Friday, January 29, 2016

Computadora atacada: Lo que hay que hacer

¿No puedes encender o apagar tu computadora? ¿Funciona mal o está lenta, se abren páginas en las que no hiciste clic, o se abren ventanas pop-up constantemente? Es bastante probable que tu computadora haya sufrido un ataque pirata o que esté infectada con un virus. Este video te dice lo que tienes que hacer.

 
¿No puedes prender tu computadora o apagarla?

¿Está funcionando mal o está muy lenta?

¿Se están abriendo páginas en las que no hiciste clic?

¿Aparecen ventanas pop-up constantemente?

Es probable que te hayan pirateado tu computadora o

que esté infectada con un virus, y necesita tu ayuda.

Deja de hacer compras o trámites bancarios en línea,

hasta que tu computadora esté limpia y restablecida.

Sin duda es un inconveniente pero es un paso necesario

para que no se empeore la situación de pirateo a peor.

Actualiza tu software de seguridad o instala una nueva versión de

una compañía confiable. Puedes usar tu teléfono u otra

computadora, para leer comentarios sobre distintos software de seguridad.

Usualmente están publicados en los blogs sobre tecnología y

sitios de comerciantes especializados en informática.

Elige con cuidado. Los estafadores a veces anuncian software de seguridad

que en realidad son programas maliciosos.

Decide cuál quieres. Vuelve al Internet y descarga el software.

Sí el software de seguridad encuentra un programa malicioso, te lo indicará.

Elimina los archivos sospechosos y reinicia tu computadora.

Sí todavía tienes problemas, ponte en contacto con el fabricante de tu

computadora u otro soporte técnico, y averigua qué más puedes hacer.

Cuando tu computadora esté funcionando de nuevo, cambia las contraseñas

que haz estado usando para tus cuentas bancarias, tus cuentas de e-mail

y todas tus demás cuentas importantes.

Lo mejor es elegir y usar contraseñas que tengan letras en mayúscula y minúscula

y con distintos caracteres, como letras, números y símbolos.

Y por último, asegúrate que tu sistema operativo y tus navegadores de Internet,

estén configurados para actualizarse automáticamente.

Tú deseas mantener tu computadora funcionando a su máximo rendimiento.

Para más información visita: alertaenlinea.gov

The post Computadora atacada: Lo que hay que hacer appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1KeTXBW
Secure Hunter

Tuesday, January 26, 2016

Join our Secure Hunter affiliate program and Earn up to 30% per Sale! http://ow.ly/WCwxJ

from Secure Hunter http://ift.tt/23m1vcC
via securehunter.com

Tips for Using Public Wi-Fi Networks

Wi-Fi hotspots in coffee shops, libraries, airports, hotels, universities, and other public places are convenient, but often they’re not secure. If you connect to a Wi-Fi network, and send information through websites or mobile apps, it might be accessed by someone else.

To protect your information when using wireless hotspots, send information only to sites that are fully encrypted, and avoid using mobile apps that require personal or financial information.

  • How Encryption Works
  • How to Tell if a Website is Encrypted
  • What About Mobile Apps?
  • Don’t Assume a Wi-Fi Hotspot is Secure
  • Protect Your Information When Using a Public Wi-Fi

 

How Encryption Works

Encryption is the key to keeping your personal information secure online. Encryption scrambles the information you send over the internet into a code so it’s not accessible to others. When you’re using wireless networks, it’s best to send personal information only if it’s encrypted — either by an encrypted website or a secure Wi-Fi network. An encrypted website protects only the information you send to and from that site. A secure wireless network encrypts all the information you send using that network.

How to Tell If a Website is Encrypted

If you send email, share digital photos and videos, use social networks, or bank online, you’re sending personal information over the internet. The information you share is stored on a server — a powerful computer that collects and delivers content. Many websites, like banking sites, use encryption to protect your information as it travels from your computer to their server.

To determine if a website is encrypted, look for https at the start of the web address (the “s” is for secure). Some websites use encryption only on the sign-in page, but if any part of your session isn’t encrypted, your entire account could be vulnerable. Look for https on every page you visit, not just when you sign in.

What About Mobile Apps?

