Pages

Virus Removal Steps For Securing PC

Internet and local networks are breeding grounds for various malware programs; the latter are designed to corrupt your files and use confidential information for malicious purposes. There could also be a great loss if your personal data, which is available on various sites, falls into the wrong hands. A virus is a type of malware that is spread through a network or a data transfer device. Hence, it is mandatory to secure your PC from virus attacks. There are various effects of a virus on your PC:

1. Your data is corrupted and cannot be read

2. You will be unable to install antivirus and other security applications

3. You receive annoying pop-ups, sometimes, even without an internet connection

4. Antivirus will detect viruses but is unable to remove them

5. Unknown Websites automatically open

6. You receive popups in your browser

7. Your computer becomes terribly slow

8. Computer shuts down or restarts automatically

Overall, the performance of your PC degrades. If you are also facing these problems, virus removal support is available online to help you detect and remove infections from your computer. Viruses can be removed from a system in various ways. One such technique using a tool called Auto runs, designed to work on a Windows Operating System, is discussed in this article. It is a flexible tool and occupies small space. Advanced users can follow the steps below to identify and remove virus programs.

1. Download and extract the Auto runs tool

2. Reboot your computer in Safe Mode. This is a mode used to perform diagnostic and administrative tasks on installations. In this mode, only limited software required for operating system's functionality are loaded. Safe Mode is available on every version of a Windows OS and can be used to your advantage, as malware remain inactive in this mode. If you are not able to operate your PC in Safe Mode, you can avail of virus removal help from experts.

3. Search the Auto runs program and open auto runs.exe file.

4. As the program starts, select Options Menu and enablethe listed options

· 'Include Empty Locations'

· 'Hide Signed Microsoft Entries'

· 'Verify Code Signature'

5. Press F5 key to refresh start-up list with these changes.

6. You will get eight different tabs which contain information on start-up entries. Any suspicious processes will be listed under 'Services' or 'Logon'. Multiple entries might be found as viruses tend to replicate. Remove all such files after consulting the Startup Database site for confirmation. This removes malicious entries from the Registry. If you are not able to distinguish which files you need to remove, contact a trusted virus removal support provider.

7. Select "Show Hidden Files" if you are unable to get those files. After following these steps, if your PC is not working efficiently, you can take virus removal online services. When all malicious entries are removed from the Registry, reboot your system in the normal mode. Your PC is now safe from malware.

By following these simple steps, you will be able to remove viruses from your PC. However, tampering with Registry files could cause system errors, if you accidentally delete legitimate entries. So, your safest best is to take a trusted, online virus removal service.

Frank Martine is working as a Technical Content Writer with SupportMart, a 24x7 available technical support company. We offer brand-independent online technical support for computers, its Operating systems & software. For get more information about Virus Removal Support and Virus Removal Help Call us at 1-855-888-9114 or visit http://www.antivirus.supportmart.net/.


View the original article here

How Has Online Security Developed?

Thankfully, the majority of internet users are now far more clued up when it comes to protecting themselves against virus-spreading techniques such as these. Nowadays the email would be regarded as the most basic of phishing scams and even those who were fooled would probably be warned against opening the attachment by their anti-virus software.

However, it would appear that there is still a lot more that businesses could and should be doing to protect themselves against the actions of cyber-criminals.

The recent hacks of huge firms like Sony, Citibank and MI6 have proved that cyber-criminals are becoming more intelligent.

Malware

The ILOVEYOU email virus was the first high-profile example of a financially-motivated attack on computers.

However, there are now thousands of organised cyber-crime groups across the world hoping to make a profit by infiltrating computer networks and installing malware on vulnerable websites.

For this reason, it has become essential for business websites to protect themselves against the threat of being hacked.

Those who employ the services of specialist web hosting companies should hopefully be offered an array of services with their data centre package to help them do just that.

A lot of high-quality web hosts will offer to complete frequent vulnerability scans of a website to ensure that there is no way for a hacker to access it. Others will manage and monitor a website's firewall to make sure for certain that no malicious activity takes place within their domain.

