Tuesday , August 9 2022

More than a million Asus machines have been infected with malware



[ad_1]

See 10 more pictures

[
{
"src": "https://production-livingdocs-bluewin-ch.imgix.net/2018/3/20/a070a5e1-4ee4-4906-8be0-ab596ef88542.jpeg?rect=35%2C0%2C1146%2C862&w=1024&auto = format "
"srcset": "https://production-livingdocs-bluewin-ch.imgix.net/2018/3/20/a070a5e1-4ee4-4906-8be0-ab596ef88542.jpeg?rect=35%2C0%2C1146%2C862&w=1024&auto = 1024w format, https: //production-livingdocs-bluewin-ch.imgix.net/2018/3/20/a070a5e1-4ee4-4906-8be0-ab596ef88542.jpeg? rect = 35% 2C0% 2C1146% 2C862 & w = 750 & auto = 750w format, https: //production-livingdocs-bluewin-ch.imgix.net/2018/3/20/a070a5e1-4ee4-4906-8be0-ab596ef88542.jpeg? Rect = 35% 2C0% 2C1146% 2C862 & w = 620 & auto = 620w format, https: //production-livingdocs-bluewin-ch.imgix.net/2018/3/20/a070a5e1-4ee4-4906-8be0-ab596ef88542.jpeg? Rect = 35% 2C0% 2C1146% 2C862 & w = 450 & auto = 450w, https: //production-livingdocs-bluewin-ch.imgix.net/2018/3/20/a070a5e1-4ee4-4906-8be0-ab596ef88542.jpeg? Rect = 35% 2C0% 2C1146% 2C862 & w = 320 & auto = 320w format ".
"sizes": "90vw",
"subHtml": "

Internet Safety: the 7 point checklist essential

You are responsible for your own security in the network. Some simple steps already provide the right protection here. We will show you what safety checks you should carry out regularly: t
Photo: iStock

"
},
{
"src": "https://production-livingdocs-bluewin-ch.imgix.net/2018/3/20/b82c79ba-33ef-4782-9909-4e07acc270b7.jpeg?w=1024&auto=format",
"srcset": "https://production-livingdocs-bluewin-ch.imgix.net/2018/3/20/b82c79ba-33ef-4782-9909-4e07acc270b7.jpeg?w=1024&auto=format 1024w, https: // production-livingdocs-bluewin-ch.imgix.net/2018/3/20/b82c79ba-33ef-4782-9909-4e07acc270b7.jpeg?w=750&auto=format 750w, https: //production-livingdocs-bluewin-ch.imgix .net / 2018/3/20 / b82c79ba-33ef-4782-9909-4e07acc270b7.jpeg? w = 620 & auto = format 620w, https: //production-livingdocs-bluewin-ch.imgix.net/2018/3/ 20 / b82c79ba-33ef-4782-9909-4e07acc270b7.jpeg? W = 450 & car = 450w format, https://production-livingdocs-bluewin-ch.imgix.net/2018/3/20/b82c79ba-33ef-4782 -9909-4e07acc270b7 .jpeg? W = 320 & auto = 320w format ",
"sizes": "90vw",
"subHtml": "

