ads

Slider[Style1]

Style2

Style3[OneLeft]

Style3[OneRight]

Style4

Style5

Free antivirus that still supports Windows XP

Microsoft no longer protects you in Windows XP, but there’s plenty of free security software that does. outlines the best antivirus tools for XP
Don’t be fooled by Microsoft’s recent U-turn on patching Windows XP. The surprise security fix for Internet Explorer 8 (the last internet explorer version that works with Windows XP) doesn’t mean that XP is now safe after all, or that the end of support for XP on 8 April was a big lie to get us all to upgrade to Windows 8. The internet explorer 8 patch on 1 May was a one-off, and it’s very unlikely there will be any more.
Microsoft will continue to update XP’s built-in security software, including Microsoft Security Essentials (http://bit.ly/1fxEN7D) and Windows Defender, and it still updates its virus definitionsin XP. But that just won’t cut it. Th  ese tools score far below many free alternatives in antivirus tests, so it’s dangerous to rely on them. One recent Windows Defender update on the internet even caused thousands of XP computers to crash at startup. As a result, Microsoft’s Technet forums were flooded with angry posts from Windows XP users (read them at http://bit.ly/1p9s6Zm). 
To stay safe in Windows XP, you need to build a solid wall of third-party security tools that do the job Microsoft no longer does. Antivirus companies are busy releasing and updating programs to meet demand from the Windows XP users that Microsoft has abandoned, so you have plenty to choose from.
Free antivirus that still supports Windows XP

Keep viruses off your XP PC

The best antivirus products that keep you safe in Windows XP come at a price. Premium suites Kaspersky Internet Security 2014 (www.kaspersky.co.uk), Norton Internet Security (uk.norton.com) and ESET Smart Security 7 (www.eset.co.uk) achieved the best results in the latest Home Antivirus Protection test by our security team at Dennis Technology Labs.
But right behind them were two completely free products: Avast Free Antivirus (www.avast.com) and AVG AntiVirus Free 2014 (http://bit.ly/1todjWi). Avast Free Antivirus is easy to use and very powerful security, with various scan levels that range from very fast to very thorough. Its database of virus definitions is updated constantly to give you ongoing protection, even against zero-day vulner abilities like the one Microsoft eventually patched on 1 May. Avast has pledged to support XP for at least another two years, which is great news to the 27 per cent of Avast users who still use XP and don’t plan to change. 
AVG AntiVirus Free is less powerful than Avast, but it also uses up much less processing power, so it’s ideal if your computer is a bit old or slow. AVG says it has “no plans to stop supporting XP users” and that XP will receive virus definitions “for the forseeable future”, which our Technology Labs team defines as 2016 or later. Read AVG’s statement at http://bit.ly/1BYABMz.
Try out all these programs to see which suits your needs best, but only keep one on your computer. If you have two security antivirus programs running at the same time they will conflict, eff ectively identifying each other as viruses and stopping either program from working properly. Having two antivirus programs is as bad as having no antivirus at all.

Find and remove malware

The outstanding security anti-malware program Malwarebytes Anti-Malware Free (www.malwarebytes.org) is designed to run alongside your antivirus, and won’t conflict with it. The new version of Malwarebytes includes “guaranteed lifetime support” for XP. Malwarebytes told Computeractive: “We will continue to support XP for as long as it’s technically possible. Th  at goes for our free version as well as premium. Twenty per cent of our users still run XP, and they shouldn’t have to pay to get protected.” Each time you open Malwarebytes it updates its database, so it won’t overlook any recent malware or PUPs (Potentially
Unwanted Programs), such as adware that slow down your computer and could be used by hackers to break into your PC.Select ‘Perform full scan’ the first time, then use the default ‘quick scan’ every week or two to keep your computer clean. It’s a portable program, so you can run it from the EXEfile on a USB stick to check for unwanted nasties on a friend or family member’s computer.

Block threats in Internet

Internet Explorer, Firefox and Chrome Web Of Trust (www.mywot.com/download) is a free add-on for internet explorer, Firefox and Chrome that uses a traffi c-lights system to warn you about phishinglinks, malicious sites and other traps. A green icon indicates that a link has excellent safety reports; amber is ‘unsatisfactory’ and red means ‘poor’. Red links are blocked by default, but you can still click them if you really want to. Web Of Trust is internet browser based and constantly updated, so it’ll always work in Windows XP.
A firewallis another essential weapon against threats from the web. Comodo Firewall Free (http://bit.ly/1zMP5KB) works alongside your antivirus and anti-malware programs and acts like a shield to protect you against threats like internet malware and zero-day attacks. Its current version still works in XP. 
Note that if you’re using Internet Explorer in XP you should be extra vigilant. Iinternet Explorer’s popularity makes it a prime target for hackers.

