tag
how-to

Five tips to help control your privacy on Mac OS X

Apple’s Mac OS X Mavericks has some very neat privacy features built in – from a “Guest User” account which restricts people to using Safari when borrowing your Mac to a panel which prevents apps using your location.

Five ‘new friends’ to avoid like the plague on social networks

Befriending the wrong person on Facebook can hand a criminal the tools for an identity theft attack – and on LinkedIn, talking to the wrong ‘recruiter’ can lead to disaster.

Smells phishy? New email scams – and why smartphone users need to stay alert

Phishing is unique among cyber attacks – it doesn’t rely on weaknesses in computer software, or new vulnerabilities – it relies, initially at least, on human gullibility. Our guide offers advice on how to avoid the latest scams – and why tablet and smartphone users need to stay alert.

Make it stop! How to cleanse your PC of unwanted adware (and ‘badware’)

‘Adware’, software which delivers unwanted adverts, isn’t as scary as some malware, but ESET’s analysis of Win32/Boaxxe shows that ‘malicious’ adware is becoming increasingly hi-tech and stealthy. Our guide will help you clean your machine – and see fewer unwanted ads.

When it just doesn’t click: How to date online without being scammed

Few things are sacred to today’ cybercriminals – and true love certainly isn’t one of them. Dating scams are a fast-growing area of cybercrime – rising by a third year-on-year in some countries, and ranging from fraud, to identity theft to malware attacks. Here’s how to stay safe.

Cash – or crash? Tips and tricks for using Bitcoin safely

Despite the heists against Bitcoin sites, plus high-profile law-enforcement actions against ‘dark market’ sites such as Silk Road, which conducted transactions in Bitcoin, the currency is soaring. We asked ESET experts, and finance advisors, for tips on how to stay safe.

Safer cyber-shopping! 12 tips for a happier Holiday Season

Don’t let cybercriminals spoil your holidays! Our tips will ensure you don’t get fooled by the latest scams while you hunt down the best deals for your family.

When big sites spring a leak: What to do when breaches put your ID at risk

When Adobe admitted 38 million user IDs had leaked from its system this week, it was one of a long line of companies to fall victim to such data breaches. Most companies react fast – and offer good advice – but our guide adds a few extra safeguards if your ID is put at risk.

Don’t pay up! How to avoid ransomware threats – and how to fight back

Ransomware can be among the most frightening forms of malware – suddenly, your screen is replaced by a message from the police, demanding money, or a message saying your files are lost unless you pay a ransom to unlock them. Our tips will help you fight back.

Clean up, speed up: How to make your PC run faster

On average, Windows PC users spend five days a year waiting for their machines to load – and the culprit for slow machines isn’t always malware. Here are a few tips to restore your grumbling old PC to top speed.

Five bad PC habits many of us STILL have – and how to stop today

Tiny things such as using an admin account on your PC when you don’t need to can give cybercriminals their “way in”. Thankfully, a few simple changes can make you safer – wherever you browse, and whatever you do.

BYO-Doh! How not to be the “bring your own disaster” guy

Many workplaces allow wokers to bring their own smartphones, tablets and PCs to work – a practise described as “Bring Your Own Disaster” by IT wags for years. Disasters, of course, DO happen – our tips should help you avoid being the guy who brings one.

Live fast, die old: Pro browsing tips to enjoy the Web at full speed (and safely too)

Malware, phishing and ID thieves are everywhere – but you don’t have to be paranoid, or hang back, or stop yourself enjoying the best the web has to offer. Our tips should help you browse with confidence.

A scam-spotters guide: Ten things your bank will NEVER do – but cybercriminals will

These days cybercriminals will use phone calls, SMS messages, emails, fake apps – and even couriers – in an effort to get your money. The key to staying safe is to recognize behavior that isn’t quite “right” – and catch phishers and fraudsters in the act.

In a rush? Five two-minute tips to make yourself more secure right now

Performing a “cyber spring clean” can be time-consuming – but many of us have a few weaknesses we can tighten up in two minutes or less. Here are a few “instant fixes” for problems you might have overlooked…

Big phish, small pond: How to stay safe from SMS phishing scams

Phishing emails are a sad fact of life, and most of us are used to dealing with them – but cybercriminals are increasingly turning to SMS to reel in their victims. Our tips should help you avoid clicking something you’ll regret.

How to keep children safe online (without looking over their shoulders all day)

Children come into contact with the internet at a very young age these days – a survey on a parenting site this year said that one in eight children go online before the age of two. Our tips will help keep youngsters safe – and help them enjoy the internet.

Don’t get zombified! Security tips for PC gamers

Don’t let your PC end up in someone’s zombie army. Gamers are prime targets for cybercriminals – our tips should help you avoid ending up an infected victim…

No chocolates for my passwords please!

Greetings Dear Reader, We have published guidance material previously on passwords and passphrases, some are blogs and some are lengthier depending on your liking (link & link).  Even still it is always good practice to reinforce sensible password techniques.  For this blog, I plan on sharing an analogous self-ritual, and one that relies on a

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

3 articles related to:
Hot Topic
18 Mar 2014
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.