Unlike websites, mobile apps don’t have a visible indicator like https. Researchers have found that many mobile apps don’t encrypt information properly, so it’s a bad idea to use certain types of mobile apps on unsecured Wi-Fi. If you plan to use a mobile app to conduct sensitive transactions — like filing your taxes, shopping with a credit card, or accessing your bank account ­— use a secure wireless network or your phone’s data network (often referred to as 3G or 4G).

If you must use an unsecured wireless network for transactions, use the company’s mobile website — where you can check for the https at the start of the web address — rather than the company’s mobile app.

Don’t Assume a Wi-Fi Hotspot is Secure

Most Wi-Fi hotspots don’t encrypt the information you send over the internet and aren’t secure. In fact, if a network doesn’t require a WPA or WPA2 password, it’s probably not secure.

If you use an unsecured network to log in to an unencrypted site — or a site that uses encryption only on the sign-in page — other users on the network can see what you see and what you send. They could hijack your session and log in as you. New hacking tools — available for free online — make this easy, even for users with limited technical know-how. Your personal information, private documents, contacts, family photos, and even your login credentials could be up for grabs.

An imposter could use your account to impersonate you and scam people in your contact lists. In addition, a hacker could test your username and password to try to gain access to other websites – including sites that store your financial information.

Protect Your Information When Using Public Wi-Fi

Here’s how you can protect your information when using Wi-Fi:

  • When using a hotspot, log in or send personal information only to websites you know are fully encrypted. To be secure, your entire visit to each site should be encrypted – from the time you log in to the site until you log out. If you think you’re logged in to an encrypted site but find yourself on an unencrypted page, log out right away.
  • Don’t stay permanently signed in to accounts. When you’ve finished using an account, log out.
  • Do not use the same password on different websites. It could give someone who gains access to one of your accounts access to many of your accounts.
  • Many web browsers alert users who try to visit fraudulent websites or download malicious programs. Pay attention to these warnings, and keep your browser and security software up-to-date.
  • Consider changing the settings on your mobile device so that it doesn’t automatically connect to nearby Wi-Fi. That way, you have more control over when and how your device uses public Wi-Fi.
  • If you regularly access online accounts through Wi-Fi hotspots, use a virtual private network (VPN). VPNs encrypt traffic between your computer and the internet, even on unsecured networks. You can get a personal VPN account from a VPN service provider. In addition, some organizations create VPNs to provide secure, remote access for their employees. What’s more, VPN options are available for mobile devices; they can encrypt information you send through mobile apps.
  • Some Wi-Fi networks use encryption: WEP and WPA are common, but they might not protect you against all hacking programs. WPA2 is the strongest.
  • Installing browser add-ons or plug-ins can help. For example, Force-TLS and HTTPS-Everywhere are free Firefox add-ons that force the browser to use encryption on popular websites that usually aren’t encrypted. They don’t protect you on all websites — look for https in the URL to know a site is secure.
Tagged with: computer security, network, personal information, privacy, Wi-Fi, wireless

Read More

The post Tips for Using Public Wi-Fi Networks appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1nlScZa
Secure Hunter

Saturday, January 23, 2016

Don’t Lose Your Digital Life Back It Up

From tax forms to family photos, the files on your computer are valuable. If you don’t want to lose them, back them up, and practice good computer security habits to protect yourself from hackers and viruses.

The post Don’t Lose Your Digital Life Back It Up appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1QrZ6b0
Secure Hunter

Thursday, January 21, 2016

Tips to Stop Cyberbullying

Social Networking & Cyberbullying Tips

 

Social networks are a great way to stay connected with others, but you should be wary about how much personal information you post and take basic precautions before going online.

 

 

The first step is to STOP. THINK. CONNECT. Take security precautions, understand the consequences of your actions and behaviors and enjoy the benefits of the Internet. Always remember to Keep a Clean Machine. Having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats.

 

 

Social Networking Tips:

 

  • Own your Online Presence: Privacy and security settings exist for a reason. When available, set the privacy and security settings on websites to your comfort level for information sharing. It’s ok to limit how and with whom you share information.

 

 

  • Once Posted, Always Posted: Protect your reputation on social networks. What you post online stays online. Think twice before posting pictures you wouldn’t want your parents or future employers to see. Recent research (http://ift.tt/1OKdFSxx) found that 70% of job recruiters rejected candidates based on information they found online.

 

 

  • Post Only about Others as You Have Them Post about You. It’s the golden rule online.