Help for CryptoLocker victims as file-unlocking website goes live

Victims of the ransomware cryptolocker can now get their files back for free, thanks to the work of security experts.

Help for CryptoLocker victims as file-unlocking website goes live
The deadly malware, which was discovered last year, was controlled by the same servers that hosted Gameover Zeus.
These were taken down by an international law enforcement effort in May 2014, although the alleged mastermind - Russian Evgeniy Mikhailovich Bogachev - is still at large (see his FBI ‘Wanted’ poster at http://www.fbi.gov/wanted/cyber/evgeniy-mikhailovich-bogachev).

In the past eight months CryptoLocker infected some 500,000 Windows computers, encrypting users’ files and demanding an average of 5300 (£178) to release them. It’s been estimated that the criminals had managed to extort at least 41,928 Bitcoins from victims - equivalent at the time to about $27 million in the first three months of its operation.

Until now, users have had to pay up to recover their files. But researchers at security companies FireEye and Fox-IT have launched the Decrypt CryptoLocker website (www.decryptcryptolocker.com), where victims can unlock their files.

They will need to enter their email address and upload one of the affected files. They will then receive a master decryption key, plus a download link to the recovery program, and be able to decrypt the remaining files.
The website was created after security researchers obtained a copy of CryptoLocker’s database of victims.

Facebook scams that install malware

What happened ?

Security company Bitdefender revealedthat the UK’s most c1icked—on Facebook scam attempts to trick you into thinking you can see how many people have viewed your profile.
Bitdefender says this is by far the most effective scam on Facebook, comprising 30 per cent of fake links that have been clicked in users’ News Feed. The company’s list of the 10 most clicked scams shows that criminals’ main tactic is to tempt users with scams relating to Facebook itself — for example, by promising to show you how to change the colour of your Facebook page from blue. 
Facebook scams that install malware

These particular scams can be hard to spot because they are presented as Facebook introducing a new feature. Only one scam in Bitdefender’s top 10 uses the bait of a celebrity sex video, which has previously been a common tactic used by hackers. 

In 2013, millions of people fell for a scam claiming to show a sex tape of US pop star Taylor Swift. This year, the promise of a sex video featuring Barbadian singer Rihanna is more popular weapon for hackers,
Clicking any of the seams will take you to a malicious website that tries to infect your PC with a virus.

What should you do?

Be aware that scammers are increasingly trying to con you on Facebook by offering tools for the site that don’t actually exist. One way these may appear in your News Feed is because they’ve been unwittingly ‘liked’ by one of your Facebook friends. To keep yourself safe, install Bitdefender’s Safego, which is a free Facebook app that scans links you receive from your friends. If Safego identifies a link as malicious, you should click the button next to it to warn the friend that sent it.

How to hide your tracks on the internet

Staying safe when you're online is more important than ever. These handy tips allow you to avoid its dodgy bits.

How to hide your tracks on the internet

Thanks to the ubiquity of internet connected devices, we’re online more often and in more places than ever. But there is a dark side to this world: cyber criminals want our money, our identities and our information, and they’re often successful in getting them. We’ll show you how to stay safe and cover your tracks when you're online. Of course, you don’t need to cover your tracks if you don’t make any in the first place. Using a PC in an internet cafe is a secure way to browse the internet, providing you don't log in to any sites. Having to go to a specific place to access the internet kind of defeats the point of mobile, unlimited internet access though. Fortunately, most browsers come with incognito or private browsing modes, which mean anything you enter is wiped when the window is closed down.

In Internet Explorer, pressing [Ctrl]+[Shift]+[P] opens an In Private window, while [Ctrl]+[Shift]+[N] opens an Incognito window in Chrome. These modes are particularly useful if you don't want sensitive information such as passwords to be stored by your browser. They’ re also useful for checking out suspicious internet links as they prevent websites accessing personal information.

