<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>אנטי וירוס - genie שירותי מחשוב לעסקים</title>
	<atom:link href="https://www.genie.co.il/en/tag/%D7%90%D7%A0%D7%98%D7%99-%D7%95%D7%99%D7%A8%D7%95%D7%A1/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.genie.co.il/en/tag/אנטי-וירוס/</link>
	<description></description>
	<lastbuilddate>Tue, 18 Apr 2023 11:36:18 +0000</lastbuilddate>
	<language>en-US</language>
	<sy:updateperiod>
	hourly	</sy:updateperiod>
	<sy:updatefrequency>
	1	</sy:updatefrequency>
	

<image>
	<url>https://www.genie.co.il/wp-content/uploads/2021/05/fav-200x200.png</url>
	<title>אנטי וירוס - genie שירותי מחשוב לעסקים</title>
	<link>https://www.genie.co.il/en/tag/אנטי-וירוס/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>אבטחת מידע &#8211; טיפים למשתמש</title>
		<link>https://www.genie.co.il/en/information-security-tips/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Sun, 06 Jan 2019 08:13:13 +0000</pubdate>
				<category><![CDATA[כתבות בנושא אבטחת מידע]]></category>
		<category><![CDATA[אבטחת מידע]]></category>
		<category><![CDATA[אנטי וירוס]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8401</guid>

					<description><![CDATA[<p>אבטחת מידע &#8211; טיפים למשתמש אבטחת מידע היא עולם רחב. בעיקרו של דבר, מטרתה היא אחת: הגנה על מערכות מחשב מפני סיכונים המאיימים עליהם. באופן כללי, היא כוללת אבטחה פיזית של המבנה בו נמצאות מערכות המחשוב, אבטחת ציוד המחשוב (החומרה) כמו גם אבטחת התוכנה והמידע האגור בה. במערכות מחשבים שונות, אם הן ציבוריות, בארגונים גדולים [&#8230;]</p>
<p>The post <a href="https://www.genie.co.il/en/information-security-tips/">אבטחת מידע &#8211; טיפים למשתמש</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Information security - user tips<br />
</strong><a title="Cyber Security" href="https://www.genie.co.il/en/information-security/">Cyber Security</a> It is a wide world. Essentially, its purpose is one: protecting computer systems from risks that threaten them. In general, it includes physical security of the building where the computing systems are located, the security of the computing equipment (hardware) as well as the security of the software and the information stored therein. In various computer systems, whether they are public, in large organizations or even with private and home users, a lot of personal information is stored, sometimes sensitive and sometimes even secret and classified. This information, the violation of which could lead to serious damage - personal, economic or security - needs protection against the intrusion of unauthorized parties, the theft of parts of it or the introduction of harmful factors into it.</p>
<p>The main dangers arise from connecting the computer systems to the Internet (although even without the Internet, there are considerable dangers). Since today, the Internet has become the basis of the use of many computer systems, it is important to understand what to pay attention to and which parts to emphasize when preparing to protect the computer system:</p>
<p><strong>antivirus</strong> - Anti-virus software is the basis for protecting the computer against viruses and external pests. It is worthwhile and correct to use legal, paid (!!) and up-to-date antivirus software. In this way your computer will be protected at the most basic and essential level.</p>
<p><strong>&quot;fire wall&quot;</strong> - Fire Wall - is a name for a protection method that surrounds the computer network with a wall that filters out various programs and occasional applications that &quot;try&quot; to penetrate into the computer and settle in it. These programs may be a potential cause<br />
to serious damage, without you intending it.</p>
<p><strong>Updated operating system</strong> - The computer&#039;s operating systems (such as Microsoft or Linux) produce renewed versions and are updated every so often. They are not immune to loopholes and it is important to update the new versions, beyond the convenience and innovations they offer, also for reasons of security.</p>
<p><strong>Emails from an unknown source</strong> - Just as you don&#039;t open a door to a stranger, so do emails from an unknown source - you should not open them. Many scams use the e-mails of unsuspecting users and inject malicious material into your computer that can cause your computer to be hacked.</p>
<p><strong>&quot;gifts&quot; from strangers</strong> - You shouldn&#039;t accept them either. Tempting offers via e-mail to get a free iPad?! In many cases it is not a gift but the potential for the introduction of a harmful factor. The same is true in social networks - you should not be tempted by &quot;gifts&quot;.</p>
