Tag Archives: How To

#ShredFest helping protect against Identity Theft

It’s no secret that personal data and private information left lying about, either in physical or digital form, can be used by thieves to steal your identity.  The problem is that securely destroying old documents, especially if you have boxes and boxes of them, can be time-consuming and frustrating.

And if you don’t destroy your data securely the consequences of being a victim to identity theft can range from outright theft of money, to unexplained debts, leaving you feeling like somebody else has taken over your life.

But thanks to a growing movement called #ShredFest originally from New York, things might get a little easier. It’s a subsidised program designed to provide secure document destruction free-of-charge. You might already have something similar in your local area, sometimes run by local banks and communities once or twice a year – or perhaps this is your opportunity to make-it-happen!

The statistics on Identity theft are nothing short of shocking. In the United States the Federal Trade Commission reports that in 2014 it received 332,646 complaints making ID theft the number one reported crime for the 15th year in a row. 

Stolen identities used in the United States in 2014 were used mostly for Government and benefits related fraud (30%) followed by Credit Card fraud (26%), Phone/Utilities fraud (16%) and Bank fraud (10%).

With the ability for criminals to collude easily on a global scale, it’s not inconceivable that we will see ID theft attempts in the future combine information obtained from the litany of online data breaches (for example, Ashley Madison), along with tidbits obtained through “dumpster diving” right at your own back door.

Fortunately, with a few simple precautions and some dedication to properly destroying the remnants of your online correspondence, and other important paperwork (that you’re no longer required to keep by law), you should be able to reduce the risk of ID theft happening to you.

Destroying Physical Documents

Got boxes of documents that you should be securely destroying? Despite #ShredFest only being available in a small number of locations at the moment, a quick search online reveals many companies that provide shredding services for a small fee.

But weighed up against the risk of ID theft against you at any time, it may well be worth it at any cost; and think of how a quick trip to your local shredding depot with a car-load of documents is not only going to put your mind at ease – but all that storage space you’ll get back at home!

Another alternative is to purchase your own document shredder – something that I have owned for many years and highly recommend – however, those boxes of tax paperwork may still be inescapable, so an annual trip to #ShredFest is likely still needed.

If you do purchase your own shredder, however, consider one that has a “cross-cut” feature (that cuts the paper into smaller pieces) which is considered a little more secure, and also there are models that can shred old CD-ROMS and DVDs which can come in handy.

Shredding Computer Files

Did you know that selecting a file and pressing delete, or simply moving the file to the trash (even after you empty it) isn’t enough to securely remove it?  It’s important to understand how to securely delete digital files on all your devices – not just your PCs, but also Mobile devices.

We’ve covered in the past how easy it is to use features like AVG’s File Shredder which can overwrite your private and personal files multiple times to ensure they cannot be recovered again.

Also if you’re recycling your old PC’s or Mobile devices, including disposing of them permanently, ensure you have taken all reasonable steps to correctly erase the data on them – this sometimes isn’t as easy as a simple factory-reset, particularly with older Android mobile devices.

Lastly, if you have an online email account (such as Gmail, Yahoo or Outlook.com) you’re likely holding on to years worth of old email that could prove to be extremely valuable to an ID thief.  As I suggest in these tips about securing your online email account, make sure you purge all your old and unwanted email too.

Until next time, stay safe out there.

Technical support phone scams are still going strong

Every day, millions of people get scam phone calls. In the U.S. alone there are more than 86 million scam calls each month.

Consumer phone scammers often use cheap robocalling services; automatic dialers that make thousands of phone calls every minute for a low cost. They hope to catch someone who is not aware of the system or hasn’t heard of phone scams. A recorded message will say you qualify for a special program to lower your credit card interest rate or that something is wrong with your computer. When you press a number to learn more, the scam kicks in. The unfortunate victims are often elderly people, recent immigrants, and young college students.

Elderly people are targeted for phone scams

Elderly people are targeted for phone scams

‘We have detected a virus’

The most popular type of phone scam is the bogus tech support claim. The one that has been around for a few years (also read Don’t be fooled by support scams) involves a caller claiming they are a computer technician employed by Microsoft, McAfee, or even, Avast. They say they have detected a problem, commonly a virus or malware, on your computer and can fix it for a fee – sometimes as high as $450.

