Posted on

Porn Sites Aren’t As Bad As You Think

Porn

 

“Did Scott really just say that?”

I know that’s what many of you are thinking about this article’s headline.

But it really is a factual statement.  Porn sites are likely some of the safest websites on the Internet, at least when it comes to being a source of virus infections on your PC.

Porn sites, even the “free” ones, work diligently to keep their sites virus and malware free because adult content is an enormous money-making business.  According to a New Mexico State University study, the industry generates $97 billion a year globally, with $10-$12 billion from the United States alone.  If users’ computers got infected every time they browsed such sites, revenue would severely plummet.

So where do those pesky, sometimes frequent, virus infections come from that cost you hard-earned money to get cleaned up?

At the risk of sounding like a broken record (because I’ve written about this numerous times over the past four years, yet still get asked this same question almost every day), allow me to share some facts about virus infections.

(Just to clarify – I don’t condone porn sites for many reasons, which would be the topic for another column.)

 

Where they come from

Virus writers strive to wreak as much havoc on as many people as possible with their coded creations.  Some do it for recognition.  For others, it’s their source of income by stealing your personal information, especially credit card numbers.

To do as much damage as possible, these cybercriminals have resorted to new methods of infecting your computer.

The most common way your computer becomes infected is through malicious advertisements that appear on popular and frequently visited websites.  This includes websites like MSN.com, FoxNews.com, Yahoo.com, and any other site contains ads.

With this type of infection, you don’t have to do anything other than visit a legitimate website at the wrong time to get infected.  If the virus-laden ad appears at the time you visit the website, it can quietly download a program to your computer, infecting it. 

Sometimes it may cause a pop-up to appear urging you to take action to speed up or clean up your PC.  These look very real, allegedly coming from Microsoft or Windows or other “reputable” companies.  When you click on such ads, software installs on your computer.  The damage is done – your computer is infected.

Phishing emails are another popular avenue virus writers use to trick you into infecting your computer.

As I was writing the column this morning, I received two fake emails purporting to be from eFax with an important fax for me.  The email instructed me to click a link to view the fax.  If I would have done so, my computer would have been immediately infected.  (I knew it was fake by recognizing the tell-tale signs of an illegitimate email.)

 

How to protect your PC

First, install good antivirus software.  This is the first line of defense against virus and malware infections.

HOWEVER, understand that NO antivirus software will block or prevent all infections.  Just like you can’t completely prevent the common cold, computer viruses are the same way.  They will happen.

Second, install the AdBlock Plus add-on for all of your web browsers (Internet Explorer, Google Chrome and Mozilla Firefox).  This will minimize your risk of having the malicious ads appear when you visit various websites.

Finally, don’t believe every pop-up or email you receive.  Even though it says it’s from Microsoft, Windows, the IRS, FedEx, UPS, or other well-known companies, it probably isn’t.  Unless you’re expecting something from someone, it’s best to simply close or delete it. 

Don’t let curiosity cost you hundreds of dollars!  Think before you click!

 

The bottom line

Computer viruses are a fact of living in the Internet age.  They’re as unforeseen and sudden as unexpectedly becoming involved in car accident.  You can do all the right things and take all the safest precautions but still get hit with an infection.

 

A NOTE ABOUT WINDOWS 10

Many of you have asked me a lot of great questions about the Windows 10 upgrade since I began writing about it in March.  It’s release date is set for July 29.

Mark and I are still evaluating and testing it, as well as developing proper procedures for installing and configuring it.  Right now, Windows 10 incorporates some positive changes, but it also has its pitfalls.  I will release our final verdict and recommendations in mid to late August.  Stay tuned to this column!

 

Posted on

9 Websites That Will Make Your Life Better

 

The Internet contains a wealth of information on virtually any topic imaginable.  Some of it is extremely useful, while other content isn’t so reputable.

In this column, I’ve compiled nine really useful websites that can make your life easier, save you money or time, or provide some fun and entertainment.  I would be interested in hearing about websites you find useful as well – just email them to questions@calibre-cs.com.

