www.bestvpn.com/blog/5184/4-ways-to-prevent-a-dns-leak-when-...
In addition to VPN connection failures (see our full article on protecting yourself against these here), the other big threat to your anonymity when using a trusted VPN service is that of DNS leaks, which can result in your ISP being able to 'see' and ...
blog.add0n.com/2015/05/16/tracker-and-script%20blocker-exten...
I saw multiple posts recently where people wanted to know which addons are redundant, so I decided to do some tests and research.
support.eset.com/kb146/
Remove previous Antivirus software! It is important that any previously installed antivirus software is uninstalled from your system before installing your ESET product. Typical uninstallation* using the Windows removal tool (Add/Remove Programs) is of ...
winhelp2002.mvps.org/hosts.htm
This article provides details on blocking Ads, Banners, Parasites, and Hijackers, web bugs, etc. with a custom HOSTS file.
apwg.org/resources/overview/
A lisit of security blogs and other online safety resources.
blog.comodo.com/pc-security/cryptolocker-virus-best-practice...
When you browse using Comodo Internet Security, you are 100% immune to the CryptoLocker Virus. Find out what steps to take if you're already infected.
krebsonsecurity.com/2013/11/how-to-avoid-cryptolocker-ransom...
Over the past several weeks, a handful of frantic Microsoft Windows users have written in to ask what they might do to recover from PC infections from “CryptoLocker,” the generic name for an increasingly prevalent and nasty strain of malici ...
myonlinesecurity.co.uk/how-to-protect-yourself-and-tighten-s...
Why do I need to know how to protect yourself and tighten security?
Why did I get infected in the first place?
You usually get infected because your security settings are too low or you blindly click yes to everything. This art ...Category:Articles Visited116
www.techsupportalert.com/content/how-stay-safe-while-online....
With the amount of malware currently prowling the internet it's very important to fully protect your computer from online dangers. This is important for everyone, not just the overly security conscious. Below I've compiled advice for both novice u ...
www.howtogeek.com/121267/11-ways-to-make-your-lastpass-accou...
LastPass offers a lot of security options for locking down your account and protecting your valuable data. We’re fans of LastPass here at How-To Geek – it’s a great service that a lot of you already use.
www.f-secure.com/v-descs/eicar.shtml
The EICAR Standard Anti-Virus Test file is a special 'dummy' file used to check and confirm the correct operation of security products.
en.wikipedia.org/wiki/EICAR_test_file
The EICAR Standard Anti-Virus Test File or EICAR test file is a computer file that was developed by the European Institute for Computer Antivirus Research (EICAR) and Computer Antivirus Research Organization (CARO), to test the response of computer ant ...
www.eicar.org/86-0-Intended-use.html
eicar combines universities, industry and media plus technical, security and legal experts from civil and military government and law enforcement as well as privacy protection organisations whose objectives are to unite non-commercial efforts against w ...
magazine.joomla.org/issues/Issue-Jan-2011/item/373-team-ease...
An article from joomlas magazine on how to create a secure password.
www.youtube.com/watch?v=VYzguTdOmmU
ophos's Graham Cluley explains a simple way of creating a complex hard-to-guess password - and how you should never use the same password on different sensitive websites.
windows.microsoft.com/en-us/windows-vista/tips-for-creating-...
Passwords provide the first line of defense against unauthorized access to your computer. The stronger your password, the more protected your computer will be from hackers and malicious software. You should make sure you have strong passwords for all a ...
www.dailymail.co.uk/sciencetech/article-2670710/Think-youre-...
The live interactive map was released by St Louis-based security firm Norse (shown). It can be used to see where global web attacks are starting and ending.
www.yahoo.com/tech/how-to-watch-worldwide-cyberattacks-live-...
These maps show how many hacking attacks are happening around the world every second.
www.express.co.uk/news/science/594638/HACKING-MAP-Watch-live...
It LOOKS like laser warfare with China and the USA blasting each other with Russia and Europe caught in the middle.
www.networkworld.com/article/2366962/microsoft-subnet/spellb...
Norse 'dark intelligence' has a 'live' map of global hacks on honeypots and Kaspersky Lab has an interactive cyber threat map that updates in real-time. Careful not to get sucked in as the amazingly hypnotic maps are serious time eaters.
Page 1 of 2