Using intrusion detection software, a number of web hosting companies will even be able to put an end to any malicious activities which do occur in record time.

Phishing

Phishing scams have only got more complex since ILOVEYOU rocked the world back in 2000 and this has led to web users being a lot more cautious about which websites they give their personal details to.

It is generally recommended to only disclose personal information on websites with secure connections, meaning that it is now crucial for all e-commerce websites to obtain an SSL certificate. This certificate confirms to customers to an online business is genuine and any web host worth its salt should be able to provide its customers with one.

Distributed Denial of Service

Distributed Denial of Service (DDoS) attacks can also create headaches for e-commerce business owners by restricting public access to a website and potentially costing a firm huge amounts in lost revenue.

DDoS attacks have certainly become more prominent since the turn of the century and are often the weapon of choice for the growing amount of politically-motivated hacktivists surfacing on the web.

The Serious Organised Crime Agency, the UK Home Office, and the CIA are amongst the companies that have been foiled by DDoS attacks in recent times but businesses can help protect themselves using the DDoS shield software that some web hosts provide for their customers.

The online world might be better prepared for the threat of cyber-crime, but there are still plenty of businesses could be doing to protect their business from becoming a victim of internet hackers.

Thankfully, many are utilising the security services of high-quality web hosts in order to make the internet a safer place.

PEER 1 Hosting operates 18 state-of-the art data centres in 13 cities across North America and Europe, and 22 network points of presence (PoPs) to suit your needs in Managed Hosting, Colocation and Cloud Hosting. The highly secure, redundant IT infrastructure of our data centres protect your servers and web presence, and ensures you are running online, all of the time.
Check all the information about those secure data centres at http://www.peer1hosting.co.uk/infrastructure/data-centres


View the original article here

Data Security Requires Network Security

"Data is you're most important asset". I am sure you have heard this dictum. It might even be considered a cliche. Well, something usually becomes a cliche when it is true.

That's why you and your organization have gone to great pains to protect its mission critical data, the data you store about customers, sales, products, production and employees. You log it, back it up, and replicate it. You store backups off site and have redundant systems.

You make sure that users are authenticated and only have appropriate rights and privileges. You create views for applications and classes of users to ensure that they view only the data that is appropriate. You have done everything possible and can sleep at night.

Be careful, you might just have missed the obvious. Here is another cliche to think about "You are only as secure as your network". Obvious? Perhaps. But it is clear that many either miss the obvious or are making bad choices about it.

Each year, Verizon issues the Data Breach Investigations Report (DBIR). The report is based on data provided by the US Secret Service and security agencies in the Netherlands, England and Australia. For 2011, they identified 855 incidents worldwide compromising 174 million records. In the eight years that they have been producing the report they have identified over 2000 incidents with over 1 billion records at risk.

Keep in mind that these are only the incidents that these agencies have discovered and the actual number incidents are surely exponentially higher.

What is important about the DBIR is what is says about the incidents uncovered. 98% of breaches were from external agents, 81% of incidents involved a form of hacking and 69% incorporated malware. On the other hand, only 5% of incidents were the result of privilege abuse.

While I would not minimize the threat from within, nefarious activities from employees can be serious; clearly there is a huge external menace. Worse, only 8% of incidents are discovered internally. It usually takes a third party for you to learn that you have been compromised. This leads to the suspicion that there are many breaches that occur and are never identified!

Now, here's the part that should give you pause. According to the DBIR 96% of breaches were not highly difficult and 97% were avoidable through simple or intermediate controls. For victims subject to the Payment Card Industry Data Security Standard (PCI DSS), 97% had not achieved compliance. The PCI DSS is intended to protect cardholder data for debit, credit, prepaid, e-purse, ATM, and Point of Sale (POS) cards.