<p><strong>File sharing</strong> - File sharing programs may be hacked and make your computer, if you use them, hackable and permeable. Therefore, it is always recommended to avoid these programs or at least take into account that any information you have shared will reach the network and become public against your will.</p>
<p><strong>Passwords</strong> - Many cases of fraud occur as a result of hackers who did not break into the network at all but, simply, discovered your passwords as users of the bank&#039;s website, the National Insurance, etc. Therefore, you should create non-trivial user passwords (not the date of your birthday, for example). You should create &quot;strong&quot; passwords that combine letters and numbers randomly.</p>
<p><strong>Innocent toolbars</strong> - Do not be tempted to install any toolbar on your computer. Check carefully who is behind it. It is very possible that this is a factor that produces a loophole that takes personal information out of your computer.</p>
<p><strong>Understanding the dynamics</strong> - It is important to understand a basic idea: any information you upload to the net - will remain there forever!!. Many upload information to the net in order to save space on their personal computer, enjoy availability and convenience, and make it easier to share it with friends. You should carefully check the privacy settings of any service you use to upload your personal information to the public network. This information is no longer in your hands and under your sole control. He will be there forever and in front of everyone who wants him.</p>
<p><strong>if not i have</strong> – In the end, with all the firewalls and antivirus programs of all kinds, exercise discretion!! Make a fun but intelligent use of the Internet and always be aware of the dangers inherent in it.</p><p>The post <a href="https://www.genie.co.il/en/information-security-tips/">אבטחת מידע &#8211; טיפים למשתמש</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>טיפים להגנה על המחשב מפני האקרים</title>
		<link>https://www.genie.co.il/en/security-tips/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Sun, 06 Jan 2019 08:11:28 +0000</pubdate>
				<category><![CDATA[כתבות בנושא אבטחת מידע]]></category>
		<category><![CDATA[אבטחת מידע]]></category>
		<category><![CDATA[אנטי וירוס]]></category>
		<category><![CDATA[וירוס כופר]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8398</guid>

					<description><![CDATA[<p>כך תקטינו משמעותית את הסיכוי למתקפת האקרים על המחשב שלכם אף אחד מאיתנו אינו רוצה ליפול קורבן למתקפת האקרים על מחשבו האישי. להתקפה שכזו יכולות להיות השלכות רבות, החל מנטרול תפקוד המחשב, דרך חיטוט בתמונות ובמסמכים האישיים ועד לגניבת סיסמאות המובילות למידע רגיש באמת, כגון: כניסה למייל הפרטי, לחשבון האישי ברשתות חברתיות ופרטי חשבון הבנק [&#8230;]</p>
<p>The post <a href="https://www.genie.co.il/en/security-tips/">טיפים להגנה על המחשב מפני האקרים</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>This way you will significantly reduce the chance of a hacker attack on your computer</strong></p>
<p>None of us wants to fall victim to a hacker attack on our personal computer. Such an attack can have many consequences, from disabling the computer&#039;s function, through rummaging through personal photos and documents, to stealing passwords that lead to information<br />
Really sensitive, such as: entering the private email, the personal account in social networks and our bank account and credit card information. Unpleasant to say the least. However, in the days when, apart from the home computer, we walk around the house and outside with the smartphone and sometimes even with one tablet or another, we are exposed every moment to such an attack, and it seems that the appetite of hackers from Israel and abroad is growing over time.</p>
<p>So what can still be done to minimize the possibility that someone somewhere could break into our computer and steal valuable information from it? It turns out that there are quite a few actions and measures, most of them very simple by the way, that each of us can take, in order to defend against these risks.</p>
<p><strong>First and foremost - the operating system</strong>. Whether it is the operating system from Microsoft or Mac OS, it must be updated. Most of the updates for the operating systems are security updates designed to close discovered &quot;loopholes&quot; and therefore their installation is critical. It must be remembered that the operating systems are the platform for all the information on the computer and hence their great importance in its security. In addition to an up-to-date operating system, it is highly recommended to activate the &quot;firewall&quot; application built into the system in order to block unwanted communications with questionable parties on the network.</p>
