Security Crunches | thenortonsetup

security crunches

At a time within which company network directors feel safer than ever — what reasonably security issues ought to a corporation be centered on once most worker pcs run their applications within the cloud? — This month’s edition of our “Tech Headlines Digest” underscore the fact that no computer security answer works 100% of the time, and the way you’ll be able to most with efficiency prepare yourself and your internal IT systems.

In November, hackers continuing to use their new favorite attack vector — malicious image files — to allegedly unfold ransomware over social media. Meanwhile, a security professional from Google expressed the opinion that ancient antivirus software system does not work that the only way to maintain complete network security is to stop all unknown software system from running. Trying to broaden its product choice, antivirus company Symantec has noninheritable LifeLock — a corporation that does not market a pc security product the least bit. Scan on to find out additional concerning the highest school headlines from the most recent edition of the security-focused roundup.

Google Security Specialist Warns Antivirus software system Is Ineffective

The Story: Speaking at the New Zealand hacker conference Kiwicon X, Google security engineer Darren rabbit-eared bandicoot noted ancient antivirus software system as “magic” that “[does] not work.” Elaborating any, rabbit-eared bandicoot explained that antivirus software system will ne’er be actually effective against unknown threats — and once security researchers discover a brand new virus, it’s actually because it’s already compromised some systems. With such a lot of firms currently victimization largely cloud-based apps, Bilby said, computers on company networks solely ought to run a couple of native applications. It is, therefore, safest to whitelist approved applications and block the execution of all different software system.

Small Business Takeaway: victimization cloud-based applications will go a protracted method toward rising the safety of any company network. If your business has already affected to a cloud network, square measure you continue to permitting users to run applications locally? Perhaps it is time to re-think your security policies.

Continue reading “Security Crunches | thenortonsetup”


Why you should not watch ‘Leaked Sex Tape’ of celebrities


There are many reasons why you should not watch the leaked sex tape that is doing the rounds on Facebook and other social media platforms.

Primarily, it encourages hackers to invade celebrities privacy when we engage with content that condones events like the Fappening.

But moreover, clicking on the links that claim to redirect you to a site showing NSFW photographs, actually begin a download of malware onto you device.
The online scam tempts Facebook users with the promise of a sex tape featuring actress.
The malware then gains control of your web browsers particularly Google Chrome and clutters sites with advertising for fake lotteries and spams sites with explicit nudity.

According to a team of researchers at Cyren, who have investigated after the scam has spread across social media, it will also gain access to your private Facebook data including your friend list to your private messages in closed chats.

Nowadays, online scammers will go to any lengths to make money with a blatant disregard to their financial victims and the celebrities whom they use as a tool for their devious online profiteering ploys.

It is better not to watch these sex tapes and take initial steps to secure you identity and personal details. For Internet security and you device protection you can install antivirus on it by that it will help you to protect from malware and different types of virus. Norton is one the leading antivirus and protection software among other antivirus in market . You can download it from And for installation support you can also visit 

How to Shield Yourself & Tighten Security

You usually get infected as a result of your security settings area unit too low otherwise you blindly click affirmative to everything. This text can show you the way to safeguard yourself and tighten security.

If {you area unit|you’re} reading this text as a part of a post-infection clean-up then please bear in mind that many anti-malware tools that are unremarkabley employed by facilitateers on on-line help forums reset varied Windows settings to the default ones that Windows came with. These are not perpetually the safest choices however area unit the default Windows choices. If you follow the recommendation below, particularly setting “Show proverbial file types”, you may be a lot of safer and you may have taken the primary steps to safeguard yourself and tighten security.

Here area unit variety of recommendations which will facilitate to safeguard yourself and tighten security and which is able to contribute to creating you a less probably victim:
Watch what you download!: several package programs and P2P applications area unit amongst the foremost ill-famed, coming back with a colossal quantity of bundled spyware which will eat system resources, block your system, clash with alternative put in code or simply plain crash your browser or perhaps Windows itself. There’s no such issue as a gift and plenty of “free” programs on net contain adware or spyware. Browse the EULA fastidiously before putting in something and if it says “Supported by Advertising” or similar choice of words be terribly cautious and expect issues and pops ups etc. Use caution what add-ons, toolbars and extensions you put in in your browser. Only a few of them area unit required, helpful or safe. All the bulk of those add-ons can do is block browsing and cause unwanted adverts and pop ups on your pc. Be extraordinarily careful once downloading from code sites. A high variety of those sites use their own “download manager” that stealthily installs questionable “optional” programs that cause pop ups, adverts and search diverts, unless you’re scrupulous concerning observation what it will and punctiliously un-check everything it offers, with the exception of the program that you simply truly need.