  • Planning a weekend get-away? Heading to Evansville, but need to fuel the car?  We all know that gas prices can vary from town to town.  GasBuddy.com can help you locate the cheapest gasoline prices throughout the nation.  Prices are continually updated as users report gas prices in their area.  Mobile apps can be installed on your iPhone, Blackberry or Android phone to help you find the cheapest gas while you’re on the go.
  • Rather than throw out an item because of an ugly stain, check out HowToCleanAnything.com.  This website features hundreds of handy tips and tricks for removing stains and cleaning all sorts of items – from carpets to vehicles to sports equipment and more.
  • Financial advisors recommend reviewing your credit report at least annually to make sure its information is correct. AnnualCreditReport.com is the only website that allows you free access to your personal credit report from each of the three major credit reporting agencies (one per year from each agency).
  • When you were growing up, were you always taking things apart to figure out how they worked? Now you don’t have to.  HowStuffWorks.com tells you exactly what you want to know about almost anything.  And if you think you know it already, take their quizzes to find out.
  • Need a phone number, but don’t have a phone book handy? WhitePages.com allows you to find people or businesses quickly and easily – including phone numbers and addresses.  You can also do a reverse phone lookup if you want to find out who a phone number belongs to.
  • Tired of having to listen to the confusing automated phone answering systems when calling big companies? All you want to do is speak to a human, right?  GetHuman.com tracks the best phone numbers and contact options for over 8,000 companies worldwide to help get you to the right person quickly.
  • Your calendar age may not reflect your “physical age” (the age of your body). Leading doctors, including Dr. Mehmet Oz and Dr. Mike Roizen, developed RealAge.com to help you find out your body’s health age.  Simply complete the online test, review the results, then follow their health advice to improve your overall wellness.
  • Looking for a truly unique gift for that someone special? Got a simple task you need done, but don’t have the time to do it yourself?  Visit Fiverr.com and see if someone is willing to do it for you for only $5.  You’ll find offers ranging from normal “I will draw you a caricature for $5” to zany “I will hand letter your message on my beer gut for $5.”
  • Enjoy listening to the radio, but hate the constant commercials? Want music tailored to your particular taste or a certain genre?  Pandora.com is a free Internet radio station that allows you to build stations around an artist, a genre, or a song.  You can also purchase an annual subscription for $55 that removes the ads.

 

Posted on

Time Warner Cable: The Devil We Know

“Better the devil you know than the devil you don’t.”

This adage couldn’t be truer than when referring to the proposed merger between Time Warner Cable and Comcast, initiated in February 2014.

Since Time Warner Cable took ownership of Insight Communications, all of us have gotten to know the company and its services very well.  It’s pretty much been a love-hate relationship from the beginning.

Some aspects of Time Warner we’ve despised:

  • the botched email transition process from Insight email to TWC email,
  • modem configuration issues requiring Tier 3 tech support to correct,
  • flaky reliability at times for Internet, phone and television services,
  • horrendous telephone technical support with inept “technicians,” and
  • ever-increasing monthly bills.

TWC did bring some positive changes, such as:

  • faster Internet speeds up to 50-meg,
  • the ability to set your DVR from your smart-phone, and
  • mobile apps allowing you to watch your favorite shows from anywhere.

When Comcast proposed buying out Time Warner for $45 billion last year, I knew it probably wouldn’t be good for consumers.  I had heard about some major issues with Comcast’s services from fellow computer professionals across the country.  But we wouldn’t really know how it would turn out for us unless the deal went through.

TWC Comcast MergerIndustry analysts initially believed the merger would be approved by the FCC, which prompted me to warn about possible upcoming changes and actions you should take back in December.

But serious opposition, citing compelling arguments, arose prompting the FCC to take a closer look at the deal – its terms and effects it would have on consumers.  If approved, Comcast would control nearly 57 percent of the broadband Internet and 30 percent of pay television in the United States.

“Giving one company control over so much of America’s communications is neither pro-consumer nor pro-competition.  Everybody knows that,” said Craig Aaron, CEO of the public interest group Free Press.

As a result, the FCC recommended the deal be sent to an administrative hearing, which would leave the decision to approve or deny it in the hands of an administrative judge.

This hearing, as most government processes, would most likely drag out for months.  It would also create significant amounts of work for the cable company executives and lawyers, increasing their costs, and most likely not result in their desired outcome based upon the evidence the FCC would present.

On Thursday, news leaked from insiders that because of this turn of events, Comcast had decided to abandon the merger.  An official announcement was expected Friday.

So for now, we’re still stuck being served by the nation’s most unpopular company, Time Warner Cable, which placed last on the University of Michigan’s American Consumer Satisfaction Index in 2014.

But at least it’s the devil we know.   Until the next proposed merger.

Posted on

Virus Attacks: The Worst Just Got Worse

Just when we thought we had seen the worst virus ever known – CryptoWall 3.0 – an infection even worse comes along.