However, incognito modes won’t stop spyware or malware accessing your keystrokes or passwords. For these you need a robust antivirus package that's kept up to date. It’s a good idea to run scans regularly to stop nasties getting in, and to use any identity protection tools included with the software. 
Google’s internet searches tend to deliver the best results, but at a price the company traclm the things you search for so it can deliver relevant adverts to you. If you’re not happy about this, you can use Duck Duck Go’s (http://duckduckgo.com) search to find what you’re looking for without being tracked. We’ve found it to be as accurate and useful as Google.

Protect your PC from malware

Learn more about the different types of malware that threaten your PC, plus discover how to protect yourself against them. 

Protect your PC from malware
Once upon a time, protecting your computer from viruses was a relatively simple affair. All you needed was an antivirus program and a firewall, and you could consider yourself fully protected. How
times change – these days there are so many different types and varieties of malicious programs (known as malware) that your PC doesn’t know whether it’s coming or going. But what exactly is
ransomware? How at risk are you from phishing? How do you protect yourself from rootkits, and what steps should you take to remove a spyware infection?
In this feature we’ll run through 10 common types of threat to your PC’s security. We’ll reveal what they are and how they work, and show you how to spot tell-tale signs that one of these pieces of malware might be lurking in the recesses of your PC’s hard drive. We’ll provide advice on removing infections from your PC, and how to protect yourself against them in future. 
We’ll also reveal some useful tools – many of which you’ll find on this issue’s free disc – that you can use to both remove stubborn infections and clean up your PC after they’re gone so you’re no longer locked out of Safe mode, unable to browse the internet or refused access to the Registry.

 
Multi-layered security 

What you’ll realise over the course of this guide is that no single program can provide blanket protection for your PC. To stay safe, what you need is a good, strong antivirus and anti-spyware program, together with a third-party firewall. If you’re strapped for cash, consider Comodo Internet Security, which combines both in a single program for no cost, and is included on this month’s free disc. We also recommend installing several scanand- remove tools like Malwarebytes Anti-Malware Free. These don’t offer real-time protection, but regular scans should help keep your system secure. 
Other layers of security can also help keep your PC and your data safe online, from protecting yourself from dangerous websites using the Web of Trust browser plug-in to blocking attacks on the programs you use every day with Malwarebytes Anti-Exploit Free. Of course, there’s also a critical layer of security that requires no software at all, and that’s modifying how you behave online to reduce your exposure to risk and react appropriately. Armed with these tools and our tips, you’ll sleep a lot more soundly (and securely) at night…

Viruses, worms and trojans

These are particularly insidious, so discover how to keep them at bay

The most common and well-known threat to your PC is the virus. This has become a catch-all term for a wide range of threats, but on its own a virus is a piece of code that attempts to copy itself so it can be distributed widely. It’s become interchangeable with the threat known as a worm, but while
they share many characteristics, there is one critical difference: viruses work by inserting themselves into host programs such as Microsoft Word. The most obvious example here are viruses written in Visual Basic that are hidden away inside macros that are stored in Word documents. The macro is triggered as soon as the document is opened unless your Word security settings are designed to block it. The first thing a macro virus usually does is add itself to the main template (normal. dot) file, which means it’ll run every time you launch Word. These days, Office security settings prevent macros from running by default.

Worms and trojans

Worms are standalone programs that behave in a similar manner to viruses, but in a self-contained fashion. Traditionally they were distributed via the internet – inserted as file attachments into emails, lurking as downloads on dubious websites, or spread via social media and peer-to-peer networks like BitTorrent. 
Because they’re standalone, worms don’t rely on any other software to run; once the file is opened, they’re able to replicate themselves and cause whatever havoc they have been programmed to perform. Some worms also deliver additional payloads such as backdoors and spyware. 
Trojans are programs that appear legitimate, but are anything but – hence their name, which is inspired by the Trojan Horse of legend. Having tricked their way into your system, the trojan can then deliver its malicious payload. Spyware and backdoor infections are common, but standalone trojans include destructive trojans, which delete files. Another variant – time-bomb trojans – wait for a specific date before delivering their payload.

Symptoms

If your PC is affected by a worm or trojan, you’ll notice sluggish performance and will be unable to run Windows Update or access certain websites. You may also find that your security software can’t update itself to protect against the latest threats, or even run at all. If you’ve accidentally installed a trojan, you may find other software you don’t recognise suddenly appearing on your computer too.

Notable example

everyone how devastating even ‘simple’ worms can be, and the fact that it used a vulnerability in Windows that had been patched by Microsoft months before showed the importance of installing the latest Windows security patches.

