Posted on
July 21st, 2010 by
David
Our desire for constant connectivity has given rise to free Wi-Fi networks in hotels, coffee shops, and airports. At home, many of us take extensive Internet security precautions, yet when it comes to free Wi-Fi, we don’t seem to realize the dangers we open ourselves up to such as malware, viruses, and even identity theft.
So what exactly is the difference in terms of Internet security, between the free Wi-Fi networks and those we use at home or work? It’s simple – there is no Internet security with Wi-Fi. Read more »
Posted on
July 20th, 2010 by
David
If you’ve ever been the victim of an Internet security attack, you’ve probably heard of the Windows registry. The registry is a prime target for the producers of malware. However, most of us have very little understanding of the registry or its connection to Internet security.
The Windows registry is the foundation of your computer. It is made up of thousands of folders called “keys” containing the basic instructions and information a computer needs to run. Because it’s so complex, most typical computer users stay clear of it. Read more »
Posted on
June 21st, 2010 by
David
Phishing attacks threaten our Internet security and can be hard to detect. They can lead to identity theft, viruses, or the need for computer repair. To help protect your Internet security, RESCUECOM’s computer repair experts offer five simple tips for detecting phishing attacks.
•1.) Avoid Action – Phishing attacks work when you take action. An email that requests information or features clickable links may be an attack against your Internet security. Legitimate emails include cut and past style links to help you avoid clicking. If there are only clickable links, the email is likely a phishing scam. Read more »
Posted on
June 14th, 2010 by
David
RESCUECOM reminds users to utilize only legitimate anti virus software, such as our Internet Security Suite.
A common cyber attack uses fake anti virus software as a means for infecting computers with malware. These attackers rely on fear to trick users into violating their own Internet security. Read more »