Tagged: security Toggle Comment Threads | Keyboard Shortcuts

  • Geebo 10:02 am on August 17, 2016 Permalink | Reply
    Tags: , , , security   

    New ransomware knows you by name and address 

    New ransomware knows you by name and address

    Ransomware is a nasty bit of malware that can lock you out of your computer or network and will hold your files ransom until you pay a bad actor to release them. One of the more infamous ransomware incidents involved a hospital in Kansas that paid the ransom in order to regain access to their patients’ records. One of the main ways ransomware infects a computer network is when a user either opens a strange email attachment or goes to an infected website.

    Now the BBC is reporting a new type of ransomware that tricks you into infecting your computer with your own name and address. In this case the scammers will send you an email that appears to be a large bill that you owe. Normally scam emails like this are generic in their presentation however this new type of attack makes the email look more official by having your name and address listed. Like any other phishing email, it tries to trick you into clicking on to an infected website. Once your computer or network is infected and your locked out from your files, the ransowmware will not only detail instructions on how to pay the ransom with Bitcoin, but it will also give you a timer that shows you how much the ransom increases the longer you wait. There has been no word yet how the attackers have been able to match up the names and addresses to the email addresses. While the malware has only been reported so far in the UK, it’s probably only a matter of time before it shows up in the US.

    The best protection against ransomware is to not click on unknown email attachments or strange websites these emails ask you to click on. It also helps to make multiple back ups of all your important files. According to Wired, if you do become infected, disconnect any infected computer from the network and try to use anti-malwarwe tools to remove the infection from the computer. They recommend only paying the ransom as a last resort as paying the ransom only propagates the attacks.

     
  • Geebo 10:02 am on August 9, 2016 Permalink | Reply
    Tags: , security, thermostat   

    Hackers Hijack Heater and Hold it Hostage 

    Hackers Hijack Heater and Hold it Hostage

    Have you thought about purchasing a smart thermostat that you can control from your smart phone or do you already have one? You may want to rethink that purchase after what a couple of security experts were able to do to one recently. At the security conference known as DefCon two security experts were able to remotely hijack one of these smart thermostats and crank the temperature up to 99F. In theory a malicious actor could hold your thermostat hostage until you pay them money to have them release control, much like any other ransomware that could infect your computer.

    This is the second bit of bad news for the smart thermostat market in so many months.This past winter, the leading brand of smart thermostats failed after a buggy firmware update left many houses dangerously cold.

    Your best bet in either of these situations is to just get an old school thermostat from your local hardware store that you should be able to hook up in minutes. Sometimes the most secure solutions are the most simple ones.

     
  • Geebo 10:45 am on August 3, 2016 Permalink | Reply
    Tags: , security   

    Changing your password frequently might actually be less secure 

    Changing your password frequently might actually be less secure

    Ever since there have been computers in offices we’ve always been told to change our passwords on a regular basis. usually 60 days. This was done in the name of security. We were told that this practice will keep out the bad guys. It’s been this way for decades and the practice has been treated as gospel however, it may just be superstition.

    Carnegie Mellon University professor Lorrie Cranor, who is also chief technologist at the Federal Trade Commission, says that requiring employees to change their password every 60 days makes systems even more vulnerable. Research indicates that people who are made to frequently change their passwords only change them in incremental amounts. If a bad actor was able to come into possession of someone’s old passwords, they may be able to determine the current password due to the patterns in the old passwords.

    A password like “tarheels#1”, for instance (excluding the quotation marks) frequently became “tArheels#1” after the first change, “taRheels#1” on the second change and so on. Or it might be changed to “tarheels#11” on the first change and “tarheels#111” on the second. Another common technique was to substitute a digit to make it “tarheels#2”, “tarheels#3”, and so on.

    This can also lead to people writing down their passwords on post-it notes that are stuck under their keyboards.

    Instead of passwords companies may want to look to biometrics, such as fingerprint readers, to secure their systems. While it’s not completely unhackable it is exponentially more secure than passwords.

     
  • Geebo 10:12 am on June 29, 2016 Permalink | Reply
    Tags: , security, selling   

    Don’t make this mistake when selling your computer 

    Don't make this mistake when selling your computer

    So you’ve decided to sell your computer or laptop online. Before you post that ad online you want to make sure of one thing. You want to make sure that none of your personal information is left on the hard drive. Now you may think you have just because you deleted all your personal files. Unfortunately, that doesn’t actually delete the files, it moves the file to a section of the computer’s hard drive where it waits to be replaced by some new data. If your old computer were to fall into the wrong hands after the sale, your personal information could be compromised.

    What you should do before selling your computer online is to first backup all your data. You can backup your data to either USB thumb drives, an external hard drive or a cloud based backup service. Then you need to reformat your hard drive. How to do that depends on what kind of operating system (Windows or Mac) that your computer uses. There are several utilities and resources available online that will help in either reformatting your hard drive or permanently deleting the previously deleted files on your computer.

    It may be a difficult chore in reformatting your hard drive before selling your computer but a few minutes of difficulty can prevent a lifetime of headaches.

     
  • Geebo 10:00 am on June 28, 2016 Permalink | Reply
    Tags: security,   

    Are your online accounts secure enough? 

    Are your online accounts secure enough?

    What are your most important online accounts? Probably your bank, your email and your social network of choice in that order. Now you may have those accounts protected with a strong password, but is that enough? You may have a password that contains alphanumeric characters both upper and lowercase among non-alphanumeric characters and that is 12 characters long. That’s all well and good but it’s not perfect. Having your accounts protected by a strong password is only one layer of protection but it is also one level of failure.

    Most online services today offer a feature that’s known as two factor authentication. When you activate two factor authentication your username and password is only one step to logging into your account. The second part to the authentication, in most cases, is that the service you’re trying to access sends you a personal one-time code, usually through a text message. That means that if you activate two factor authentication, if someone were to ascertain your username and password they still wouldn’t be able to access your account without having your cell phone.

    While two factor authentication isn’t perfect it can go a long way in keeping your online life secure.

     
  • Geebo 10:31 am on May 31, 2016 Permalink | Reply
    Tags: , , MySpace, security   

    The MySpace hack could cost you 

    The MySpace hack could cost you

    Do you remember MySpace? You know, the sparkly animated background plagued social network of the mid 2000s. Admit it, you had one but you abandoned it after the advent of Facebook. Recently it was made public that the former king of the social networking world had been hacked and hundreds of millions of usernames, email addresses and passwords have been compromised.

    So what does this mean to you? Well, that depends. Are you still using the same password that you were using with MySpace? If you use the same password on multiple websites or apps you are in danger of having all your information compromised. Internet security experts often say that you should use different passwords for all your different accounts and to aid in doing so you should use a password manager like Lastpass or KeePass to keep them all straight and passwords should be changed routinely.

    Even if you’ve abandoned your MySpace account and haven’t logged into it in years there still could be personal information attached to the account that could potentially lead to identity theft. If you no longer use a service you’re better off deleting the account than letting it sit out there as a potential target for identity thieves.

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel