Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Tuesday 28 December 2010

McAfee's 2011 List of Threats

With the New Year fast approaching, tech enthusiasts are very excited about all of the latest technology that is being introduced in 2011, but what about the possible security concerns that come with all the new technology? On Tuesday, December 28, 2010, McAfee released their 2011 list of threat predictions. The company said, "The list comprises [the] most buzzed about platforms and services, including Google's Android, Apple's iPhone, Foursquare, Google TV and the Mac OS X platform, which are all expected to become major targets for cybercriminals."

"We've seen significant advancements in device and social network adoption, placing a bulls-eye on the platforms and services users are embracing the most," said Vincent Weafer, senior vice president of McAfee Labs, in a statement. "These platforms and services have become very popular in a short amount of time, and we're already seeing a significant increase in vulnerabilities, attacks and data loss."

McAfee will have to work especially hard to fend off the increasingly sophisticated malware that will be targeting Apple in 2011. So far, the Apple Mac OS platform has been decently secure, said McAfee. The iPhone and iPad are growing increasingly popular in the business realm though, and McAfee is afraid that with the general lack of knowledge about how to secure these Apple devices Apple botnets and Trojans could be a frequent occurrence and become a serious issue.

The biggest thing that people need to be really careful about is social networking sites. McAfee said that sites like Twitter and Facebook can easily fall prey to problems like URL shortening scans. They continued saying that they knew that utilizing abbreviated links does make it easier to condense your 140 character limit Tweets, but sometimes these links are also an easy way for criminals to mask and direct users to malicious Web sites. Each minute there are more than 3,000 tiny URLs created. Due to these astronomical numbers, McAfee said that they expect to see an increasing number of URLs that will be utilized for spam, scamming, and other malicious purposes.

Although a recent study showed that only 4 percent of adults really use location-based services, companies are continuing to release location-based features including Foursquare, Google Latitude, Facebook Places, and more. McAfee warns that the information that is shared on sites like these could easily enable cyber criminals to formulate a targeted attack. They also predicted that in 2011 there will be an increase in the use of this type of tactic across most of the popular social networking sites.

A lot of these location-based services that people utilize are used via their mobile phones. Because of this, McAfee is also predicting a “rapid escalation” in the number of mobile attacks due to “widespread adoption of mobile devices in business environments, combined with historically fragile cellular infrastructure and slow strides toward encryption."

McAfee also said that the increased use of Internet TV connections could pose a serious security risk. If manufacturers just rush into releasing their products, they could run into some major issues with suspicious and malicious apps on platforms such as a Google TV device. "These apps will target or expose privacy and identity data and will allow cybercriminals to manipulate a variety of physical devices through compromised or controlled apps, eventually raising the effectiveness of botnets," McAfee said.

These weren’t the only things that McAfee had on the threat list that they released. The list also included:

Hacktivism: McAfee is predicting that there will most definitely be a rise in the number of possibly politically motivated cyber attacks. "More groups will repeat the WikiLeaks example," McAfee said. They continued saying that unlike WikiLeaks though, the strategy will be much more sophisticated and leverage social networks.

Friendly Fire: McAfee is saying that there will also be a rise in the use of malicious content that is disguised as an e-mail from a source that you know. There is “signed” malware that works to imitate legitimate files that McAfee is afraid will be much more prevalent. They also said that “friendly fire,” which is a threat that seems to come from your friends but really is a virus such as Koobface or VBMania, will become a much more prevalent choice by cybercriminals. McAfee also said that these attacks go hand-in-hand with social network attacks and that these social network attacks could quite possibly eventually overtake e-mail attacks.

Botnets: McAfee Labs is predicting that with the merger of Zeus and SpyEye that there will be more sophisticated bots that will be produced because of the advancements for bypassing security mechanisms and law enforcement monitoring. McAfee Labs also says that they expect to see an increase in botnet activity that begins to adopt data-gathering and data removal functionality, instead of the more common use of sending spam.

