Keep Potentially Unwanted Programs Off Your Computer

Potentially Unwanted Programs PUPsWhen you’re downloading free programs onto your computer, chances are you’re also installing PUPs, or Potentially Unwanted Programs. Here’s how they get on your computer, what they do, and how to remove them.

If you’re thinking baskets of doe-eyed baby dogs, then you’re sadly mistaken. PUPs is the acronym that stands for Potentially Unwanted Programs. Also called bundleware, junkware, or PUAs (Potentially Unwanted Applications), PUPs are software programs that you likely didn’t want installed on your computer. Why not? Here are a few things that PUPs can do:

– slow your computer down
– display numerous annoying ads
– add toolbars that steal space on the browser
– some collect private information

PUPs often come bundled with software that you did, in fact, want to download. By swiftly clicking through an installation, it’s easy to miss the fine print and “agree” to these extra applications.

So why aren’t PUPs simply called malware? The makers of PUPs felt that since they included the information necessary for consent in the download agreement, they shouldn’t be lumped in with other malicious programs. (‘Cause everyone reads download agreements, right?) So cybersecurity company McAfee came up with the softer, less mal-sounding term “Potentially Unwanted Programs.”

Read the rest of the article here

Protect Yourself From Identity Theft

hackerIdentity theft is a serious crime. It occurs when your personal information is stolen and used without your knowledge to commit fraud or other crimes. Identity theft can cost you time, money and ruin your good name.

Deter identity theft by safeguarding your information.

  • Shred financial documents and paperwork with personal information before you discard them.
  • Protect your Social Security number. Don’t carry your Social Security card with you or write your Social Security number on a check. give it out only if absolutely necessary or ask to use another identifier.
  • Don’t give out personal information on the phone, through the mail, or over the Internet unless you know who you are dealing with.
  • Never click on links sent in unsolicited emails: instead, type in a web address you know. use firewalls, anti-spyware, and anti-virus software to protect your home computer. Be sure to keep the software up-to-date.
  • Don’t use an obvious password like your birth date, your mothers maiden name, or the last four digits of your Social Security number.
  • Keep your personal information in a secure place at home, especially if you have roommates, employ outside help, or are having work done in your home.

Detect suspicious activity by routinely monitoring your financial accounts and billing statements. Be alert to signs that require immediate attention:

  • Bills that do not arrive as expected
  • Unexpected credit cards or account statements
  • Denials of credit for no apparent reason
  • Calls or letters about purchases you did not make

Inspect your credit report.

  • Credit reports contain information about you, including what accounts you have and your bill paying history. The law requires the major nationwide consumer reporting companies – Equifax, Experian, and TransUnion, to give you a free copy of your credit report each year if you ask for it. Visit Annual Credit Report a service created by these companies, to order your free credit reports each year.
  • Review financial accounts and billing statements regularly looking for charges you did not make.

Defend against ID theft as soon as you suspect it. Place a “Fraud Alert” on your credit reports and review the reports carefully. The three nationwide consumer reporting companies have toll-free numbers for placing an initial 90-day fraud alert. A call to one company is sufficient.

  • Equifax: 1-800-525-6285
  • Experian: 1-888-397-3742
  • TransUnion: 1-800-680-7289

Close any accounts that have been tampered with or established fraudulently. File a report of criminal identity theft with law enforcement officials to help you with creditors who may want proof of the crime.