 

 

  • When in Doubt, Throw it Out: Links in email, tweets, posts, and online advertising are often the way cybercriminals compromise your computer by getting you to click on something or share information when you shouldn’t. If it looks suspicious, asks you to act immediately or offers something that’s too good to be true ‐ even if you know the source ‐ it’s best to delete or if appropriate, mark as junk email.

 

 

  • Make Passwords Long, Strong and Unique: Combine capital and lowercase letters with numbers and symbols to create a more secure password. Passwords are private information and not to be shared with friends.

 

 

  • Your Online Reputation can be a Good Thing: Recent research (http://ift.tt/1OKdFSxx) also found that recruiters respond to a strong, positive personal brand online. So show your smarts, thoughtfulness, and mastery of the environment.

 

 

  • Be Honest if you’re Uncomfortable: If a friend posts something about you that makes you uncomfortable or you think is inappropriate, let them know. Likewise, stay open‐minded if a friend

 

approaches you because something you’ve posted makes him or her uncomfortable. Share with care. People have different tolerances for how much the world knows about them respect those differences.

 

  • Keep Personal Information Personal: Be cautious about how much personal information you provide on social networking sites. The more information you post, the easier it may be for a hacker or someone else to use that information against you by stealing your identity, accessing your data, or committing other crimes such as stalking.

 

  • Know and Manage your Friends: Friends are people you know and trust. Some of the fun of social networks is creating a large pool of friends from many aspects of your life. In general, a smaller group of known people is better. Use tools to manage the information you share with friends in different groups or even have multiple online pages. If you’re trying to create a public persona and want to share ideas, photos or other information with the larger public, create an open profile or a “fan” page that encourages broad participation and where you limit the posting of any personal information. Use your personal

profile to keep your real friends more synched up with your daily life.

 

 

  • Safer for me More Secure for All: What you do online has the potential to affect everyone – at home, at work and around the world. Practicing good online habits benefits the global digital community.

 

 

 

 

Cyberbullying Tips:

 

  • Know what Actions to Take: If someone is harassing or threatening you, remove them from your friends list, block them, and report them to the site administrator.

 

 

  • Avoid Escalating the Situation: Responding with hostility is likely to provoke a bully. Depending on the circumstances, consider ignoring the issue. Often, bullies thrive on the reaction of their victims. If you or your child receives unwanted email messages, consider changing your email address. The problem may stop. If you continue to get messages at the new account, you may have a strong case for legal action.

 

 

  • Document Cyberbullying (or other Unwanted Contact): Keep a record of any online activity (emails, web pages, social media posts, etc.), including relevant dates and times. Keep both an electronic version and a printed copy.

 

 

  • Be an Upstander: Speak up if someone is bullying your friend. Stop untrue or harmful messages from spreading. Report the situation to a trusted adult and on social networks. Refuse to be a passive bystander. For more resources, visit http://ift.tt/1P9GRGm2/be‐an‐upstander‐and‐ prevent‐cyberbullying/

The post Tips to Stop Cyberbullying appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1OKdFSB
Secure Hunter

Wednesday, January 20, 2016

Secure Hunter Anti-Malware PRO Giveaway

We partnered up with  windowsdeal.com to deliver this amazing giveaway to you.

Secure Hunter Anti-Malware PRO   Secure Your Digital Life , and today Secure Hunter  is giving away 1 Year 3PC  Licenses each worth $19.99 for 12 months!

 

Deal Expires in:

3 days

Share with family & friends Today

The post Secure Hunter Anti-Malware PRO Giveaway appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1QdTajZ
Secure Hunter

Inside Intel’s CPU-level multi-factor auth (and why we’ve got deja vu) Secure Hunter

Password? All you need is your phone, fingerprint, PIN, mother’s maiden name …

Analysis  Intel has baked multi-factor authentication defenses into its sixth-generation Core processors.…

The Register – Security
Secure Hunter Anti -Malware

The post Inside Intel’s CPU-level multi-factor auth (and why we’ve got deja vu) Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/20e2VmK
Secure Hunter

Hot Potato exploit mashes old vulns into Windows System ‘sploit Secure Hunter

Exploit takes a long time to cook Windows, but gives hackers a menu of evil options

Shmoocon  Foxglove Security bod Stephen Breen has strung together dusty unpatched Windows vulnerabilities to gain local system-level access on Windows versions up to 8.1.…

The Register – Security
Secure Hunter Anti -Malware

The post Hot Potato exploit mashes old vulns into Windows System ‘sploit Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/20e2Uzq
Secure Hunter

Saturday, January 16, 2016

Mobile Security Tips

Take security precautions, think about the consequences of your online behavior, and enjoy the Internet with more peace of mind.