Well, one thing that can definitely be taken from McAfee’s 2011 list of threats is that there are definitely threats out there that users want to avoid. Security is a big issue that many people tend to avoid, including myself. Protection and caution is necessary and is something that people really need to pay a little more attention to.

A Tech Travel Agent from Rentacomputer.com, the Worldwide Technology Rental Company will schedule installation of projectors, computers, and office equipment on a permanent or temporary basis in over 1000 cities worldwide. Call 800-736-8772

We have 3987 Installers, Technicians and Engineers stationed worldwide to serve you.

Friday 9 July 2010

Summer Travel with Your Computer

Summer Travel with Your Computer

Let's face it. With computers becoming more and more mobile, many people are traveling with their laptops, smartphones, tablet computers, and even desktops in some cases. Vacation doesn't necessarily mean a vacation from EVERYTHING in 2010. We still check in with the office, we still check our email, and we still surf the internet or play games. But what happens if you have a problem? How do you prevent a problem from occurring? If you're planning to take you computer on the road this summer, here are a few tips for you to keep in mind:

- Remember when you are on a public network, you are vulnerable than you would be at home on your own network. Unless you have a firewall, any data that can be shared on your home network can be shared with the other people using the same network you are, whether it be in a restaurant, hotel, or other spot.

- Purchase and take along a car adapter. My personal laptop battery only lasts about two-three hours. That was a bit disappointing when I recently found myself in the backseat of my grandfather's car for a five-hour drive to Florida. I was able to get a little work done and play a few computer games, but over half of the trip was spent wishing I'd charged my iPod. So, take your car adapter along for long rides, or don't use power-hungry applications.

- If you are going to have to rely on your battery more than usual, make sure your computer is running smoothly. Get yourself a tune-up, defrag your hard drive, run a few malware removal programs and delete or disable programs you no longer use for quicker boot-up and optimum performance.

- Be aware of thieves. Sure, we worry about people stealing our data but if someone has physically stolen our computers, data stolen over unsecure networks is the least of our worries. According to LoJack for Laptops, 600,000 laptops are stolen from cars and hotel rooms each year. Fortunately, there are laptop locks you can purchase that prevent this from happening. Also, use common sense. If your computer is in your car and you need to run into a store, don't leave it in plain view. Keep it in a suitcase or in your car's trunk.

- Power down. If you're done working with your computer, turn the power off completely. Wireless connections and even Bluetooth connections can leave you vulnerable to attacks.

- Find out where you can get reliable tech support and computer service. Many hotels offer tech support but many do not. If you find yourself with a problem, you don't want to be stuck, trying to find someone who can help get you up and running again. A quick call to a company like Computer Service Now (1-877-422-1907) can take care of any of your problems, no matter where you are located.



Looking for Computer / PC Rental information? Visit the www.rentacomputer.com PC Rental page for your short term business PC needs. Or see this link for a complete line of Personal Computer Rentals.

Wednesday 28 April 2010

Keeping Your Child Safe Online

Keeping Your Child Safe OnlineKids are getting online more than ever these days, especially those who are into social networking websites such as Facebook, Twitter, and MySpace. I've seen kids as young as six or seven years old with Facebook accounts. While these websites can be fun, they can also be dangerous if they fall into the wrong hands and as a parent, it's your duty to make sure your child know the risks and how to protect themselves from harm's way.

Kids love to get online and are often more knowledgeable than their parents and teachers. That's why it's important that parents and teachers should take steps to learn about what's happening online and what their kids are involved with. Kids left to their own devices could end up in a number of troublesome situations, from dealing with a cyber-bully or a schoolmate with ill intent, to facing child predators or even con artists.

Communication is important. Talk to your kids about what they're doing online and remind them of the danger they could face and what to be on the lookout for. But there are other things to do to keep your kids safe.

1. Take advantage of parental controls. Children don't want their parents watching every move they make but many websites offers ways for parents to monitor or control their children's online activity while respecting their privacy. Talk to your kids about exactly what you plan to monitor or control and be honest with them to gain their respect.

