Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


October is National Cyber Security Awareness Month.

  • Please log in to reply
10 replies to this topic

#1 Net_Surfer


  • Banned
  • 2,154 posts
  • Gender:Male
  • Local time:01:19 PM

Posted 27 October 2008 - 02:16 AM

October is National Cyber Security Awareness Month.

Learn more about how computer bots can steal your identity!

Bot is short for web robot; a type of malicious software that is used to take control of your computer. After it has control of your computer, it can send spam from your email address, infect other computers, or even steal your personal identity.

To steal your identity, a bot installs a discrete keystroke logging program on your computer that records every keystroke you make on the keyboard and sends that information back to the criminal responsible for the bot. Every user name and password you type could end up in the hands of someone else.

The use of bots is not new, but is gaining in popularity among the criminal underground of the Internet. Newer attacks are designed to target information that is more personal to the everyday user of computers and the Internet. Bots can hide on computers and often have similar names to files that are used to run the computer, so detecting them can be challenging. After a bot takes control, the computer is basically being operated by the source of the infection; usually a criminal getting paid to send spam, host phishing sites, or infect other computers.

Even though bots can hide, there are some telltale signs that can alert you to their presence.

* Bots will frequently use your email account to send spam from your computer, which hides the identity of the criminal. Spam sent to invalid email addresses will result in delivery failure notifications in your email inbox. Look at the addresses in the failure notices. If they are not addresses you recognize, your computer is most likely infected.
* When logged into your email, take note of unusual or constant activity of the outbox folder. An outbox that is constantly busy indicates the computer is being commanded to send email.
* Often bots will create multiple email addresses on your account and use those accounts to send spam. Several new email addresses appearing under your account could indicate your computer is infected with a bot.
* Bots will install multiple toolbars to help collect search information from your internet browser. If new toolbars suddenly start to appear in your browser, chances are good your computer is infected.
* Modem activity will be noticeable over long periods of time, even if you are not using the computer. Constant activity or frequent flashing of the data light on the modem may indicate a bot is present and working on the computer.
* Error messages suggesting certain applications are trying to access the Internet or can't run could indicate the computer is infected. These could include messages about certain drives not being accessible and should be closed using the X. Clicking directly on these messages could infect your computer.

Protect Your Computers.
The good news is you can protect your personal information and your computer from becoming infected with a bot, by installing an Anti-Virus that offers the latest technology to combat bots and other forms of malware.

I recommend that if you can afford install a well known Anti-Virus like Norton or McAffe. or use a free one of the links below: * Set the anti-virus to update automatically, followed by weekly scans.
* Avoid downloading software from web sites with an unknown or falsified brand.
* Ensure your computer is set to receive auto updated for the Windows Operating System.
* Periodically change your email password and use strong password practices when doing so. Strong passwords are at least eight characters, contain at least one number, one uppercase letter and one special character (i.e. ()*&^%$#@!).
* Check your account activity often and delete unknown email addresses.
* Remove unwanted toolbars from your internet browser.
* Do not click through or open suspicious emails or email attachments.
* Avoid Social Networking Scams - never provide your personal information (i.e. social security number or credit card number) to emails soliciting this information, even if the email looks to be from a company or brand you recognize. A legitimate company will not request this information through email.

There are several things you can do if you suspect your computer is infected. Download the latest anti-virus updates, and then run a scan. If you don't have anti-virus software installed, install it! Run a scan and let the software help remove the infection. Download the latest Windows updates. Check your programs list and remove any programs you suspect were installed by a bot. Consult with a computer specialist if you are unable to fully recover the computer on your own.
Remember, prevention is the key to successfully protecting your identity when online.

Viruses, Trojans & Other Invaders

The names for the most common types of Internet invaders are always changing, but the goals are the same-someone or something is trying to access your computer to use it in a way you normally wouldn't allow. Fortunately, with a little know-how and the right tools you can stop most threats in their tracks.

What you need to know about internet invaders

Knowledge is power. To avoid Internet intrusions you first need to know what they are. Here's a top ten list of the most common ways intruders target your computer:
Top Ten Internet Invader Terms

1) Hackers—A hacker is someone trying to gain unauthorized access to a computer or network.

2) Hijackers—Hijacking is a type of attack in which an attacker gets access to communication between two people or machines and then pretends to be one of them.