Removal

Your security software should be able to deal with trojans and worms, even after they get on to your system. Try using a standalone scanner like ClamWin Free Antivirus or Malwarebytes Anti-Malware
Free (both on your free disc) in Safe mode if you’re struggling to remove a threat.

Protection

Aside from keeping your security software up to date and running regular scans, you can minimise the risk of these types of malware from getting on to your PC by making sure you keep Windows and your key programs up to date. Also use caution when opening files, particularly those downloaded from unknown sources.

 
Spyware

This malware is designed to watch what you’re doing and steal your personal information

Whereas traditional viruses aim to replicate and spread themselves far and wide, spyware tends to focus its efforts on the computer on which it’s installed. Its primary aim is to collect information about the computer user by spying on their activity. It then uses this information to target the user with ads and other material for financial gain. Spyware can also be used to steal financial data and passwords through the use of a keylogger, which monitors what you type. 
Like other forms of malware, spyware attempts to change computer settings – particularly those related to the internet. It does this to prevent its removal, and to make use of the information it’s gathered to bombard the infected computer with ads and other unwanted material.

Symptoms

The signs of a spyware infection are similar to those of worms and trojans, and although you may realise that your information has been compromised, it might take weeks to become apparent.

Notable example 

CoolWebSearch is the name given to a family of constantly evolving spyware infections that target web browsers changing homepages and default search engines, bombarding users with ads and collecting personal information.

Removal

Try running your usual security software in Safe mode first. If this fails, follow the step-by-step guide below, focusing on using Spybot Search & Destroy and Malwarebytes Anti-Malware.

Protection

Keep all your software updated and be suspicious of any program that originates from the internet. Your firewall may help you detect spyware by alerting you to processes that try to send information from your PC without your knowledge.

 
Ransomware 

This kind of malware attempts to extort money from the infected PC’s owner

ou can probably guess how ransomware works – it takes control of your PC and demands that a ransom is paid before it is released. It can be delivered in a number of ways – via an infection, in a file that the user is tricked into downloading and running, or via network vulnerabilities such as backdoors. Once the ransomware is installed, it will restrict access to critical parts of your PC – either by locking down certain parts of the system to prevent you from performing key tasks, or by encrypting files – typically documents and photos that are potentially irreplaceable. The ransomware will then display messages demanding the user pay the malware creator – perhaps via online payment or by sending a premium-rate text message from their phone. In return for this payment, the user is given an unlock code that should (in theory) remove the restrictions and restore control. Some demands may even be time-limited, trying to force the user into responding quickly rather than sitting
on the problem or seeking external help. Of course, like all ransoms, there’s no guarantee that control will be returned even if the end user follows the demands.

Symptoms

Ransomware has no need to hide – its aim is to let the user know it’s been installed and extort payment in return for releasing control of the computer and its key files. 

Notable example 

CryptoLocker has extorted tens of millions of pounds from affected users by encrypting files and demanding payment for the unlock code.

Removal

The ransomware infection itself should be removed by most security software, but any encrypted files or system locks will remain. Users can avoid paying the ransom for minimum data loss if they have secure offline backups of their files. 

Protection 

HitmanPro.Alert (on the cover disc) offers a CryptoGuard tool that prevents your personal data from being encrypted should ransomware get on to your PC.

 
Zero-day attacks

These threats exploit recently-discovered vulnerabilities

Security updates for programs are designed to close recently discovered holes. Left unrepaired,
these could be exploited by malware developers, allowing them to sneak on to people’s systems as part of a ‘zero-day attack’. These can take the form of worms, trojans and other types of malware, but their reliance on a specific vulnerability makes them easier to block.

Symptoms

The same as most other malware attacks. 

Notable example 

The Conficker worm in 2009 preyed on a security hole in Windows XP that had been closed months before, but because users were so lax about keeping Windows up to date, many fell foul
of an easily preventable attack.

Removal

If possible, install the latest security patch or update. Use your security software to remove the infection. 

Protection 

Keep your software and OS fully up to date. If you’re still using Windows XP, consider upgrading.
If you’re stuck using an older browser and your security suite doesn’t offer protection against zero-day attacks, install Malwarebytes Anti-Exploit from this month’s free disc.

 
Browser hijackers

This term refers to software that modifies your web browser settings – typically the home page, default search engine and even error pages. The aim is to push you towards websites containing advertising. 

Symptoms

Your browser’s home page and search engine are changed, and any attempts to change them back fail. Some hijackers block access to security sites and install browser toolbars.