2. Keep your computer in an area of the house where you can be there to keep an eye out, without hovering over your child's shoulder. Insist computers stay in the kitchen or living room and not in a bedroom or office, where your child can lock themselves away to get online.

3. Don't allow your children to meet random strangers whom they've met online. In the event your child absolutely has to meet someone, make sure a parents or trusted adult accompanies them. Make sure your children know the potential risks of someone not really being who they say they are.

4. Make sure you know the "code" your kids are using online. Acronyms such as "TAW" means teachers are watching and "PA" means parent alert. There are dozens of other ways kids use code to let their online friends know there is an adult around. If you see these frequently, you may want to investigate further what your child is doing.

4. Make sure your child's teacher is monitoring their online usage. Many schools have blocked certain websites but with kids' knowledge of the web, they can find other ways to get into trouble. With computers in almost every classroom these days, teachers should constantly monitor their students' use. If a student is clicking out of a window when you walk by or a group has gathered around one computer screen, chances are, your students are not doing what they should be.

5. Let your child know that they do not have to feel uncomfortable having a conversation online, just as in real life. Whether it's a friend or stranger they're talking to, make sure they know that feeling scared, trapped, threatened, or offended is not OK and it is OK to end that conversation. Talk to them about how they can end the conversation promptly and let them know they can talk to you about how they feel.

6. If you do set up a Twitter, Facebook, MySpace, or other social networking website, make sure your child is taking advantage of the privacy settings. Make sure your kids are only adding friends who aren't safe to talk to and keep an eye out for anything suspicious.

7. Make your children aware of malicious information, such as spam or virus threats. Help them understand what it means and what they should and shouldn't open or click on.

8. Google your children's names on a regular basis. Again, you don't want your child to feel like you are spying on them, but you can do this to show them just how easy it is for ANYONE to find out anything about them. If your child has a blog, a social networking site you are not aware of, or have posted any information about themselves online, it will most likely come up in a search.

9. Again, communication is key. Make sure your kids know that not everything they see online is legitimate and talk to them about incidents in the news, so they know the risks.



Looking for Computer / PC Rental information? Visit the www.rentacomputer.com PC Rental page for your short term business PC needs. Or see this link for a complete line of Personal Computer Rentals.

Tuesday 16 March 2010

Never Use These Passwords

Never Use These Passwords


Computer security is more important than ever these days and one of the most simple things you can do to protect yourself is come up with a password that is not easy to guess. Sure, it's tempting to come up with something easy for your own benefit; with all of passwords we have to remember these days, you probably find yourself forgetting your passwords if you don't keep careful documentation of them, but an easy password is like an invitation to anyone looking to steal your information.

According to researchers at the University of Maryland's James Clark School of Engineering in College Park, unsecured computers are hacked into over 2,000 times a day or every 39 seconds. Study leader Michel Cukier says it's a lot more common than you think, "Most of these attacks employ automated scripts that indiscriminately seek out thousands of computers at a time, looking for vulnerabilities. Our data provide quantifiable evidence that attacks are happening all the time to computers with Internet connections. The computers in our study were attacked, on average, 2,244 times a day."

Hackers are experts at coming up with passwords. For example, many people use their user name as their password. If you think you're being clever, guess again. 43% of the time, hackers are able to guess passwords by simply guessing that it's the user name. So what other kind of passwords are common and easily guessed? Below is a list of the ten most common passwords:

  1. User Name
  2. User Name with 123 at the end
  3. 123456
  4. the word "password"
  5. 1234
  6. 12345
  7. passwd
  8. 123
  9. test
  10. 1

If any of these sound familiar, you probably need to change your information immediately. In addition, you might want to reconsider your user name if it's one of these top ten common user names:

  1. root
  2. admin
  3. test
  4. guest
  5. info
  6. adm
  7. mysql
  8. user
  9. administrator
  10. oracle

Once a hacker gains access to your computer, any number of things can happen. According to the study, the first things they do are check your software configuration, change your password, check your hardware and software configuration again, download a file, install the downloaded program and run the downloaded program.