3) Viruses—Like many viruses that make you sick, computer viruses are easily spread. The term virus is used for a piece of computer code that attaches itself to a program or file so it can spread from computer to computer, usually meant to do damage to your software, hardware and files.

4) Worms—A worm, like a virus, is designed to copy itself from one computer to another, but it does so automatically.

5) Spyware—Spyware is software that performs certain behaviors, such as filling your screen with advertising popups (such programs are known as adware), collecting or transmitting personal information (through keystroke loggers), or changing the configuration of your computer, generally without your consent.

6) Malware—Malware is short for "malicious software" that is designed to cripple your computer or destroy your information.

7) Trojan horses—Like the Trojan horse of old, when soldiers hide inside a fake statue to attack the city of Troy, today's Trojan horses hide malicious software within other seemingly harmless software.

8) KeyLogger—a piece of software which captures a user's strokes on a computer keyboard. This software can be distributed through a trojan horse or virus to hack into an capture private information from an unsuspecting user.

9) Bots—A bot is a type of malware which allows an attacker to perform actions using your computer, usually without your knowledge.

10) Botnets—Botnets are composed of individual bots-sometimes numbering in the hundreds of thousands. They are then used to distribute spam e-mail, spread viruses, and attack other computers and servers.

Firewalls and Routers

Use a firewall to screen out invaders and help make your computer invisible to hackers.

A firewall is a solid defense against online threats that blocks bad things from reaching your computer. Simply put, a firewall is a barrier between a computer and the Internet. When you visit a suspicious site, the firewall either filters out the dangerous data or blocks the connection entirely. A properly chosen and configured firewall like McAffe provides a good measure of protection against hackers and other online threats.

What you should know about firewalls

There are three basic types of firewalls—each has pros and cons. Your options include:

* Software firewalls can be installed on individual computers and are a good choice for most home users. However, most software firewalls must be purchased, and each computer connected to the Internet may need its own copy. Also, installation and set up may be required. If you are Comcast High-Speed Internet subscriber, you can download the free McAfee Security Suite that includes firewall software protection to help conceal your computer from hackers and spyware.

* Hardware routers provide firewall protection to multiple computers connected to the Internet and may offer other connectivity benefits. However, their wiring can create clutter on already crowded desktops.
* Wireless routers allow "over the air" connections between your computer, other devices, and the Internet. These routers may or may not include a built-in firewall, so be sure to check the features of your model carefully. Also keep in mind that wireless routers broadcast information using radio signals that, if left unprotected, can be intercepted by unauthorized individuals.

I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is susceptible to being hacked and taken over. I am very serious about this and see it happen almost every day with my clients. Simply using a Firewall in its default configuration can lower your risk greatly.

What you should do to protect yourself with a firewall
Decide which firewall works best for you.
* Install and, if necessary, configure the firewall for your computer and network.
*Monitor your firewall settings to ensure they are providing the intended level of protection.
Free Firewalls Links:For a tutorial on Firewalls and a listing of some others available ones see the links below:

Understanding and Using Firewalls
US-CERT Cyber Security Tip
Never install more than one firewall on your system! Several together can give you problems and decrease the reliability of it seriously!

Home and Wireless Networks

Linking your computer and other devices to a home network, especially a wireless one, is great for convenience, but potentially not so great for security. The same technology that lets you use your laptop in any room of the house could give your neighbor—or a hacker—access to your network and the private information it contains.
What you should know about home and wireless networks

A home network sends and receives signals through a central device called an access point. These signals connect computers and other devices to the Internet and to each other. Wireless access points can send these signals several hundred feet through the air. Without proper safeguards, anyone within that distance may have access to your network.

What you should do to help protect your home or wireless network

Take these simple steps to protect your home wireless network from intruders.

* Make sure to install anti-virus, and firewall software on your computers and access point. Use automatic updates to keep your security software current.
* Secure your network and access point by following a few quick and easy steps. There are a wide variety of access points so consult your hardware's instruction manual to learn how to enable the security features on your specific device.
* Consider placing the wireless access point in a central location in your house. Avoid placing it by exterior walls and windows to help decrease the signal strength outside of the intended coverage area.
* Avoid storing sensitive materials on your computer. This includes credit card numbers, social security numbers, information about family members or other personal information.
If you want to learn more:

* From SSID to WEP: how to minimize the risks of your wireless network

BC AdBot (Login to Remove)


#2 samuel3


  • Members
  • 2,349 posts
  • Gender:Male
  • Local time:09:19 PM

Posted 27 October 2008 - 05:55 AM

Thanks for this! very intresting. I have vista and ive tryed to get ZoneAlarm on it, but Zonealarm doesn't work on Vista?

