Clean Up Your Computer With These Utilities

ttt-logoEvery computer needs a tune-up now and then. Unfortunately computer viruses often disguise themselves as cleaning programs and other utilities. You think you’re downloading a legitimate program, but you end up infecting your computer instead.

Here are some of my favorite bona fide utilities to help you keep your computer in top condition. I’ve included the full address for each product as a reminder that links, even on a benevolent site like this one, can be hijacked by hackers in order to lead you to malware-infected sites. Always visit the manufacturer’s site or app store directly to download programs, and remember that you use these utilities at your own risk.

Also make sure you are running a reliable antivirus program, that you have current updates for your system installed, and that you have a recent backup. See each utility’s site for more information and support.

Useful Utilities For Windows

  • CCleaner from Piriform
    This program offers an easy way to clean out temporary files and other cached data. It also has options for optimizing your computer.
  • Malwarebytes
    One of the top products for virus and malware removal. Your regular antivirus program offers routine protection, but Malwarebytes can help you remove the sneakies that manage to infiltrate those defenses.
  • Personal Software Inspector from Flexera Software (formerly Secunia)
    If you’ve been looking for a convenient way to make sure all of your Windows programs are up to date, look no further. PSI scans your system and lets you know which programs need updates or are obsolete. No more wondering if you have the latest versions!

Useful Utilities For Mac

  • El Capitan Cache Cleaner from Northern Softworks
    This little gem lets Mac users clear out caches and other miscellaneous junk. You can also use it to repair permissions, which can help to mitigate problems, as well as run other optimization routines. Despite the name it also works with previous versions of Mac OS.
  • Apple Diagnostics (Apple Hardware Test) from Apple
    This hardware testing program is built into your Mac. Restart your Mac, then hold down the D key until the Apple Diagnostics window appears.
  • Disk Utility from Apple
    This is another built-in tool that helps you diagnose and repair hard drive problems. You’ll find it in the Utilities folder in the Applications folder on your Macintosh HD.


How To Protect Your Mobile Devices From Malware

ttt-logoMobile malware is on the rise, but few people maintain the same precautions on their tablets and phones that they do on their computers. Here’s what you need to do to stay protected.

Mobile devices need antivirus software just like any other computer, but watch for malware masquerading as antivirus. In general the same security rules we use for computers also apply to phones and tablets:

  • Use the latest version of your device’s software
  • Install all software updates
  • Back up your data
  • Install only well-known apps from known developers
  • Be wary of malware disguised as legitimate apps
  • When in doubt, don’t click

It’s a good idea to configure a passcode for your mobile device. You should also enable any “Find My Device” features your phone or tablet may have. You can configure most devices to erase any data after a certain number of incorrect login attempts, which will keep your information safe should your device become lost or stolen.

Remember that some threats are universal. A fake website that attempts to harvest your username and password can affect you whether you are viewing it on Windows, Mac, or any mobile device. You also need to use strong, secure passwords that are unique for every site, and enable two-factor authentication where possible.

Here are links to antivirus for mobile devices and more.

iOS Antivirus (iPad / iPhone)

iOS Security Tips (iPad / iPhone)

Android Antivirus

Android Security Tips

Tech Tips Articles

How To Create Strong Passwords (2016 Edition)

How To Configure Security Settings For Windows, Mac, iOS, and Android

Ransomware: A Dangerous Threat To Your Computer

Computer SecurityRansomware is a particularly nasty form of computer virus that encrypts your data, then demands an electronic ransom for the encryption key. Why is ransomware so hazardous, and how can you remove it?

Ransomware is vicious because it doesn’t just render your computer unusable. It encrypts all of your files, including those on networked computers, removable drives, and server volumes. To get the key to unlock the encryption, cyber-criminals demand that you pay. Ransomware has decimated businesses and consumers alike. It’s been around on Windows for ages (see my writeup of Cryptolocker from a few years ago), but recently the first Mac-based ransomware has appeared in the wild.

Should You Pay?
There’s some debate amongst computer security experts as to whether it is better to pay the ransom or not. Sophos’ Naked Security blog has a good overview of the discussion. They also have an excellent article on what you can do if you are infected by ransomware.