<p>A wireless internet network at home, at work or in the shopping mall, definitely improves the surfing experience but can be a real danger if it is not properly protected. The home network must be secured with a strong password (we will expand on it later). This way you will not only prevent others from &quot;surfing&quot; on your account, but you will also prevent access to all the shared information on your home network. When you are out of the house, prefer surfing through secure networks, or alternatively, always remember that surfing on public networks that are open to everyone, increases the potential for stealing information from you many times over, be careful.</p>
<p>The importance of the strength of the login passwords for your email and social networks is critical. A password that is considered too easy to decipher, such as a sequence of ascending numbers, the word password, date of birth, etc., is like handing over all your personal information on a platter of money to anyone of any kind. Don&#039;t bother choosing the password. Try to make it as difficult as possible to identify it. It is desirable to have both letters and numbers in it, and it is highly recommended to change the password at least two to three times a year, and of course in any case where there is a suspicion of any attempt to break into your account.</p>
<p>Browsing social networking sites is similar in many ways to wandering in a large public place. Thus, when you are approached by a foreign party whom you do not know, it is advisable to behave with suspicion and not rush to give personal information about you, at least until you are completely sure of the purity of his intentions. This way you will also maintain your personal security, never confirm receipt and opening of a file sent from someone you do not know for sure. Any message sent to you by email or on social media from an unknown party requires your vigilance. Suspicion is not a bad word here, it is recommended to be careful.</p><p>The post <a href="https://www.genie.co.il/en/security-tips/">טיפים להגנה על המחשב מפני האקרים</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>הוירוס ההרסני ביותר בעולם</title>
		<link>https://www.genie.co.il/en/scary-virus/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Thu, 03 Jan 2019 09:37:08 +0000</pubdate>
				<category><![CDATA[כתבות בנושא אבטחת מידע]]></category>
		<category><![CDATA[אנטי וירוס]]></category>
		<category><![CDATA[שירותי מחשוב]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8321</guid>

					<description><![CDATA[<p>לפני מספר ימים קיבלתי מייל מוזר שמזהיר בתוקף מפני מייל שעשוי להגיע אלי עם וירוס שמוחבא בתוך גלויה חיננית, ואותו הוירוס אמור לשרוף לי את הכונן הקשיח. כמו כן, המייל אומר שחברת מייקרוסופט טוענת שזהו הוירוס ההרסני ביותר שנוצר אי פעם והתגלה ע&#34;י תוכנת האנטיוירוס המפורסמת מקאפי וגם מקאפי עדיין לא מצאו פיתרון. המייל הזה [&#8230;]</p>
<p>The post <a href="https://www.genie.co.il/en/scary-virus/">הוירוס ההרסני ביותר בעולם</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A few days ago I received a strange email that strongly warns against an email that may reach me with a virus that is hidden inside a graceful postcard, and that virus is supposed to burn my hard drive. Also, the email says that Microsoft claims that it is the most destructive virus ever created and was discovered by the famous anti-virus software McAfee and both McAfee still have not found a solution.</p>
<p>This email was sent to millions of people around the world and I guess a large number of you received the same email, and were just as scared as I was.</p>
<p><strong>So let&#039;s put things in order:<br />
</strong>If you receive an email that seems somewhat suspicious, it is recommended not to open it, many times these are viruses and other pests or an advertisement for Viagra/Cialis. I highly recommend using effective anti-spam solutions to avoid inconveniences.</p>
<p>Some of the viruses distributed via email (the example of the virus that attacked Facebook) may be sent by a friend or one of<br />
Your contact, so if you suspect - don&#039;t be ashamed to pick up the phone and make sure that the contact did indeed send the same email on purpose.</p>
<p><strong>And now let me get back to the weird email thing.<br />
