Procedure

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, December 5, 2009

8 Tips for Safer Online Shopping

Posted on 10:23 AM by Unknown
The holiday season is upon us, and now more than ever that means shopping on the Internet.
This past Black Friday saw $595 million in online sales, an 11 percent increase compared to Black Friday 2008, according to online market tracker comScore.
But with the comfort and convenience of buying presents from your couch comes with security risks that even the most vigilant shopper can take for granted.
The browser used to be just a place to access Web pages, but as more people makes financial transactions and store personal data there, the security of browsers has become vital to consumers at home and IT managers at the office.
[ For complete coverage on Microsoft's new Windows 7 operating system -- including hands-on reviews, video tutorials and advice on enterprise rollouts -- see CIO.com's Windows 7 Bible. ]
Microsoft has offered up tips on how to fortify your browser against viruses, spam and malware.
Naturally, Microsoft would prefer you use Internet Explorer 8, although it's worth noting that Internet Explorer has been losing market share throughout 2009, and Mozilla's Firefox, Apple's Safari and Google's browser Chrome all have security features of their own.
Internet Explorer 8: Five Security Features for Enterprise Users
Internet Explorer currently has 63.6 percent of the browser market share, a six percent drop from January 2009, according to Web metrics company Net Applications.
Here are eight (as in Internet Explorer 8. Get it?) ways to have a safer time shopping online.
Keep your computer's software and browser current. Microsoft's Download Center is a good place to start.
Protect your computer with firewall, antivirus, antispam and antispyware software. Click here for a list of security software providers.
Beware of phishing scams and malware. IE8's SmartScreen Filter feature alerts users if a Web site you are trying to access has been reported as unsafe and allows you to report any unsafe sites you find. SmartScreen Filter and other security features can be accessed in IE8 under the Safety tab in the upper right hand corner.
Protect yourself against cross-site scripting attacks. Cross-site scripting, or XSS, attacks allow malicious code to be injected into Web pages that can lead to identity theft. What's most unsettling about XSS: everything looks normal to the user while unauthorized access is being given to a hacker and sensitive data is being stolen. IE8 has a built-in XSS Filter that is always on.
Identify Fake Web Addresses. By highlighting the domain name of a Web address in black, IE8 makes it easier to see a site's true identity, thus avoiding getting fooled by a deceptive Web site.
Browse more privately. The InPrivate Browsing option in IE8, located under Tools, allows you to surf the Web without the browser storing data about your session. Temporary Internet Files, Web address history, cookies and passwords are all disabled.
Make Sure Payment Web sites Use Encryption. Any Web site that processes credit card information must use encryption. To make sure of this, look for: An "s" after http in the Web address - it should read https; a closed padlock icon in the address bar or at the lower-right corner of the browser window; a green address bar - IE8 uses green to indicate a trustworthy site.
Never Respond to Unsolicited Requests to Update Your Account Information. An e-mail asking to update account information might be a scam for stealing your identity. Legitimate companies never send unsolicited e-mail or instant message requests for your passwords or other personal information.

 http://www.pcworld.com/article/183518/8_tips_for_safer_online_shopping.html
Email ThisBlogThis!Share to XShare to Facebook
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Will New Internet Domain Names Change the Web?
    Finally, the World Wide Web will live up to its name. The decision by the Internet Corporation for Assigned Names and Numbers (ICANN) that W...
  • How to sync files and folders across two PCs
    Here are four ways to do this, although--technically speaking--only two of them actually keep the files on both PCs. The others merely make ...
  • Rumored Sony PS4 controller shows new thumbsticks
    As the speculation on Sony's next game console is ramps up ahead of  next week's press event , a pair of images have surfaced, purpo...
  • Twitter: Hacking attacks may have accessed data of 250K users
    Twitter said today that it recently detected a series of attempts to hack into user data, and that the attackers may have successfully absco...
  • When malware strikes: How to clean an infected PC
    You work hard to protect your PC from the malicious thugs of our digital world. You keep your antivirus program up to date. You avoid questi...
  • Yahoo Reject Microsoft ! Glance At New Corp.
    As we know, Microsoft is aggressively try to overtaking Yahoo. They launch 44,6 billion dollar AS bid ! This is the biggest offer that ever ...
  • Why Microsoft redesigned Windows
    Windows 8 has its fans and foes, but Microsoft felt the time was ripe for a new look and feel for a product used by more than 1.2 billion pe...
  • Rugged laptop guide
    Our rugged laptop guide will give you more information on rugged laptops and rugged notebooks than, let’s say, 95% of regular rugged laptop ...
  • LinkedIn shuts down would-be hook-up service
    LinkedIn has shut off its API access to “Bang With Professionals,” a Web service that was intended to facilitate more, say, intimate connect...
  • Convert a Kindle ebook to a different format
    When you buy an ebook from Amazon, it's yours, right? Technically speaking, Amazon is merely licensing the book to you. And the company ...

Categories

  • apple
  • browser
  • buy
  • christmas
  • computer information
  • crack
  • cyber monday
  • download
  • files
  • firewall
  • flash disk
  • font
  • graphene
  • hard disk
  • hidden
  • Hot News
  • how to
  • intel
  • Internet
  • Internet Explorer
  • iOS
  • iPad
  • Mac
  • Malware
  • nokia
  • notebook
  • play station 4
  • processor
  • removal
  • safe
  • samsung
  • samsung. microsoft
  • security
  • sony
  • ssd
  • The Meaning Is
  • tips
  • twitter
  • ubuntu
  • video card
  • virus
  • vulnerability
  • What to do
  • windows 8
  • windows7

Blog Archive

  • ►  2013 (90)
    • ►  October (2)
    • ►  September (6)
    • ►  August (3)
    • ►  July (4)
    • ►  June (5)
    • ►  May (9)
    • ►  April (14)
    • ►  March (11)
    • ►  February (17)
    • ►  January (19)
  • ►  2012 (27)
    • ►  December (22)
    • ►  November (5)
  • ►  2010 (4)
    • ►  June (1)
    • ►  January (3)
  • ▼  2009 (32)
    • ▼  December (2)
      • How to recover corrupted PowerPoint file using TEM...
      • 8 Tips for Safer Online Shopping
    • ►  November (11)
    • ►  October (11)
    • ►  September (2)
    • ►  March (2)
    • ►  February (4)
  • ►  2008 (39)
    • ►  October (2)
    • ►  September (2)
    • ►  August (1)
    • ►  June (1)
    • ►  May (3)
    • ►  March (1)
    • ►  February (7)
    • ►  January (22)
  • ►  2007 (46)
    • ►  December (8)
    • ►  November (9)
    • ►  September (4)
    • ►  August (2)
    • ►  July (9)
    • ►  June (14)
Powered by Blogger.

About Me

Unknown
View my complete profile