Shockingly, only 29% of PCI DSS covered organizations have implemented a firewall to protect their data! I know what you're saying; we must be talking about mom and pop shops. In large part, yes. But the report separates out large organizations and found that only 71% have firewalls. When you consider that the impact of a breach to a large organization can be huge, it is shocking that 29% do not have firewalls to protect the PCI sites.

When it comes to being compliant by having antivirus protection the large organizations are somewhat better at 86% compliant, but for all organizations the compliance is even worse at 23%! Put another way, 14% of large and 77% of all PCI DSS covered organizations do not implement virus scanning.

When you do not protect yourself you endanger everyone you come into contact with. Based on these figures, I'd say there are a lot potential "Typhoid Marys" out there!

Let's consider a few of the common hacking threats that you need protection from:

SQL Injection: This is an attack on a database using a website's input form. An SQL Statement that produces undesired results is appended to a fields input.

For example, a typical login script sets variable values equal to input posted for a user id and a password and then appends them to a select statement. The statement is executed to check if a record with that combination of values exists.

Suppose the value posted for userid is "ui" and the password value is "pw;drop table users"

The statement would execute as follows:

Select * from users where userid="ui" and password= pw;drop table users"

The system would execute 2 separate statements. First the select lookup and then the statement dropping the user table. Ouch!

Guessable Credentials: Large organizations have standard procedures that require changing default user and passwords, but this is one of the top breaches for small organizations.

For example, the default user for MySQL Server is root with no password.

If you do not add a password after installation you will be vulnerable.

Even if you do, make sure that you use a "strong password" with combinations of letters, numbers, case and special characters. Too often, people use a guessable password such as the current month or even the word "password" itself.

Keylogger: There are a variety of malware programs that can record the keystrokes typed by a user at a web site or using their computer. They particular target obtaining user id's and passwords, but they can capture any data being input

Brute Force and Dictionary Attacks: Brute Force is a technique used against encrypted data where you attempt to exhaust all possibilities until you find the correct one. A Dictionary Attack is similar, but you work off of a list of likely prospects. For example a list of common passwords, such as "password", months, years, etc.

Backdoors: A backdoor is a way of bypassing the normal authentication process. Hackers take advantage of the fact that computer makers and application developers often create backdoors during development and neglect to remove them when they go into production. Malware can identify backdoors and even create new ones that can be used later.

Keep in mind that even if you are using a firewall and antivirus you may still be vulnerable. The problem with most antivirus protection is that they only address viruses and exploits that have been identified and added to a "blacklist" of known viruses.

Not bad, except there are approximately 50,000 new viruses and system exploits unleashed EVERY DAY! They will eventually update their blacklist for a specific issue, but you are always playing catch-up.

I prefer protection that uses a "whitelist" concept and sandbox. With this technique, program files are compared to a list of valid files and only allowed to run in your system if they are on the list. If the scanner has any suspicions about a program, it is run in an isolated system area called a sandbox where the scanner can determine if it is OK or should be deleted.

If you operate a web site that handles sensitive information, such as an e-commerce site, it is critical that you use the Secured Socket Layer (SSL) and SSL Certificates. SSL provides a secure, encrypted connection between the web site and the browser. SSL Certificates authenticate your web site for the user, ensuring that your users will have confidence in your site.

There are a variety of SSL Certificates that can be purchased at a low cost.

An "Extended Validation" (EV) SSL Certificate provides the highest level of authentication.A Wildcard SSL can save money for web operators that have sub domains. One wildcard SSL can be purchased that will cover a site and all its sub sites. For example, you can apply one wildcard SSL that covers both judgeco.com and sports.judgeco.comUnified Communications (UC) SSL Certificate can be applied to multiple domains and host names. A single UC SSL certificate can be used for a primary domain and up to 99 alternate names. They are very popular for use with Microsoft Exchange and Microsoft Live servers.

As the DBIR indicates, the threats to your data are great but there are simple and cost effective solutions. Never go without a firewall and antivirus protection. Make sure your web site is protected with SSL and SSL Certificates.