How To Avoid Ransomware
You are far better off avoiding ransomware in the first place. Start by making sure you have multiple sets of known good backups. A clean backup is one of your best protections against ransomware and other viruses. Below you’ll find my guide on backup options for Windows and Mac, including how to test your backups to make sure they work when you need them.

All of my usual security recommendations apply as well. Use a top-quality antivirus program, and keep your computer up to date. If you’re on an obsolete version of Windows or Mac, now’s the time to upgrade. Check your default security settings, and use strong, unique passwords on every site.

Here are some Tech Tips articles to help. You can also sign up to receive Tech Tips by email and follow Tech Tips on Facebook for the latest tech support advice for Windows and Mac.

How To Back Up Your Computer (For Windows And Mac)

How To Create Strong Passwords (2016 Edition)

How To Configure Security Settings For Windows, Mac, iOS, and Android

Security Basics For Mac Users

How To Protect Your Web Browser

Security Basics For Mac Users

appleIf you’re not protecting your Mac from Internet threats, your computer can easily be overcome by viruses and malware. But running antivirus isn’t enough. Mac users also need to be just as aware of scams, fake apps, and other Internet dangers as their Windows counterparts. Here are some resources to get you started.

If you’d like to know more about Mac security, stay tuned to Tech Tips via Facebook, Twitter, and RSS, or subscribe by email.

Mac Antivirus Programs

Mac Security Help

Tech Tips – Recommended Advice For Mac Users

Windows XP Is Dead. Now What?

Windows XPAs you may have heard, Microsoft has ceased support for Windows XP. Many people assume it’s okay to keep using it. They’re dead wrong.

WinXP is already vulnerable to viruses because it’s been out so long. Now we have the nightmare scenario in which bugs are discovered but not fixed. Here’s how it goes: Microsoft announces a security vulnerability and offers patches for Win7 and Win8. The hackers rub their hands with glee and start testing to see if WinXP has the same vulnerability. Lo and behold it does, and they have an easy way to sneak into your computer.

Like the recently discovered Internet Explorer bug, which gives hackers a way to take over your entire system. It’s the first major vulnerability since XP’s demise. We know the bug exists in IE under XP. At first Microsoft said they weren’t going to patch it for XP, but now they’ve changed their minds. The question is, what about the next big bug? Using WinXP is like leaving your front door keys in the lock with a sign that says “Come on in, the best valuables are right over there!”

This isn’t a marketing gimmick or a way to increase PC sales, though I’m sure tech vendors don’t mind if you give them money. This is about you and the real-world repercussions of a hacked computer. Do you want your bank accounts wiped out? Do you want your identity stolen? Do you want your online identities hijacked? If not, then get off Windows XP.

Some of you will decide you don’t want to upgrade. That’s up to you, but I strongly recommend you reconsider. A very few of you – less than you think – will have some business-critical function that requires XP. Unless you are in that infinitesimal group, upgrade now.

What are your choices? Windows 7, Windows 8, or Mac. I did a rundown on them a while back based on a question from a reader. At this time, my recommendation stands at Windows 7 or Mac depending on your preference, with Windows 8 a distant runner-up due to its unfamiliar interface and lack of apps. Or, you could go pure mobile with tablet and smart phone.

For those of you who really, truly, honestly cannot upgrade from Windows XP, you have my condolences and some advice:

  • Use a browser other than Internet Explorer. Never use IE even for a moment.
  • Make sure you have the last round of updates Microsoft offered for XP. You can still use Automatic Updates to install them.
  • Run a good antivirus program.
  • Double-check regularly with Malwarebytes and CCleaner.
  • Don’t use Windows XP for finances or online purchasing. Ever. Your smart phone is safer at this point and I don’t advocate using smart phones for finances.
  • Don’t use WinXP to access social media sites (Facebook, Twitter, etc). Social media is a virus cesspool and you don’t have a lifejacket.
  • Plan your upgrade. This is not a permanent solution. Eventually your PC will fail and you will have to replace it.

