Category: Security

Security is an important topic when it comes to technology. There are many different areas of security, so this category is divided into various sub-categories to help navigate through the posts on security.

  • Why Your Wireless Network May Not Be As Secure As You Think

    Why Your Wireless Network May Not Be As Secure As You Think

    I have written several posts on securing a wireless router. I have even written posts that provide step-by-step detail on how to secure specific models of wireless routers. While you should enable WPA2 and use a strong passphrase, that may not be enough to keep your wireless network protected by unauthorized users.

    In many routers manufactured today, there is a known issue related to a technology that has been pushed by the wireless industry to make setting up and securing a wireless network easier. Unfortunately, this new technology has also opened up a large security hole that can allow unauthorized users access to your wireless network – even if you secured your network with WP2 and a strong passphrase.

    WPS – WiFi Protected Setup

    When wireless networks started to become popular, many people weren’t aware of the security that needed to be implemented in order to protect their network. Most people were just used to use standard network routers where you just plugged in a computer using a network cable and everything was good to go.

    Unfortunately, with wireless, security is vital. Anyone with a wireless network card that is within range of your wireless router can connect to your network. The problem is that many people don’t understand how to properly secure a wireless router. Let’s face it, many people don’t want to navigate through an array of confusing options and try to understand terms like WPA, WPA2, AES, TKIP, etc.

    In 2007, the WiFi Alliance created WiFi Protected Setup (WPS) that provides an easy way for someone to configure and setup security on a wireless network. The way WPS works is a wireless router is shipped with a personal identification number (PIN) – usually 8 digits in length – that is printed on a sticker on the router. With WPS, a user can then enable encryption for the wireless network by pressing a button on the router and then entering the PIN in the network’s setup wizard.

    While this sounds like a great way of connecting devices to a wireless network easily, there is one issue: is can easily be hacked. WPS was created with usability in mind and not security.

    In December 2011 researcher Stefan Viehböck reported a flaw that showed brute-force attach feasible against WPS. This flaw allows unauthorized users to gain access to a wireless network.

    While the PIN is an 8 digit number, the last digit is a checksum of the first 7 digits, which leaves 107 = 10,000,000 possible PIN numbers. The issue is that the router will confirm validity of the first half (4 digits = 10,000 possibilities) and the second half (3 digits = 1,000 possiblities) separately, which reduces the number of possibilities to guess to about 11,000. Since WPS doesn’t lockout after several incorrect attempts, it wouldn’t take long for a device to guess the correct PIN and gain access to the wireless network..

    Protecting Your Network

    The issue with WPS is that many routers may have it enabled by default – even if you have used the feature or not. This makes your wireless network vulnerable to a brute-force attack.

    The only solution, at the moment, is to disable WPS from within the router’s administrative dashboard. Some routers provide an option to disable WPS, while others require a firmware update. My Linksys E4200 required a firmware update to disable WPS.

    If you are unsure of whether your router provides the ability to disable WPS, you should ask the manufacturer, or use their support forums and ask other owners. You may have to update the firmware on your router, as I had to do.

    While WPS provides an easy way to attach devices to your wireless network, the lack of security in such a feature, in my opinion, far outweighs the usability. I suggest you manually attach devices to your network, once the network is secured, and turn off WPS instead.

  • How to Protect Your Children Online

    How to Protect Your Children Online

    We live in a connected world where everyone seems to be online. While there are many benefits to going online, those with children, however, need to keep in mind what their children are doing.

    There are many threats to children on the Internet. The most common being strangers that are looking to prey on children or take advantage of them. Friends can even become a problem if they have a falling out with your child resulting in bullying. One threat for children online is from them self, especially if they are known to post a lot of information about them self online. The information can be used against them, and many children may not realize this.

    (more…)

  • How to Achieve Total Compliance With Endpoint Data Encryption

    How to Achieve Total Compliance With Endpoint Data Encryption

    When South Carolina Governor Nikki Haley called encryption “complicated” and “cumbersome,” and noted few government agencies and financial institutions employ encryption to protect sensitive personal data, security experts took notice. Haley’s October 2012 remarks came after a massive data breach compromised the Social Security numbers and financial information for three-quarters of her state’s population, and highlighted an Internet security issue: Data encryption, specifically endpoint data encryption, is not only a key facet of keeping data safe, but also a compliance issue.

    (more…)

  • How LastPass Keeps Your Passwords Safe and Secure

    How LastPass Keeps Your Passwords Safe and Secure

    The reason I trust my passwords in LastPass is because of the security of the system. LastPass is about as secure as you can get for keeping your passwords safe. The reason is how the lengths they go to to ensure your personal information remains as secure as possible.

    In order to see why I trust LastPass, it is important to understand how your passwords are secured within the service. Let me try to explain the security process of LastPass as best as I can.

    For those that have used LastPass you know that you are required to log in using two pieces of information: your email address and your master password. These two pieces of information is the key to the whole security process, and without one of the pieces, it is impossible for anyone – including LastPass – to gain access to your passwords and other information.

    (more…)

  • 3 Applications You Must Keep Updated at All Times

    3 Applications You Must Keep Updated at All Times

    It seems that each week we are constantly interrupted by popup windows on our computers instructing us to update an application. If you are like me, these popup windows can be quite annoying. As annoying as I might find them, they appear for a good reason – to ensure that the software we have on our computer is the latest, and hopefully, the most secure version available.

