Safe Browsing With Web Of Trust

I tend to get many requests from people all over the world who like to know if there is a way to find out if a website on the Internet is malicious in nature or dangerous in other ways before accessing it.

There are actually a few possibilities to handle that. Most of these require specific IT knowledge however to look up server and domain information at the domain registrar and query databases that contain relevant information.

A better option for most users is to install a web browser extension that handles all of that for them. And one of those extensions is the Web of Trust extension which is available for Mozilla Firefox, Microsoft Internet Explorer and Google Chrome.

Continue reading Safe Browsing With Web Of Trust

10 Tips To Improve Your Internet Security

Security is important. Computer security basically consists of protecting data from unauthorized access. Data can be anything from files on the computer system over personal information of the user to tax documents, photos or credit card transactions. Many Internet users do not see it that way and reduce it to protecting the computer against computer virus attacks.

by Lorri37 via

Continue reading 10 Tips To Improve Your Internet Security

How To Verify That You Are On The Right Website

If you ever worked in tech support you know that there are users who have to use computers without having a clue what is going on. Those users open a website by entering its url in the search form, click on links in emails, open attachments and do many other things that experienced computer users call foolish or at least a security risk.

I have met many PC users who could not tell me on which website they were currently on and it took a lot of navigating around before they could tell me.

This guide is for those users. It will explain how to find out on which website you are and if it is the right website. This may sound trivial to experienced users but believe me when I say that it can benefit inexperienced users.

This guide will use Microsoft’s Internet Explorer 8 web browser. Other web browsers, like Firefox, usually have a similar layout.

Continue reading How To Verify That You Are On The Right Website

The Phishing Flow Chart

Here is a handy phishing flow chart that can help inexperienced computer users in analyzing potentially dangerous emails. Check out our how to identify phishing attacks guide for additional information and tips on phishing attacks.

The flow chart basically walks a user through the analysis of an email. It begins by identifying the sender and then checking consecutively if the email contains links or attachments and if it requests personal information.

Continue reading The Phishing Flow Chart