Skip to content
View in the app

A better way to browse. Learn more.

Thailand News and Discussion Forum | ASEANNOW

A full-screen app on your home screen with push notifications, badges and more.

To install this app on iOS and iPadOS
  1. Tap the Share icon in Safari
  2. Scroll the menu and tap Add to Home Screen.
  3. Tap Add in the top-right corner.
To install this app on Android
  1. Tap the 3-dot menu (⋮) in the top-right corner of the browser.
  2. Tap Add to Home screen or Install app.
  3. Confirm by tapping Install.

End of life cycle for Window 7 and 8.x

Featured Replies

  • Replies 32
  • Views 1.6k
  • Created
  • Last Reply

Top Posters In This Topic

The biggest culprits that spread malware, viruses and spam onto other computers and online are those that download bad material from visited websites, or copied on from external devices and fail to scan their computers regularly, transfer their bad material through disks and memory sticks in their workplaces and end up getting viruses in their email accounts that automatically send attachments and bad links to all their contacts or send what they consider as must haves by email or links to others who take the bait. No versions of windows can protect us from that.

Actually that's a popular misconception and it's no longer true, as I said earlier.

Most of the infection attempts I see (other than emails) are from hijacked links on legitimate websites. in other words, they've been hacked and instead of defacing the site or something, they replace a valid link with one to a host somewhere like China or Russia. User's don't normally question a quick lookup, look how many Google or Amazon links you go to just opening most webpages.

They are web attacks intended to exploit either unpatched browsers (any of them) or unpatched addons like Flash.

The email ones are easy to deal with.

The web based ones much harder, because they use sophisticated techniques to hide the download of browser-based malware, then encrypted tunnels to go back to a CnC server to download more malicious code.

Again: The key attack points are unpatched operating systems and software.

Just going around in circles. Different strokes for different folks.

Just going around in circles. Different strokes for different folks.

I'm afraid web-borne threats do not distinguish between "different folks".

The more holes you have, the more vulnerable you are.

Very simple equation really.

Create an account or sign in to comment

Recently Browsing 0

  • No registered users viewing this page.

Account

Navigation

Search

Search

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions → Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.