 

 

Keep a Clean Machine.

Just like our desktop and laptop computers, the software on our mobile devices (e.g., smartphones and tablets) must be kept up-to-date and free from malicious software.

 

  • Protect all devices that connect to the Internet. Smartphones, tablets, gaming systems, and other web-enabled devices all need protection from viruses, malware, and other online threats. The best defense against online threats is to keep your mobile security software, web browsers, and operating systems up-to-date.

 

  • Monitor your device’s data usage and investigate discrepancies. An unexplained spike in your device’s data usage could indicate the presence of spyware. Running security software to identify and remove unwanted software could protect your bill—and your personal data.

 

  • Know the source of your app. Fraudulent apps often masquerade as popular products. Be sure to verify you are downloading the legitimate app and only download from trusted app marketplaces.

 

  • Keep apps up to date. Apps are periodically updated to add new features and better security.

Ensure your apps are regularly updated and delete apps you no longer use.

 

  • Do not “jailbreak” or “root” your mobile device. Running non-standard apps may prevent the installation of important security updates from the manufacturer and may void your device warranty.

 

Restrict Device Access.

Mobile devices contain a significant amount of personal information, such as contacts and saved login information. Lost or stolen devices can be used to gather information about you and others.

 

  • Secure physical access to your device. Be aware of your surroundings when using your device in public. “Shoulder surfing”—looking over a victim’s shoulder to capture passwords, personal identification numbers, or other data—has become a greater threat in recent years.

 

  • Lock your mobile device. Use a strong passcode or passphrase, facial recognition, or fingerprint authentication to restrict access to the personal information on your device.

 

  • Remotely manage your device. Many mobile devices have features that allow users to remotely find, lock and erase content should their device is lost or stolen.

 

  • Think before you app. Understand and be comfortable with what information (e.g., location, your contacts, social networking profiles) the app would access and share before you download the app.

 

  • Protect your data. Back up your data onto a personal computer, an external hard drive, a flash drive, a network, or the cloud. Keep track of any stored passwords on the device and be sure to change these if your device is lost or stolen.

 

  • Clear data on your old devices. Erase all your personal data and saved passwords before selling, exchanging, or disposing of your old mobile device.

 

Connect with Care.

Exercise caution and use common sense when connecting to public (open) Wi-Fi networks.

 

  • Be mindful of what is at risk. Open networks are vulnerable to monitoring, allowing user information (e.g., browsing history, passwords) to be collected. Use a virtual private network (VPN) or connect to trusted, secure networks as they provide unreadable (encrypted) transmissions.

 

  • Get savvy about Wi-Fi hotspots. When using public Wi-Fi, limit the type of business you conduct, and adjust the security settings on your device to limit who can access your phone.

 

  • Be mindful of remote connectivity. Disconnect Wi-Fi, Bluetooth, near field communication (NFC), or other remote connectivity services when not using them.

 

Be Web Wise.

We can all take steps to keep ourselves safer and more secure online.

 

  • Stay current. Keep pace with new ways to stay safer online. Check trusted websites for the latest information and share with friends, family, and colleagues to encourage them to be web wise.

 

  • When in doubt throw it out. Links or attachments in email, posts, and texts are often the ways cybercriminals try to steal your information or infect your devices.

 

  • Protect your money. When banking and shopping online, check for web addresses with “https://” which means the site takes extra measures to protect your information. Sites beginning with “http://” are not secure.

 

  • Own your online presence. Set security and privacy settings so that you are comfortable with the information you share. In addition, block those that you want to avoid contact with.

 

Be a Good Online Citizen.

Being safer online makes the online world more secure for everyone. Practicing good online habits benefits the global digital community.

 

  • Share about others only as you would be comfortable having them share about you.

 

  • Never give out anyone else’s personal information (e.g., email, social media handle, mobile number, photos, videos) to a third party without that person’s permission.