Internet Safety: the 7 point checklist essential

1) Passwords must be changed regularly.
Photo: iStock

"
},
{
"src": "https://production-livingdocs-bluewin-ch.imgix.net/2018/3/20/e4bc6eed-2bdd-4b56-b5ea-d7e30b274198.jpeg?rect=105%2C0%2C1444%2C1086&w=1024&auto = format "
"srcset": "https://production-livingdocs-bluewin-ch.imgix.net/2018/3/20/e4bc6eed-2bdd-4b56-b5ea-d7e30b274198.jpeg?rect=105%2C0%2C1444%2C1086&w=1024&auto = 1024w format, https: //production-livingdocs-bluewin-ch.imgix.net/2018/3/20/e4bc6eed-2bdd-4b56-b5ea-d7e30b274198.jpeg? rect = 105% 2C0% 2C1444% 2C1086 & w = 750 & auto = 750w format, https: //production-livingdocs-bluewin-ch.imgix.net/2018/3/20/e4bc6eed-2bdd-4b56-b5ea-d7e30b274198.jpeg? Rect = 105% 2C0% 2C1444% 2C1086 & w = 620 & auto = 620w format, https: //production-livingdocs-bluewin-ch.imgix.net/2018/3/20/e4bc6eed-2bdd-4b56-b5ea-d7e30b274198.jpeg? Rect = 105% 2C0% 2C1444% 2C1086 & w = 450 & auto = 450w, https: //production-livingdocs-bluewin-ch.imgix.net/2018/3/20/e4bc6eed-2bdd-4b56-b5ea-d7e30b274198.jpeg? Rect = 105% 2C0% 2C1444% 2C1086 & w = 320 & auto = 320w format ".
"sizes": "90vw",
"subHtml": "

Internet Safety: the 7 point checklist essential

You should also check regularly whether your passwords or account details have been compromised. This is under "I have been seen" (https://haveibeenpwned.com/).
Image: Bluewin / Dirk Jacquemin

"
},
{
"src": "https://production-livingdocs-bluewin-ch.imgix.net/2018/3/20/5eb5e174-eebf-4580-9026-51779d32ca35.jpeg?w=1024&auto=format",
"srcset": "https://production-livingdocs-bluewin-ch.imgix.net/2018/3/20/5eb5e174-eebf-4580-9026-51779d32ca35.jpeg?w=1024&auto=format 1024w, https: // production-livingdocs-bluewin-ch.imgix.net/2018/3/20/5eb5e174-eebf-4580-9026-51779d32ca35.jpeg?w=750&auto=format 750w, https: //production-livingdocs-bluewin-ch.imgix .net / 2018/3/20 / 5eb5e174-eebf-4580-9026-51779d32ca35.jpeg? w = 620 & auto = format 620w, https: //production-livingdocs-bluewin-ch.imgix.net/2018/3/ 20 / 5eb5e174-eebf-4580-9026-51779d32ca35.jpeg? W = 450 & car = 450w format, https://production-livingdocs-bluewin-ch.imgix.net/2018/3/20/5eb5e174-eebf-4580 -9026-51779d32ca35 .jpeg? W = 320 & auto = 320w format ",
"sizes": "90vw",
"subHtml": "

Internet Safety: the 7 point checklist essential

2) Where did you log in? Services such as Facebook or Google offer overview pages where you can see where you logged in. In addition, there is usually information such as the IP address used or the browser used.

Image: Bluewin / Dirk Jacquemin

"
},
{
"src": "https://production-livingdocs-bluewin-ch.imgix.net/2018/3/20/febbd377-440a-4900-a23b-e152563ba815.jpeg?w=1024&auto=format",
"srcset": "https://production-livingdocs-bluewin-ch.imgix.net/2018/3/20/febbd377-440a-4900-a23b-e152563ba815.jpeg?w=1024&auto=format 1024w, https: // production-livingdocs-bluewin-ch.imgix.net/2018/3/20/febbd377-440a-4900-a23b-e152563ba815.jpeg?w=750&auto=format 750w, https: //production-livingdocs-bluewin-ch.imgix .net / 2018/3/20 / febbd377-440a-4900-a23b-e152563ba815.jpeg? w = 620 & auto = format 620w, https: //production-livingdocs-bluewin-ch.imgix.net/2018/3/ 20 / febbd377-440a-4900-a23b-e152563ba815.jpeg? W = 450 & car = 450w format, https://production-livingdocs-bluewin-ch.imgix.net/2018/3/20/febbd377-440a-4900 -a23b-e152563ba815 .jpeg? w = 320 & auto = 320w format ",
"sizes": "90vw",
"subHtml": "

Internet Safety: the 7 point checklist essential

3) Many websites and services do not have to login directly, instead the deviation is taken via the Facebook or Google account. Therefore, these rights of access should be regularly cleaned. What isn't used is flying out.
Image: Bluewin / Dirk Jacquemin

