Technology Summary. We research and implement best practices regarding website security and stability. In addition to preventative measures, our site is scanned and monitored regularly by multiple redundant internal and external automated systems for any unauthorized content changes that may indicate the presence of malware on our site. We also scan our site manually multiple times… Continue reading ResourcesForLife.com Security Policies and Best Practices
Tag: security
The Impact of Anonymity on Internet Safety, Security, and Content Integrity
Summary This document addresses the safety, security, and authenticity problems arising from anonymity on the Internet. Benefits of Anonymity Anonymity has some benefits to the individual and the community, such as: Drawbacks of Anonymity. Although there are some apparent benefits to anonymity, the benefits are outweighed and are nullified by the drawbacks of anonymity. These are… Continue reading The Impact of Anonymity on Internet Safety, Security, and Content Integrity
Solution for Symantec Endpoint Internet Security or Norton AntiVirus Slowing Down Apple or Windows Computer
Technology Summary. Users of Symantec (or Norton) antivirus software, such as Endpoint Security or Internet Security suite, on Apple or Windows computers may notice a slowness when trying to perform data intensive tasks, such as system backups. This can also be an issue with McAfee, Trend Micro, and Computer Associates software. Solutions are provided below… Continue reading Solution for Symantec Endpoint Internet Security or Norton AntiVirus Slowing Down Apple or Windows Computer
Hackers Launch Biggest Data Heist in History With a Global Kneber Botnet Virus Hacking Campaign to Hack the Planet
Technology Summary. The world’s largest data heist and hacking campaign was recently discovered and it is still underway. There are a surprisingly small number of news reports about this story so far. According to a report by PC World, the Kneber botnet virus “puts the potential threat of last year’s Conficker worm to shame.” According… Continue reading Hackers Launch Biggest Data Heist in History With a Global Kneber Botnet Virus Hacking Campaign to Hack the Planet
Security and Privacy Precautions When Forwarding Email
Technology Summary. When forwarding email newsletters and similar items, it is important to remove links from messages that may automatically give the recipient inadvertent access to your personal account with the original sender. For example, if someone who receives the email from you clicks on the one click unsubscribe button, you’ll be removed from the list.… Continue reading Security and Privacy Precautions When Forwarding Email
Beware of Facebook Fraudulent Email Phishing Scheme Describing a New Account Login System Update Tool
Technology Summary. There is a fraudulent email circulating that appears to be from Facebook with one of the following subject lines: Facebook Account Update Facebook Update Tool New login system The email is fake and will take you to a website designed to steal your facebook login and password. Do not click on any of… Continue reading Beware of Facebook Fraudulent Email Phishing Scheme Describing a New Account Login System Update Tool
Adobe Acrobat Reader Virus Security Threat Vulnerability
Technology Summary. At the time of this report, there is currently a 0-day (zero day) vulnerability with Adobe Reader 9.2 and previous versions. A zero day vulnerability means that the virus has been discovered spreading through the Internet today, yet most anti-virus software doesn’t yet have defense against it. This virus has been reported and… Continue reading Adobe Acrobat Reader Virus Security Threat Vulnerability
AVG or Symantec Endpoint Protection – 139 Point Software Removal Procedure Steps
Technology Summary. Symantec Endpoint Security can sometimes become corrupted to the point that it produces error messages yet can’t be uninstalled automatically by Windows. Symantec is aware of this issue. Removal Instructions. A four page fine-print manual removal procedure document is available on the Symantec website. The instructions include about 139 steps or points that… Continue reading AVG or Symantec Endpoint Protection – 139 Point Software Removal Procedure Steps