Showing posts with label Internet security. Show all posts
Showing posts with label Internet security. Show all posts

Thursday, May 15, 2014

Advice to die-hard Windows XP users: Dump Internet Explorer

If you are still using Windows XP on your computer, you are now highly vulnerable to cyber attacks as Microsoft has stopped supporting this operating system effective last month.

Well, you can reduce that risk by more than half, according to security experts, by ditching Internet Explorer (IE) and use other browsers such as Firefox, Chrome, Opera, etc. Of course Microsoft disagree, but that's another matter.


Microsoft's support of Windows XP has ended on April 8, 2014 and there would be no more patches for security loopholes for this operating system.


Dump the Internet Explorer?

This seems to be the consensus if Computerworld is to be believed.

"By switching to a non-Microsoft browser, Windows XP users can halve the number of vulnerabilities that apply to the OS, according to a survey of flaws Microsoft fixed in the second half of 2013. 
The statistics support the advice from security professionals, who have recommended users run a rival browser to avoid some of the attacks aimed at their unprotected PCs. 
Microsoft stopped sending patches to Windows XP PCs last month. The ban also applies to any version of IE that runs on the aged operating system. But a tally of Windows and IE vulnerabilities patched from July to December 2013 shows that the browser poses a greater security risk to XP bitter-enders than does the OS itself. - CWM"

The article is elaborated further at Computerworld Magazine here. Take a look.


TheGreenMechanics: I currently have Mozilla Firefox, Google Chrome and Microsoft Internet Explorer installed in my machine and I seldom use IE alone.

Thursday, March 20, 2014

Who can see your IP adress and what you can do about it

All Internet communications require Internet Protocol (IP) addresses. If a website you visit couldn't see your IP address, it would have no way to send you pages, images, files, and so on.


It's nothing personal, it's just location. Image source


To see how easily a site can see your IP address, visit What is my IP Address. Or just Google what's my ip address. It's easier to get than your telephone number.


It's not as scary as it sounds?

Who can see your IP address and how serious a problem that is? Assuming you're using a router, those web sites can only see the router's IP address, not your PC's. They can't tell who in the house is visiting them - which is just a small comfort - but this also protects you from certain drive-by malware attacks.

What can website administrators find out about you from your router's IP address? They can identify your Internet Service Provider (ISP) and figure out approximately where you're located. They will likely be able to identify your neighborhood, but not your home. And they can see how often you (or someone else sharing your router) visit their website.

But they won't be able to see that forever. Chances are your IP address is not a permanent fixture. Most home Internet accounts use a dynamic IP address, which your ISP changes from time to time.

And, of course, if you take your laptop to a coffee house or library, you'll have an entirely different IP address there, although you now have to consider public network security issues.

If you're still worried, you can use a Virtual Private Network (VPN). Once you've set one up, your Internet connections travel encrypted from your computer to the VPN server, and from there, unencrypted, to their final destination. The sites you visit see only the VPN's IP address.


TheGreenMechanics: You can also use VPN to view websites blocked in the particular country you are surfing the interned from. For example, if you travel to Shanghai, China where blogger.com gets blocked from time to time, you may want to consider VPN.


Note: This article was published by Computerworld Malaysia on Mar 18, 2014. Source Link

Monday, February 17, 2014

6 tips for smartphone privacy and security

You own a smartphone, or perhaps two.

Do you know that our smartphones track wherever we go, what we say, who we say it to, our likes and dislikes, and when we are playing games instead of working? And that our computers track and record the same types of information day in and day out?




There is a long literature written by R.Kaplan in the Computerworld, a link which I have provided at the end of this article. You can scroll right down if you are interested, but if you are more for tips then these are the 6 that was recommended:

Note: I found Iip no.2 to be particularly useful but it'd cost more. How about Item no.6? I think many people enjoy doing them. I see that all the time on Facebook - "Currently enjoying dinner at...", etc.


1. Make sure you continually ask yourself when using mobile devices

Ask yourself, "Do I care if anyone knows this?" where "this" means where you are, what's in the photos, what I am searching for on Google, that I am watching a movie, that I am telling a joke, or a host of other information you are producing.


2. Isolate your professional life from your personal life

While it is clearly more convenient for you to use a single device for dual purposes, realize that if you maintain the integrity of your devices you will be able to shield irrelevant and personal information from business interrogations.

While this is not ideal, it is light years better that being questioned about the homophobic, sexist, or racist joke you sent to your brother last year.


3. Keep some privileged or confidential information on your devices

While this will not likely keep your devices free from prying eyes, it will necessitate the need to implement more costly procedures in the examination of your devices which protect the integrity and character of your information.


4. Control the number and location of backups

The existence and locations of backup media can often be discovered in an examination of a device. If these backups are discovered by a competent examiner, you will be forced to produce them.


5. Don't try to fool the professionals by hiding or deleting information

Be aware that the courts have tools for punishing those who get caught. Since you likely have little idea of the operating characteristics of all the applications and the operating system running on your device, you are not capable of discreetly eliminating data from your device.


6. Quit posting everything you do on social networking sites

Twitter, Facebook, Instagram, Foursquare and the like are fun, but can prove dangerous to your privacy. If you do post information on social networking sites make certain you use the privacy settings so that you can limit who has access to your information on an ongoing basis and so you can demonstrate your desire for privacy to a court if it orders your information production.

At least don't use your common identity (your first and last name) to catalogue your information.



This was written by Ronald Kaplan for Computerworld and if you would like to read more, you can hop to this link.

Tuesday, February 11, 2014

This smartphone will self-destruct in 5 seconds

In future there is a suggestion that all phones come with a “kill switch”, which would render the phone unusable if it was stolen.

It was proposed by a senator in California and if passed it will become a law that would make it mandatory for smartphone manufacturers to include theft protection security on each phone.


This should concern everyone.


The proposers claimed it will shut down the market for stolen devices.

Problem is, this would also provide opportunity for hackers and criminals to "kill" and disable your phone, and it would still have the same effect of losing your phone.


That is for the general consumers. How about sensitive (national security) issues?

IBM is said to be working on electronics for the U.S. military that will self-destruct on command to ensure that powerful devices holding critical data stay out of the hands of the enemy.

DARPA (Defense Advanced Research Projects Agency), the U.S. military's research arm, awarded a $3.4 million contract for its "Vanishing Programmable Resources" program to IBM on Jan. 31.

"Sophisticated electronics can be made at low cost and are increasingly pervasive throughout the battlefield. However, it is nearly impossible to track and recover every device resulting in unintended accumulation in the environment and potential unauthorized use and compromise of intellectual property and technological advantage." - DARPA on its website.

DARPA said on its website that it's looking for devices, such as sensors, radios and phones, that work as well as off-the-shelf commercial options but can be remotely triggered to break apart.

IBM has been tasked with developing materials, components and manufacturing capabilities. The company, according to DARPA, is working on a "strained glass substrate" that will shatter. A trigger, such as a fuse, will be used in at least one, if not multiple, areas on the device.

The trigger would be set off by a radio-frequency signal.


Source: Computerworld Malaysia