View the original article here

About the Browser Redirect Virus and Its Removal

The Browser Redirect Virus is one of the most common virus found on the internet today. It has infected millions of computers globally. This horrible little virus infiltrates your Windows settings and redirects your search results in Google, Yahoo and Bing. It is imperative that you remove this menace as quickly as possible before it has a chance to introduce your computer to any further malicious code. Permanent removal of the browser virus is the only way to guarantee your computers security.

Standard antivirus programs are not designed to look in the right places to locate the browser virus. The reformatting of your main hard drive as well as the other hard drives connected to your system will not produce permanent results. Removal is best achieved by a program specifically designed to find and remove the virus. Your standard anti-virus and security software has little chance of locating and removing the virus. An approach using specific techniques and tools is best to permanently remove the redirect virus.

The browser virus has a sophisticated design. Although the virus is complex, its goals are simple and direct. Or to "redirect" in this case. As you use Google, Yahoo or Bing to search topics, your results might look fine, but when you click on the link you are redirected to an unrelated site. Often the sole intention is to redirect you to ad pages for products and services the hackers want you to buy. Unfortunately there is often a more sinister motive. Often you are redirected to sites that contain malicious code with the intent of installing spyware onto your computer. This is very serious and the very security of your personal information is then at risk.

You might be wondering how did I get this virus. Well, in most cases it is introduced to your PC through email as an attachment, sometimes via an infected plugin or download. Because the virus disguises its self as a file that should be on your computer, it can be very difficult to remove and linger for a long time.

The permanent removal of this virus is crucial to your computer and can only be achieved using the correct tool and technique. The redirect virus effects several components of your computer. Be very cautious if you are planning to remove the virus yourself. You should have a strong working knowledge of your computer system if you plan to go the DIY route. There is no lack of free information available on the web from self proclaiming experts telling you how to remove the redirect virus. I have looked through many of these and there are always steps and components missing from the solution. Without a guarantee or support, you are left out in the cold if something goes wrong. If you are familiar at all with computers you know things go wrong all the time.

I would like to recommend a program that has a 100% Guarantee of success or your money back. The Fix Redirect Virus program was designed specifically to find and remove the browser virus permanently Guaranteed. The program was designed by an experienced computer technician who also was effected by the browser virus. He was very motivated to find a working solution to this huge problem and has done so. 100% Guaranteed!

For more information about this guaranteed permanent removal program and how I came across it. Go to http://redirectvirus.co/ and read my redirect virus tale of horror.

Best of Luck, Bill


View the original article here

SSL Certificates: Free Can Be Costly

If you operate a web site that exchanges personal information with the site users, such as an e-Commerce site, you probably know that you should be using the Secured Socket Layer (SSL). SSL enables a secured, encrypted, connection between your web server and the user's browser. This requires that you obtain an SSL Certificate.

But there are a lot of SSL Certificate providers with a variety of choices. Certificate providers charge varying prices per year for different products. If you have multiple web sites the costs can add up.

However, there are free Certificates available. They provide a secure, encrypted connection just like other SSL Certificates. So, why should you pay when you can use a free certificate?

Good question!

All things being equal, free is my favorite price range!

It's very tempting to choose the free "self-signed" Certificates and it might well be all you need. On the other hand, we all know about what happens when you are penny wise!

When a user connects to an SSL site a message is sent with the certificate information required to setup the secured connection. It must include the name of the certificate "signer" which is either:

the creator of the certificate (self-signed) ora third party called a Certificate Authority.

A Certificate Authority provides assurances that the site the user thinks they are connecting to is in fact that site. There are scams where hackers trick users into thinking they are connected to one site and they are actually communicating with another. Users may provide personal and financial information to criminals engaged in fraud. Self-signed certificates leave your users vulnerable to these predators.

Because of this, most browsers will display a warning message that the site may be unsecure. The user can bypass the message, but it does not leave the user with a warm and fuzzy feeling about the site. And the message is correct. If your web site has been hacked by a scammer your users are in peril if they proceed.