    While you can have any number of applications installed, there are three popular applications that you most definitely must keep as updated as possible. While you may not use all three described below, if you do use any of these, ensure you perform the updated when requested.

    (more…)

  • 2 Essential Tips To Keep Your Data Safe and Secure

    2 Essential Tips To Keep Your Data Safe and Secure

    As we all know, computers and computer hardware aren’t built to last. We are constantly replacing computers every five or so years, or replacing hard drives on a regular basis. Hard drives are notorious for going bad, and when that happens, you could potentially lose all your files. We all have files that we can’t lose, whether those files are photos, videos, or business/school-related files, we need to keep such files safe and secure.

    The good news is that, if you haven’t already thought about protecting your files, it isn’t really difficult to protect your important files. This post outlines two tips that you should employ to safely, and easily, backup your important data files so you won’t lose them, as well as protect those files from unauthorized users.

    1. Backing Up Data Offsite

    One aspect of data backup that many people don’t give much thought about is where are they storing their data. Most people would probably copy their files to an external hard drive that is located next to their computer. While this is effective at restoring data that may have been lost on an internal hard drive, it shouldn’t be the only place to backup data.

    Let’s think about this for a second. What would happen if the location that stores both the computer and the external hard drive was struck by a disaster – fire, hurricane, tornado, etc? Such events put the data on both the computer and the external hard drive at risk of being lost.

    In order to prevent such a problem, it is always best to store at least one copy of all your files at another location – offsite. The good news is that storing your files offsite doesn’t have to be complicated.

    For me, I use two methods of storing my files offsite. The first is by backing up my files using Backblaze, which is a cloud service, so my files are backed up – securely, of course – online. I use Backblaze because they offer unlimited storage for a small monthly fee, and I don’t have issues with capping.

    Please note:

    I am affiliated with BackBlaze, but I only recommend them because I am currently using their service and trust them for my data backups.

    A second option that I use is by copying my data to a small, external hard drive, and then physically store that hard drive at another location. Every so often I would bring the hard drive home and update the files on the drive and return it to the offsite location.

    If I were to ever lose all my files, I would restore the data with the small, external hard drive first, and any files that weren’t backed up would be restored from Backblaze. Optionally, I can restore all my files using Backblaze as they can provide a hard drive or USB flash drive of all my files, for a price.

    Encrypt Data

    2. Data Encryption

    While backing up my data to external hard drives is a good option, there is a problem with it – it isn’t secure. While most of us may not think about securing our data to prevent others from reading the files, if you store personal information (think taxes), you may want to look at encrypting your data.

    Encrypting an external hard drive isn’t expensive, and isn’t too difficult. There is a great free, open-source, solution called TrueCrypt that you can download and use to secure the data on any external hard drive.

    For those that aren’t familiar with using TrueCrypt on an external hard drive, you can find tutorials on encrypting your hard drive online by simply doing a search. I found a great tutorial for encrypting my external hard drive that made it very easy to protect my files.

    There are a few things that you will need to keep in mind when using TrueCrypt:

    • Depending on how much data you are encrypting, it could take some time to encrypt your files. It took about 30 hours to encrypt 400 GB of data on my external hard drive. If the process is interrupted, it could make your data unreadable. TrueCrypt does allow you to pause the encryption process, if needed.
    • When you connect your encrypted drive to your computer, you won’t see any data on your drive – this is normal. You will need to use TrueCrypt to mount the drive to the correct letter and then enter a password to decrypt the information on the drive.

    To elaborate on the second point, the drive letters caused me a bit of an issue. When I backup my data through Backblaze, the software looks for drive “I” to backup the data. When I encrypted the drive, and then connected the drive to the computer, Windows automatically connected the drive to “I”. The problem was, Windows couldn’t see the data on drive I because it is encrypted.

    The solution was to remap the external hard drive to another letter – “R”, in my case – and then mount the encrypted drive in TrueCrypt to drive “I”. I now see two drives in Windows – “R” from Windows, and “I” from TrueCrypt.

    For those that are wondering, Backblaze works without any issues with my encrypted external hard drive because it can read/write drive “I” without any problems.

    As for my files I store with Backblaze? Those are encrypted on my system before they are uploaded to their servers, where they remain encrypted, so I have no worries there.

    Above are two essential tips for keeping your data files safe and secure. If you think about all the files that you have currently stored on your hard drive, and what it would take to replace those files, you may want to seriously take a look at backing up those files.

  • Need to Hide Your IP Address? VPNs Can Help

    Need to Hide Your IP Address? VPNs Can Help

    In this age of the Internet, many people are trying to find ways to keep themselves protected online, by hiding their IP address, for various reasons. Some may just want the privacy aspect of being anonymous, while others may want to access specific services without being monitored. Privacy has always been at the forefront of technology, and with the Internet, privacy has become a big issue.

    There are many reasons why you might want to hide your IP address when accessing the internet. Some of the most common include:

    (more…)

  • Beware Of The Scam!

    Beware Of The Scam!

    Beware scammers from all directions! Criminal elements will try and trick you into handing over your money by telephone, email, post and via the web. Remember the following tips to avoid being caught out.

    (more…)