Recovering from a Trojan Horse or Virus
by the United States Computer Emergency Readiness Team
www.us-cert.gov
Michael D. Durkota and Will Dormann It can happen to anyone. Considering the vast number of viruses and Trojan horses traversing the Internet at any given moment, it’s amazing it doesn’t happen to everyone. Hindsight may dictate that you could have done a better job of protecting yourself, [...]
Is your company keeping information secure?
Federal Trade Commission
Are you taking steps to protect personal information? Safeguarding sensitive data in your files and on your computers is just plain good business. After all, if that information falls into the wrong hands, it can lead to fraud or identity theft. A sound data security plan is built on five key principles:
* Take [...]
Read More About - Is your company keeping information secure? »
Protect Your Computer From Microsoft
Microsoft
Microsoft Security
4 steps to protect your computer
Step 1. Keep your firewall turned on
What is a firewall?
A firewall helps protect your computer from hackers who might try to delete information, crash your computer, or even steal your passwords or credit card numbers. Make sure your firewall is always turned on.
• How to turn on your firewall
• [...]
Online Verification: Who Can You Trust in the Virtual World?
How can you tell who you are communicating with over the Internet? This article from Business Week helps explain.
Kaylee was struggling. Diagnosed with a heart condition and cancer, she was scared. So she started a blog. Soon, people across the country answered her plea, writing notes of encouragement and even trying to mail [...]
Read More About - Online Verification: Who Can You Trust in the Virtual World? »
Phishing Through Your Browser
There is an attack that will grab information across web browser windows / tabs. Though it is not the most significant threat on the Internet, it should be of concern.
Learn how to prevent keystroke copying and password theft — Full Article