Computer VirusCryptoWall-infected computers have all of their documents and pictures encrypted and held ransom by cybercriminals.  You can’t open or use any of your files unless you pay their exorbitant ransom of hundreds of dollars in hopes they will decrypt your files.  Since they’re criminals, there’s no guarantee they will honor their word after they’ve already pocketed your money.

This threat is very real.  Two clients came to my office in the same day last week with the CryptoWall virus on their computers.  One lost all of his files because he didn’t have any backups; the other recovered many of her files because she had a backup from a year ago.

While CryptoWall 3.0 is extremely difficult to prevent, it uses the old-style method of infecting your computer.  You click on a link in an email or a website, you’re taken to a website that downloads the infection to your computer, and it automatically runs.  Damage done.

But this latest strain of ransomware CANNOT BE PREVENTED.

What’s worse is that it’s attacking your computer from legitimate websites – like Photobucket.com, CBSSports.com, HuffingtonPost.com, Mapquest.com, Realtor.com, and many others.

These are websites that everyday computer users visit all the time.

Time Warner Cable customers.  You’re exposed too, especially if you check your email on their website at mail.twc.com.

This latest threat, known as Fessleak, bypasses all antivirus software because it’s doesn’t install any files on your computer before it does it’s damage.  It initiates a command to a process on your computer via your computer’s memory right from the hijacked website.

These cybercriminals create advertisements that get displayed on popular websites all over the Internet through ad distribution networks.  They use intriguing subject lines to trick you into clicking on the ad.

Recent subject lines they’ve used include: “Grandma’s response to getting an iPhone for Christmas is hilarious” and “These are the Charlie Hebdo cartoons that terrorists thought were worth killing over.”

The subject line paired with a compelling photo summons your curiosity, which makes you click on the ad.

Within moments of clicking on the ad, a full screen message appears telling you that all your files are encrypted and you have to pay a ransom to get them back.

Your computer can also become infected in other ways – without you having to click on anything.  The hackers use vulnerabilities in popular software –like Adobe Flash Player – installed on your computer to infect and destroy.  Again, this goes undetected by antivirus software.

WHAT YOU MUST REMEMBER

Antivirus protection on your PC is a necessity.

BUT … NO antivirus software will prevent 100% of infections.  And it will NOT protect against these latest, most destructive ransomware infections in the wild at all.

WHAT YOU MUST DO

 

First, you MUST religiously back up the important files on your computer.

An off-site backup is preferred.   If you back up to an external hard drive or flash drive, you MUST disconnect it from your computer as soon as the backup is complete.  Otherwise, these infections will destroy your backups, too.

Second, install Windows updates and other software programs as quickly as you can when they are released.

Third, install AdBlocker plugins for your web browsers to prevent advertisements from showing up on websites you visit.  AdBlock Plus (adblockplus.org) is a good plugin to use.

Finally, be careful what you click on.  Don’t let your curiosity get you in trouble.

The days of the safe Internet are long gone.  Prevention is becoming increasingly difficult.  Preparation for the inevitable is now what every computer user must do.

Posted on

5 Myths About Computer Viruses

Our tech bench at Calibre Computer Solutions always has at least one computer (usually more) on it that’s been infected with some type of virus or malware. Nasty infections requiring specific removal tools and processes have increased dramatically over the past year.

The number one question I’m asked is, “How did this get on my computer? I have antivirus protection.”

In today’s column, I would like to dispel five common myths most computer owners believe about viruses and spyware. Learn these, make the recommended changes, and your risk of infection will be greatly reduced.

MYTH #1 – If I have an antivirus program, my computer is safe.
Unfortunately this is not entirely true. Having a good antivirus program, such as our recommended Managed VIPRE Antivirus, is an important step in the right direction.

However, malware creators work hard to sidestep the common protection programs either by exploiting newly discovered security holes before they’re patched or by using “social engineering” to trick users into opening infected files directly.

While there is no guarantee of total safety, experts recommend a combination of the following for reasonable protection:

• Professional antivirus software – NOT the free AVG or Microsoft Security Essentials
• Regular software updates for your operating system (Windows or Mac OSX), Java, Adobe products, and Internet browsers
• User education (e.g. “If you don’t recognize the sender, don’t open the attachment”)
• Perimeter defense (firewall, hosted spam filtering, DNS protection)
• Regular, automated backups

MYTH #2 – If I use a Mac, I don’t have to worry about viruses.

Once upon a time this was mostly true. When Macs were a tiny slice of the overall market, it just wasn’t worth the malware writer’s time to learn how to infect Apple computers.

