Skip to main content

Online Privacy and Security: Everyone's Concern


Online privacy and security is not merely an area of importance relegated to IT and Information Security professionals but, rather, should be a primary concern for every individual who has an electronic device (whether PC, notebook, tablet, iPad, mobile phone, etc.) that connects to the Internet. Today's malicious hackers (not all hackers are malicious, I myself am a Certified Ethical Hacker (C|EH)), identity thieves, pedophiles, etc. are becoming more and more technologically astute and, each time you logon to the Web-especially on public networks-you are placing yourself, your identity, and your finances at risk!
I know, you think it will never happen to you but the fact of the matter is that Internet-related crimes are on the march and will only continue to grow in numbers as technology becomes more ubiquitous and our connectivity expands. Today, more than any other time in the past, pretty much any electronic device can be connected to a network (especially wireless networks) and any connected device via which an individual shares personal information, or has a connection to another device on which is housed personal information, is at risk. All devices and networks, no matter how great the security, have vulnerabilities. The bad guys know about these vulnerabilities before you do and can and will breach them if you leave the door open.
Antivirus software alone (in many cases, even with a firewall) can't protect you 100%. Online security has to be thought of in terms of layers (think of an onion) and protection applied at the various layers of potential vulnerability.
It is recommended that each system have, at minimum, the following placed and configured appropriately. (Note: In most cases, when security software or hardware is installed the software simply isn't configured correctly. See the detailed manufacturer's instructions at time of install.)
1) Antivirus is a must.
2) An adequately configured firewall (there are three possible implementations and nothing wrong with using all three!) which can consist of a software firewall, a router-based complementary firewall, and typically your operating system will have a local firewall as well.
3) Anti-spyware software to detect, delete, and block ad bots and the like.
4) A tool for "cleaning up" your system that will remove temporary files and unnecessary cookies.
5) If a wireless network is in use, then one should be utilizing no less than WPA encryption (not open and not WEP). WEP encryption can be cracked by a neighbor or wardriver in less than 30 seconds on a bad day!
6) A network monitoring tool to detect and prevent unauthorized access of non-approved computers from accessing your network (e.g., neighbors seeking "free Internet").
7) A host or network-based intrusion prevention and/or detection system.

Comments

Popular posts from this blog

Beginning of Hacking

Before Hollywood took the hacking phenomena under its wing, unless you were a clued-in techy, the world of hacking would be unfamiliar territory. In recent years, movies like The Girl with the Dragon Tattoo, The Matrix and The Italian Job have managed to glamourize the high-tech thrill of breaking into servers, cracking door codes and hijacking security networks. But before television brought the hacker technology into our general knowing, hacking was still an occurring reality for some. So what is the history of hacking and where did today's sophisticated hacking begin? Late 1950s – The MIT Start Off with a Bang Hacking wasn’t always about computers. In fact, the first ‘hackers’ were roof and tunnel hackers, which the Massachusetts Institute of Technology was instrumental in introducing. These were people who entered roof and utility tunnel spaces without authorization, in other words getting into a place they shouldn’t be in – which is where computer hacking go...

Internet of Threats!

T he Internet of Things (IoT) is continuing to gain traction with an ever-increasing number of connected devices coming to market. But as tech-savvy consumers begin investing in their first devices for a connected home, what is to stop them becoming a cyber attacker's next target? While still uncommon, we know that cyber attackers are going after connected consumer devices, demonstrated on a massive scale by the group of Russian hackers who published thousands of live-streaming webcam footage from over 250 countries. Unless the manufacturers of connected devices take a holistic approach to bolstering their cyber security efforts, these types of attacks will increase in number. To gain a greater understanding of the cyber security risks that consumers could be exposing themselves to, research was conducted into the cyber security posture of six ‘always-on’ consumer IoT devices. The results were unsettling. Veracode carried out a set of uniform tests across all the...

How to Unlock (and Play) Hidden Chess Game Inside Facebook Messenger

What can you do with Facebook Messenger? Chat with your friends Send GIFs, stickers, and photos Make video calls Send people money in Messenger Have you ever wondered to Play a game while you chat with friends? Yes, it is possible. Facebook had made it to the reality by building a hidden built-in functionality in Facebook Messenger that lets you play Chess with your friends without having to install a third-party app. It just takes one simple step to unlock this hidden game. All you need to do is: type " @fbchess play " and hit Enter, during a conversation, and a small square box would appear in the chat box. Here's how to play: The person who initiated the game would be assigned "White" side, to make the first movement. Although there is some standard algebraic notation like:- B for “Bishop” R for “Rook” Q for “Queen” K for “King” N for “Knight” P for “Pawn” Pawns could b...