Category: Security

Security is an important topic when it comes to technology. There are many different areas of security, so this category is divided into various sub-categories to help navigate through the posts on security.

  • BYOD Rules, Network Security & Your Business

    BYOD Rules, Network Security & Your Business

    The integration of sophisticated interfaces in modern devices has made it difficult to draw a line between personal and business usage. Nearly a decade back, it was fairly easy to differentiate between data/software/applications targeted or being used at an enterprise level and those at a personal scale.

    The data that is being circulated around can be classified as business and non-business. Each has its own specific attributes with respect to sharing and security management. For instance, under no circumstance would you want enterprise data (account information, client detail, etc.) to be circulated freely.

    (more…)

  • CryptoLocker – Holding Your Computer for Ransom

    CryptoLocker – Holding Your Computer for Ransom

    In September 2013 a new type of malware was discovered to be making the rounds in computers running Microsoft Windows. This new malware is not really a virus because it typically requires a user to open an infected e-mail. What makes this malware particularly dangerous is what it does once it infects your computer – it holds your files for ransom.

    This may sound funny at first, but this type of malware – called ransomware – is very serious. The malware that was recently discovered is called CryptoLocker, and has begun causing pain for many users around the world.

    Money for Your Data

    In case you haven’t heard about ransomware, it is malware that infects your computer and then restricts access to your computer. Once the restrictions are in place, the malware will then request a ransom to remove the restrictions. If the ransom is paid, the restrictions are removed.

    With CryptoLocker, the restrict is access to your data files. When CryptoLocker infects your computer it will then silently begin encrypting your local data files without you even knowing your files are being encrypted. While you may have an anti-virus product installed, it may not detect CryptoLocker, or it may detect the malware once files have been encrypted.

    When CryptoLocker encrypts files on your computer, it uses what is called a public key, which it obtains by connecting to a command-and-control server online. In order to decrypt the data, a private key is needed, which is stored on a command-and-control server. The private key is, therefore, never stored locally, so you can’t decrypt the data yourself. Decrypting the data yourself is impossible without the private key.

    Once your data is encrypted, you are presented with a message to send a specified amount of money to remove the encryption. The amount of money is about $100 USD or $300 USD. The payment is to be made through MoneyPak, Ukash, cashU or Bitcoin. After a specific time without payment, the key that is used to decrypt your data is destroyed and your data can’t be decrypted.

    What files does CryptoLocker encrypt? Files with these extensions 3fr, accdb, ai, arw, bay, cdr, cer, cr2, crt, crw, dbf, dcr, der, dng, doc, docm, docx, dwg, dxf, dxg, eps, erf, indd, ????????.jpg, ????????.jpe, img_*.jpg, kdc, mdb, mdf, mef, mrw, nef, nrw, odb, odc, odm, odp, ods, odt, orf, p12, p7b, p7c, pdd, pdf, pef, pem, pfx, ppt, pptm, pptx, psd, pst, ptx, r3d, raf, raw, rtf, rw2, rwl, sr2, srf, srw, tif, wb2, wpd, wps, x3f, xlk, xls, xlsb, xlsm, and xlsx. This is a long list is contains most common data files that everyone uses.

    Not only can the data files on your local, internal hard drive be encrypted, but it has also been reported that files on attached external hard drives and network drives can also be encrypted.

    Protecting Yourself From CryptoLocker

    The best defense, as it is with most malware, is to ensure you don’t open strange e-mail messages. With CryptoLocker, it is send through well-crafted e-mail messages.

    The e-mail messages may inform you about a customer support-related issue, or perhaps a message from a courier company, such as Fedex, UPS, etc. The e-mail messages will include a ZIP attachment that contains the CryptoLocker program. The program itself is disguised as a PDF File – including the PDF icon – but has a name like FORM_101513.pdf.exe.

    As I mentioned above, if you don’t recognize the e-mail, or it doesn’t make any sense to you, just delete the e-mail without opening it.

    Also, you should ensure that you always backup your data. I recommend you use Backblaze (I use them) to backup your files. If CyrptoLocker, or other malware, destroys your files, then you can always restore them with Backblaze.

  • How to Backup Your Files for Years to Come

    How to Backup Your Files for Years to Come

    It is amazing how fast life can go by sometimes. I was recently looking at some of my digital photos and realized that I have over 28,000 digital photos saved since 2002. That was the year I bought my first digital camera. Back then I didn’t realize how many I would actually accumulate, but after starting a family since that time, the number of photos has grown exponentially.

    Photos aren’t something that I can recreate, which means that if I lose one, it is lost forever. If you are like me and have kids, losing photos is probably something you hope will never happen – because you can’t retake the picture. As I was going through my photos I am always glad that I have a good backup process in place that allows me to enjoy the same photos 11 years after they were taken. Having a backup process is the reason that I know I can view these photos 11 years into the future and beyond.

    (more…)

  • How to Secure the Linksys EA4500 Wireless Router

    How to Secure the Linksys EA4500 Wireless Router

    Wireless routers, by default, are unsecured when you connect a router for the first time. This is important to know as you will need to take the necessary steps to secure any wireless router that you have just purchased.

    With regards to Linksys routers, the steps to secure the router are very similar, so if you have trouble finding proper steps to secure your Linksys router, you can usually follow steps for another Linksys router.

    To make it easier for owners of the Linksys EA4500 wireless router, I will provide the steps to secure the router below.