Do you have questions about Windows XP’s end of support? Ask in the comments, and don’t forget to subscribe to Tech Tips by email and follow on Facebook. You can also follow @trionaguidry on Twitter.

Cryptolocker: Why Modern Computer Viruses Are More Dangerous Than Ever

crypt-messageToday’s computer viruses go beyond mere annoyance. How does holding your data for ransom sound? What about spying on you through your webcam, tracking your physical location, recording every keystroke you make? Welcome to the modern generation of computer threats, where infection means real-world consequences.

The latest virus making the rounds is Cryptolocker, a textbook example of all the truly nasty ways in which a modern computer virus can ruin your day. Cryptolocker encrypts your data with a one-way algorithm which mathematically cannot be reversed. If you don’t pay the ransom within the timeframe, the only key to your data is gone, kaput, goodbye.

You can’t restore your data by removing Cryptolocker, because removing the virus doesn’t decrypt the data. No tech support person in the world can decrypt it for you because it’s simply not possible without the key. Even police departments have paid the ransom, even as they recommend that consumers not do so.

Here are some resources on Cryptolocker so you can keep it from digging its sharp claws into your computer.

Cryptolocker started its initial spread via email attachments, which are fairly easy to avoid. But now it’s morphing into variants that can be transmitted via USB drive, and luring victims with fake software activation codes. Although it’s a Windows virus, like all viruses it can be transmitted via Macs and mobile devices. Following in the steps of other viruses, soon Cryptolocker will evolve into spreading via social media sites.

And this is just the start.

There are other viruses out there that can activate webcams – and yes, they can bypass the green light that tells you the webcam is on. They can listen through microphones. They can track your location via your mobile device. They can listen in on your conversations on social media.

Now, more than ever, it’s vital to protect yourself from computer viruses. Here are some Tech Tips resources to help:

Have you run into Cryptolocker or other similarly destructive viruses? Share in the comments, and don’t forget to subscribe to Tech Tips by email and follow on Facebook. You can also follow @trionaguidry on Twitter.


How To Avoid Keyloggers, Ransomware, And Rootkits

keyThe most advanced threats to your computer – keyloggers, ransomware, and rootkits – are also the most insidious. The best way to deal with them is to avoid them entirely.

Keyloggers come in hardware form, but are usually software viruses that secretly record everything you type. Ransomware holds your computer and its data hostage until you pay. Rootkits allow hackers to remote-control your computer, and are often used to introduce other types of malware.

Related article: Advanced Threats Target Your Computer (The Northwest Herald)

So why should you fear these threats?

  • They bypass your security.
  • They steal your money and your identity.
  • They force your computer to infect still more computers.
  • They turn your computer into a spam-generating cog in the hackers’ profit-driven machine.

In the tech industry we say you’re rooted or pwned (like owned with a p – “powned”). In other words, the hackers own you. They own your accounts, your passwords, your address, your finances… your life.

Related Tech Tips article: What To Do If You Get A Computer Virus

Fake Antivirus Software
In particular, watch out for fake software scams. I’ve spoken of these before. Fake antivirus software tricks you into installing it, then bypasses your protections and invites its malware friends in to play. It’s devilishly hard to get rid of, as anyone who’s been infected can tell you. Usually you’re looking at a reinstall. And the darn stuff actually makes you pay to be infected! Talk about a scam.

This is why you don’t want to do a web search for “Windows antivirus” and start clicking on random links – many of them are poisoned results that lead you straight to the lookalike fakes.

Related Tech Tips articles: Is Your Security Software Real Or Rogue?How To Spot Bad Web Links

Rootkits And Remote Admin
Concerning rootkits – those backdoor programs that allow hackers remote control of your computer – I’d like to point out that these are not the same as the built-in remote admin tools on your computer. A rootkit, by its nature, is designed to be stealthy. Remote admin programs are supposed to be used to maintain computers for legitimate purposes (say, if you are performing tech support on machines in a remote office). But it can also be exploited just like a rootkit if a hacker convinces you to turn it on. Check out this article on telephone tech support scams for an example.