So, when should you use self-signed certificates?

I would only use them on internal web site, intranet sites. For example, if you have labs that are testing sites that require SSL you can save some money by using self-signed certificates.

I would never use a self-signed certificate on the internet, "customer facing" as we say. The risk is just not worth it and you risk alienating your users. If you are a commercial site servicing customers, that free certificate could end up being very expensive.

Compare SSL certificates offered by the Certificate Authorities for one that is most appropriate for your site and choose carefully. The costs and features vary widely and you need to consider your needs. If you have multiple domains and sub sites there are certificates that will help you reduce costs. Depending on how secure you need your site certificates will offer different levels of assurances.


View the original article here

Should You Take Free Promotional USB Thumb Drives From Trade Shows? I Wouldn't

Did you know one of the tricks that hackers often use is to drop USB thumb drives in a parking lot outside of the Corporation and make it look like it just fell out of someone's purse, out of their pocket, or off their key chain? What invariably happens is that if they leave 10 of these in the parking lot, three of them will be used on a computer device because the individuals who found them are interested in seeing what is on them (curiosity killed the cat syndrome), or they wish to use them for moving their own data, or storing it for later, a free USB drive from heaven?

Thus, if you put 20 USB thumb drive devices in the parking lot, and 10 of them are found without being run over or crushed, then the odds are that three of them will be used by an employee inside the company. They may use that USB thumb drive device on their personal computer at home, or put it into a computer at work. The hackers embed code on the USB thumb drive, even though its directory claims to be empty, and they use that to extract passwords to get into the system later. It's amazing how well this works. These hackers are quite diabolical indeed.

It was also discovered that CD-ROM's with small business information on them have been given away as free promotional items, and used by sneaky individuals to invade someone's computer, allowing them to deliver ads onto the user's platform. Well, with all this known and these sneaky spyware and hacker tactics often using human and innate characteristics and behavior, I'd like to ask you a question; have you ever taken a free promotional USB thumb drive at a tradeshow booth? Haven't we all? How do you know those are safe to put in your computer?

Why would you put anything in your computer unless you knew it was safe? How do you know the company giving it away knows it's safe? They may have purchased them by the thousands from a reseller manufacturing them in China. Are you beginning to see some of the challenges here? Any time you load software on your machine, computer, tablet, or even smart phone, or any time you upload an app, you are risking infiltration by hackers and those who create spyware.

Now then, back to the question which is the title of this article; "should you take free promotional USB drives from trade shows?" Absolutely not, and for all the reasons I mentioned above. Indeed I ask that you please consider all this and think on it.

Lance Winslow has launched a new provocative series of eBooks on Cyber Security Concepts. Lance Winslow is a retired Founder of a Nationwide Franchise Chain, and now runs the Online Think Tank; http://www.worldthinktank.net/


View the original article here

Why You Probably Shouldn't Be Saying Your Computer Is Broken

Does your town have a Dump? Visit it. Know what you'll find? Hundreds of discarded computers. Guess why?

Is it because we all junk last year's PC to get this year's upgrade? No, very few of us are that rich! Is it because millions of us have decided the computer is just a passing fad? Please. Or is it because severe arthritis is now afflicting the fingers of more people than get the sniffles each year? No. The No.1 reason why town dumps are PC graveyards is because each year, millions of us simply conclude that we've broken our desktop, laptop or netbook.

When we really haven't!

Truth is, while your local computer store would love everyone to buy a shiny new PC every year, about 97% of us don't need to. Why? Because research has found that it's actually the proliferation of VIRUSES that causes the vast majority of computers to appear broken. And it's nothing more than that appearance that causes millions of us to become so frustrated that we actually throw our PCs away!

"But," you're now thinking, "even if my last computer was just a victim of viruses, the damage was still done. That PC was so problem plagued, I HAD to throw it out!" The truth is, "Probably not."

But rather than dwell on the mistakes of the past, let's look at how to avoid them in the future.

