This blog complements my book, The Essential Guide to Home Computer Security, to help you keep your home computers and smartphones secure.

Tuesday, 22 January 2013

Beware of fake Java updates

And of course, attackers will take advantage of that ignorance. Beware of fake Java updates - new malware is posing as a Java update to fix recent vulnerabilities.

Monday, 21 January 2013

Java - Obscured Security for Home Users

For cyber security people (securitists?) there has been a lot of discussion about whether Java should be disabled for security reasons. I think that many non-expert home users have no idea what Java is, whether they use it regularly, or whether they even have it. Discussing security in this way does not help those users who really need it. The relation who asked me what a reboot was is not going to appreciate Java. Basically it's a system that allows a website to run software on your machine. Usually that's a bad idea, because if something or someone can run software on your machine they can do pretty much what they like. In fact it is the goal of a lot of hacking attempts. But Java is designed to resist this, and is constrained as to what it can do to your computer. Except however when a flaw is found and isn't fixed quickly. If you want to how to disable it in your browser (probably the biggest risk) - try this link to the Sophos website.

Tuesday, 4 December 2012

Malware protection for mobiles - more choices

Both T-Mobile and France Telecom have announced partnerships with mobile security company Lookout to preload free malware-protection software onto selected Android devices. Also AVG have announced a secure browser for Apple iOS and anti-virus for Android. And industry giant Norton have announced new mobile security software to protect multiple devices, including Android smartphones and tablets, as well as iPhones and iPads. All in all there are a lot more options for security on mobiles and tablets worth checking out.

Wednesday, 26 September 2012

Security Firm Identifies Top Words Used in Spear-Phishing Attacks

Security Firm Identifies Top Words Used in Spear-Phishing Attacks: A new report from security software company FireEye details the top words used in malicious attachments and emails distributed by spear-phishers. Spear-phishing are targeted phishing attacks. They may be sent to you at home to try and get your work passwords for example, by-passing your employers security. More phishing to be aware of was also reported this week with a spurious Microsoft update email .

Monday, 9 July 2012

Trojan Horse Found in the App Store

Watch Out: Trojan Horse Found in the iOS App Store: Kaspersky have reported  a new malicious app on the Apple App Store and Google Play Store. The app's name is Find and Call, and it's the first time they report having seen a malicious app make it into Apple's App Store.