Related articles: Tech Support Phone Scams Hit HomeHow To Kill Computer Keyloggers

Drive Imagers
Fortunately, you can make it easier to recover your computer if you do have to reinstall it – by imaging the drive while it’s still clean. This, combined with regular backups of your everyday data, will let you restore your computer quickly.

Windows Drive Imagers

Mac Drive Imagers

Have you encountered keyloggers, ransomware, or rootkits? Share in the comments, and don’t forget to subscribe to Tech Tips by email and follow on Facebook. You can also follow @trionaguidry on Twitter.

Image courtesy of Stuart Miles /

Cyber Attacks Spell Trouble For Consumers

padlock-phoneDo you know what to do if your account is swept up in a cyber attack? In the last year many popular sites, including LinkedIn, Twitter, and Evernote, have been attacked and consumer information stolen. What can you do to protect yourself?

As I said in my tech column in this month’s The Northwest Herald:

Cybercriminals attack big companies for the big prize: user account information. With email addresses and passwords in hand, they go on an account-cracking spree across the Internet, hoping that some of the users in their massive heist are using the same weak passwords on multiple sites. Itʼs likely some of your accounts have already been swept up in data breaches like this.

There are a number of things you can do to reduce the possibility of being hacked. Here are my recommendations plus related Tech Tips articles to help you with each step.

If your account has been hacked, you need to reset it. Here is information on account security and resetting hijacked accounts for some of the major sites:

And here is information on the recent breaches I mentioned:

For the latest news on data breaches (something a little more reliable than mass media articles), try these IT security sites.

Do you have questions about cyber attacks and hijacked accounts? Ask in the comments!

Image courtesy of Stuart Miles /

Your Webcam Can Be Used Against You

webcamSmile! Your private life might be streaming live on the Internet!

Did you know hackers use viruses to commandeer the webcam on your computer, tablet, or smart phone? Makes you think about all the places you take these devices, and what they could be recording. In this month’s The Northwest Herald I talk about the dangers of unsecured webcams and microphones:

It’s not just your devices, but those of the people around you as well. Chances are, you’ve had a phone or tablet nearby during a private conversation with a lawyer, a doctor, a friend. What if someone else was watching and listening through that device?

Cameras can be hijacked in a number of ways. Cybercriminals can commandeer them with viruses, then extort you by demanding money for the deletion of potentially embarrassing photos and videos. Sometimes they have the nerve to imitate law enforcement, claiming that you have illegal content on your computer and will go to jail if you don’t pay their fee.

I’m fond of taping over the webcam unless you need to use it regularly – in which case a purse or pocket provides a lovely view of lint, should someone try to sneak a peek. That doesn’t help with microphones, of course, which is why it makes sense to store your mobile devices where they’re less likely to overhear private conversations.

I also strongly recommend to my fellow parents – get the computers and camera-equipped game consoles out of your kids’ bedrooms, NOW. There are some scary new statistics about the increase in predatory sexploitation which will make you want to take a hammer to every camera in the house.

Here are some articles about webcam security you might find interesting:

What are your concerns about webcam and microphone security? Share in the comments!

Image courtesy of renjith krishnan /


Donation Scams Another Tool In Hacker Arsenal

When disasters strike, we want to help. But before you click to donate to charity, ask yourself – is it a scam?

Hackers use natural disasters like hurricanes, floods, and earthquakes to scam unsuspecting donors. In The Northwest Herald I talk about donation scams:

What’s behind these fake links? Many of them lead to phony lookalike sites that steal your donation and compromise your credit card number. Others silently install malware on your computer or steal your passwords for Facebook and email. Sometimes they do all of these things, a veritable smorgasbord of hacker delight.

As I said in the article, you should never click on links but instead type the address of the charity into your browser. The Red Cross, for example, is

A real charity will never ask for your password, your Social Security number, or other personal information. Most charities also don’t solicit via email unless you’ve specifically signed up for their list.

How can you tell if a charity is legit? Here are some places to start.

If you’ve already been scammed, here are resources that can help:

Do you have questions about donation scams? Ask in the comments! You can also subscribe free to Tech Tips by email for more computer news, security tips and social media advice.