Notable example

CoolWebSearch was one of the first browser hijackers in 2004, and was so pervasive most security products couldn’t remove it properly.

Removal

Try Malwarebytes Anti-Malware Free (on your free disc) to remove the infection. You’ll need to reset the search and home pages yourself.

Protect any folder on your PC

Locking folders from being accessed on your own user account is not part of Windows by default. Folder Password Expert helps keep your data safe.

Folder Password Expert is a program that allows you to protect folders against unwanted access. It can lock folders on an internal hard drive, flash drive, external USB drive and network drive. When folders are password protected and locked, their contents cannot be read, copied, modified or deleted. To access the locked folders, you must supply the correct password. 
Folder Password Expert guarantees your privacy by making it impossible for anyone to access your data – even in Windows Safe Mode. If somebody logs on under your Windows account, they will not be able to access your data without that crucial password, which for added security is not stored anywhere in Windows. To download the program, go to www.folder-password-expert.com and click ‘Try It Free’ in the top-left. Once installed, select ‘Run Trial Version’ to use the 30-day trial ($39.95 thereafter).

Lock folders

Lock folders
On the Welcome screen, deselect ‘Show this screen each time Folder Password Expert starts’, otherwise you’ll be constantly reminded to upgrade. Click on ‘Next’. You’ll then need to choose a task (‘Lock folders’ or ‘Unlock folders’). Choose ‘Lock folders’ and click ‘Next’. On the next screen, click on ‘Add’ and browse to the folder or folders that you want to lock and click ‘OK’.

Enter password

Enter password

Choose ‘Next’ and you will be asked to enter a password. You’ll notice that if you tick the option below the password fields, you can enter a password hint. When choosing a hint, ensure that only you will understand it. Click on ‘Next’ and you will be told that your folders have been locked. Click ‘Next’ again and you’ll see the ‘Select a Task to Perform’ screen again.

Verify locked folder

Verify locked folder
Let’s test what happens when you lock a folder. Navigate to the folder in Windows Explorer and you will see that it now has a little red stop sign next to it, indicating it’s locked. Double-click the folder to open it. Folder Password Expert will be launched and you’ll need to enter your password for access. The password hint (if you provided one) can be acquired by clicking ‘Get a hint…’

Unlock folders

Unlock folders
Open up Folder Password Expert again, but this time choose ‘Unlock folders’ and on the next screen select the folder from the list (if you have more than one locked folder) and click ‘Next’. Tap in your password on the next screen. The next screen will say you can now open the folder normally. Remember to go back and lock it again if you want to keep it secure.

Protect folders in Windows Explorer

Protect folders in Windows Explorer
You don’t have to open up the program first to use Folder Password Expert’s features. Right-click the folder in the right-hand pane of Windows Explorer and select ‘Lock folder’ from the pop-up menu. To complete the process, enter your chosen password. Unlocking the folder is also easy: double-click it in the right pane of Windows Explorer and enter the password.

Quick access

Quick access
Folder Password Expert helpfully adds a context menu to the Start menu entry. An arrow points to the right showing your recent protected files. Here you can permanently pin folders to the Recent list, unlock them or remove them entirely. If you manually pin the Folder Password Expert start menu icon to the Taskbar you still get the Recent menu when you right-click.

Secure a USB or network drive

As well as being able to secure folders found on any drive or partition on your PC, you can also secure folders on a networkattached hard drive or one connected by USB. Simply navigate to the folder using Windows Explorer, right-click and choose to lock or unlock folders. Remember that any network-attached drive will need to be discoverable in Windows Explorer.

Trial version notes

To unlock the full version from the trial one, you’ll need to enter the code that you receive after purchase (there’s a ‘Paste from the Clipboard’ option) and then click ‘Next’. If you let the trial period expire without paying for the full version, the program will not be able to lock new folders; however, it will still be able to unlock protected folders on your computer.

