IT Security Blog

  • Home
  • About IT Security Blog
  • IT Security Basics
  • Real-World Issues
  • Network Security
  • News
  • Malware
  • Tips
  • Spyware

Wireless Security Tips

30 September 2010 By Saran

Wireless networks are becoming increasingly common these days, ranging from home use to businesses. Increased mobility within the network’s range and the reduced cost of installing a LAN without cabling are but some of the advantages you can get when using Wi-fi. It’s major disadvantage lies in the higher security risks of unscrupulous users hacking into your personal data and gaining access to the Internet to your network. Here are a few precautions you could take to ensure your network security:a laptop

Change the default administrator passwords. Default administrator passwords to network devices are easily available online and well-known to hackers. Most routers allow you to change this easily.

Turn on data encryption. This allows you to scramble the messages and data sent through the network. Most devices come from the manufacturers with this option turned off, so users have to activate this. Also note that all Wi-fi devices in your network must share the same data encryption settings to work together.

Disable SSID broadcast or change the default SSIDs. SSID is short for service set identifier, and is attached to the header of all packets in a wireless network. It also uniquely identifies your network. This is broadcast at regular intervals, and hackers can use this to identify vulnerable networks. Also, change your SSID from the default, and refrain from using IDs that can reveal who owns your router and where it’s located.

Restrict the computers that can access your network. You can do this by filtering the MAC (Media Access Control) addresses to those of the devices in your network.

Install antivirus software and firewalls. This might seem obvious, but after the initial install most users forget to update their virus definitions. Computers on a wireless network needs the same protection as other computers.

Filed Under: IT Security Basics, Real-World Issues, Tips, Wireless Security Tagged With: IT Security Basics, Real-World Issues, Tips, Wireless Security

Precautions with Bluetooth Connections

13 July 2010 By Saran

Among the features that most mobile phones have today is that of features that include the Bluetooth and Infrared connectivity as a means of wireless connections. While such advancements has made it easier for people to transfer files such as images and sounds from one phone to another, it also becomes a loophole to allow viruses to infect the operating system of mobile phones today.

Cabir Bluetooth Precaution

Worms such as Cabir, have become the onslaught of rampant mobile phone intrusions, something that uses the Bluetooth connectivity as a means of infecting mobile phones of today. Once they get through, malfunctions and error messages are sure to ensue, making it a need for the software systems of mobile phones of today to be either formatted or disinfected with available anti-virus and worm removers such as Panda Software.

Inconvenient as it may seem, it is advisable for mobile phone owners to refrain from activating their Bluetooth connections to avoid such infections and untoward intrusions at any time.

Filed Under: IT Security Basics, Malware, Operating Systems, Real-World Issues, Spyware, Tips, Wireless Security Tagged With: bluetooth, cabir, connectivity, viruses, worms

Careful of Unknown Links in Messaging

6 July 2010 By Saran

Trojans hacks and worms can easily enter a person’s computer by a mere click of a link. Instant messaging, the new trend in adhering towards faster and easier communication anywhere in the world has been enhanced thoroughly, going to the extent of allowing links to be followed, sometimes generated automatically from infected computers. Such are done even when offline messages are left, such as in Yahoo Messenger issues.

Instant Messages

The best way to avoid such links is to refrain from clicking on links without prior notice from the actual user. While most people would rely heavily on the level of relationship that they would have with their online buddy, it is still best to double check and verify before proceeding on the site link.

Being infected is quite painful that it leads to even formatting the entire system. This holds true for people who are not aware or have the time to clean it manually and methodically. Hence, the best way is to be more cautious, especially when peculiar links are met.

Filed Under: IM, Instant Messaging, IT Security Basics, Malware, Spyware, Wireless Security Tagged With: hijack, Instant Messaging, trojans, worms, yahoo-messenger

Scan Storage Devices before Enabling

27 October 2009 By Saran

Viruses and malware issues are far from being a thing of the past. On the contrary, they seem to grow large by numbers as each day passes. Thus the works of security software companies have their work cut out for them. There is not definite date to which such threats and intrusions would wholly be resolved.