FIRST: Accept the fact that today, most computers are designed to cope with most of the guff users subject them to. But what most computers can't cope with is all the cyber-thugs who launch more than 50,000 increasingly sophisticated viruses onto the Web. Every day!

SECOND: Accept the fact that every time you hop on the Internet, your computer MUST have antivirus protection and the failsafe support of a team of ace online problem solvers. Kind of like your own Pit Crew in an auto race.

Depressed over how dangerous the Internet has become? Don't be. Because all the best Internet Security Software companies are way ahead of you. And those Cyber-Thugs. With Firewall and Antivirus software infused with impressive, next generation ideas like White List Strategies and Auto Sandbox technology to protect your PC. In fact today, the best Internet Security software is:

Designed to never even allow any threatening file to enter your PC.

Combines an impenetrable Firewall with the latest Auto Sandbox Technology and a White List Strategy that only permits a continually updated list of SAFE files to enter your PC.

Gives you 24/7 live, expert, online problem solvers, who are never more than one click away. Compassionate, Microsoft Certified experts who are ready to solve hundreds of PC problem for you, including slow PC, crashes or blue screen shut downs. All of which are usually caused by viruses.

What will such top notch Internet Security Software cost you? $10.00 to $70.00 tops. Which is a bargain, compared to the cost of a brand new replacement PC!

Problem: "My PC is broken!" Solution: Take some top notch Internet Security Software. Not a trip to the Dump.

COMODO provides the best antivirus software and complete Internet Security Software


View the original article here

Financial Malware

Cybercrime is, more often than not, a business, and just like any other business, cyber criminals are out to make money, even if it is your money. It's no secret that financial malware is one of the most popular tactics of hackers. Nothing is more frustrating than fraudulent banking activity. If you have never been a victim of fraud, try to imagine your hard-earned money vanishing furiously from your account, unknowingly. The first thought upon discovery is denial: you start second guessing whether the transactions are yours, that is, until you see the location, which is probably from another state or country. The next thought is "How?" You are staring at your debit card in your hand, you have never misplaced your online banking login information, never given out your debit card number, and have always made sure to check that your website browser was secure (i.e. https) prior to an online transaction. Next comes the onslaught of excuses and the dreaded phone call to one of your banking representatives to explain that your money is gone, but you haven't spent it. And if you're one for immediate gratification, fraudulent banking will be a major headache, to say the least: you will have to volunteer to actively participate in the investigation, file reports, and answer questions before they can even begin the process of refunding your money. You've played out every possible scenario in your head where you could have been vulnerable, but there's a plausible explanation you probably did not muse over: financial malware.

Financial malware is one of the worst categories out there. The amount of the attacks targeting the financial sector is growing irrepressibly. It seems logical that hackers would target major financial institutions; however, the bulk of malware aimed at the finance sector is en route for its customers, the obvious reason being that the average end user's system is probably less secure than the systems utilized by financial institutions. Here's some insight into how financial malware works, so that you can be on the lookout and alter your habits to prevent being the next victim:

1. Financial Malware Step 1: Hackers create banking Trojans, simply put, a program that may appear to be legitimate, but in fact does something malicious. Trojans are often used to gain backdoor access like remote control of a computer, for instance. The mastermind behind the scenes also creates what is termed his "Command and Control Center" in order to manage and control the spread of his new botnet (network of infected computers), issue new commands, and monitor progress. Cyber criminals are smart too. They automatically re-encode their distributed infections quicker than most anti-virus software can recognize and stop the spread.

2. Financial Malware Step 2: The next step is the most crucial: spreading the malware. Let's reiterate: cyber criminals are geniuses-they utilize crafty social engineering technology in order to trick users to install the malware, thus integrating the target operating system into their botnet and under the control of the cyber criminal. Ideally, the malware should not be spread too broadly; wider distribution increases the chances of discovery and insertion into antimalware vendors' signature-recognition files. The most popular form is spam emails (using any message, often appearing to come from a credible source or legitimate organization, to trick users into clicking a link or opening an attachment which downloads the Trojan onto the operating system), but there are several different strategies used, some as advanced as incorporating pop-ups on online banking websites and infecting the user once he simply mouses over the ad! There is an old saying in the security community: "Dancing monkeys beat security every time"... when presented something entertaining or potentially groundbreaking news, curiosity wins over caution.