Internet explorer security flaws

Internet explorer security flaw

 

What happened?


in its Patch Tuesday for March. Microsoft issued 18 security fixes for lntemet Explorer. some of which were marked as critical. The most urgent fix was for a zero—day-Vulnerability in Internet Explorer 9 and 10. It was spotted on 13 February by security company FireEye (http://bit.ly/1AuxA0u), and left unpatched by Microsoft for a month. although the company did issue a temporary ‘Fix it’ solution and advised users to upgrade to Internet Explorer 11, which wasn‘t at risk.
The flaw had already been exploited by hackers. who targeted the US website Veterans of Foreign Wars (http://bit.ly/1ui6OIN) which is popular with military or ex—military personnel. This type of hack — when criminals target a website only visited by a particular group of people - is known as a waterhole attack.
Microsoft said that hackers could have used the flaw to carry out a remote code execution. a common form of attack that lets them access your PC if you visit an infected website.
This Patch Tuesday was the second successive to contain a batch of IE fixes. In February. Microsoft patched 24 vulnerabilities in the browser, which remains the company’s most attacked product. Microsoft will its final Patch Tuesday for Windows XP on 8 April.

 
What should I do?

lf you have “automatic updating" turned on in Windows, you don't need to do anything. To check, in Windows Vista, 7 and 8 go to the Start menu, Control Panel, ‘System and Security’, then ‘Turn automatic updating on or off’.
Make sure ‘Install updates automatically (recommended)' is selected. In XP, Click the Start button, All Programs, then Windows Update. Visit the support page to team how to install updates manually(http://bit.ly/1uud27y).  For more information on these IE patches. read Microsoft’s Security Bulletin for March(http://bit.ly/ZfIlrY) . You should also read the blog post from the Microsoft Security Response Center(http://bit.ly/1rAz5p4).

Secure your wireless network

We all know that having a secure wireless network is important, but a good password alone isn’t always enough. These methods will help keep your data extra safe.


Securing your network beyond the password level seems like a chore. That’s understandable, but with so many wireless devices in the hands of other people just feet from your property, you need to go a little further to ensure your privacy is kept intact. We’re going to guide you through the essential steps you should take to
improve the security of your home wireless network. 
At the core of most Wi-Fi home networks is a router, which sends data between your wireless devices and the internet. To set up your router, you must access the administration panel through a web browser. This is where you enter your network address and account information. The admin panel is protected with a login screen, which requires a username and password, but as you’ll see, that’s just the first stage in protecting your network.

Wi-Fi protected setup

If you’re updating your router, your new device will follow either the 802.11n or 802.11ac specification, and will almost certainly come with WPS (Wi-Fi Protected Setup). This is usually a physical button on the router that you press to lock the device securely while you set it up. It will let you bypass any password setup until you’re securely logged into the admin panel.

Update your router’s firmware


Older routers can develop security issues as you attach new devices to your network. Check your router manufacturer’s site for a firmware update. This will ensure compatibility with the latest devices and will refresh your router. Firmware updates usually involve downloading a file from the website and uploading it to
your router via the firmware section of your router’s admin panel.

Change your password regularly


If your router is a few years old, firmware updates might be the only way to add better security features, but when you reboot the device afterwards, you’ll have to configure its security options again. We recommend using WPA-PSK or WPA2 at the very least, and you should choose a new password that includes both letters and numbers, making it difficult to guess.

Switch off SSID


By default, routers broadcast their ID to nearby wireless devices, but it’s easy to stop this so snoopers can’t detect your network. In your router’s admin panel you should find an option to stop broadcasting the SSID (service set identifier). To connect your own devices, you’ll need to enter both the name and password; it won’t appear on the list of available networks.

Address reservations


If you give each device on your network a static IP address, your connections will not only be faster and more reliable, but also more secure because you can easily see which devices are connecting to your network. Devices you don’t recognise will be given IPs that are not in your list of reserved ones.



MAC filtering


Stop unrecognised devices from gaining access by creating a list of MAC (Media Access Control) addresses for your devices. Only allow these to connect. Look for an address filtering option in your router admin panel and enter the MAC address for each device. To find the MAC address, type getmac in Command Prompt for Windows PCs. Check the manufacturer’s site for other devices.


Don’t auto-connect to hotspots


Connecting to open Wi-Fi networks exposes your PC to security risks. To disable automatic connections to open Wi-Fi networks, click ‘Control Panel > Network and Sharing Center > Manage Wireless Networks’ (in the left pane) and right-click the one you want to change. Click ‘Properties > Connection’ and uncheck ‘Connect automatically when this network is in range’.

Disable wireless administration


If your router has the option, change the setting that allows router administration through a wireless connection to ‘off’. You now need to connect with a wired connection (LAN) to get to the admin panel, essentially preventing wireless hacking. You have now completed the core tweaks to protect your network, but check the manufacturer’s instructions for other ways to stay secure.

Top