We all know the benefits of the World Wide Web, and most of us gain from it on a daily basis. With the effortlessness of e-mail, social networking sites, and mobile technologies in allowing us to stay connected with one another, along with a boom in web content that continues to draw us to our PCs, we spend more and more time online.
But we also know the dangers that lurk on the Internet are growing increasingly sophisticated and personal. As more people make their way online and try new web technologies, one thing is certain: cyber scammers will be setting their aims on launching targeted attacks to nab greater profits.
At Lavasoft, it’s our goal to make sure you have clear, detailed information on real-life threats to your security, so you can stay a step ahead of the game. Educate yourself on the latest online tricks with this month’s articles on social engineering tactics, social networking-based attacks, phishing scams, and mobile threats.
If you want to comment on an article you see in LN or have an idea for a story, write to email@example.com.
Social Engineering: Good Triggers and Bad Triggers
Where’s the Party? Hackers Found in Social
Online Threats Get Personal
Smartphones Open the Door to New Mobile Threats
Study Quantifies UK Cyber Crime Garlick
New Targets in Detection (September 2007)
Join the Lavasoft Team!
To get all news on one, printable page, click here
When it comes to the using the Web, nothing is quite like content. Internet users spend more time online viewing news or entertainment content than on sending e-mail, shopping or searching for information. A study conducted by Nielsen/ NetRatings logged a 37 percent rise in the amount of time spent viewing online videos and news. Overall, nearly half of time spent online in 2007, 47 percent, is made up of viewing content. The study sites the explosion of web content, like social networking sites, along with an increase in online speeds as factors in the increase.
Term of the Month
The Hosts File is a file stored on your computer that is used to look up the Internet Protocol (IP) address of a device connected to a computer network. Some spyware changes your Hosts File in order to redirect you from a site you intended to visit to sites that the spyware company wants you to see.
Source: Anti-Spyware Coalition Glossary
You already know the paid versions of Lavasoft’s anti-spyware software have vital real-time protection to relieve the burden of constant malware attacks. But Ad-Aware 2007 Plus and Pro versions also include built-in privacy and security tools, for example, the Hosts File Editor. You can use the Hosts File Editor to take control of your Web navigation by blocking advertisement sites, reversing browser hijack entries, assisting with parental controls, and creating navigation shortcuts. To use the Hosts File Editor in Ad-Aware 2007, from the “Tools and Plug-ins” tab, select “Tools” and then click “Hosts File Editor.” New users can find more specific directions in the Ad-Aware 2007 Product Manual.
Creating strong online passwords is one piece of the security equation. If you are wondering just how secure that password you have created really is, Lavasoft News has come across a website you can use to rate passwords, to help you learn how to create better ones. Try out the “Password Strength Meter” on Securitystats.com. Remember, even though the site will not store the passwords you enter, test a password similar to one you might use (not your real password), as the site advises.