3. Financial Malware Step 3: Once infected, attackers can obtain login information and other user credentials, but the main goal is to piggyback on active online banking sessions and initiate fraudulent transactions. Once user information is compromised, cyber criminals transfer money into different accounts they have access too. However, taking the money and running is not as simple as walking into the bank and performing withdrawal; banking institutions are too smart for that, and cyber criminals would not last very long. That's why they have several of what are called "mules" or middlemen, whose task it is to withdraw money and pass it on to the cyber criminal (probably naively, for compensation), obscuring the identity of the true thief.

People who truly value their money should never get complacent with its security. Part of the burden falls on financial institutions, as it will be increasingly important for banks worldwide to cooperate more closely in order to trace fraud through growing layers of mules. It is also the responsibility of software vendors to ensure that processes for software updates are fluent so that users are running the latest versions. But most importantly, end users should never wait until financial malware disaster strikes to seek protection. Security products should be installed and updated as quickly as possible. Outdated antivirus software has little value! Behavioral changes can also come in handy when it comes to preventing financial malware; this is a matter for which increased skepticism is actually okay. If at all possible, use an entirely different computer for online banking. Make sure your passwords are strong. Do not store login information where it may be accessible. Call financial institutions to verify the validity of dubious messages. Join the effort against financial malware. Force cyber criminals to make their own money, and not take yours, by investing in the protection of your finances.

Fortunately, there are companies out there committed to thwarting the spread of financial malware, like KaspAV, a division of Guardian Network Solutions and authorized Kaspersky reseller. KaspAV specializes in providing the ultimate antivirus solutionsin order to prevent harmful types of malware from lodging itself into your system for malicious damage.

Reprint Terms: You're welcome to reprint these articles on your website and in your e-newsletters free of charge, provided that you do not change the article in any way and you include the byline, financial malware.

In doing so you agree to indemnify Guardian Network Solutions and its directors, officers, employees, and agents from and against all losses, claims, damages, and liabilities that arise out of their use.


View the original article here

Time to Pay Attention to Your Password!

Every time you turn around these days you are asked to setup a user id and password. Mostly for web sites, but for telephone systems and computer access too. Keeping track of them all can be a challenged and it understandable that people take shortcuts.

Understandable, but not wise.

Some shortcuts are, well, short sighted to be polite. The most popular is the word "password" itself. I think hackers could figure that one out! Some people write their user ids and passwords on posted notes or paper left prominently in their office or cubicles. That is safe from remote computer hackers, but not from nefarious colleagues. Sad to say, there are a few out there.

They may seem like a nuisance, but with almost all of our important information now stored online they are the first line in the defense of our financial, professional and personal information. Almost every day I hear a story about a person whose personal life has been turned upside down because someone has compromised their bank, credit card accounts and credit worthiness through unauthorized loans.

It's time we to start taking the more seriously!

The good news is that there are a few simple rules to follow that can be a big help.

First, never leave a list of password and ids around where people can find it. No post it notes!

Second, do not base your passwords on personal information that could be guessed. That would include your name, your close relative's names, your date of birth, etc.

OK, that takes care of co-workers up to no good. What about the sophisticated hackers?

Third, you have to make your password difficult for the hacker to identify through "brute force". That simply means trying many possible combinations. To do that, you should have what is called a "strong" password. A strong password will adhere to the following rules:

Contain 8 or more characters.Include Alpha, numeric and special characters (&,!, etc.).Include a mix of upper and lower case letters.Never use a sequence of number (1234).Do not duplicate your user id in the password.