Scanning Protocol

For the time being, it would be advisable for people to scan third party storage devices such as diskettes, USB drives and mobile storages to be safe and sound. These wandering viruses can attack at any time and this is a fact anywhere computer related materials are concerned.

Files can go as far as infecting the executable files, hence document, excel and compiled scripts are baits for immediate infection and malicious intrusions. Software applications also have their limits as their development teams cater only to a specific genre for known harmful files. But it is better to lower the risk of intrusion than not having protection at all.

[tags]scan, spyware, virus, infections, spyware, malware, trojans[/tags]

Filed Under: Backups, IT Security Basics, Malware, Network Security, Operating Systems, Programming, Real-World Issues, Security Policies, Spyware, Storage, Tips, Wireless Security Tagged With: infections, Malware, scan, Spyware, trojans, virus

Smartphones Get The Best Of Hackers

26 March 2009 By Saran

symbianTwo posts ago, I wrote something about British people NOT paying much attention to security on their mobile phones. If the results of the Pwn2Own smartphone hacking contest are to be relied on, then there might not be much too worry about – unless someone physically steals your phone.

According to a story ran by Apple 2.0, hackers were kind of stymied during the contest. Here is a snippet of the feature:

The contest, sponsored by 3Com’s (COMS) TippingPoint computer security division, pitted some of the world’s sharpest hackers and computer security experts against five smartphones: an Apple (AAPL) iPhone, a Research in Motion (RIMM) BlackBerry and phones running on Google’s (GOOG) Android, Microsoft’s (MSFT) Windows Mobile and Nokia’s (NOK) Symbian operating systems.

Although the rules were relaxed each day to make hacking easier, the phones managed to withstand the few attempts that were made to “pwn” them — Internet-gamer slang meaning to conquer or gain ownership.

I believe this was the same convention where the Safari was hacked by Miller. Luckily for the smartphones, though, none were cracked by the time the contest ended. This spells good news to smartphone owners like me and you. I was just thinking about searching for more security applications for my Nokia smartphone but perhaps it is not that urgent.

So are the phones just that good? Perhaps. Or maybe, they are still new and they have not really been the focus of hackers. While this is good news, I am thinking that pretty soon, they will become the targets. What do you think?

Photo from 3g

Filed Under: Real-World Issues, Wireless Security

Cellphone Deals Here…and there…. What’s the catch?

27 February 2009 By Saran

phishingSeems everybody is out for cheap deals on just about everything and who wouldn’t be in this recession where cash is hard to come by and jobs are being shed by the thousands. Now, there are truly some honest cell phone deals out there but you have to be sure you’re getting the right stuff. Having the latest phone gadget might be one thing but keeping that new phone secure from hacks is another. Sure you can get it cheap from the internet but how sure are you you’re getting the real stuff.
Criminals are becoming craftier than ever and they have even managed to copy branded products complete with all the security stickers and holographic security seals with them. They can also be pre-loaded with malware for the amount of computing power they pack is enough to emulate an ultraportable, in function that is. Just how dangerous are these hacking attempts, for mobile devices using Windows very dangerous for there is a group bent on exacting damage on the software giant.
ensuring you have the latest updates to your operating system is vital to maintaining your ability to fend off attacks. Having intrusion prevention systems installed is also a good thing for like your PC, they also need protection. Given the power of these gadgets and their ability to connect to the internet, they are not immune to attack. Let’s set this as an example, an unprotected PC connected to the internet for the first time will last an average of 15 minutes before it is hacked and compromised. Now you do the math for your mobile!

Filed Under: Cryptography, E-mail, General, IM, IT Security Basics, Malware, News, Privacy & Anonymity, Real-World Issues, Spyware, Tips, Web browsers, Wireless Security

Newer Posts
Older Posts

Categories

  • Backups
  • Cryptography
  • E-mail
  • Firefox
  • General
  • Google Chrome
  • IM
  • Instant Messaging
  • IT Security Basics
  • Malware
  • Network Security
  • News
  • Operating Systems
  • Physical Security
  • Privacy & Anonymity
  • Programming
  • Real-World Issues
  • Review
  • Security Policies
  • Spyware
  • Storage
  • Tips
  • Web browsers
  • Wireless Security