Also if i download ZoneAlarm and it works.. Should i turn off my Built in firewall that came with Vista?


#3 Net_Surfer

  • Topic Starter

  • Banned
  • 2,154 posts
  • Gender:Male
  • Local time:01:19 PM

Posted 27 October 2008 - 06:10 AM

Thanks for this! very intresting. I have vista and ive tryed to get ZoneAlarm on it, but Zonealarm doesn't work on Vista?

Also if i download ZoneAlarm and it works.. Should i turn off my Built in firewall that came with Vista?


Hi Samuel3

Here is something that will probably point to your quesion:

Checkpoint has released an updated ZoneAlarm 7.1 that's designed to work with Windows Vista's architecture. This is the first true two-way firewall for the Windows Vista environment. Windows Vista includes the Windows Firewall, however, it blocks only inbound traffic, allowing all "except where excepted" outbound traffic. This may seem like a fine distinction, but it can be huge. If you acquire a remote-access Trojan on your Windows Vista machine, Microsoft may not flag the outbound traffic.

Go see it here: to read more about it.

#4 Net_Surfer

  • Topic Starter

  • Banned
  • 2,154 posts
  • Gender:Male
  • Local time:01:19 PM

Posted 27 October 2008 - 06:20 AM

Hi Samuel.

I found another link to that, since I do not use vista. I can not guaranty that it will work, try and see.

Description of ZoneAlarm Free

ZoneAlarm lets you block uninitiated and unwanted traffic, even while your PC is unattended or while you're not using your connection. To further limit your exposure to attack, specify which applications can access the Internet. The program lets you stop e-mail-borne Visual Basic Script worms, too.


It does not run on Windows Vista. You can download the Vista version: here. Support for Windows 98 and Windows Me has been discontinued.

ZoneAlarm for Vista

Version: 2007

Downloads Count: 81,842

License Type: Free

Price: Free

Date Added: Jun 15, 2007

Operating Systems: Windows Vista

Requirements: Windows Vista only

File Size: 18000 KB

Author: Check Point Software Technologies Ltd.

#5 samuel3


  • Members
  • 2,349 posts
  • Gender:Male
  • Local time:09:19 PM

Posted 27 October 2008 - 06:35 AM

EDIT - sorry didnt see you second post.

Im downloading it as we speak.

Edited by samuel3, 27 October 2008 - 06:40 AM.

#6 Net_Surfer

  • Topic Starter

  • Banned
  • 2,154 posts
  • Gender:Male
  • Local time:01:19 PM

Posted 27 October 2008 - 06:52 AM

Hi Samuel.

Like I said I do not use Vista. and never tried zone alarm, some users said that it installs fine but it consumes a lot of resources.

here is a note from the PC World editor:

Editor's Review of ZoneAlarm for Vista

Note: this version of ZoneAlarm works only with Vista. You can download the Windows XP and 2000 version here.

The advantage of the ZoneAlarm firewall over the built-in Vista firewall is that ZoneAlarm will only allow those programs you specifically ok to access the Internet.

Microsoft's Vista firewall does allow this kind of outbound filtering, but the feature disabled by default. Not only that, it's hidden and buried - you can't even get to it through the normal Windows Firewall interface.

ZoneAlarm's free firewall, by contrast, will display a pop-up if a new program attempts to access the Internet. That program will be blocked until you allow it.

I installed ZoneAlarm's app on my Vista laptop, and it went smoothly for the most part. After double-clicking the 18MB download, I was prompted to shut down the Cisco VPN service. But after a couple of reboots - I had to reboot twice before my wireless connection re-activated - I was able to establish a VPN connection without any trouble.

Check Point, ZoneAlarm's maker, says it is the first vendor to use Vista's Windows Filtering Platform API, but from the end-user's perspective I didn't see anything different in the interface compared to the XP version I've tried before.

That interface includes plenty of pop-ups that you may or may not want, and that may or may not help. Outbound connection alerts can help to block malware that gets past your antivirus software and tries to send your stolen data to an Internet repository, for example, but you need to be know how to tell whether an alert is for a valid program or malware.