Once the frightened consumer agrees, the phone scammer has them download software for remote access. You can imagine what changes a crook can make to computer settings which allows them access later.

Other tactics tech support scammers take include:

  • Enroll their victim in a bogus computer maintenance program
  • Collect credit card information to bill for services
  • Install malware that can steal personally identifiable information like passwords and account numbers

‘Your computer is damaged’

Another type of tech support scam begins with a pop-up message designed to scare the user which says, “Your computer is damaged.” These scams usually occur after the computer user downloads software that includes a toolbar, an unwanted add-on, or adware. When the user clicks the pop-up to learn more, they are redirected to a website with instructions to call a number to activate or register the bogus software. From there the scam looks similar to the previous technical support scam in which they try to sell other products or services.

How to protect yourself from tech support scams

Be cautious when installing free software. Some programs include additional software that is bundled with the regular download. Make sure you uncheck any boxes for additional software installations.

Activate Avast ‘Potentially Unwanted Programs’ (PUPs) detection. PUPs include search bars, intrusive adware, and browser extensions that Avast does not detect by default. To enable this detection open the Avast program and go to Settings. Click Customize next to Web Shield. Go to Sensitivity and put a check mark beside PUP and suspicious files.

Do not give control of your computer to a person that calls out of the blue claiming to be from tech support. If it is a real technical support person, then they will schedule a time to call you.

Never share your credit card information or passwords with someone who calls you claiming to be from technical support.

Make sure your antivirus software is up-to-date and running, and apply security patches and updates to your browser and software.


 

Follow Avast on FacebookTwitterYouTube, and Google+ where we keep you updated on cybersecurity news every day.

Windows 10 not playing DVDs? Here’s why.

Microsoft has included the DVD Player software for free in Windows 10, but only if you’re upgrading from any of the following versions:

  • Windows 7 Home Premium, Professional or Ultimate
  • Windows 8 or 8.1 with Windows Media Center.

It’s free for a limited time, but Microsoft hasn’t given any indication as to how long that will be. So if you haven’t already upgraded and qualify for the free DVD software, you might want to consider upgrading soon.

It’s important to note that to receive the DVD Player app from Microsoft for free you must upgrade Windows 10 from your existing version of Windows.  A clean install of Windows, despite this being the preference for many people, won’t work.

What if you don’t want the Windows DVD Player app? No problem, there are free and open source alternatives available, such as VLC Media Player

While you’re at it, remember to keep all software on your PC up-to-date and install an antivirus solution like AVG AntiVirus Free to prevent infections against viruses and malware.

If you have any tips for Windows 10 you’d like to share, please let us know via Facebook or Twitter. Until next time, stay safe out there.

Ashley Madison hack – the importance of securing your personal data

I have just read the informative blog written by my colleague Michael McKinnon, detailing the extent of the data breach that AshleyMadison.com suffered earlier this month.

As with all data breaches, the first thing people ask themselves is, “does it affect me and what precautions can I take?”  When a large amount of data is stolen that includes personal details such as credit card numbers and date of birth, you can take measures now to minimize the risk of your data being misused in the future.

What can we do to protect ourselves after a data breach?

  • Ensure your online accounts are not using the email address and a password that could be guessed from personal information, if you are then change the password.
  • Keep a close watch on your credit reports. This will help you identify if someone is using your identity to take a line of credit in your name. Most credit scoring agencies allow you to run a report for free at least once.
  • Spammers may send emails that look like they are coming from valid sources. Make sure to carefully scrutinize these emails – don’t click on links that look suspicious – and if in doubt contact the sending organization directly to ensure it’s an official communication.
  • Avoid using the same email address or profile name across multiple online accounts. For example, have a primary email address used for recovery of forgotten passwords and account information. Have a secondary email address for offline and online retail transactions. Have a third for financial accounts and sensitive information.
  • Set privacy settings.  Lock down access to your personal data on social media sites, these are commonly used by cybercriminals to socially engineer passwords. Try AVG PrivacyFix, it’s a great tool that will assist you with this.
  • Check electronic statements and correspondence.  Receipts for transactions that you don’t recognize could show up in your mail.
  • Use strong passwords and two-factor authentication: See my previous blog post on how to create complex passwords that are easy to remember.
  • Have updated security software.  Updated antivirus software will block access to many phishing sites that ask for your personal data.

