Seems everybody is out for cheap deals on just about everything and who wouldn’t be in this recession where cash is hard to come by and jobs are being shed by the thousands. Now, there are truly some honest cell phone deals out there but you have to be sure you’re getting the right stuff. Having the latest phone gadget might be one thing but keeping that new phone secure from hacks is another. Sure you can get it cheap from the internet but how sure are you you’re getting the real stuff.
Criminals are becoming craftier than ever and they have even managed to copy branded products complete with all the security stickers and holographic security seals with them. They can also be pre-loaded with malware for the amount of computing power they pack is enough to emulate an ultraportable, in function that is. Just how dangerous are these hacking attempts, for mobile devices using Windows very dangerous for there is a group bent on exacting damage on the software giant.
ensuring you have the latest updates to your operating system is vital to maintaining your ability to fend off attacks. Having intrusion prevention systems installed is also a good thing for like your PC, they also need protection. Given the power of these gadgets and their ability to connect to the internet, they are not immune to attack. Let’s set this as an example, an unprotected PC connected to the internet for the first time will last an average of 15 minutes before it is hacked and compromised. Now you do the math for your mobile!
Archives for February 2009
Cyber Security In Obama’s Sights
Who said that Obama does not have a techie side to him? If reports earlier this month are to be believed, the newbie President is not ignoring the importance of cyber space. Iain Thomson of Vnunet.com had this report early this month:
US president Barack Obama has ordered an immediate 60-day review of the online security of government IT systems to check for vulnerabilities.
The review will be led by Melissa Hathaway, who has served as cyber co-ordination executive to the US Office of the Director of National Intelligence. Hathaway will also serve as acting senior director for cyberspace for the National Security and Homeland Security councils during the review period.
“The national security and economic health of the US depend on the security, stability and integrity of our nation’s cyber space, both in the public and private sectors,” said John Brennan, assistant to the president for counter-terrorism and homeland security.
First thoughts…this is wonderful; this coming from the head of the country, it should be a good sign. However, I was thinking about the 60-day limit – would this be enough? More so, are the intelligence arms going to be part of this review? I doubt that the CIA, the FBI, and the NSA will allow anyone to take a look into their systems. Maybe the review is just for the less sensitive government agencies. Who knows?
In any case, I was just thinking of those people who love hacking systems to get credit card numbers, bank account numbers, and the like. Those days will probably be gone pretty soon, don’t you think?
Protect Yourself Against The Conficker Worm
There are worms and there are worms. This worm, dear friends, seems to be making more noise than usual. In fact, since the Conficker worm was detected in October of 2008, it has affected more than 9 millions computers worldwide. In fact, Christopher Null over at Yahoo Tech says that the situation has gotten so bad that the numbers might have reached 15 to 20 million by now!
So how do you make sure you are protected? Here are some ways by which you can make sure that the Conficker worm will not get into your system.
First, it is important to understand that this worm takes advantage of security holes in Microsoft Windows – so what’s new? What you should make sure of is that your Windows is updated. Go to Microsoft and make sure that you have an updated patch that will resolve this issue.
Another thing that you can do is to disable autorun for CDs and USBs. The Conficker worm is a self-replication program and can spread through a network or removable disks. As such, when plugging in any removable device, you can take on the added protection by NOT having autorun on.
The good news is that home networks are relatively safe from the worm. This is due to the fact that firewalls and similar protection are often set in place. Do not be complacent, however, especially if you use your laptop outside of your home.
Good luck protecting your PC against this worm!