I've seen alerts before where I just couldn't tell, myself. And if you block the wrong thing some programs may not work correctly.

--Erik Larkin

Most commercially available firewall products, both hardware- and software-based, come configured in a manner that is acceptably secure for most users. Since each firewall is different, you'll need to read and understand the documentation that comes with it in order to determine whether or not the default settings on your firewall are sufficient for your needs. Additional assistance may be available from your firewall vendor or your ISP (either from tech support or a web site). Also, alerts about current viruses or worms (such as US-CERT's Cyber Security Alerts) sometimes include information about restrictions you can implement through your firewall.

Unfortunately, while properly configured firewalls may be effective at blocking some attacks, don't be lulled into a false sense of security. Although they do offer a certain amount of protection, firewalls do not guarantee that your computer will not be attacked. In particular, a firewall offers little to no protection against viruses that work by having you run the infected program on your computer, as many email-borne viruses do. However, using a firewall in conjunction with other protective measures (such as anti-virus software and "safe" computing practices) will strengthen your resistance to attacks.


#7 samuel3


  • Members
  • 2,349 posts
  • Gender:Male
  • Local time:09:19 PM

Posted 27 October 2008 - 06:54 AM

I keep getting this popping up Posted Image then when i click the x on that this comes up - Posted Image when i close that, the pop up will come up again.

#8 Net_Surfer

  • Topic Starter

  • Banned
  • 2,154 posts
  • Gender:Male
  • Local time:01:19 PM

Posted 27 October 2008 - 07:28 AM

Hi Samuel

We just crossed posts.
check my reply that I posted before you added those screens pics.

Here is another Editors note about ZoneAlarm for Vista.
Also check their website for technical support about that incompatibility errors:

ZoneAlarm for Windows Vista Released

For the millions of computer users who purchased a new PC during the past five months, there have been precious few options for true, two-way firewall software on Windows Vista. But now, Check Point Software Technologies has released its popular line of ZoneAlarm products with versions designed to run on the latest Windows operating system.

At the moment, hardly any security vendors offer firewall protection for Windows Vista users, let alone free versions. Kudos to Check Point for continuing to offer its free version of ZoneAlarm, when almost all other security software vendors have abandoned the free firewall market with the advent of Vista.

Microsoft made a great deal of noise about the security improvements it was bringing to Vista, but in my opinion it failed to deliver on true, two-way firewall protection in Vista's Windows Firewall. Yes, the built-in firewall allows users to build custom lists that block not only incoming connection attempts but also outgoing attempts. But the Windows Vista firewall interface is hardly much different from the one included in Windows XP, which is not very intuitive or interactive for the average user.

Check Point's entry into the Vista market was delayed in part by wrangling between the security software industry and Microsoft over just how deeply security vendors could delve into the operating system to stave off new attacks that seek to undermine the security of the system at a fundamental level. At the core of this rather public row was a Microsoft technology called "PatchGuard," which was designed to help block malicious programs from making key changes to the core of the Windows operating system. For a while, it looked as though Microsoft planned to keep security vendors out of this space as well, but ultimately Redmond and the industry that it helped spawn came to an agreement of sorts: Microsoft would develop a custom programming interface that third-party security providers could use to approximate that fundamental level of access.

Check Point, like most other security vendors, offers various security suites that seek to provide additional layers of protection, including anti-virus (from Russian software maker KasperskyLab) and anti-spyware features. Key among the features not included in the free version of ZoneAlarm is the OS-Firewall, which tries to block activity from programs that exhibit certain suspicious behaviors.

All of the ZoneAlarm suites come with a free 15-day trial period, so if you're running Vista and are curious about the non-free options, check them out. I'm still experimenting with the copy of the suite I received from Check Point, and so far it's fairly impressive. Customers who purchased a license for one of the suites on Windows XP should be able to transfer that license over to a Vista machine, according to Laura Yecies, general manager of ZoneAlarm's consumer and small business division.

However, my experience with software security suites has fairly consistently been one of "jack-of-all-trades, master of none." Most of these suites tend to be a tad bloated and heavy users of system resources, even on modern machines with plenty of memory and processing power.