Once a file has been downloaded then scan it along with your antivirus BEFORE gap it: As a assure i like to recommend scanning it at: Kaspersky Application authority which is able to provides a recommendation supported alternative user input and what the file seems to try and do. If it’s safe then it’ll say therefore. Unknown files area unit mechanically given a caution rating and unhealthy files area unit marked with a red warning.

Set your folder choices to “Show proverbial file varieties”: The default for Windows is to cover proverbial file types which means, after you receive associate email voice communication “open this picture” or “read this necessary document”, you don’t see the .exe at the tip. Once you set proverbial file varieties to indicate it’s a lot of less probably that you simply can accidentally click on a malware file and open it, thinking that it’s an image from a devotee or a document that you simply predict. This shows you the way to line it for Windows seven or view and this for Windows 8.1.

Watch out for sites that insist you wish a special codec to look at the video or hear music on the location as ninety nine of the time they’re making an attempt to put in malware. If you have already got Windows Media Player, Flash Player, QuickTime or Real Player put in there ought to ne’er be a need to put in a special player or codec from the location.

Phishing and Identity Theft: Be terribly cautious of links in emails allegedly coming back from your bank, savings and loan, nondepository financial institution, PayPal, etc. Hover your mouse over the link to envision whether or not it’s the proper bank web site, etc. If the address showing within the hovered link is not the same because the address it says it’s then do not click on that. head to your bank’s web site via a proverbial sensible link. If you are doing happen to accidentally click on a suspicious link, do not panic however merely shut the browser window and undoubtedly do not enter any data within the web site. This Microsoft page has some terribly useful recommendation. we have a tendency to all get terribly blasé concerning phishing and assume we all know such a lot that we are going to ne’er fall for a phishing try. do not assume that each one makes an attempt area unit obvious. expect any web site that invitations you to enter ANY personal or monetary data. it would be associate email that claims “you have won a prize” or “sign up to the current web site for discounts, prizes and special offers”.

Malicious Email attachments: Be terribly careful with email attachments. the fundamental rule isn’t open associatey attachment to an email unless you’re expecting it. currently that’s terribly simple to mention however quite onerous to place into follow as a result of we have a tendency to all get emails with files hooked up to them. Our friends and family like to send United States photos of them doing silly things or perhaps cute photos of the kids or pets. ne’er simply blindly click on the go into your email program. perpetually save the file to your downloads folder therefore you’ll check it initial. Most (if not all) malicious files that area unit hooked up to emails can have a faked extension. that’s the three letters at the tip of the file name. sadly, Windows hides the file extensions by default therefore you wish to line your folder choices to “Show proverbial file varieties. Then after you unfasten the nada file that’s purported to contain the images of “Sally’s dog catching a ball” or a report in Word document format that job has sent you to complete performing on over the weekend, you’ll simply see if it’s an image or a document and not a computer virus. If you see .EXE, .COM, .PIF or .SCR at the tip of the file name don’t click on that or try and open it, it’ll infect you. Whereas the computer virus is within the nada file it cannot hurt you or mechanically run. once it’s simply sitting unzipped in your downloads folder it will not infect you, provided you do not click it to run it. simply delete the nada and any extracted file and everything are going to be OK. you’ll perpetually run a scan along with your antivirus to make certain.

Smart Screen Filter: Keeping it turned on the least bit times can shield you and tighten security plenty. If you’re victimisation view or Windows seven then net person nine (on Vista) associated eleven (on W7) has an intrinsic good filter that scans all websites that you simply visit and every one web-based downloads. it’ll provide you with a warning and block access to proverbial infected websites and unknown or malicious feasible files that you simply try to transfer. It will not block .zip or .rar files. Obviously, good Filter solely works if you utilize net person as your browser and not if you utilize Firefox, Chrome or another browser. If you’re victimisation Windows eight.1 or Windows one0 then you’re far better protected as a result of good Filter is intrinsic to Windows and scans, checks and blocks ( if needed) any file you transfer or open on your pc. this manner it works on all browsers and any files received by email additionally as net scanning. alternative browsers have similar protection that ought to perpetually be left turned on: Chrome has “Enable phishing and malware protection” Firefox has “Block according net forgeries and block according attack sites”. See here for a way to envision that they’re turned on.

