In this week’s member-exclusive How-To Tuesday on Simple Tech Tips, we’re talking about how to remove a computer virus. The built-in antivirus on your computer isn’t enough to stop today’s Internet threats. Even with robust security software, viruses can still sneak through. This step-by-step guide will help you identify and remove computer viruses on Windows … Continue reading How to Remove a Computer Virus
Category: antivirus
How to Avoid Spear Phishing Scams
In this week’s member-exclusive How-To Tuesday on Simple Tech Tips, we’re talking about how to avoid spear phishing scams. Most people are familiar with phishing messages, spam that tries to trick you into clicking on links and infecting your computer with malware. Spear phishing takes this to a whole new level by using highly personalized … Continue reading How to Avoid Spear Phishing Scams
How to Spot Fake Apps on the App Store
In this week’s member-exclusive How-To Tuesday on Simple Tech Tips, we’re talking about how to spot fake apps on the App Store. Fake apps are running rampant on official app stores like Apple and Google, and security experts warn consumers to be cautious. But how can you recognize a fake app from the real deal? … Continue reading How to Spot Fake Apps on the App Store
Typosquatting: How Mistyped Web Sites Lead To Malware and Scams
Ever type the wrong Web address by mistake? Did you know that cybercriminals snatch up typoed domains in order to create tempting lookalikes? Typosquatting is the practice of registering a domain that is a typo of a common site, like goole instead of google or microsft instead of microsoft. Most people don't notice typos, especially … Continue reading Typosquatting: How Mistyped Web Sites Lead To Malware and Scams
When Good Apps Go Bad: How to Avoid Malicious Software
Fake apps proliferate online, and it’s hard to tell the good apps from the bad. Scammers are getting sneakier by hiding their malicious apps behind the smokescreen of reputable ones. Your garden-variety fake app is typically malware disguised as a fun game or useful utility. Behind the shiny exterior lies code that can steal your … Continue reading When Good Apps Go Bad: How to Avoid Malicious Software
You Need Better Antivirus Than Your Computer’s Built-In Software
Your computer’s built-in antivirus software is no match against today’s Internet threats. Here’s why you should replace it with something stronger. Windows and Mac computers both have default antivirus programs, Windows Defender and Apple’s XProtect. (If you haven’t noticed XProtect running on your Mac, that’s because it runs silently in the background as part of … Continue reading You Need Better Antivirus Than Your Computer’s Built-In Software
What You Need to Know About Tech Support Scams
Tech support scams are a continuing threat to consumers, especially with so many people working from home. Here’s how to avoid them, and how to find real tech support. A tech support scam usually starts with a fake phone call, phishing email, or pop-up ad. Phone calls are an especially popular choice for reaching consumers … Continue reading What You Need to Know About Tech Support Scams
“Secure” Web Sites Aren’t Always Secure
How do you know if a web site is safe? Do you look for the lock icon? Would it surprise you to learn that isn’t enough? Consumers have long been taught to look for the lock icon or “https” in the address bar to determine whether or not a site is secure. Years ago, when … Continue reading “Secure” Web Sites Aren’t Always Secure
Ransomware: A Dangerous Threat to Your Computer
Ransomware is a particularly nasty form of computer virus that encrypts your data, then demands payment for the encryption key. Why is ransomware so hazardous, and how can you remove it? Ransomware is vicious because it doesn’t just render your computer unusable. It encrypts all of your files, including those on networked computers, removable drives, … Continue reading Ransomware: A Dangerous Threat to Your Computer
A Home User’s Guide to Mobile Device Internet Security
Few of us maintain the same security precautions on our tablets and phones that we do on our computers. But mobile devices contain personal data, and they go wherever we do. Here’s what you need to know to keep your mobile devices protected. In general the same security rules we use for computers also apply … Continue reading A Home User’s Guide to Mobile Device Internet Security