With the growing popularity of the Apple Mac though, comes a growing interest from online criminals. In 2012, over 600,000 Mac computers were infected with the Flashback malware, and security maker Sophos currently tracks over 4500 Mac-specific viruses and malware currently in use around the world.

Like PC users, the time has come for Mac users to add antivirus software and make sure they are being diligent with software updates and backups.

MYTH #3 – My mobile devices can’t get infected.

Also not true! As of 2012, the fastest growing segment of both malware quantity and malware profitability (for the criminals creating these things) is the smartphone and tablet market – more specially, Android-based devices.

iPhones and iPads are still largely malware-free, though a June 2012 article in Forbes magazine titled “There is too malware on the iPhone!” makes the point that iDevice users should not assume they are completely invulnerable.

With the rise in Android malware, it is important to install protection software on your mobile phone or tablet. I recommend using VIPRE Mobile Security.

MYTH #4 – No one would be interested in hacking into my computers.

Really? I hear this a lot, often from people who:
• Have a reasonably powerful computer, and
• Have a high-speed internet connection

That’s really all criminals need.

With that computer infected and under the control of a malware-enabled criminal botnet, it can be used to send thousands of spam messages per day, attack other computers on the Internet, or control other infected computers so that authorities can’t trace the real controller’s point of origin.

They can also watch every keystroke you enter in the computer, looking for patterns that might be credit card numbers, social security numbers, bank accounts, and passwords. These can be bundled and sold on the online black market. Since the entire process is automated, it’s common for thousands or even hundreds of thousands of infected computers to be under the control of just a handful of people.

The take-away here is, no matter how unimportant you think your computer might be, you should still take precautions to protect yourself AND others.

MYTH #5 – If I do get infected, it just means I’ll get some error messages or pop-up ads.

Unfortunately this is also wrong. As I mentioned above, malware is a serious, money-making business for the creators. We already talked about some of the ways they can make money – hijacking your computer to send spam or to capture your credit card information for example. In those cases, people generally have no idea their computer is infected until they notice problems on their credit report.

A more aggressive version of malware is becoming more common though.

Imagine this scenario – You turn your computer on one day. Instead of the normal startup screen, you get a message saying that your computer’s files are encrypted and the only way to get them back is to wire $300 to the hackers. After they receive the money, they will give you the password to get all your data back. (Although they’re more likely to just demand more money).

These are increasingly common strategies that these online criminals use to make money.

To fight back, use these three tips:
• Use strong protection (see point 1 above)
• Backup regularly
• Use strong passwords and change them often

Make sure any hosted email accounts you may have, including Gmail or Hotmail, include a second authentication method such as a cell phone or alternate email account. Usually with this in place, you will be notified whenever your primary password is changed, and you can contact the service provider immediately if you weren’t the one who changed it.

Posted on

3 Ways to Protect Your Privacy on Facebook

Facebook undoubtedly is the greatest social networking tool created.  It has allowed millions of people the ability to easily and regularly connect with friends and family – no matter how far away they are.

Such platforms make it extremely easy to let down our guard and willingly divulge personal information without thinking about who may see it and how it may be used by others, and in turn, how doing so may impact us.

Two weeks ago in this column, I shared some alarming statistics and other details about how Facebook gathers information on you and how various individuals and groups use this information.  Today, I want to provide you three practical ways to protect your privacy on Facebook.

 1.      THINK before you type

Facebook allows you to share a wealth of personal details – your birthdate, relationship status, religious and political views, work and education history, where you live and more.  You need to ask yourself, how important is it that I share this information?  If you decide to share this information, you need to think about how much detail you wish to share – knowing that it can be used by less than honest people.

It’s also very easy to post a status update or upload a photo “off the cuff.”  However, you need to think about WHO can see your post and WHAT potential effects it could have.  For example, if you announce that you’re enjoying a weekend out of town, that could let the wrong people know that your house is empty and an easy target.

Remember, too, that even if you delete something from Facebook, it can remain stored on their servers for up to 90 days.

 2.      Understand you’ve agreed to how Facebook uses your information

When you created your Facebook account, you agreed to certain terms and conditions on how Facebook can use the things you share on the site.  For example:

  • Facebook can use any photos and videos you post in any way they wish without your approval.
  • Deleting any content does not mean that all copies of it are immediately removed from Facebook’s servers.
  • When you use an application within Facebook (such as Farmville or Birthday Calendar), you give the developer of that application access to and use of certain information contained in your profile, as well as potentially information from your friends’ profiles.