Lastly, you may want to consider enlisting an identity monitoring service.  Commercial companies that have been breached often offer this reactively to the victims but understanding where or if your identity is being abused in real-time will give you the ability to manage issues as they happen.

Follow me on Twitter @TonyatAVG

Could someone be watching you through your webcam?

A few weeks ago in Toronto, Chelsea Clark and her boyfriend we’re snuggling in their own home watching Netflix together on his laptop. This sounds very similar to what lots of people do to relax at home in the evening. What makes this story stand out is that someone was in the room with them.

covering a webcam

Some people cover the webcam with a bandage to protect their privacy

Turns out that the next day when Clark looked at her Facebook page, she saw intimate images of herself and her boyfriend from the night before sent from an unknown person. The person, identified as Mahmoud Abdul in Cairo, Egypt, uploaded the pictures with a message that said “Really, cute couple [sic]”. The pictures were apparently taken from the laptop’s webcam.

This type of story is not new. This past March, a young man turned himself into the FBI and was sentenced to 18 months in federal prison for the computer hacking of Miss Teen USA, Cassidy Wolf. He watched her through her computer’s webcam for months, and took intimate photos of her in her own bedroom. He then attempted to blackmail her, asking for money for not posting the videos and photos.

You may remember the stories we shared with you on this blog about baby monitors that were hacked in Ohio and in Texas. In both incidents, a hacker took control of the monitor and screamed obscenities and shouted abuse at the toddlers while they were sleeping.

These are stories that make your hair stand up on the back of your neck, especially when you think about the lengths we go to while securing our homes from intruders. We lock the doors and windows, we install burglar alarms and motion-sensitive lighting — all to keep bad guys out. But these days, it’s what we bring inside our house that makes us vulnerable.

How to protect yourself from webcam or CCTV hacks

  • The best defense is to make sure that your computer is always up-to-date. Update your antivirus program to the latest version and keep your virus definitions current, update your browsers and plugins and patch your software, even well-known names like Adobe, Oracle, and Microsoft. Avast Software Updater can help you stay on top of all that.
  • Make sure your router is protected. Avast Home Network Security checks your home network for security issues to help prevent attacks on your router or devices. This video explains,

  • If you have an external camera, such as a CCTV device, then do what you can to understand how it works and what security measures are in place. This may include changing the default password and settings.
  • Many people tape a piece of paper or stick a bandage over their camera when they’re not using it.
  • As always, do not click on links in emails or other messages that are unexpected or come from strangers.

Follow Avast on Facebook, Twitter, YouTube, and Google+ where we keep you updated on cybersecurity news every day.

10 ways to ensure your security while shopping online

That online shopping increases day by day is not news. If you are an average user, you are probably already aware of the normal precautions and have taken them yourself. Ease of use and convenience when browsing for different products or searching for the best prices has improved greatly. However, at the same time, online threats and frauds have also increased exponentially. Therefore, from time to time, all of us must review our behavior and think again if our habits are secure.

Follow a few simple tips to stay safe while shopping online

Follow a few simple tips to stay safe while shopping online

Best practices while online shopping

1. Use your own computer or mobile device when shopping. It seems obvious, but you cannot trust a computer that does not belong to you, even your best friend’s computer. It might not have appropriate protection and it could already be compromised by malware. So, always use your own device, install an anti-malware solution and before you start doing anything that involves your money, scan your network to discover if it is safe.

2. Use your own Wi-Fi connection with a strong password. You must use a non-standard password for your network and router. Router vulnerabilities and weak passwords allow cybercrooks easy access to your home network. This sounds complicated, but it’s really not. Avast Home Network Security can help you by guiding you to the manufacturer’s website. The blog post will help you understand what it does and why it’s important.