"
},
{
"src": "https://production-livingdocs-bluewin-ch.imgix.net/2018/3/20/5fb92222-538a-48d0-93d2-2a230042305b.jpeg?rect=35%2C0%2C1330%2C1000&w=1024&auto = format "
"srcset": "https://production-livingdocs-bluewin-ch.imgix.net/2018/3/20/5fb92222-538a-48d0-93d2-2a230042305b.jpeg?rect=35%2C0%2C1330%2C1000&w=1024&auto = 1024w format, https: //production-livingdocs-bluewin-ch.imgix.net/2018/3/20/5fb92222-538a-48d0-93d2-2a230042305b.jpeg? rect = 35% 2C0% 2C1330% 2C1000 & w = 750 & auto = 750w format, https: //production-livingdocs-bluewin-ch.imgix.net/2018/3/20/5fb92222-538a-48d0-93d2-2a230042305b.jpeg? Rect = 35% 2C0% 2C1330% 2C1000 & w = 620 & auto = 620w format, https: //production-livingdocs-bluewin-ch.imgix.net/2018/3/20/5fb92222-538a-48d0-93d2-2a230042305b.jpeg? Rect = 35% 2C0% 2C1330% 2C1000 & w = 450 & auto = 450w format, https: //production-livingdocs-bluewin-ch.imgix.net/2018/3/20/5fb92222-538a-48d0-93d2-2a230042305b.jpeg? Rect = 35 % 2C0% 2C1330% 2C1000 & w = 320 & auto = 320w format ".
"sizes": "90vw",
"subHtml": "

Internet Safety: the 7 point checklist essential

4) The same principle applies to apps on smartphones. Do we really need all the consents given to them? If you don't want to delete an app completely, you can at least restrict your rights.
Image: Bluewin / Dirk Jacquemin

"
},
{
"src": "https://production-livingdocs-bluewin-ch.imgix.net/2018/3/20/3ab12aeb-dd6d-4e99-a410-4aef75292582.jpeg?w=1024&auto=format",
"srcset": "https://production-livingdocs-bluewin-ch.imgix.net/2018/3/20/3ab12aeb-dd6d-4e99-a410-4aef75292582.jpeg?w=1024&auto=format 1024w, https: // production-livingdocs-bluewin-ch.imgix.net/2018/3/20/3ab12aeb-dd6d-4e99-a410-4aef75292582.jpeg?w=750&auto=format 750w, https: //production-livingdocs-bluewin-ch.imgix .net / 2018/3/20 / 3ab12aeb-dd6d-4e99-a410-4aef75292582.jpeg? w = 620 & auto = format 620w, https: //production-livingdocs-bluewin-ch.imgix.net/2018/3/ 20 / 3ab12aeb-dd6d-4e99-a410-4aef75292582.jpeg? W = 450 & car = 450w format, https: //production-livingdocs-bluewin-ch.imgix.net/2018/3/20/3ab12aeb-dd6d-4e99 -a410-4aef75292582 .jpeg? w = 320 & auto = 320w format ",
"sizes": "90vw",
"subHtml": "

Internet Safety: the 7 point checklist essential

5) Do you know what's active on your computer right now? Windows Task Manager …
Image: Bluewin / Dirk Jacquemin