Knowing what Facebook and others can do with your information – always abide by Rule #1 – THINK BEFORE YOU POST!

For full Facebook terms and conditions, visit http://www.facebook.com/legal/terms.

 3.      Set and regularly review your privacy settings

Limiting who can see certain information about you, who can find you on Facebook, and more requires you to modify the default Facebook privacy settings.

You should take about 30 to 45 minutes to review and change the privacy settings to your liking.  You can download a step-by-step guide to help you choose the right settings by visiting our website at https://www.calibreforhome.com/facebookprivacy.

Once you’ve set your privacy settings, you can’t simply forget about it.  Facebook constantly changes its site, which can affect how your information is shared.  I recommend reviewing your settings at least every other month to make sure your information stays locked down.

Above all, remember Rule #1 – THINK BEFORE YOU POST!  Just because you’ve set your privacy settings does NOT mean that you are completely protected from having personal information shared with others who shouldn’t see it.  You cannot completely lock down what you post or provide on Facebook.

In closing, while Facebook is a valuable and entertaining platform for interacting with others, you must always be on guard with how you use it and what information you share on it.

Posted on

What information are YOU sharing on Facebook?

Facebook. It’s the most popular hangout on the Internet – ranking #1 globally and #2 in the United States among the most visited websites.

The ability to “spy” on your Facebook friends can be rather interesting and humorous. Most people share way more about their personal lives and thoughts in this online forum than they would in normal day-to-day conversation. We know more about others than ever before.

But what people knowingly share on Facebook pales in comparison to the exorbitant amount of personal information collected behind-the-scenes by Facebook and other Internet sites. This raises serious questions about your online privacy: What information is being collected?  How is it being used?  Could it fall into the wrong hands?

In this two-part series, we will briefly examine the facts about your privacy on the Internet, followed by providing practical ways you can protect your personal information while still using the social networking sites.

A recent study by Consumer Reports found that:

  • 4.7 million people “liked” a Facebook page about health conditions or treatments (details an insurer might use against you)
  • 4.8 million have posted on Facebook where they planned to go on a certain day (a potential tip-off for burglars)
  • 20.4 million include their birth date on their profiles (can be used by identity thieves)
  • 900,000 discussed finances on their wall
  • 2.6 million discussed their recreational use of alcohol on their wall (can be used by employers and schools)
  • 4.6 million discussed their love life on their wall

This information is willingly provided by Facebook users through status updates, uploaded pictures, comments, and profile details. Most of it doesn’t require special access for others to see it – considering that 28 percent of all Facebook users share all, or almost all, of their wall posts with people other than just their friends.

And others DO use the information you post.

Employers, insurance companies and college admissions departments regularly check Facebook to obtain information on potential employees, insureds, or students. What they find can be used to make a determination about you.

Government agencies, such as the IRS, use Facebook as a research tool in resolving taxpayer cases. The Electronic Frontier Foundation, a privacy and consumer rights group, obtained a 2009 training manual that offered this example of how an agent could use Facebook:  “An IRS officer learns that a taxpayer he’s investigating is a comedian who posts a video on a social network to promote previous and upcoming performances. It suggests the agent contact past performance locations to find out how much the comedian was paid or serve the performer a summons at a future venue.”

As mentioned before, criminals and enemies can also use information you post against you.

However, did you know that …

  • Facebook receives a report every time you visit a site with a Facebook “Like” button – even if you never click the button or are not even logged in to Facebook?
  • Your personal information could be given to a third-party without your knowledge if you have a friend using a Facebook app that extracts that data – even if you have locked down your privacy settings?
  • Facebook uses facial recognition software that detects your face in photos, allowing friends to easily tag you – and this is automatically allowed by default?

Sites like Facebook have a reason for collecting this vast amount of information on you. It’s valuable.

Companies appreciate having this detailed market research readily available to them at a very low cost. They use this information to target consumers who are most likely to buy their products or services.

While Facebook doesn’t give these companies your information without your consent, when you click on an ad, “like” a page, or make a purchase, you may be giving them access to more information than you think.

It’s a scary world out there. Because the Internet is an integral part of our daily lives, avoiding it really isn’t an option – especially if you’ve already joined the over 900 million Facebook users.

In the next column, I’ll provide practical steps you can take to protect your privacy and personal information.

Posted on

10 Amazing Google Search Tricks To Help You Find What You’re Looking For Faster

Practically everything you ever wanted to know (and even stuff you don’t!) can be found on the Internet. A simple Google search can help you find exactly what you’re looking for.