3. If you cannot avoid using public/open Wi-Fi, use a VPN to encrypt your communications, or it could be eavesdropped on and your financial data and credit card credentials could be stolen. Avast SecureLine VPN offers strong encryption for Windows, Mac, and Android devices.

4. Choose your online store wisely. Focus on the best-known ones, where you can read other consumers’ opinions and reviews. We prefer the official site, especially if you are buying apps, so you can avoid fakes or other software bundled together with what you want. Nevertheless, this is not enough. Rogue apps have been know to slip into official stores like Google Play or Windows Store. You really need to have a security app installed and updated in your device: why don’t you do it right now with free Avast Mobile Security?

5. Look for a safe site. Nowadays, all the safe sites use HTTPS protocol (you know, that little padlock in the address bar of our browser). Avast products also scan your HTTPS traffic and prevents many threats. Do not give personal information: common sense is a good security measure, why would you need to inform your birthday to the online store? Moreover, while you are browsing, take your time to check refund policies, privacy policy (what do they do with your personal data), and product guarantees.

6. Search for the best price. You may find the free tool Avast SafePrice (available as a browser plugin called Avast Online Security) useful in helping you find the best offers online in trusted stores.

7. Do not use the same password for all your accounts. You must be aware that if you have an account or have done business with any company that falls victim to a breach, hackers sell your passwords to other cybercrooks. Use different passwords in different sites and a password service.

8. Keep your own computer up-to-date. A lot of security issues start when hackers exploit vulnerabilities in the software installed in your computer. The more popular software they are, the better for hackers. Adobe, Oracle, and Microsoft are only recent examples.

9. Keep a paper trail. Print or save your transaction records; it will be easier for any post sale issue. While you have a trail, you can check your credit card statement to make sure transactions match and if there were unauthorized charges.

10. Prefer safe payment options like your credit card or PayPal. Do not send money directly to the store or vendor. Credit cards have built-in protections and you can receive a refund in case of fraud.

Follow Avast on Facebook, Twitter, YouTube, and Google+ where we keep you updated on cybersecurity news every day.

How to scan and remove viruses when your computer is offline

Some sophisticated viruses hide when you turn on your computer (also known as booting up your computer), and even antivirus software like Avast, with its boot-time scan feature, can be prevented from seeing it. If you believe your computer is infected with a virus, the first step you should take is to download and install Avast Free Antivirus and run an entire system scan. If for some reason you are unable to do that, and you have exhausted all other alternatives, like asking our support team for help by submitting a request online at http://www.avast.com/support, then you can create an Avast Rescue Disk that will scan, detect, and remove most malware. This bootable version of Avast attacks a virus from outside of your computer system, catching it before it hides or camouflages itself.

rescue disk

To run a virus scan when offline, create an Avast Rescue Disk.

You can create the Avast Rescue Disk from any Avast product. All you need is an uninfected computer with Avast Antivirus 2015 installed and an empty USB flash drive (make sure it is fairly new so that it supports booting) or a blank recordable CD/DVD.

Follow these easy steps:

  • Open the Avast user interface.
  • From the menu selection on the left, select Tools, then click Rescue Disk.
  • Choose the media type that you want to use; an empty USB flash drive or a recordable CD/DVD.
  • Follow the directions. Creating the rescue disk only takes a few minutes, depending on the speed of your computer and internet connection.

For detailed instructions with screenshots please visit our FAQ: Create Avast Rescue Disk as a bootable USB flash drive or CD.

Once you have created the Rescue Disk, plug it into your infected computer and reboot. There are a variety of ways to boot into the so-called Recovery mode; the ESC, F11 or F12 keys are the most common way to enter the boot menu. Our FAQ: Start up your computer from external bootable media with Avast Rescue Disk explains in more detail how to boot up your infected computer using the USB flash drive or CD/DVD that you created.

The Avast Rescue Disk wizard will walk you through the steps to scan for malware on your infected computer. You can choose to scan your entire computer or you can select specific folders or disks.

When the scan has finished the wizard will show you an overall results page and you will receive a scan log report listing the threats that were found. From there you may decide to repair or delete the infected files.