 

Visit http://www.dhs.gov/stopthinkconnect for more information.

The post Mobile Security Tips appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1U3B0SY
Secure Hunter

Friday, January 15, 2016

What to Do If Your Computer Has Been Hacked

Hijacked Computer: What to Do

You can’t turn your computer on or off.
It’s acting up, running slow, opening pages you didn’t click, displaying pop-ups constantly.
There’s a good chance your computer’s been hacked or infected with a virus and needs your help.
Stop shopping, banking, and entering passwords online until your computer is cleaned and restored.
It’s inconvenient to be sure, but it’s a necessary step to prevent the situation going from bad to worse, from hack to horrible.
Update your security software.

Install a new version from a reputable company.
You can use your phone or another computer to check reviews of security software.
Tech blogs and retail sites usually post them.

Anti Malware removal
Choose carefully.

Scammers sometimes advertise security software that’s malware in disguise.
Make your decision, get back online, and download the software.
If the security software finds malware, it flags it for you.
Delete the suspicious files and restart your computer.
If you’re still having problems, contact your computer manufacturer or other tech support
and find out what else you can do.
Once your computer is back to normal,change the password you’ve been using for your bank
accounts, your email accounts, and all your other important accounts.
The safest route is to choose and use passwords that have upper and lowercase letters as well
as numbers and symbols.

And finally, make sure your operating system and internet browser are set to update automatically.
You want to keep your computer operating at peak performance.
Right by  onguardonline.gov to learn more.

 

The post What to Do If Your Computer Has Been Hacked appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1P51jtN
Secure Hunter

Wednesday, January 13, 2016

What To Do When Your Email Gets Hacked

Are your friends and family getting emails from you that you didn’t send?

Or maybe you want to check your email, but you can’t log in?

Chances are your email’s been hacked.

Here’s what to do.

  1. Change your password
  2. Reclaim your account
  3. Enable two-factor authentication
  4. Check your email settings
  5. Scan your computer for malware
  6. Find out what else has been compromised

What To Do When Your Email Gets Hacked

The post What To Do When Your Email Gets Hacked appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1J366ti
Secure Hunter

Launch of Anti-Malware PRO Malicious Software Detector

Online threats are now more frequent and diverse than ever before, and the common ‘virus’ that most people are familiar with is only one of many ways that malicious forces can gain access to the data on a person’s devices. The broader term malware has since been coined for software that masquerades as helpful while wreaking havoc on devices, stealing their hardware capacity along with private data and more. Secure Hunter has released a new free program in response to this, and has now launched Anti-Malware PRO to give people a premium protection option.

Secure Hunter Anti Malware PRO acts as a sidekick to any antivirus program, identifying and locating malicious software as it first rears its head, and eliminating it before it has the opportunity to reach users’ data. A low-cost option for malware protection, Secure Hunter hunts down Trojans, worms, spyware, ad-ware and more, with pro and free versions available.

To help spread the word about the product launch, the company has launched a Secure Hunter Affiliate Program, which enables affiliate marketers spreading the word about the product to earn up to 30% commission on every sale, while being furnished with a huge range of resources to help make it happen.
 

 

Try Secure Hunter Pro !

You will not be charged for your first 14 days, and $19.95 after your trial end.

The post Launch of Anti-Malware PRO Malicious Software Detector appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1J33xHC
Secure Hunter

Sunday, January 10, 2016

Your jingle to take into the weekend: QuickTime security fixes to apply Secure Hunter

Apple closes out week with patches for Windows

Apple has posted an update to its QuickTime media plugin, addressing multiple remote code execution flaws for Windows 7 and Windows Vista users,…

The Register – Security
Secure Hunter Anti -Malware

The post Your jingle to take into the weekend: QuickTime security fixes to apply Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1OHR7W1
Secure Hunter

Tuesday, January 5, 2016

Yet another music video treat from Insight Enterprises Secure Hunter

Santa Baby, slip an order under the tree

Booze quaffed and mince pies munched, it’s time to get one’s nose back to the grindstone for the IT industry’s great unwashed. But fear not those of you with post-holiday blues, we have a visual cracker for your delectation.…

The Register – Security
Secure Hunter Anti -Malware

The post Yet another music video treat from Insight Enterprises Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1SxepQ9
Secure Hunter