Case in point: Up until last month, my father-in-law was using the ZoneAlarm Security Suite to protect his Dell PC, which sports a 3.0 GHz Pentium 4 processor and more than 2 gigabytes of RAM. But he complained the system just wasn't running as swiftly since he had installed the program. Earlier this month, he un-installed the suite and opted for the free version of the firewall alongside a third-party anti-virus program. He now says the change has sped up the performance of his machine remarkably.

What about you, Security Fix readers? Tell us about your experience with software security suites, or whether you've chosen to mix and match security software on your Windows PC.

By Brian Krebs | June 13, 2007; 10:35 AM ET

#9 samuel3


  • Members
  • 2,349 posts
  • Gender:Male
  • Local time:09:19 PM

Posted 27 October 2008 - 07:33 AM

None of it helped - I will just unistall it, i cant even open the program up.

#10 hellknight


  • Members
  • 120 posts
  • Gender:Male
  • Location:The Netherlands
  • Local time:09:19 PM

Posted 27 October 2008 - 03:24 PM

Net Surfer,

Intresting guide - it contains a fair amount of good information.
There's 1 think that suprises me, though - you're advising McAffee and Norton for the commercial anti-virus programs.
From my own experience, and info found around the net, both of these perform poorly these days - they are heavy on resources, but score only poor to moderate on most anti-virus comparative tests. Why not recommed ESET's NOD32, or Kaspersky, for example? In general, these perform a lot better, and use fewer resources.

Also, advising people to close suspicious errormessages using the X isn't the safest advise these days - stuff like the old errorsafe, and other, meaner malware spreads partially via that kind of message/popup, and are also triggered/installed by simply closing the window with the X - the safest way is killing the application (Iexplore, firefox, etc) in which you get that message via task manager (Ctrl-alt-del).

#11 Net_Surfer

  • Topic Starter

  • Banned
  • 2,154 posts
  • Gender:Male
  • Local time:01:19 PM

Posted 28 October 2008 - 12:10 AM

Hi hellknight
October 2008 will be the fifth year of National Cyber Security Awareness Month.

The Goal of my post is to increase awareness about cyber security and engage users in implementing additional security measures to protect their computers.

About the X if you got those pop ups in your computer, you probably already infected. And you are right by using control alt delete will bring up your windows task manager and you can end the process there, so that its a another way to close those pop ups windows.

Also see it here: Fake anti-malware products. (Rogue Programs)

Which software should you use?
There are many vendors who produce anti-virus software, and deciding which one to choose can be confusing. All anti-virus software performs the same function, so your decision may be driven by recommendations, particular features, availability, or price.
While installing anti-virus software is one of the easiest and most effective ways to protect your computer, it has its limitations. Because it relies on signatures, anti-virus software can only detect viruses that have signatures installed on your computer, so it is important to keep these signatures up to date. You will still be susceptible to viruses that circulate before the anti-virus vendors add their signatures.
Installing any anti-virus software, regardless of which package you choose, increases your level of protection. Be careful, though, of email messages claiming to include anti-virus software. Some recent viruses arrive as an email supposedly from your ISP's technical support department, containing an attachment that claims to be anti-virus software. However, the attachment itself is in fact a virus, so you could become infected by opening it.

Free Security Check-Ups
Many computer security vendors offer free computer security checks for your computer. Visit a link below to check your computer for known viruses, spyware, and more and discover if your computer is vulnerable to cyber attacks.











