In the past months, the "malware community" has been busy launching and testing all sorts of infections and attacks.
They are always searching for new ways of breaching security, but lately I have seen an increase of their efforts and even results:
1. Yahoo stolen passwords:
Yahoo! confirmed that a file from its Contributor Network (formerly Associated Content) containing approximately 450,000 Yahoo! and other company users names and passwords was compromised on Wednesday (11.07.2012).
And the list goes on with Toolbars distributing infections on users computers, browser hijacks when you install various programs, phishing sites being more and more like the original and thus harder to trace, with serious infections that cripple the operating system.
BullGuard takes security very seriously.
What you need to do about it:
1. Change the passwords for your accounts. BullGuard offers our users the means to encrypt and backup files. This is useful for encrypting really important information. You can easily create a document, in which to save all the passwords for your accounts and then encrypt them and back them up on the online drive. This way, you can keep track of your passwords in a secure way, which enables you to change the password for your accounts as often as you like. Oh and by account I mean everything, from e-mail address, to social network (Facebook, Twitter, etc), to blogs and forums and so on.
2. Use passwords that have at least 8 characters, at least one digit in them and at least one capital letter.
3. Never use the same password on accounts that you use to register using the same e-mail address. For example, if I set my password to be the same for my e-mail address and for a forum to which I register using the same e-mail address, in the eventuality that the forum get's hacked and my account is stolen, they hackers also get access to my e-mail and from there it's a domino effect.
4. Keep your software up to date. Start with Windows, then your security suite, but it is just as important to install updates for Flash Player, for your e-mail client, for Java, and for all your other software.
5. Take control of your computer. Before we use any kind of tool, we need to read the instructions. The computer is no exception. There are millions of articles on how to use your computer. Searching the internet for how to do something may turn up less time consuming than waiting to get professional support.
6. Get professional support. BullGuard has 24/7 support and we are proud of it. If you have an issue or just questions regarding your security, we are always glad to help. I know that is a great marketing punch line but it also the truth.
7. Please be responsible with your browsing! If I purchase a car and slam it at 200Km/h into a wall, I can not ask why the car did not protect me.
Doesn't help that Bullguard consistently fails to identify and deal with the worst offender - TRpatch R Gen. Failing top deal with it I can accept - it is a difficult virus to get rid of for any antivirus system. But identifying it? Even Avira manages that.
You see any security company is fighting the same thing, so there are no conflicts, just healthy competition. The goal is to keep people safe.
I am afraid that I have to note that, if you think TRpatch R Gen is the worst offender, you know nothing about real offenders and what they can do.
Lastly, most security suites to not remove PUPs. The term PUP was first used by persons at McAfee's Avert research lab to avoid any legal issues that may arise from calling these types of applications "spyware". You may not be aware of this, but there are real companies behind some of these PUPs, which defend their product, as unwanted as it can be some times.
If you want to be secure, you have to be willing to learn the basics of what that means. There are a few simple steps that you can take, which will keep you safe at all times. Follow the steps Touch is giving you and you will be relieved of the problem www.bullguard.com/forum/10/TRpatch-R-Gen_96555.html
Support, which is free of charge at BullGuard, is there for any time software (automated processes) fails, one way or another.