</strong>After some research in the dark alleys of the Internet, I found out that this email that has been circulating on the net for a few weeks warns of a virus-bearing email with the title <strong>&quot;Postcard from Hallmark&quot;. </strong>Apparently, according to information written on quite a number of websites, it is a fictitious chain letter, an urban legend, and it is likely that none of you will actually receive the message that carries the most destructive virus ever, <strong>but</strong> And I emphasize <strong>but</strong>, if you receive this email do not risk opening it!</p>
<p><strong>So we learned 2 important things today:</strong></p>
<ul>
<li>Never, but never open a strange email that you didn&#039;t expect, it may contain malware that will harm your PC.</li>
<li>Chain letters are usually a scam, and always at the end of the letter will be written something like &quot;if you don&#039;t forward the letter then&quot;, which causes us to send the letter in absolute hysteria to our loved ones who will send them to their loved ones and everyone will spend a few minutes to understand what the hell they want from them.</li>
</ul>
<p><strong>And this is Wikipedia&#039;s definition of the term: chain letter<br />
</strong>A chain letter is a letter that includes a message asking the recipient to make several copies of the letter and pass them on to additional recipients. A chain letter can be considered a type of meme. Common methods used in chain letters include emotional manipulation through heartbreaking stories, get-rich-quick pyramid schemes, and exploiting superstitions to threaten the recipient with bad luck, violence, or even death if they dare to &quot;break the chain&quot; and not forward the letter.</p><p>The post <a href="https://www.genie.co.il/en/scary-virus/">הוירוס ההרסני ביותר בעולם</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>בדיקת חדירות וכלים חינמיים לאבטחת מידע</title>
		<link>https://www.genie.co.il/en/information-security-defend/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Sun, 30 Dec 2018 09:47:04 +0000</pubdate>
				<category><![CDATA[כתבות בנושא אבטחת מידע]]></category>
		<category><![CDATA[אבטחת מידע]]></category>
		<category><![CDATA[אנטי וירוס]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8236</guid>

					<description><![CDATA[<p>מה זה אבטחת מידע? אבטחת מידע פירושה הגנה על מערכות מחשב כנגד איומים וסיכונים שעלולים לפגוע בהן. כשמדברים על אבטחת מידע, הכוונה היא הן לאבטחה פיזית והן לאבטחה וירטואלית. כלומר שמירה על רכיבי המארז מצד אחד, ושמירה על המידע שנאגר במחשב מצד שני. תמיד נוכל למצוא את אותם אנשים אשר ממעיטים בחשיבות אבטחת המידע שלהם. לעיתים [&#8230;]</p>
<p>The post <a href="https://www.genie.co.il/en/information-security-defend/">בדיקת חדירות וכלים חינמיים לאבטחת מידע</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 style="text-align: justify;"><strong>What is information security?</strong></h2>
<p style="text-align: justify;">Information security means protecting computer systems against threats and risks that could harm them. When we talk about information security, we mean both physical security and virtual security. That is, keeping the components of the case on the one hand, and keeping the information stored on the computer on the other hand. We can always find those people who underestimate the importance of their information security. Often, at a later stage they will realize that they made a bitter mistake. After all, in the end, each of us has important information on the computer. Whether it is a database of large companies or a &quot;negligible&quot; password of one of your users. Although absolute security does not exist, it is recommended to use the options offered in order to protect what is important to us in the best way.</p>
<p style="text-align: justify;">The field of information security changes and develops at a meteoric pace, in a way that requires vigilance on the part of computer users. Therefore, and in order to make your life easy, we decided to present to you the leading free software in the field of information security.</p>
<h3 style="text-align: justify;"><strong>Recommended software for information security:</strong></h3>
<p style="text-align: justify;">There are a large number of computer protection software on the market, but some stand out above the rest. The scope of protection that the software provides differentiates one from the other. The following programs that we will review, offer the highest level of security, and at the same time they are free.</p>
