Category: Security

Security is an important topic when it comes to technology. There are many different areas of security, so this category is divided into various sub-categories to help navigate through the posts on security.

  • The 4 Most Effective Tips to Protect Your Computer from Ransomware

    The 4 Most Effective Tips to Protect Your Computer from Ransomware

    Ransomware – a class or malware that restricts access to a computer until a ransom is paid – has been around for many years. In fact, one of the first known ransomware – the “AIDS” trojan – was found in 1989. Unlike other malware, ransomware has been in the background, not drawing much attention. In 2013, the ransomware called CryptoLocker began making news as it infected computers, and then began encrypting personal data files. Once the files were encrypted, a ransom message was displayed informing the user to pay a specified amount of money.

    Encrypting files isn’t new, of course, but now malware authors are using such encryption to extort money from unsuspecting computer users. The problem is that the encryption that is used cannot be broken by brute force methods, so either the data is lost, or the ransom needs to be paid. More and more ransomware are starting to make their rounds among computer users, and there could be much more robust, efficient ransomware, with stronger encryption, in the future.

    While this may sound disturbing, there are many ways that you can protect your computer from ransomware.

    1. Backup Your Files

    This first method is probably the most important one – backup your files. Backing up your files is probably the best method as you can just restore your files from the backup if they do become encrypted by ransomware. Of course, you want to make sure you have a clean system to restore your files onto, or you will just re-encrypt the files.

    With regards to backup, you should backup your files to “cold storage” to prevent ransomware from encrypting your backup files. Cold storage means that you can’t access your backed up files directly from your computer all the time. For example, if you backup your files to an external hard drive, only connect the hard drive when you want to backup your files, and then disconnect the hard drive from the computer. Another example of cold storage is when you backup to cloud service online.

    For me, all my backed up files are stored away on cold storage. The first is an external hard drive that sits beside my computer, but is always off until I want to get access to the files or backup new files. A second backup is stored on a portable external hard drive that is connected less often – only when I have many gigabytes of data since the last backup. A third backup is stored online with Backblaze.

    2. Use a Sandbox or Virtual Machine

    A great solution to protecting your data from ransomware is to limit what the ransomware can get access to. Two of the best solutions to this is to browse the Web and check e-mail in either a sandbox or virtual machine.

    A sandbox is the easier of the two to setup as it runs directly in the operating system of your computer. Basically a sandbox is a separate, tightly controlled area, on your computer that you can run applications in. Any application running in a sandbox has limited access to other resources on your computer – including your files. An application in a sandbox, may be able to read a file on your hard drive, but it cannot write to the file. You can also control what applications are allowed to run within the sandbox, access the Internet, and do other tasks on your computer.

    There is a great Windows sandbox application called Sandboxie that has been proven to contain ransomware.

    If you are technical you may want to look into setting up a virtual machine. A virtual machine is basically another computer that runs within your current computer. You main computer becomes the host to the virtual machine. Everything that happens in the virtual machine, stays within the virtual machine.

    With a virtual machine, you can install a Unix-flavor operating system, such as Ubuntu, to give good security, and then access the Web and your e-mail from the virtual machine. If you do download ransomware, it may not even execute in the virtual machine as it isn’t a Windows system, and if it does execute, then the ransomware can’t see the data files on your host computer.

    You can create virtual machines for free by using VirtualBox.

    3. Don’t Use an Administrator Account

    Windows users have always accessed their computers using an administrator account. This account has unlimited access to the computer, and up until recently was the only type of account used. Fortunately, starting with Windows Vista – although more with Windows 7 – Microsoft changed Windows to allow users to use a limited account.

    If you are using Windows Vista or later, you should not be logged in with an administrator account. You should always use a limited user account. The reason is simple: any application you run will run in the same context as your user account. This means that if your account has started a ransomware application, and you are logged in with an administrator account, than the ransomware application will have unrestricted access to your computer.

    While using a limited user account will not protect your data files if you accidentally ran a ransomware application, it will limit what files it affects or what restrictions it places on your computer. A limited user account can only see their own data files, and can’t change system settings, which will help limit ransomware.

    To stress the point about not using an administrator account, over 90% of Microsoft-reported vulnerabilities in 2013 could have been mitigated by using a limited user account.

    I have used a limited user account for 4 years with Windows 7, and haven’t had any issues with running applications. So if you are using Windows 7 or later, don’t log in with an administrator account.

    4. Don’t Open Suspicious E-mails

    While this tips has been mentioned for stopping malware all the time, it is still surprising that people still don’t follow it. CryptoLocker spread by an e-mail attachment, and infected hundreds of thousands of computers. That ransomware could have been stopped, or severely affected, if people just don’t open e-mail, or run attachements from unknown senders.