Comcast is one of the many companies that supports National Cyber Security Awareness Month, and it's giving away McAffe Security Suite for free to their customers, and some people or comcast customers are not aware of this.
So here it is:
If you are a Comcast High-Speed Internet subscriber, you will enjoy to take the advantage of getting the highly-acclaimed McAfee Security Suite, a $120 value, at no additional cost with your subscription. You and your family can surf worry free with proven protection against identity theft, viruses, hackers and more. Plus get parental controls. We make fast safe and easy. All you need is your comcast.net email address and password to get started!
Benefits & Features
Improved Features:
NEW! Improved performance with less processing, less memory use, and faster scanning.
NEW! Protection without interference - McAfee security service will intelligently defer tasks, updates, and alerts. This is a unique feature that allows you to use your PC for uninterrupted movie watching, slide show presenting, or game playing.
Firewall Protection automatically monitors activity, and lets you hide your presence on the internet to make your computer invisible to malicious hackers.
Additional Benefits:
Identity Theft Protection guards your identity when you are online. McAfee Password Vault provides a safe place to store your confidential passwords.
Windows Protection with McAfee X-Ray for Windows detects and kills applications that hide from Windows such as rootkits.
McAfee System Guards watch your computer for specific behaviours that signals virus, spyware or hacker-like activities.
Built-in PC Health and Performance Tools keeps the PC running at peak performance with automated disc defrag, and clean-up for files, applications and browser history.
McAfee Image Analysis keeps offensive content and pictures away from your children.
McAfee Network Manager monitors PCs across your network for security weaknessess so you can easily fix security issues from one centralized network map.
Built-in McAfee Shredder allows you to digitally "shred" confidential files, effectively removing any and all traces of them from your computer.
Parental Controls
Time Limits help parents determine when their child can use the internet by day of the week and hour of the day. Web Site Blocking guards children from accidentally accessing a site which contains inapproriate material. Image Analysis allows parents to block images not suitable for young eyes, even on pariticular web sites which may not be blocked.
McAfee® Security Suite provides trusted PC and Internet protection so your whole family can enjoy online activities such as surfing the Web, shopping, banking, emailing and instant messaging. Always on, always protecting and always updating, McAfee delivers a worry-free Internet experience because it guards both your identity and your PC from viruses, spyware, email, and hackers.

The latest McAfee software and updates download automatically, so you never have to install anything manually when a new version is available. Also included in your subscription is McAfee® Network Manager, which simplifies control over the security of all your home PCs. Network Manager plugs into McAfee® SecurityCenter, which has been redesigned to give you an at-a-glance view of your security status.


Government, nonprofit groups, and corporations all participate in this nationwide effort to get the word out.
links to organizations and coalitions concerned with the issues.
National Cyber Security Division
The National Cyber Security Division (NCSD) works collaboratively with public, private and international entities to secure cyberspace and America's cyber assets.

Anti-Phishing Work Group
The Anti-Phishing Working Group (APWG) is the global pan-industrial and law enforcement association focused on eliminating the fraud and identity theft that result from phishing, pharming and email spoofing of all types.

This site is a useful source for families to learn how to protect themselves from online danger and create the safest online experience possible. The glossary and kid sites are a great resource for parents teaching their children about the Internet

Internet Storm Center
The ISC was created in 2001 following the successful detection, analysis, and widespread warning of the Li0n worm. Today, the ISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with Internet Service Providers to fight back against the most malicious attackers.

Microsoft's StaySafe
Staysafe.org provides individualized advice for teenagers, parents, and educators to protect themselves online. There is also a current news section to help keep consumers up to date on the latest Internet related news. This site is funded and hosted by Microsoft.

Multi-State Information Sharing and Analysis Center
The MS-ISAC is a collaborative organization with participation from all 50 States, the District of Columbia, local governments and U.S. Territories. The mission of the MS-ISAC, consistent with the objectives of the National Strategy to Secure Cyberspace, is to provide a common mechanism for raising the level of cyber security readiness and response in each state and with local governments. The MS-ISAC provides a central resource for gathering information on cyber threats to critical infrastructure from the states and providing two-way sharing of information between and among the states and with local government.
NASCIO represents state chief information officers and information technology executives and managers from state governments across the United States. NASCIO provides two topical Newsbriefs which you may sign up for to be delivered via email to you each week on Enterprise Architecture and Cyber Security. NASCIO also conducts various research and issue briefs.

Onguardonline.gov provides practical tips from the federal government and technology industry to help consumers be on guard against Internet fraud, secure their computers, and protect their personal information. This site is a useful source of information for quick facts about cyber security and steps the consumer can use to protect themselves. There is also a link where consumers can file complaints to help local and federal law enforcement identify and stop hackers, identity thieves and scam artists.

US-CERT (United States Computer Emergency Readiness Team)
US-CERT is the result of a partnership between the Department of Homeland Security and the public and private sectors. US-CERT provides a way for citizens, businesses, and other institutions to communicate and coordinate directly with the United States government about cyber security. This site is a useful source of high level cyber security information.

Anti-Spyware Coalition
The Anti-Spyware Coalition (ASC) is a group dedicated to building a consensus about definitions and best practices in the debate surrounding spyware and other potentially unwanted technologies.
Composed of anti-spyware software companies, academics, and consumer groups, the ASC seeks to bring together a diverse array of perspective on the problem of controlling spyware and other potentially unwanted technologies.

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users