But why are they doing this? Often, they are creating a "botnet." A botnet monitors your computer and reports back to the hacker. They can lead to fraud or identity theft, disrupt other networks or damage computer files, and lots of other criminal activity.



Looking for Computer / PC Rental information? Visit the www.rentacomputer.comPC Rental page for your short term business PC needs. Or see this link for a complete line of Personal Computer Rentals.

Sunday 24 January 2010

Great Products For Child-Proofing Your Computer

Great Products For Child-Proofing Your Computer

Anyone with a child knows they are fascinated with computers, starting at a very young age. Leaving your child alone with your computer is not the ideal situation, but watching them every second isn't always possible, either. Whether you want to protect your children from the many dangers of the internet or protect your important files from little hands who may not know exactly what the "delete" button means, the following programs can help make your child's PC experience more enjoyable and help you rest a little easier.

Safe Eyes 5.0 This program does everything you need and then some. It's touch - your smartest kid won't break the code of protection - and it covers up to three computers. It's compatible with both Mac and PC and retails for about $49.95.

Peanut Butter PC 3.0 Peanut Butter PC not only protects your files, but it keeps your kids entertained at the same time. It's not nearly as tough as Safe Eyes, but it does have interactive elements. However, in a review, PC Mag says they aren't very exciting. This one retails for about $24.95.

Hoopah Kidview Computer Explorer 6 This one is perhaps a bit too cutesy for older kids, but it will keep the little ones out of your important files. It offers kid-safe email and keeps web-surfing age-appropriate and it sells for about $39.95.

KidZui 5.0 KidZui allows your kids to surf the web, play games, view videos and interact socially online in a very lively environment. And it does it all for a mere $7.95.

Net Nanny 6.0 This is probably the best choice for child-proofing your PC. It does what you probably expect it would, but it also offers a number of unique features not found on any of the other programs. It has secure web-traffic filtering, ESRB-based game control, and records IM conversations if they come across as dangerous. You can monitor and manage from any location with email alerts and remote configuration. This one is $39.95.

OnlineFamily.Norton This is the only free product on the list but it's actually pretty good quality compared to a few of the others. It blocks bad websites, controls how long your child can spend on the computer, supervises chats and social network use. It works with both Macs and PCs and remote configuration and reporting is super-easy.



Looking for Computer / PC Rental information? Visit the www.rentacomputer.com PC Rental page for your short term business PC needs. Or see this link for a complete line of Personal Computer Rentals.

Monday 18 January 2010

McAfee's Predicted Security Threats for 2010

McAfee's Predicted Security Threats for 2010

McAfee recently released a report that predicts potential online security threats for 2010. To summarize, the anti-virus and computer security company, which is based out of Santa Clara, California, sees an increase in threats from social networking sites, banking security, and bot nets. In addition, they see increases in attacks targeting users, businesses, and applications. However, the findings weren't all negative. McAfee says they expect an increase in law enforcement and its effectiveness in fighting cybercrime.

As social networking sites, such as Facebook and Twitter, become increasingly popular, they'll most likely become a breeding ground for cyber attacks. On top of the increased number, the attacks will be more sophisticated. Facebook users are particularly vulnerable due to the number of third party applications used. Games and other applications are popular and most people will trust an invitation from their friends without using caution. But that invitation could easily be malware or something else designed to harm your computer. There's really no way to protect yourself other than avoiding the third party apps such as quizzes and games.

URL shorteners such as bit.ly and tinyurl.com are also expected to become a target of cybercrime. These tie-in to social networking because most people use them to post links to their profiles. The websites shorten a normal URL into a smaller one that will fit in almost any space and is especially popular on Twitter, where you only have 140 characters to gets your message across. One major problem with these smaller URLs is that they can't be previewed, so clicking on one at random could lead you to somewhere you don't want to be. This makes it a very easy target for crooks.

