Jacob is a nerd and proud of it. But his older siblings seem oblivious to his hardware and software achievements. Even after Jacob flies to the rescue when their shared computer is on a malware-induced fritz do they dismiss his advice. How will he make his siblings gain some respect? Find out in this week's Spyware Horror Story.
Identity theft victims would be allowed to request monetary compensation for the time they spent getting their lives back in order under a bill approved by a U.S. Senate panel.
The Identity Theft Enforcement and Restitution Act of 2007 would allow those who fell prey to identity fraud to seek "criminal restitution"--that is, payouts from the offender in a particular case--for time "reasonably" spent correcting "actual" or "intended" harm.
While potentially significant, it's unclear exactly how much of an impact the legal changes would make, should they be made … Read more
WASHINGTON--Federal consumer protection authorities say they want nothing more than to put the financial hurt on deceptive spyware purveyors. The trouble, they say, is that the law still doesn't let them.
But currently, the FTC can only force an offending company to turn over ill-gotten profits or to pay a finite amount to affected consumers--"consumer redress," as it's known … Read more
With so many potential threats on the Internet, it is an absolute necessity to prepare your computer for the Web. Whenever I get a new computer, the first programs I download include antivirus, antispyware, and firewall software. Frankly, if you don't have at least these three types of programs running on your computer, it's like driving at night without your lights on--sure it's possible, but don't be surprised if it ends in a crash (har har).
Fortunately, there are a lot of great security programs available at Download.com. Recently I've written Killer Downloads about both the best firewalls and the top antivirus programs. This week I'm doing a software roundup of a different type. In recent scouting of new (and new to me) software I came across some great Windows programs that work behind the scenes to keep your computer running smoothly and also keep your data secure.… Read more
Co-owning a computer can be tough, especially if you've got to share time with an Internet-hungry sibling.
That's why Ashley's sister jumps at the offer of a fresh computer for her exclusive use. This means Internet independence for both girls, if the hand-me-down computer passes 14-year-old Ashley's spyware test.
It doesn't. In fact, it fails miserably, so stuffed is it with Trojans, dialers, and worms. Will Ashley be able to disinfect it for her sister, or will she declare the computer a dud? This week's Spyware Horror Story, "My sister's keeper," … Read more
Silent and invisible, some malware sneaks up on you to quietly wreak havoc on your system resources and possibly mine your files for personal, bank account-cracking information. Shudder.
Other types of Trojans more helpfully announce their presence by lobbing pop-ups, disabling your Start menu, or in Matthew's case, playing puppet master with your browser.
As Trend Micro releases an upgrade to their PC-Cillin Web security product, they've renamed it Internet Security 2008.
It's a bit less glib and reflects the way in which malware attacks have proven to have serious, life-altering consequences in the real world. CNET's Rob Vamosi has given the trialware five stars, and it's hard to argue that Trend Micro doesn't offer a comprehensive suite of tools to keep you safe.
"I dabble in a high-risk area of the 'Net...I click links for money. That, in itself, opens me to tons of security issues."
So begins Patricia's personal Spyware Horror Story (see all.)
But despite the risk, it's Patricia's family that faces undoing, not by a devastating link, but by a harmless-looking "X" button on a sinister pop-up window. Patricia knows how to cap the pop-up--do you? Test your knowledge in "Nix the 'X'."
If an IM link from a friend pops up on your screen, do you click it right away? Most people, like Eivind, do. Most don't end up with a PC-killing worm.
Malicious IM links are a growing threat to users, and Eivind got dished an unpleasant preview of the trend we have to look forward to. Can she warn her friends of the deception before they're compromised too?
PC gamers would risk a lot for the sake of gameplay, even ignoring security warning signs or remaining coolly unconcerned.
Meet two young teens whose quest for the gamer's high set them on a collision course with a whole horde of Trojan malware scarier than anything they'd encounter in RuneScape or World of Warcraft.