Surf & Earn $300 Deposit Contest Bonus PTCWall Special Offers Login Register Forum
UltimateAdz - Forum
5 replies to this topic
bigramil
Golden
Posts: 9
The FBI and Interpol has confirmed it.

Keylogging Theft is the NUMBER 1 global internet crime and will be for a long time.
New Viruses:

Ransomware - WannaCry (worm), Locky,Locky Virus, Browse Pulse, Dragon Branch and other Ransomware - Latest threat that encrypts files (rendering them unreadable) and demands a ransom from its victims to get them back. So far, it has attacked 500,000 people. Avira Antivirus Pro offers you complete protection against Locky, preventing it from ever getting onto your PC.
SupTab - a browser hijacker that redirects searches to harmful sites. The malware that stands out among 13 million new viruses within the last 30 days one that stands out - 6/9/15
browsefox - turning your browser into a billboard by infecting browsers and displaying ads - non-stop - that are very hard to remove...
Somoto - can be very similar to spigot and could come from free downloads;
Somoto Gen2 is a clever AdWare virus that hides in legitimate software and secretly installs malicious programs that take control of your web browser;
Framer - a new drive-by install virus that secretly steals data and capable of capturing your guarded email address as well as your log in details or passwords;
Seedabutor - a browser hijacker that redirects searches to harmful sites;
Spigot Toolbar Virus is potential malware categorized as a browser hijacker similar to Conduit Toolbar that installs as a browser add-on, browser helper object (BHO), and browser extension with or without user consent and changes existing internet browser settings of popular internet browsers including Google Chrome, Mozilla Firefox, and Microsoft Internet Explorer and also causes problems relative to the invasion of privacy and system functionality for many users.
W32.Blaster. Worm virus which has been identified that could allow an attacker to compromise a computer running Microsoft Windows and gain control over it. Microsoft took immediate action after the spread of the virus, however, a considerable amount of computers worldwide have been victimized and the Blaster Worm is still at large. More information on this security flaw in the Microsoft Windows and the nature of the virus can be found at: http://www.symantec.com/avcenter/venc/data/w32.blaster.worm.html
When infected with ad.doubleclick.net redirect, other common symptoms include:
Advertising banners are injected with the web pages that you are visiting.
Random web page text is turned into hyperlinks.
Browser popups appear which recommend fake updates or other software.
Other unwanted adware programs might get installed without the user’s knowledge.

To remove ad.doubleclick.net redirect, follow these steps:
STEP 1: Use Zemana AntiMalware Portable to remove browser hijackers
STEP 2: Scan and clean your computer with Malwarebytes Anti-Malware
STEP 3: Double-check for malicious programs with HitmanPro
(OPTIONAL) STEP 4: Reset your browser to default settings

Also protect your PC from being attacked by Conficker, Sality, Zeus, Cutwailrotects
Hohosearch, yeabests.cc, GetPrivate Ads, TeslaCrypt, Funday24.ru, and GreatDeals

This warning is critical especially from the proliferation of hackers in PTC sites.

B E W A R E !!!

For virus protection installation a free malwarebytes or an effective anti-virus is a must.

For Key-logger and hacker protection, clean up of browser should be done regularly. Changing of password to a more difficult to copy should also be implemented especially to email addresses.

Maybe, this might not be sufficient and I hope technicians can do more suggestions. This could serve as a basis for Admin to help provide assistance to its members to safeguard themselves from these nemeses.

More Solutions Suggested by a Friend:--

1-Always type some additional characters in the mid , at the end , beginning of mix of this scheme.
Then select the additional(extra) characters typed in your password and Delete them from your password , to correct your password.
this way u have a better chance of deceiving the key-logger

2-If you need to use a public PC, then use a mobile password management/form filling application such as Siber Systems' Pass2Go roboform filler. Pass2Go runs off a USB memory key and protects your passwords behind a master password. Even if the master password is, it's useless to the thief unless he has your USB key, too. It's not a foolproof solution, but it will evade hacking tools that rely on capturing keyboard events .

3- some anti-key-logger soft wares are listed below :

There are many solutions to this
BitDefender
SpyShelter
DataGuard Anti-Key-logger
KL-Detector v1.3
Keylogger Blocker
Zemana AntiLogger
spy guard
KeyScrambler..

Email security

As email is not a secure method of transmitting information, always be careful when sending sensitive information via email. Use caution before responding to email requests for account login or other personal information.
Never enter any information into an email or pop up. Prince Fund will never solicit account or personal information via email.
Do not open emails from unrecognized senders.
Use spam detectors to filter malicious and fraudulent emails.
Beware of emails that request you to click on a link or visit a web site. These links could lead to malicious sites intended on gathering your personal information. Such malicious sites often look very similar to the legitimate web site of the companies being misrepresented. These emails typically convey a sense of urgency.
Account Security
Security of information is paramount at xxxxx. Work continuously to safeguard your accounts, employing the very latest technology and security methods. Only you can protect your personal computer from identity theft. Below are key steps you can take to reduce your online risks significantly.

Secure your home computer

Follow these steps to protect your computer:
Anti-Virus Software must be Up-to-Date
Anti-Spyware Software must be Up-to-Date
Personal Firewall needed
Regular Installation of Security Updates (Best Automatic Option)
Your Wireless Home Network Protection
Exercise Caution with Wireless Hotspots
Minimize your online risk
Follow these steps to protect you from internet fraud:
Protect Your Passwords
Do NOT use same Passwords
Protect Yourself from Phishing Scams
Do NOT Open Unexpected E-Mail (Especially with Attachments)
Do NOT E-Mail Personal or Financial Data
Do NOT Be a Victim of Session Stealing (Always use Logout button)

Tips to Avoid Phishing

- Avoid entering your account information within ads. Phishers will create pages to look like this site to get your login details. Never login without navigating to our homepage first.
- Avoid clicking links or opening attachments within emails unless you know/trust that the sender is genuine. Many times phishing emails try to spoof the actual senders logo images and email copy. If you get spoof emails from Paypal or Payza you can always forward them to spoof at paypal.com or spoof at payza.com and they will take action against the phishers.
- Use good anti virus programs such as Comodo and MalwareBytes together as they can help with online protection.
- In most cases phishing in the PTC industry is done through ads. This is why you should never enter your login details of a previously joined site within a ad frame as this is likely a attempt to phish your account details.
- If you have the slightest doubt about something go with your instincts. In most cases the phishing ads have ridiculous claims like Make 1000 dollars instantly, etc.

What to do if your Account was Phished

When phiser is detected within the system it is suggested to suspend him/her until the owner sends in a support ticket to stop the phisher and to prevent further abuse on the account holders account. I would suggest logging into your account, changing your password and then looking on your login history page and scan for IPs that are logging into your account that are not yours. Once you identify IPs accessing your account that are not yours, you should take a screenshot and send in a ticket outlining which ones are not yours so that these unauthorized IPs can be banned from the server.

If you even think your account has been phished you should change your password and look at your login history which can be found on the bottom left hand menu of your account area. Login history will show you all the latest logins/ IPs / browsers that have accessed your account.


Hope this will help.

Happy Earning and Stay Safe!
uroojmir
Golden
Posts: 37
Received: $0.0000
Balance: $0.2780
Referrals: 4
Very very useful topic. Everyone to read.
bigramil
Golden
Posts: 9
Thanks
aznada
Diamond 1 Year
Posts: 101
thanks
aznada
Diamond 1 Year
Posts: 101
good info
slowhand2
Golden
Banned
Posts: 101
This user has been banned because of violating the Terms Of Service. All his posts have been deleted.
UltimateAdz Team.