Due to the popularity of Microsoft products, cyber criminals have been taking advantage of them for years. However, as programs such as Adobe Reader and Flash become more popular, McAfee expects they will become a bigger target, taking over the top "honor" from Microsoft. In 2009, Adobe Reader saw an increase of problems due to security holes, leading the company to take a more proactive approach to patching up problems.

Email attachments have always been a problem when it comes to spreading malware and that threat is expected to continue and even get bigger. The company expects an increase in specific targets when it comes to email, and those include journalists, corporations, and individual users who could easily be convinced to download an attachment that is hiding a Trojan or other bit of malware.

Other projected problems include banking Trojans. Normally used to get your financial information, McAfee expects them to become so advanced that they will start interrupting transactions and even withdrawing money from your accounts. 2009 already saw an increase in banking cybercrime, with many Trojans making their way past strong bank security. Botnets are also expected to be a threat. McAfee calls them a "leading infrastructure for cybercriminals" and says they are "used for actions from spamming to identity theft." While they are harder to track down due to their ability to move from computer to computer without a central base of operation, there has been some recent success in shutting them down.

Despite all the many threats, McAfee does project an increase in law enforcement's ability to track down cybercriminals. Even so, there are steps you should take to protect yourself. Purchasing security software and keeping it updated is very important and something everyone should do. Keeping your PC up-to-date with Microsoft patches that protect your operating system, office suite, and browser is also important. You should also be sure that you are aware of all the latest threats and realize what's at risk. Exercise caution when opening files or downloading applications.



Looking for Computer / PC Rental information? Visit the www.rentacomputer.com PC Rental page for your short term business PC needs. Or see this link for a complete line of Personal Computer Rentals.

Thursday 12 November 2009

Adobe Flash potentially puts most computers and users at risk



According to researchers there is a flaw within Flash that allows hackers to launch silent attacks on websites and users. Adobe hasn't tried to hide the fact that it is true and has suggested that its up to site designers to make sure they design their sites in such a way to prevent the attacks.

"The magnitude of this is huge," said Mike Murray, the chief information security officer at Orlando, Fla.-based Foreground Security. "Any site that allows user-uploadable content is vulnerable, and most are not configured to prevent this."

The problem lies in the Flash ActionScript same-origin policy which is designed to limit a Flash object's access to other content only from the domain it originated from, added Mike Bailey, a senior security researcher at Foreground. Unfortunately, said Bailey, if an attacker can deposit a malicious Flash object on a Web site -- through its user-generated content capabilities, which typically allow people to upload files to the site or service -- they can execute malicious scripts in the context of that domain.

"This is a frighteningly bad thing," Bailey said. "How many Web sites allow users to upload files of some sort? How many of those sites serve files back to users from the same domain as the rest of the application? Nearly every one of them is vulnerable."


The problem is that Adobe and security companies are trying to get the word out, but web application designers and programmers aren't listening. A few of the major sites that have actually locked down their servers to protect their users include Microsoft's Windows Live Hotmail and Google's YouTube, but sites like Google's Gmail and even some Adobe sites, still remain vulnerable. The researchers say the likelihood of an attack on Gmail is still very small, its also a very real possibility.

The only current defense users can employ against such attacks is to stop using Flash, or failing that, restrict its use to sites known to be safe with tools such as the NoScript add-on for Mozilla's Firefox, or ToggleFlash for Microsoft's Internet Explorer.

"The best mitigation is to not use Flash," argued Murray, "but we know that that's impossible for most users, since Flash is so widely used on the Web."

"Almost everyone using the Internet is vulnerable to a Web site that allows content to be updated inappropriately," said Murray. "That's not hyperbole, it's just fact. This has the potential to affect any social media site, any career site, any dating site, many retail sites and many cloud applications. That's why this attack is so serious. End users would never know they got exploited."



The best suggestion would be to get the news out about the vulnerability and hope that Adobe gets a patch to fix the problem before the slight flaw turns into a major headache for everyone.