Some people also recommend not using dictionary words in the password, and I think that would be ideal. However, it becomes really hard to remember a password if it is a random set of characters and numbers. Ideal, but probably not practical.

Next, be vigilant.

Whenever you are at a web site that requires you to login, make sure it is running the Secured Socket Layer (SSL). SSL creates a secured, encrypted connection between the web server and the browser.

You can tell the site is using SSL because it will have "https:" instead of "http:" on the URL address line and there will be an image of a padlock displayed.

Last, make sure your computer has a firewall and you are running an antivirus scanner. You need this protection for a lot of reasons, but it is important protection against identity theft in particular. A common technique of hackers is to infect your computer with a "key logger" program that records your keystroke. When you visit secured web site the key logger will capture your user id and password which the hacker can use against you!

Keep in mind that even if you are using a firewall and antivirus you may still be vulnerable. The problem with most antivirus protection is that they only address viruses and exploits that have been identified and added to a"blacklist" of known viruses.

Not bad, except there are approximately 40,000 new viruses and system exploits unleashed EVERY DAY! They will eventually update their blacklist for a specific issue, but you are always playing catch-up.

I prefer protection that uses a "whitelist" concept and sandbox. With this technique, program files are compared to a list of valid files and only allowed to run in your system if they are on the list. If the scanner has any suspicions about a program, it is run in an isolated system area called a sandbox where the scanner can determine if it is OK or should be deleted.

If you follow the rules for a strong password, ensure you are using SSL sites and run antivirus and firewall software you will significantly reduce the risks of identity theft and the nightmare that can be.


View the original article here

When You Can No Longer Trust Big Data - Whom Can You Trust?

The other day, I was talking to an acquaintance about how I was worried about the future of big data and privacy. You see, I can already envision a future that none of us would particularly care to live in, one where all of our data, all of our lives, down to the most minute event would be shared with anyone that might use that information to sell us something, regulate our behavior, or charge us a fine, fee, or tax. You may not see it, but as the coordinator for a think tank which operates online, what I see is scary, and it's happening so fast.

No, I'm not one to run around like Chicken Little and tell you that "the sky is falling" but rather, I'm suggesting to you that we have a chance at this particular juncture in the information age to fix the problem before it occurs. If you can't trust big data, then who can you trust? If those collecting the data are doing it without your permission, and using it for things other than it was originally intended, then you can't trust the communication you use, the social networks you involve yourself in, or even the companies that provide searching for all the information you'd like to learn on the Internet.

It is not just the Internet, it's all the people associated with it, all the people using the data. Many Americans are worried about their government spying on them, but I think the more unfortunate potential eventualities is when other governments are spying on our citizens, and wish to curtail their free speech as it might make their regimes look bad overseas. If you can't trust the purveyors and collectors of this information not to share it, then you can't trust anyone.

You can't trust your friends, or your family to share personal information with you online, over the phone, not now or in the future, not even in person, as there might be surveillance cameras tracking everyone's face that came to meet with you, registering them by their name, and storing it away somewhere. The chief of the NSA made a statement to Congress, and more people should have taken notice. He said that we are "this close" while holding his index finger and thumb together to becoming a totalitarian state. Well, he'd be the guy to know, he's the one running the show.

Unfortunately, I agree with him, I see what he sees, although I'm not privy to all of his information on how the data is used and collected, but I know for a fact that there are people in the government, people in corporations, and others that want this information very badly, and they're willing to do whatever it takes to get at it. Eventually they will, they will find a reason, excuse, or loophole in the law to use your data against you, or rather for something that you wish they wouldn't use it for. Indeed I hope you will please consider all this and think on it, it may be the most serious issue of our time.

Lance Winslow has launched a new provocative series of eBooks on Future Internet Challenges. Lance Winslow is a retired Founder of a Nationwide Franchise Chain, and now runs the Online Think Tank; http://www.worldthinktank.net/


View the original article here

Related Posts Plugin for WordPress, Blogger...