"
},
{
"src": "https://production-livingdocs-bluewin-ch.imgix.net/2018/3/20/3284d5b3-fe90-4467-bc09-bd3f6f19852e.jpeg?w=1024&auto=format",
"srcset": "https://production-livingdocs-bluewin-ch.imgix.net/2018/3/20/3284d5b3-fe90-4467-bc09-bd3f6f19852e.jpeg?w=1024&auto=format 1024w, https: // production-livingdocs-bluewin-ch.imgix.net/2018/3/20/3284d5b3-fe90-4467-bc09-bd3f6f19852e.jpeg?w=750&auto=format 750w, https: //production-livingdocs-bluewin-ch.imgix .net / 2018/3/20 / 3284d5b3-fe90-4467-bc09-bd3f6f19852e.jpeg? w = 620 & auto = 620w format, https: //production-livingdocs-bluewin-ch.imgix.net/2018/3/ 20 / 3284d5b3-fe90-4467-bc09-bd3f6f19852e.jpeg? W = 450 & car = 450w format, https://production-livingdocs-bluewin-ch.imgix.net/2018/3/20/3284d5b3-fe90-4467 -bc09-bd3f6f19852e .jpeg? w = 320 & auto = 320w format ",
"sizes": "90vw",
"subHtml": "

Internet Safety: the 7 point checklist essential

… as well as the activity display of a macOS solution
Image: Bluewin / Dirk Jacquemin

"
},
{
"src": "https://production-livingdocs-bluewin-ch.imgix.net/2018/3/20/ce4187c2-b456-43ec-a7df-7ff93f7bb6eb.jpeg?w=1024&auto=format",
https://production-livingdocs-bluewin-ch.imgix.net/2018/3/20/ce4187c2-b456-43ec-a7df-7ff93f7bb6eb.jpeg?w=1024&auto=format 1024w, https: // production-livingdocs-bluewin -ch.imgix.net/2018/3/20/ce4187c2-b456-43ec-a7df-7ff93f7bb6eb.jpeg?w=750&auto=format 750w, https: //production-livingdocs-bluewin-ch.imgix .net / 2018 / 3/20 / ce4187c2-b456-43ec-a7df-7ff93f7bb6eb.jpeg? w = 620 & auto = 620w format, https: //production-livingdocs-bluewin-ch.imgix.net/2018/3/20/ ce4187c2-b456-43ec-a7df-7ff93f7bb6eb.jpeg? w = 450 & car = 450w format, https: //production-livingdocs-bluewin-ch.imgix.net/2018/3/20/ce4187c2-b456-43ec-a7df-7ff93f7bb6eb .jpeg? w = 320 & auto = 320w format ",
"sizes": "90vw",
"subHtml": "

Internet Safety: the 7 point checklist essential

6) There is a danger not only from hackers in distant countries. Your neighbors 15-year-old son may have fun breaking into foreign WLANs. So, you should check regularly if there is no intruder in your network.
Photo: iStock

"
},
{
"src": "https://production-livingdocs-bluewin-ch.imgix.net/2018/3/20/9ac4d2ee-7b10-44a2-b1a9-c18825ce02d3.jpeg?w=1024&auto=format",
"srcset": "https://production-livingdocs-bluewin-ch.imgix.net/2018/3/20/9ac4d2ee-7b10-44a2-b1a9-c18825ce02d3.jpeg?w=1024&auto=format 1024w, https: // production-livingdocs-bluewin-ch.imgix.net/2018/3/20/9ac4d2ee-7b10-44a2-b1a9-c18825ce02d3.jpeg?w=750&auto=format 750w, https: //production-livingdocs-bluewin-ch.imgix .net / 2018/3/20 / 9ac4d2ee-7b10-44a2-b1a9-c18825ce02d3.jpeg? w = 620 & auto = 620w format, https: //production-livingdocs-bluewin-ch.imgix.net/2018/3/ 20 / 9ac4d2ee-7b10-44a2-b1a9-c18825ce02d3.jpeg? W = 450 & car = 450w format, https://production-livingdocs-bluewin-ch.imgix.net/2018/3/20/9ac4d2ee-7b10-44a2 -b1a9-c18825ce02d3 .jpeg? w = 320 & auto = 320w format ",
"sizes": "90vw",
"subHtml": "

Internet Safety: the 7 point checklist essential

7) Finally, regular updates on all devices and software of all types are essential. Current software is the best protection against any dangers. Therefore, whenever possible, automatic updates should be implemented or, alternatively, checked by hand for regular updates.
Image: Bluewin / Dirk Jacquemin

"
}
]

[ad_2]
Source link