

Firefox and Thunderbird Critical Updates

On June 1st, Mozilla, the creators of the highly popular Open Source applications, such as Firefox and Thunderbird (alternate Internet browser and e-mail client), released an update. The update addresses several vulnerabilities in both applications with more than five of them getting a “highly critical” rating from two very reputable security companies (Secuna, ZDNet), and the Mozilla corporation itself.

For most… Continue reading

Microsoft Word Vulnerability

Friday, June 2nd, 2006

Microsoft Word Vulnerability

Back on May 19th, a vulnerability was discovered in Microsoft Word that allowed a specially crafted Word document to arbitrarily install malware. This vulnerability is a Zero-Day Flaw, meaning there are yet to be any patches or fixes to stop it. To make matters worse, this particular vulnerability was released to the public, as well as, Microsoft, so anyone who whishes to exploit the Word… Continue reading

Yahoo! IM Worm

Friday, May 26th, 2006

Yahoo! IM Worm

Whenever you see a title like that, you know there’s a virus goin’ around. This week’s exploit is a self-propagating worm that affects those of us who enjoy Yahoo’s Instant Messenger service.

This worm was discovered in late May by Face Time Security Labs. They were using a “Honey Pot,” which is an industry trick to attempt to ensnare attackers by using an unsecured un-updated PC… Continue reading

GooleAnon

Friday, May 12th, 2006

GoogleAnon

If you’re like everybody else who uses the Web, I imagine you use Google’s popular search engine to look up information about different topics. Well, just like about any other Web site out there, Google sets cookies on your browser for various reasons, such as remembering preferences.

With Google however, it keeps cookies that track user searches and stores them on its database for possible future needs. Some of… Continue reading

Firefox Update

Friday, May 5th, 2006

Firefox Update

Do you use Firefox? Well, if you do, you’re sure to be interested in this update. Mozilla recently released a patch update for the Firefox browser, which will fix a security flaw that has been hanging around. What’s the flaw, you ask? It has to do with how Firefox handles JavaScript codes. It mainly deals with the “contentWindow.focus( ) code.

This bug could easily be controlled… Continue reading

SiteAdvisor

Friday, May 5th, 2006

SiteAdvisor

If you are serious about securing your system, you are in for a treat today, because I have a free security application that is going to help protect your PC in new, proactive ways. It’s called SiteAdvisor and it’s actually been around since April of 2005 when a group of students from MIT got tired of cleaning all the spyware and spam out of their folks’ PCs on school… Continue reading

Microsoft Re-Engineers April’s Security Update

Well, it seems as though Microsoft isn’t completely out of the woods from the critically rated vulnerabilities that plagued its operating systems late last month. It appears that the remedy for these security holes wasn’t entirely without consequences. There were six scheduled update patches for April, three of which were critical and three that had less severe ratings. Microsoft did come out with the fix… Continue reading

Strider URL Tracer With Typo-Patrol

Friday, April 21st, 2006

Strider URL Tracer With Typo-Patrol

There are lot of ways online attackers can get information from you. They can attempt to install malware on your computer or they might just send you popups. Anyone who has spent any time on the Web has experienced at least one of these annoyances, if not all of them. Well, as you know, here at WorldStart, we try to arm and inform our readers… Continue reading

April Microsoft Updates

Friday, April 14th, 2006

April Microsoft Updates

Well, it’s that time of the month again; the second Tuesday of the month (well yesterday anyway), and Microsoft has some updates that you need to make sure you have installed. A critically rated vulnerability, as you may remember form other articles, is the highest level of severity given to a vulnerability and it should be dealt with immediately.

With that in mind, it has been a… Continue reading

The Fifth Internet Explorer Security Zone

For those of you that don’t know, Internet Explorer places restrictions on Web content by which security zone a site happens to be in. It classifies these sites into zones, which are preset security profiles in Internet Explorer. The security zones which we have discussed before in earlier articles, are located in Internet Explorer under Tools, Options, Security tab. The four default zones have… Continue reading

March Updates

Friday, March 24th, 2006

March Updates

Believe it or not, March has been a pretty busy month for critical updates. It has also included the most severe rating vulnerability a program flaw or malware can achieve. Microsoft’s monthly update came out on the 14th and it addresses a critical flaw that affects a number of different MS Office components, as well as, seven versions of MS Works.

In addition to the Critical Office vulnerability… Continue reading

The World Map of Viruses

Friday, March 17th, 2006

There’s a lot that goes into trying to stay on top of all the most recent security threats. Every day, there are new vulnerabilities, new patches, a new scam, a new Trojan, new virus or a rootkit, so it’s easy to keep busy with all of them. To make matters even more complicated, the viruses all have different strains that exploit systems

SiteAdvisor

Thursday, March 9th, 2006

SiteAdvisor

A product that I have actually been looking to find for awhile now is some sort of service or tool that can quickly determine whether or not a Web site you are visiting contains hazardous elements. Sure, there is a lot of different security software out there that work together to stop threats from entering your system. However, none of these products can proactively warn you of the dangers… Continue reading

Windows OneCare Live

Friday, February 24th, 2006

Windows OneCare Live

I’ve been reading several tech security sources lately and according to them, one day there is going to be far fewer companies out there making security software because the giants in the industry are going to take over. They are going to be acquiring smaller security companies that show promise while extinguishing their identity and making them their own. It appears as though I’m seeing a lot… Continue reading

WPA

Friday, February 17th, 2006

WPA

I have done security articles in the past on how to lock down or secure your wireless network form unwanted guests. In this article, I am going to discuss how to set up a Mac filter, how to stop your SSID from being broadcast out for the world to see and talk about a few other wireless security fundamentals. At one time, WEP (Wired Emulated Protection) was the standard… Continue reading

Hosts File

Thursday, February 9th, 2006

Hosts File

If successful at infiltrating your system, viruses and other malicious code will use a common procedure in which they write entries into a special file called the Hosts file. By putting these special entry lists into the Hosts file, attackers attempt to accomplish one of following two things:

1) Viruses will put entries into your Hosts file to stop you from having any contact with any antivirus protection’s… Continue reading

Blackworm

Friday, February 3rd, 2006

Blackworm

The Blackworm (that’s one of the titles bestowed upon the latest Internet threat) is also known as Nyxem, Bluemal or even Blackmal, depending on the source in which you happen to be viewing. Of course this doesn’t matter, because we all know that what’s in a name does not matter. Besides, I’m sure that if you get caught by one of these, you’ll be coming up with your own… Continue reading

Free Newsletter Signup



Tech Tips Daily

Become a tech pro! Get the very best tech and computer help sent directly to your email every weekday!

Tech Tips Weekly

The week's best in tech and computer help. Get your issue sent to your email every Friday!

WorldStart's Daily Deals

The very best deals on the Internet! Get a new set of incredible sales every day of the week!

Just For Grins

Clean jokes, funny quotes, and hilarious comics. Sent 5 times a week straight to your email.


Subscribe


Love Worldstart? Refer A Friend!

Buy Worldstarts Internet security survial guide
WorldStart's Premium Membership

Tip Archive


Categories:
Archives: