About Over 50 Articles Library
Content: Services - Computer
Computer Security No 58: Eleven steps to improve your privacy
Corporate - Private Computer Security
Eleven steps to improve your privacy
Heimdalsecurity recommends a few steps to achieve this:
1. Strong passwords - that includes two-factor authentication, never use the same password for two accounts or sites; use sentences
2. Stay safe from spyware - A few security solutions that can remove spyware from your system are Malwarebytes, Spybot Search and Destroy, Lavasoft's Ad-Aware, etc.
3. Keep all your systems patched and up-to-date - WannaCry exploited unpatched and unsupported systems
4. Don't use an admin account for day to day work
5. Don not turn off UAC (User Account Control) as it monitors what changes happen in the system and asks for your permission for these changes. It will also give you heads up when an important event takes place, such as installing or removing an application.
6. Use a secure browser - Bitdefender’s Safepay, Comodo‘s Dragon Internet Browser or the Epic Privacy Browser.
7. Don not trust public and free Wi-fi networks
8. Check the links before you click - hover the mouse and see in the left hand side bottom corner what it points to
9. Log out when you finished work - to avoid authentication credentials (or cookies) from being stored in the browser, try solutions such as Disconnect.me or uBlock
10. Don not post private information on social networks
To read the entire article: https://heimdalsecurity.com/blog/online-privacy-essential-guide/
(source: heimdalsecurity; image source: andpop.com)
French police seize 6 Tor (onion) relay servers in WannaCry investigation
"On 15th May, a French hacktivist, who uses the online moniker 'Aeris,' informed the Tor community that the official from Central Office for Combating Crime Related to Information and Communication Technologies (OCLCTIC) raided the Online.net hosting provider and have seized his "Kitten1" and "kitten2" (torguard and fallback directory) servers on 14th May.
Aeris also claimed that the French authorities had taken this action after a victim company (possibly Renault) contacted the agency for help and provided network traffic logs to assist the investigation."
Tor nodes protect the privacy of Tor users and no actual data had been retained on them, so the law enforcement authorities would hardly find any evidence related to the WannaCry gang.
(source:hackernews, hacked.press; image source: pinterest)
1. Xavier - malware discovered by Trend Micro researchers affecting over 800 Android apps. Features:
Evades Detection: it escapes from being analyzed, from both static and dynamic malware analysis, by checking if it is being running in a controlled environment (Emulator), and using data and communication encryptions.
Remote Code Execution: designed to download codes from a remote Command & Control (C&C) server, allowing hackers to remotely execute any malicious code on the targeted device.
Info-Stealing Module: is configured to steal devices and user related information, which includes user’ email address, Device id, model, OS version, country, manufacturer, sim card operator, resolution, and Installed apps.
"Trend Micro recommends using their multilayered mobile security solutions such as Trend Micro™ Mobile Security for Android™, which is also available on Google Play."
2. Dvmap (first Android malware with code injection) - discovered by Kaspersky Labs in June - in Colourblock a free puzzle app; it was downloaded 50,000 times before Google removed it.
"To bypass Google Play Store security checks, the malware creators used a very interesting method: they uploaded a clean app to the store at the end of March, 2017, and would then update it with a malicious version for short period of time. Usually they would upload a clean version back on Google Play the very same day. They did this at least 5 times between 18 April and 15 May."
(sources: Trend Micro; Kaspersky Labs; image source: Android Sage)
Patch Tuesday from Microsoft
Microsoft released June's Patch Tuesday, a collection of patches for 96 security vulnerabilities across its products.
The patch release also includes emergency patches for unsupported versions of Windows platform the company no longer officially supports to fix three Windows hacking exploits leaked by the Shadow Brokers in the April's data dump of NSA hacking arsenal.
The June 2017 Patch Tuesday brings patches for several remote code execution flaws in Windows, Office, and Edge, which could be exploited remotely by hackers to take complete control over vulnerable machines with little or no interaction from the user.
It is important that you ensure your computer is patched.
(source: microsoft; image source: ziggy and friends)
Cyber Security training and governance reviews:
* Cyber Security & Privacy suite for Directors and Officers.
15% discount offered if booked before 30/06/17
Send your enquiries to firstname.lastname@example.org
* ABG and Conscious Governance joint service offer: Cybersecurity Governance Systems Review
to find out more visit:- http://consciousgovernance.com/cybersecurity-governance-systems-review
Memories of jokes
Moderated by Monica Schlesinger: www.advisoryboardsgroup.com.au
© About Over 50s 2017 website by aml websites online