Facebook, Google+, Twitter and alternative Social Networking sites: Don’t get frenzied with what you post on these sites and keep in mind that plenty of what you post are going to be public and it’s rather like walking down the native main street and shouting dead set everybody in range everything that happened last night, your name, address and signal and wherever you hide the spare keys to your exterior door. ne’er post after you area unit feat or that the house are going to be empty long. Plenty of thieves, fraudsters and alternative criminals loiter around and monitor social networking sites and use the knowledge they gain from them to try and do voluminous nasty things to you. Additionally keep in mind what you post are often browse by all of your friends and sometimes your boss or perhaps a possible leader. Do not let one thing you wrote after you had a couple of drinks otherwise you were in a very silly or unhealthy mood return and bite you a couple of weeks, months or years later. Read more…

Keep Windows and programs up to date:

Windows Update and net Explorer: head to id est > Tools > Windows Update or use electrical device > Windows Update and install ALL vital and Security Updates listed. It’s extraordinarily necessary to perpetually keep current with the most recent security fixes from Microsoft. Install ALL of these patches. Older versions of net person don’t seem to be supported or counseled and you’re powerfully suggested to right away update (to IE9 for view and IE11 for Windows seven, Windows eight and Windows eight.1). As of Gregorian calendar month twelve, 2016 there are not any additional security or practical updates for any version of net person below IE11 (except IE9 on view only). you need to update your net person browser to the most recent version instantly. Windows eight RTM additionally finished support thereon date and you need to update to W8.1 so as to induce updates and keep safe.

It does not matter if you commonly use an alternate browser like Firefox, hunting expedition or Google Chrome. simply having older versions of net person, that area unit liable to such a big amount of exploits, put in on your pc is enough to permit malware and exploits on to your pc with no action on your half. Microsoft currently problems security updates on the second Tuesday of each month and non-security updates on the fourth Tuesday. ensure you are doing a Windows update as shortly as you’ll when 6:00 p.m. U.K. time or 1:00 p,m. U.S. local time to induce the most recent updates on those days.

Oracle Java: I don’t suggest that you simply have Java put in the least bit unless you fully want it. the quantity of malware infections that occur as a result of Java vulnerabilities is therefore high these days. The overwhelming majority of users get by alright while not Java however IF you are doing want it then:

Oracle Java gets updated oft therefore ensure you update it frequently and uninstall any previous versions once you’ve got done therefore.

NOTE: the Java updater doesn’t perpetually take away the previous vulnerable versions.

Please follow these steps to get rid of parts of older versions of Java and to update:

Download the most recent version of Java Runtime surroundings (JRE)
Scroll right down to wherever it says “Java Platform, commonplace Edition”
Look within the right-hand box that claims “JRE” and click on the BLUE “Download” button
That takes you to the list of the most recent Java SE Runtime surroundings downloads with alternatives for each sort of software package
Check the box that says: “Accept License Agreement”
Click on the link to transfer the acceptable Windows Offline Installation and put it aside to your desktop
Close any programs you’ll have running – particularly your application
Go to begin > electrical device and click on on “Programs associated Features” (or double-click on Add or take away Programs if you are running an older version of Windows) and take away all older versions of Java. Double-click any item with Java Runtime surroundings (JRE or J2SE) within the name and reply “Yes” to substantiate that you simply need to get rid of it (or click the take away or Change/Remove button in older versions of Windows). Repeat as persistently as necessary to get rid of every Java version
Reboot your pc once all Java parts area unit removed
Then, from your desktop, double-click on the transfer to put in the latest version
However, the a lot of easier and fewer confusing means is to travel to and press the red “Free Java Download” button

Adobe Flash Player, athlete Reader etc.: Keep Adobe Reader and Flash Player updated. one in every of the foremost common avenues of infection is out-of-date and vulnerable versions of those 2 product. If you’re victimization Windows 8.1 and Windows 10 then Flash is intrinsic and can mechanically update for net person. you may still ought to use the Flash updater to stay Firefox updated however Chrome mechanically updates Flash. Check whether or not you’ve got the most recent version of Flash Player here. browse here for a way to line your PDF reader to open all PDF files within the PDF reader itself and not in your browser for safety reasons.

