Text Box:

The Computer Genius

wants you to stay informed!


Check out these noteworthy articles from:


The New York Times On The Web


Cyberthieves Silently Copy Your Passwords as You Type



Published: February 27, 2006

Most people who use e-mail now know enough to be on guard against "phishing" messages that pretend to be from a bank or business but are actually attempts to steal passwords and other personal information.

But there is evidence that among global cybercriminals, phishing may already be passé.

In some countries, like Brazil, it has been eclipsed by an even more virulent form of electronic con — the use of keylogging programs that silently copy the keystrokes of computer users and send that information to the crooks. These programs are often hidden inside other software and then infect the machine, putting them in the category of malicious programs known as Trojan horses, or just Trojans.

Two weeks ago, Brazilian federal police ….    To read the rest of this article, click here.



Protecting Yourself From Keylogging Thieves



Published: February 27, 2006

The network security firm Sophos estimates that an unprotected computer has a 40 percent chance of being infected by a malicious worm within 10 minutes of being connected to the Internet. After an hour, the odds rise to 94 percent.

That's reason enough to keep up to date with operating system patches, invest in a solid antivirus program and use a basic firewall. But even with those measures in place, malicious code — including a keylogger — can sometimes find its way onto your computer.

"There are plenty of ways to ….   To read the rest of this article, click here.



Through His Webcam, a Boy Joins a Sordid Online World



Published: December 19, 2005

The 13-year-old boy sat in his California home, eyes fixed on a computer screen. He had never run with the popular crowd and long ago had turned to the Internet for the friends he craved. But on this day, Justin Berry's fascination with cyberspace would change his life.

Weeks before, Justin had hooked up a Web camera to his computer, hoping to use it to meet other teenagers online. Instead, he heard only from men who chatted with him by instant message as they watched his image on the Internet. To Justin, they seemed just like friends, ready with compliments and always offering gifts.

Now, on an afternoon in 2000….    To read the rest of this article, click here.