<h3 style="text-align: justify;"><strong>Protection against viruses:</strong></h3>
<p style="text-align: justify;"><strong>Avast –</strong> A popular antivirus that has gained publicity due to the fact that it maintains high security standards, despite the fact that it is offered free to the general public.</p>
<p style="text-align: justify;">link: <a title="avast" href="http://www.avast.com/he-il/index" target="_blank" rel="nofollow noopener noreferrer">www.avast.com</a></p>
<p style="text-align: justify;"><strong>ClamWin –</strong> A famous antivirus that offers effective and safe protection for Windows and Linux. The software operates in an open source method, meaning that the source code of the software is open and accessible. This fact allows any developer to edit the software code and publish an updated version of it. This option helps the software to develop in an accelerated and efficient manner, so that if there is a new virus one of the developers can make a quick update immediately after discovering it.</p>
<p style="text-align: justify;">link: <a href="https://clamwin.com" target="_blank" rel="noopener">https://clamwin.com</a></p>
<h3 style="text-align: justify;"><strong>Protection against scammers:</strong></h3>
<p style="text-align: justify;"><strong>Ad-Aware –</strong> The famous software company, Lava-Soft, recently launched software that combines protection against spyware and protection against viruses, when they work side by side optimally. The software is offered free of charge to anyone interested in it. If you want to use an upgraded version of the software, which is more suitable for business customers, you can pay another small amount and have peace of mind, knowing that your computer is in good hands.</p>
<p style="text-align: justify;">link: <a href="http://www.lavasoft.com/" target="_blank" rel="nofollow noopener noreferrer">http://www.lavasoft.com</a></p>
<h3 style="text-align: justify;"><strong>Firewall software:</strong></h3>
<p style="text-align: justify;"><strong>Comodo Firewall –</strong> One of the most famous firewall programs in the world. The Comodo company offers a free version intended for the home user, alongside a paid version, which combines the company&#039;s high-quality antivirus and their famous firewall.</p>
<p style="text-align: justify;">link: <a href="https://personalfirewall.comodo.com/" target="_blank" rel="nofollow noopener noreferrer">https://personalfirewall.comodo.com/</a></p>
<p style="text-align: justify;"><strong>ZoneAlarm Firewall –</strong> The first firewall software in the world, which was developed by the team of programmers of the Israeli company Check Point. The software is used by millions of people and is a solid and stable foundation for those who want to protect their computer. The software is offered in a free version, alongside a paid version that offers more extended security.</p>
<p style="text-align: justify;">link: <a href="http://www.zonealarm.com/" target="_blank" rel="nofollow noopener noreferrer">http://www.zonealarm.com/</a></p>
<h3 style="text-align: justify;"><strong>Anonymous browsing:</strong></h3>
<p style="text-align: justify;"><strong>Tor –</strong> The anonymous Tor browser will help you maintain your privacy while surfing the Internet. The software uses a proxy, in such a way that you can remain anonymous while browsing. The software is open source and its security is regularly improved. You can download the browser for free through the official website.</p>
<p style="text-align: justify;">link: <a href="https://www.torproject.org/" target="_blank" rel="nofollow noopener noreferrer">https://www.torproject.org/</a></p>
<h3 style="text-align: justify;"><strong>Browsers for surfing the Internet:</strong></h3>
<p style="text-align: justify;"><strong>Chrome –</strong> Google&#039;s free browser is designed in a minimalist way and offers fast and safe browsing. Today it is the most popular browser in the world.</p>
<p style="text-align: justify;">link: <a href="http://www.google.com/chrome/" target="_blank" rel="nofollow noopener noreferrer">http://www.google.com/chrome/</a></p>
<p style="text-align: justify;"><strong>Firefox –</strong> A secure and convenient browser that is offered for free use.</p>
<p style="text-align: justify;">link: <a href="https://www.mozilla.org/he/firefox/new/" target="_blank" rel="nofollow noopener noreferrer">https://www.mozilla.org/he/firefox/new/</a></p><p>The post <a href="https://www.genie.co.il/en/information-security-defend/">בדיקת חדירות וכלים חינמיים לאבטחת מידע</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>