Skip to main content

Words of Caution for Staying Safe on the Web

Here is what Danvers Baillieu, COO of HideMyAss!, has these words of caution for staying safe on the web.

1. Beware of public WiFi
There are simple ways to prevent data loss via public WiFi. Check it’s legitimate: It’s easy for hackers to set up a fake WiFi network that looks like an official one.
Before signing on to any WiFi, the best way to check if the network name is legitimate is by asking an employee of the place you’re in.
2. Forget the network
Once you have finished browsing on a WiFi, log off all services you were using and then ask the device to forget the network so it doesn’t automatically join next time you’re in range.
3. Turn off your WiFi
Make sure you disable WiFi when you’re not using it. This prevents your device joining any rough networks automatically without you noticing.
4. Use a VPN
VPNs act as an intermediary between your device and the internet server, routing all your activity through your own little loop of the internet that is encrypted, meaning a would-be intruder will find it impossible to sniff your information out or know what you’re doing, whether this is on a mobile, tablet or computer.
5. Look after your passwords
It’s good practice to change all passwords regularly and not use the same passwords across many different services. There are password managers available online that help manage them all.

hacking
 
The most popular password of 2014 was 123456
There are also services that support two-factor authentication, allowing you to add two levels of password protection on services such as Gmail, Twitter and Facebook.
6. Check the lock
You wouldn’t leave your front door open, so why leave yourself vulnerable online?
If a website is secure it displays the green lock sign by it. This is otherwise known as HTTPS, and it encrypts the data that passes from your device to the internet server, meaning any hackers can’t decipher your private information.
7. Apps can be dodgy
Always check permissions on the apps before installing and make sure they aren’t accessing unnecessary information. For example, a drawing app should not have access to your contacts list or your network info.

Comments

Popular posts from this blog

Network-Based and Host-Based Vulnerability Scanners

There are two main types of automated scanners, network-based and host-based. Network-based scanners attempt to look for vulnerabilities from the outside in. The scanner is launched from a remote system such as a laptop or desktop with no type of user or administrator access on the network. Conversely, the host-based scanner looks at the host from the inside out. Host-based scanners usually require a software agent to be installed on the server. The agent then reports back to a manager station any vulnerabilities it finds. Network-based scanners look for exploitable remote vulnerabilities such as IIS holes, open ports, buffer overflows, and so on. Host-based scanners look for problems such as weak file permissions, poor password policy, lack of security auditing, and so on. Host-based and network-based scanners complement one another well. It is very effective to employ both when testing critical systems. Again, you need to be careful when using these scanners. Network-b...

Luxury streetwear and urban fashion trends

As the world of fashion continues to evolve, luxury streetwear and urban fashion trends have emerged as a major player in the industry. These styles blend the high-end sophistication of luxury fashion with the edgy, street-inspired aesthetic of urban wear, creating a unique and fashionable look that is perfect for both day and night. One of the key players in the luxury streetwear scene is the brand Supreme, whose iconic logo and collaborations with luxury brands like Louis Vuitton and Nike have made it a household name. Another popular luxury streetwear brand is Off-White, known for its bold, graphic prints and collaborations with fashion giants like Nike and IKEA. But luxury streetwear isn't just limited to big-name brands. Indie designers and smaller labels are also making waves in the industry, with their unique, one-of-a-kind pieces that combine luxury materials with street style. One of the key trends in luxury streetwear is the use of high-end materials like leather, suede, ...

IMAP and POP

IMAP and POP are mail protocols that enable users to remotely access e-mail. Since these protocols are designed and used for remotely accessing mail, holes are frequently open in the firewall allowing IMAP and POP traffic to pass into and out of the internal network. Because this access is open to the Internet, hackers frequently target these protocols for attack. Many exploits are available that enable hackers to gain root access to systems running IMAP and POP protocols. To defend against these exploits, system administrators should first remove IMAP and POP from the systems that do not need these services. Additionally, system administrators should ensure they are running the latest versions of the software and should monitor for and obtain all system patches.