If you’re like me, you’re all about saving time and making life easier. Google has created a really smart search engine to help you find what you’re looking for faster and easier. For this article, I’ve researched and compiled a list of 10 cool Google search tricks.

NOTE:  Some of these tips may work on other search engines, such as Bing and Yahoo.

 

What time is it?

To find the local time in the city nearest you, simply type in what time is it in the search box. If you want to find out the current time in a specific city, type in what time is it followed by the name of the city (for example, what time is it New York City).

 

Do math

If you don’t have a calculator handy, or just don’t want to try to do the numbers in your head, Google can perform even the most complex of mathematical calculations. Simply write the math equation in the search box.

 

Find movie show times

Yes, Showplace Cinemas lists movie times on their website. But you can find them out quickly and easily using Google. In the search box, type movie: followed by the name of the movie. For example, movie: The Expendables 2.

 

Look up definitions

Remember those bulky red Webster’s dictionaries from high school?  Now you can access every word at your fingertips. To find out what a word means, type define: followed by the word. For example, define: enigma.

 

Search for similar terms

It’s best to be as specific as possible when searching for something on the Internet. However, many different words can be used to describe the same thing. You can use a the tilde (~) sign before the word you want synonyms for. For example, if you’re searching for tutorials, in the search box you can type ~tutorials. This will bring up results for tutorials, guides, manuals, resources and several other similar words.

 

Search for specific terms

Another way to narrow down your search results is to use specific words or phrases. Type your word or phrase in quotation marks in the Google search box. For example, “Google search tips”.

 

Search for specific file types

If you’re searching online for a manual for your television, it most likely will be available as a PDF file. However, if you simply search by the make and model of your television, hundreds of useless search results will fill up the pages. Using the filetype statement can help you quickly locate the type of file you are looking for. For example, Panasonic TC-L42E50 manual filetype:PDF returns the user guide as the first search result.

 

Track packages

Expecting an important FedEx or UPS delivery?  Simply type in the tracking number in the Google search box.

 

Get flight information

Picking up a friend or family member at the airport and need to know if their flight is on time?  Enter the airline and flight number in the search box. Google will give you the arrival and departure times. For example, Delta flight 5778.

 

Find places

Although Google maps and Google Earth are powerful tools for finding locations, you can pull up a map right with the Google search bar. Simply type in maps:  followed by the location. For example, maps: Indianapolis, Indiana will display a map of our state capital.

Posted on

Are You Using the Safest Web Browser?

Web Browsers

Like most computer users, you probably spend a little time each day on the Internet.  You may read the news, check the latest status updates of your friends on Facebook, sort through your incoming email, and play a few online games.

A program installed on your computer called a web browser allows you access to nearly everything on the Internet.  Internet Explorer is the most common web browser and comes preinstalled on your computer.  Mozilla Firefox and Google Chrome are two other popular and free web browsers that can be installed on your PC.

We have seen an increase in damaging viruses infecting computers over the past month.  Most of these viruses attacked while the computer user was on the Internet – in many cases, while viewing or visiting various websites.

Keeping your computer system safe from viruses and malware is a multi-layered approach.  It requires having an effective antivirus program, a reliable hardware firewall, and constantly installing the latest Windows and other software updates to fix security vulnerabilities.

Using a safe web browser is another important tool in protecting your computer and your personal information.

Most people use Internet Explorer simply because it is already installed on their computers.  But is it the safest one to use?

A recent study performed by Accuvant Labs shows that Internet Explorer is NOT the safest web browser (the complete report can be found at http://bit.ly/rMBCR7).  Their in-depth evaluation of the big three– Internet Explorer, Mozilla Firefox and Google Chrome – found that Google Chrome is the web browser that is most likely to keep your computer secure from viruses, malware and other attacks.  Surprisingly, Mozilla Firefox was deemed to be the least secure.

It must be noted that while Accuvant asserts their study is unbiased, their research was commissioned by Google.  Furthermore, Microsoft claims their Internet Explorer 9 is the most secure web browser in the world (Microsoft’s study can be found at www.yourbrowsermatters.com).

So who do you believe?  Remember, statistics can be made to prove practically ANY point one wants to make.

But here’s my expert opinion:  Google Chrome, from my personal use and research, does seem to be a faster, more secure web browser than the others.  Chrome is updated more frequently than the others, which helps fix security problems faster, thus protecting your computer better.

I would recommend installing and using Google Chrome for all your Internet surfing.  Google Chrome can be downloaded from our website at https://www.calibreforhome.com/free-tools.