    Many attachments in e-mails are designed to trick users into opening the attachments. Such attachments would actually have two extensions – such as .pdf.exe or .doc.exe. All the user will see many times is the first extension and an icon associated with that extension. For example, a file called example.pdf.exe file would display just example.pdf with an Adobe Reader icon. Unfortunately, the .exe extension at the end means that the file isn’t a PDF document, but an application that will run when opened.

    One of the first things I do after I install Windows is to display hidden extensions of known file types, so I can exactly see all the extensions for all the files on my computer. This helps to determine if a file has a double or a single extension.

    There are many ways you can protect your computer from various forms of malware. What are some of the tips that you use to protect your computer from ransomware?

  • The Best 5 Tips to Prevent Malware on Your Windows System

    The Best 5 Tips to Prevent Malware on Your Windows System

    Windows has always been synonymous with malware. To this day, Windows systems are being targeted by malware developers because of the number of Windows systems online, as well as how many exploitable security holes are available. Much of the malware can easily be prevented if users just took the time to implement some security measures on their Windows systems.

    Below I provide 5 of the best tips that I utilize on my Windows system. Since implementing these tips, I haven’t had to worry about any malware on my computer in any shape or form.

    (more…)

  • Data Breaches and Cyber Attacks: Protect Your Business Network

    Data Breaches and Cyber Attacks: Protect Your Business Network

    Your business may be under attack, but you may not know until serious damage has been done. Keep yourself and your business protected with software and tools.

    If you own a business, you may be vulnerable when it comes to cyber attacks. This is true whether you have five employees or well over 200. Cyber attacks do not discriminate, meaning you should be prepared to ward off potential danger before it arises. You can work on protecting your business network by downloading and using efficient antivirus software and fortifying your computers and network with the best available methods of protection.

    (more…)

  • Cybercrime Report Gives Insight Into How Serious it is Worldwide

    Cybercrime Report Gives Insight Into How Serious it is Worldwide

    The average web user will probably have some anxiety about whether or not they’re safe when logging on. If clicking onto the wrong site or a page loaded with malware, then the consequences could be disastrous in terms of keeping their most important files safe. Cybercrime is something that has become increasingly prevalent throughout the world, being a major cause of anxiety.

    Mapping how big a problem it has become, Symantec Norton has recently released one of the one of the largest consumer cybercrime and internet threat reports of 2013. Conducted to find out how individuals are affected by the actions of cyber criminals, it revealed quite a few interesting findings that hint at the scale of the issue affecting the entire world, particularly Asia.

    (more…)

  • Get Secured With the Right Password

    Get Secured With the Right Password

    Passwords are often the only thing that protects our information from the grasping hands of other people. Very few people know about data encryption, and even fewer of them actively use these technologies and algorithms. Frankly speaking, modern people are pretty negligent to information security issues, which results in hack attacks on their e-mail addresses and social networks accounts.

    A recent study showed that in Europe only 24% of the residents use different passwords for different sites. The others use one or two passwords on all services where they are registered. So how can you protect yourself from hacking? Here are 5 basic tips which will help you.

    (more…)

  • Cloud Storage Providers in Race to Make Their Products PRISM-proof

    Cloud Storage Providers in Race to Make Their Products PRISM-proof

    Although its finer details were only uncovered earlier this year, anxiety over a surveillance program initiated by the National Security Agency (NSA) has grown significantly among companies who rely on having a significant online presence. PRISM, which was a key arm of an anti-terror operation run by former President George W. Bush back in 2007, was designed to collect data covertly.

    Initially, organisations suspected to have links to terrorist organisations were among those targeted by PRISM, although its scope rather controversially spread to companies large and small. Those with files stored online were most likely to fear for the safety and security of their documents, as they could have been seen by NSA employees, leaving them to wonder what steps to take next.

    (more…)

  • 10 Tips to Secure Your Windows System

    10 Tips to Secure Your Windows System

    For many people Windows is synonymous with viruses, malware and security vulnerabilities. For many years Apple and Unix/Linux users have touted how they don’t have to worry about viruses or malware.

    Windows users have, however, enjoyed the fact that their system has the most compatibility for hardware and software than any other system. This, unfortunately, has also been an issue as Windows users have always had a more open system to allow for such compatibility, which has allowed viruses and malware to propagate easily.

    With the 10 tips outlines below, I will show you how you can run your system in a much more secured way, to the point where you can, hopefully, make viruses and malware threats a thing of the past. The good news is most of you probably won’t even need to spend a dime to make your system much more secure.

    (more…)

  • Advantages of a VPN Server: How to Set It Up

    Advantages of a VPN Server: How to Set It Up

    Virtual Private Network, or a VPN server, is an Internet-based private network that is set up between several computers. With recent news that the NSA monitors a great deal of Internet-based communication, setting up a private network to give an extra layer of privacy between yourself and government agencies overstepping their bounds can’t hurt. A VPN might sound complicated to set up at first, but the advantages are well worth the effort you put into the server search and configuration.

    (more…)