Refdesk Home
Home
[ Search Net ] [ Facts Subject Index ] [ Facts Encyclopedia ] [ Newspapers USA/World ] [ Report Broken Links ]
[ Fast Facts ] [ First Things First ] [ Quick Reference ] [ Site Map ] [ Privacy ] [ Contact Us ] [ ]


Pop-Up, Spyware, Browser Hijacking,
SPAM Blockers and Identity Theft Resources

SAFEGUARD YOURSELF

  1. The Internet Crime Complaint Center - "The Internet Crime Complaint Center (IC3) is a partnership between the Federal Bureau of Investigation, the National White Collar Crime Center, and the Bureau of Justice Assistance. IC3's mission is to serve as a vehicle to receive, develop, and refer criminal complaints regarding the rapidly expanding arena of cyber crime. The IC3 gives the victims of cyber crime a convenient and easy-to-use reporting mechanism that alerts authorities of suspected criminal or civil violations."
  2. Know whom you're dealing with. If the Web site of a seller or charity is unfamiliar, check with your state or local consumer protection agency and the Better Business Bureau. Get the physical address and phone number in case there is a problem.
  3. Don't believe in easy money. If a Web site or e-mail claims you can earn money with little or no work, get a loan or credit card even if you have bad credit, or make money on an investment with little risk, it's probably a scam.
  4. Think twice before entering contests operated by unfamiliar companies. Fraudulent marketers sometimes use contest entry forms to identify potential victims.
  5. Guard your personal information. Don't provide your credit card or bank account data unless you are paying for something. Your Social Security number should not be necessary unless you are applying for credit. Be especially suspicious if someone claiming to be from a company with whom you have an account asks for information that the business already has.
  6. U.S. Computer Emergency Readiness Team - Established in 2003 to protect the nation's Internet infrastructure, US-CERT coordinates defense against and responses to cyber attacks across the nation.
SPYWARE AND ADWARE
  1. Advanced SystemCare Ultimate - "Your PC's Ultimate Protection and Ultimate Performance! Protect you against viruses, spyware, hackers, phishing, botnets and more."
  2. Avast Free Antivirus - Avast Free 5, an A-list freeware antivirus app, provides the same steadfast protection of well-known, pricier antivirus programs. Avast is remarkable for both its effectiveness and arguably providing the most complete free antivirus on the market.
  3. Avira AntiVir - Avira's AntiVir has been a player in the security world for some time; however, in 2008 its status boomed because of its remarkably strong detection rates. It still remains near the top of independent antivirus efficacy tests.
  4. IObit Malware Fighter - "Detect and Remove New & Hidden Malware. Secure Your Online Surfing with Full Browser Protection."
  5. LavaSoft's Ad-aware - Anti-Spyware program.
  6. Malwarebytes: Free anti-malware, anti-virus and spyware removal download - "Malwarebytes products have a proven record of protecting computers by completely removing all forms of malware, including viruses, Trojans, spyware, adware and rootkits. When it comes to the safety of your computer, Malwarebytes provides the ultimate in protection from the cutting edge of technology!"
  7. Microsoft Security Essentials - "Use Microsoft Security Essentials to guard against viruses, spyware, and other evil software. It provides real-time protection for your home or small business PCs. Free Antivirus for Windows."
  8. PC Hell - Spyware and Adware Removal Help and Resources.
  9. PC Matic - PC Matic provides peace of mind by protecting your home devices against the latest threats like ransomware, viruses, identity theft and more.
  10. Spybot Search and Destroy - Spybot - Search & Destroy can detect and remove spyware of different kinds from your computer.
  11. Spyware Blaster - Prevent the installation of spyware and other potentially unwanted software.
  12. SUPERAntiSypware - "Detect and Remove Spyware, Adware and Remove Malware, Trojans, Dialers, Worms, KeyLoggers, HiJackers, Parasites, Rootkits, Rogue Security Products and many other types of threats."
  13. Touch N Go - "Touch N Go is turnkey biometric identification software / SDK that enables developers to integrate biometric fingerprint solution into their applications."
  14. Webroot Software - Automatically detects and can remove all common forms of malicious programs including Trojans, system monitors, keyloggers and adware
  15. Windows Defender - "Windows Defender is software that helps protect your computer against pop-ups, slow performance, and security threats caused by spyware and other unwanted software by detecting and removing known spyware from your computer."
SPAM BLOCKERS (SPAM is unsolicited E-mail)
  1. MailWasher - MailWasher is a free (for 30-day trial) E-mail checker with effective spam elimination. Discover the safe way to stop unwanted viruses and e-mails before they get to your computer.
  2. SecPoint - Network Security Firewall Appliance UTM VPN Web Scan - "A Scandinavian Anti Spam Appliance based on Open source Linux and utilize RBL lists, Content Scanning, Anti Spam Grey Listing technology to combat spam."
  3. SPAMfighter - SPAMfighter is a free (for 30-day trial) plug-in for Microsoft Outlook and Outlook Express, that automatically and efficiently blocks spam.
FIREWALLS
  1. How Firewalls Work - "What firewall software does. Article by HowStuffWorks."
IDENTITY THEFT AND OTHER RESOURCES

    IDENTITY THEFT RESOURCES:

  1. Identity Theft: Take Charge - Fighting Back Against Identity Theft - Was your identity stolen? This guide from the Federal Trade Commission tells you what to do when bad things happen to your good name.
  2. How Not to Get Hooked by a 'Phishing Scam' - Phishing is a high-tech scam that uses spam or pop-up messages to deceive you into disclosing your credit card numbers, bank account information, Social Security number, passwords, or other sensitive information. This Federal Trade Commisson Consumer Alert offers ideas how to deal with this growing Internet problem.
  3. How to Protect Yourself From Identity Theft - "Identity thieves use a varied array of methods to get their hands on your personal information. To prevent identity theft, follow these simple guidelines."
  4. Anti-Phishing Working Group - Phishing attacks involve the mass distribution of 'spoofed' e-mail messages with return addresses, links, and branding which appear to come from banks, insurance agencies, retailers or credit card companies.

    OTHER RESOURCES:

  5. Email Abuse - This site is dedicated to informing users of this potential abuse and providing them with the tools to avoid becoming a victim and to fight back at Email Abusers.
  6. OnGuard Online.gov - Practical tips from the federal government and the technology industry to help you be on guard against Internet fraud, secure your computer, and protect your personal information.





Refdesk Home
Home
[ Search Net ] [ Facts Subject Index ] [ Facts Encyclopedia ] [ Newspapers USA/World ] [ Report Broken Links ]
[ Fast Facts ] [ First Things First ] [ Quick Reference ] [ Site Map ] [ Privacy ] [ Contact Us ] [ ]