    Steps to Secure the Linksys EA4500 Wireless Router

    If you have owned a Linksys router in the past, the steps I outline below make look familiar, that is because the firmware that is included with the various Linksys routers look very similar.

    I have divided the steps into several sections to make it easier to follow, and to indicate what tasks each group of steps perform.

    Loading the Router’s Web Interface

    Before securing your Linksys EA4500 you will need to access the Web interface. This is done by opening a Web browser and navigating to the router’s Web interface.

    Note:

    I suggest that you use Internet Explorer, if available, to access the Web interface. Many users have reported problems with accessing the Web interface for a router with other Web browsers.

    1. Open you Web browser and then enter 192.168.1.1 in the address bar.
    2. The router will then prompt for a user name and password. Leave the user name field blank, and type “admin” (without the quotes) in the password field.

    Change the Router Password

    Once you have access to the Web interface, the first steps you should perform are to reset the password needed to access the Web interface. Unfortunately, you can’t change the user name with the stock firmware, buy making the password long and complex should provide enough protection.

    1. Click the “Administration” tab from the menu at the top.
    2. Next, if the “Management” page isn’t display, then click the “Management” link at the top.
    3. In the “Router Access” section, enter a new password for the router, and then enter the same password in the second field to confirm.
    4. Click the “Save Settings” button at the bottom.
    5. The router will then save the new password, and you will be required to re-login again with the new password. The user name will still be blank.

    Setup the Wireless Network

    The steps outlined in this section are probably the most important steps to follow. These steps will secure your wireless networks from unauthorized users. Failure to perform these steps will allow anyone access to your wireless network.

    The Linksys EA4500 allows devices to connect to it on either the 2.4 GHz or 5 GHz frequency. In order to make a device connect to either frequency without having to change networks, we will be making both frequencies use the same network name (SSID).

    1. Log into the router, if you haven’t already done so, and then click the “Wireless” tab at the top.
    2. By default, Wi-Fi Protected Setup (WPS) is selected, which is unfortunate because WPS is not secure. Click the “Manual” option to switch from WPS.
    3. For both the 5 GHz and 2.4 GHz sections use the following settings:
      • Network Name (SSID): The name for your network. This is the name that will appear in the list of wireless networks that can be detected by wireless devices.
      • Security Mode: WPA2 Personal or WPA Personal.
      • Passphrase: Enter a long and complex string of characters, numbers and symbols. This is the most important element to secure your wireless network.
    4. Click the “Save Settings” button at the bottom to save your security settings.

    After you perform the steps outlined in “Setup the Wireless Network”, you can then select you wireless network from the list of available networks and then enter the passphrase that you have created. Anyone that connects to the wireless router will need to enter this passphrase – unless you setup guest access within the router.

    At this point your Linksys EA4500 wireless router is secured, and no unauthorized users should be able to gain access to your network or router.

  • The Top 3 Most Dangerous Computer Viruses

    The Top 3 Most Dangerous Computer Viruses

    Computer viruses have come a long way since the very first one in early 1970s. Back in those days, computer viruses were basically self-replicating programs which didn’t do a lot of harmful activities (or anything harmful at all).

    Most were intended as academic testing purposes, and some were pretty much intended as jokes. The first virus in the wild was Elk Cloner, which essentially cloned itself from floppy disks to spread and upon 50th use, it will show a poem.

    Since then, viruses were developed with different purposes. These days when you talk about a computer virus, you think about malicious programs with evil intentions.

    For good reasons, too.

    Do you know how much destruction computer viruses are causing every year?

    Billions.

    Yes, that’s in dollars. Millions of computers get infected every year, and billions of dollars are lost.

    (more…)

  • How to Simplify Your Backup Process

    How to Simplify Your Backup Process

    If you used computers for any length of time, chances are that you have experienced a computer crash. If you were lucky, you were only faced with the hassle of attempting to get your computer up and running. However, in far too many cases, computer crashes result in partial or total data loss.

    Backing up your essential files and programs has always been wise, but in past decades the process was cumbersome, slow and expensive. These days, there is little excuse not to back up your computer files. In many cases the backup process runs in the background, allowing you to continue to use your computer while protecting your data against loss. Depending on your needs and your budget, you also have several data backup options.

    (more…)

  • Advances in Technology that Keeps Your Home Safe

    Advances in Technology that Keeps Your Home Safe

    Everyone knows that a good security alarm system can help protect your home from intruders, but since the first home security alarms, released in the 1850’s, technology has made giant leaps to make our homes even safer. Check out these recent advances in technology that can help keep you safe within your home.

    (more…)

  • DDoS Attack Metrics for 2013 [Infographic]

    DDoS Attack Metrics for 2013 [Infographic]

    Getting yourself informed on DDoS attack trends from quarter to quarter through the year is a vital part in understanding and preventing these attacks on your data and security. Only through obtaining accurate facts and figures will you able to get yourself properly learned and well-prepared in the event you need protection. Take a look at this infographic to get a clear and coherent review, through stats and figures, of DDoS attacks from the first quarter of 2013, compared to the second quarter.

    In merely a single quarter, DDoS attacks have grown not only in size, but power and duration as well. This infographic will give a break down on the comparison of total DDoS attacks, DDoS attack modes, and average duration, bandwidth, and packets-per-second. From the first quarter to the second, the percentage of total DDoS attacks has went up a full 20 percent, while average duration has increased 10 percent. Get detailed info on all aspects of DDoS attacks from the first to second quarter, through this infographic.

    (more…)