There are two options when a threat is found:

  1. Avast can remove the malicious code automatically. If it fails to repair the files, they will be automatically deleted.
  2. You may choose to work with the files manually. You have the choice to repair selected files or delete selected files. After you’re done, just to be on the safe side, you may want to start another scan.

Once you are done and your computer has been restarted, you can remove Avast Rescue Disk. You can also safely use Avast Rescue Disk to scan and disinfect other Windows PCs, but since virus definitions are always being added, it’s better to create a fresh Rescue Disk when needed.

Avast evangelist, Bob G. made a video about Avast Rescue Disk when it was introduced. It still works the same way, even though the Avast program interface looks a little different. Thank you, Bob, for making informative, helpful videos.

 

Six quick tips for safer and happier gaming

Gaming is not immune to malware, phishing, scams, viruses, trolling, or abuse. Whether you’re new to playing games, a casual gamer or a hard-core veteran, there are always new threats emerging from the murky depths of the digital world that can lay waste to your gaming fun.

These 6 easy tips can give you a head-start to having a safer and more secure gaming experience.

  1. Buy from reputable and trusted stores to avoid malware
    If you’re looking at purchasing anything online, you should try and purchase from reputable, trusted and well established stores. This will greatly reduce the risk of malware, virus and ransomware infections.If you’re using Android devices you should stick to Google play and avoid sideloading. For iOS devices, use the App store. PC and Mac users can use these trusted online stores or platforms: Steam, Uplay, MacGameStore, com, GreenmanGaming, Origin just to name a few. Console gamers can of course buy new or used games from bricks and mortar stores, and digital copies can be bought via their respective online store – Xbox has the Xbox marketplace and the Playstation offers games via the Playstation Network.When in doubt about the credibility of online stores, do some research. Look for online reviews or ask around in forums before making a decision to buy.

 

  1. Secure your all your accounts
    If you’re using online stores, gaming networks or app stores that contain your personal and financial details, you’ll want to do the following:

    • Keep your login details private and secured with a strong password.
    • Always require a password to login to an account, and remember to logout when you’re finished.
    • Disable in-game or in-app purchases, or require a password to enable purchases.
    • For an added layer of security, you can use prepaid cards or vouchers instead of providing your credit or debit card details.
    • If in doubt about the security of your data being stored by an online service provider, then remove it.

 

  1. Be careful using emulators
    A game emulator is a software program that emulates a video game or game system. Some of the software used to load games can contain malicious code. Try to avoid using emulators if possible unless you know what you’re doing and are aware of the risks.
    If you desperately want to play a retro game, then you can always visit the Internet Archive which offers a free web based library of video games that were made in the 70’s through to the 90’s – https://archive.org/details/internetarcade.

 

  1. Don’t feed the trolls
    If you encounter abuse or harassment while playing network games or Massively Multiplayer Online Games (MMO/MMOG), don’t react or engage with the abuser. Instead, ignore and support anyone who is being abused and use the game or gaming network’s report function to report abuse to the developer, support team or moderator. If possible document any incidents so you can provide credible proof.

 

  1. Keep your personal details private
    Beware of revealing too much. When playing games online with others, try and keep your personal details as private as possible – other players don’t need to know your address, telephone number, email, age, gender etc. – this will help avoid abuse or harassment in the real world and also reduce the risk of identity theft.

 

  1. Install an antivirus solution and keep software up-to-date
    You should always try and keep all your devices up-to-date. Not just the operating system but all your software too, including games. Developers or manufacturers regularly find vulnerabilities which they patch with software updates.If you’re playing on a PC, Mac or mobile you should consider installing an effective antivirus solution just in case. PC users you can install AVG AntiVirus Free to help protect against any nasties that might want to infect your system, it also has a handy game mode that won’t slow down your PC while you’re playing games. Mac users can download AVG AntiVirus for Mac for free, and if you’re an Android user you can download AVG AntiVirus for Android via the Google Play Store.

If you have any other tips you’d like to share, please let us know via Facebook or Twitter Enjoy your gaming and stay safe out there.