Always use a typical or restricted user account for regular pc usage, particularly for net use: this is applicable largely to Windows seven, Windows 8.1 associated Windows 10 or view as a result of several programs running on XP do not work properly unless you are victimization an Administrator account however attempt to see if you’ll work on a restricted user account on XP. On W7 and view set the UAC to the best level and perpetually set a arcanum on the Administrator account. On Windows 8.1 or W10 solely have the UAC assail the center level. Once a program or person tries to change settings or add one thing new then you get associate alert and you can not continue till you either permit it by writing the Administrator arcanum or refuse it by pressing NO. This ONE issue can stop ninety nine.9% of malware and unwanted programs from putting in. Browse this link for full details concerning the UAC.

Internet choices – ActiveX Controls and Plug-ins: head to net Options/Security/Internet and press “Default Level” then OK. currently press “Custom Level”. Set the subsequent choices as represented here: Setting the net Zone for added Security. Sites that you simply apprehend obviously area unit higher than suspicion like on-line banking and alternative secure sites solely are often enraptured to the trusty Zone below net Options/Security.

Never place sites like Facebook, Twitter, Myspace, MSN or the other similar sort of social networking web site within the trusty Sites zone.

Q. therefore why is ActiveX therefore dangerous that you simply ought to increase the protection for it?

A. once your browser runs associate ActiveX management it’s running associate feasible program. It’s no completely different from double-clicking associate exe file on your drive. Would you run simply any random file downloaded from an online web site while not knowing what it’s and what it does?
Scan at Secunia for out-of-date and vulnerable common applications on your pc and follow their recommendation and links to update them.

EMET: It’s extremely counseled that you simply install Microsoft’s EMET increased Mitigation expertise Toolkit 5.5 (released Gregorian calendar month twenty nine, 2016) that proactively protects you against the bulk of 0-Day-Exploits in Windows and alternative common code. browse all concerning EMET and the way it will facilitate to stay you safer from exploits before Microsoft or alternative developers will update their code. EMET 5.2 was the previous stable unharness (March 2015). These versions 5.2 and 5.5 have plenty of enhancements in protection capabilities over the previous EMET four.1 and EMET five.1.

Install a decent Antivirus and firewall: i like to recommend Kaspersky or Eset good Security for a purchased antivirus and for a free one: Microsoft Security necessities (for Windows seven or view only). Windows 8.1 and Windows one0 have intrinsic protection known as Windows Defender.

Always ensure your Antivirus and Firewall area unit switched on and unbroken updated and don’t permit unknown programs or processes to access the net or your pc, perpetually block them and fire recommendation.

Install {a sensible|an honest|a decent} Anti spyware with time period protection: I like to recommend 2 programs as having good time period protection additionally nearly as good improvement capabilities: SUPER Anti Spyware or Malware Bytes Anti-Malware.

Backup, Backup and Backup: within the event of you being infected or changing into a victim of a nasty or unsuccessful program or Windows update, the best, easiest , safest and fastest thanks to recover is to own a whole current image backup. I take advantage of and suggest Acronis True Image. i take advantage of associate external drive WD My Book three TB USB 3.0 drive with Backup and do a daily progressive backup victimisation Acronis True Image and even have the non-stop file backup running, that instantly backs up all my documents and pictures, etc. (in truth I actually have it set to backup any new or modified files in MY Documents, My Photos, My Videos, My Recorded TV and My Downloads folder. That means the worst that may happen is that I lose concerning one hour of labor or the last hour of emails at the foremost.

Passwords: If you’ve got been infected then bear in mind that just about all trendy malware/spyware is meant to steal your personal data. that features all passwords, log ins to forums and alternative websites and, most of all, your bank, mastercard or PayPal details. it’s important that when you’ve got been cleansed up you modify all of your passwords and on several occasions it’s necessary to induce in reality along with your bank or alternative establishment to tell them that your details might (probably have) been taken.

One of the best ways that to safeguard yourself and tighten security is to ne’er, EVER use an equivalent arcanum on completely different sites. Perpetually use a unique arcanum for every web site you log in to. do not use straightforward passwords like your name or your husband/wife/boyfriend/girlfriend/dog or cat’s name. perpetually use a powerful arcanum with a mix of letters and numbers and completely different characters. Passwords like Jenny, Rover, 12345, 54321, password, login or similar words area unit fully useless. you wish one thing like TsfE£%9& to forestall them from being guessed.

I powerfully suggest victimisation ROBOFORM to store and make safe, secure passwords.
If you’ve got followed the recommendation during this article then you may have learnt the way to shield yourself and tighten security and hopefully be less probably to induce infected within the future.