Here is a descriptive list of “Back to School Cyber Security Tips” – The LastPass Blog

These tips are good educational points for, not only for Students, but for everyone. I have found over the years people do not take online and device security seriously and/or do not have a good understanding of it. I encourage you to follow the source link below to learn the basics and learn how to keep your online presence safe.

Online and device security may not be the first thing that comes to mind with the new school year, but more and more middle school, high school and college students have mobile devices, laptops, and online educational requirements. It is more important than ever that students protect their digital lives as much as adults.

Source: Back to School Cyber Security Tips – The LastPass Blog

At Last, The Secret to Satellite Internet Security is Revealed

This is a Guest Post by Allen Jame, who is a follower of “What’s On My PC”. Thank you Allen for sharing your expertise on Satellite Internet Security with my readers…

Satellite communication is referred to as one of the most popular communication technology used for global communication.

Its applications are vast. Military intelligence, Broadband internet service, and weather forecasting are its some most popular applications.

The satellite dish network internet Wi-Fi is supposed to be the best solution for getting internet in the rural areas.

Although its advantages are vast still security in the satellite communication is a significant concern.

There are many limitations. For example, power control, high link delay, and link availability are some of the standard security issues on the satellite internet.

During the satellite communication, protections of the links and the satellites are not enough. Sound integrity and the confidentiality of the downlink earth stations is also a significant concern.

In this article, you will witness security issue with the satellite internet. Some of the main security issue covered in this article are:

  • Eavesdropping
  • Satellite security link protocol issues
  • Network infrastructure issues
  • TCP based security issues
  • Information-System based security issues
  • Long delays

Continue reading “At Last, The Secret to Satellite Internet Security is Revealed”

Kaspersky’s Antivirus For FREE Soon Rolling Out

I have known Kaspersky’s Antivirus to be one of the best when it comes to computer security (however, at a price — not FREE). Soon you will be able to get a baseline version of Kaspersky’s Antivirus for FREE. This new development by Kaspersky’s (according to ZDNet) is apparently in light of the U.S. Government removing Kaspersky Lab from two lists of approved vendors used by government agencies to purchase technology equipment. Apparently, this is amid concerns the Russian-based company’s products could be used by the Kremlin to gain entry into United States networks.

The removal of Kapersky’s from the vendors list follows the accusations from US intelligence agencies that Russia hacked into Democratic Party emails, thus helping Donald Trump to election victory, despite President Vladimir Putin proclaiming his country has never engaged in hacking activities, but some “patriotic” individuals may have.

Ok, now that you have digested this, is it safe to install the free version of Kaspersky’s on our home-based computer systems? Personally, I am not installing it and will stick to the free version of BitDefender; however, if you are interested in the FREE version, click on the source link below to monitor for its’ release. Reportedly, the free version will rollout to the U.S. first…

If you do opt to give this a try, make sure you remove (uninstall) any antivirus software that is currently existing on your computer. Typically, to remove antivirus software, it is best practices to visit the website of the product and look for an uninstaller that will completely and safely remove the antivirus software from your PC.

SOURCE: Kaspersky’s Antivirus FREE

 

Malwarebytes Labs Explain The “Dark Web” AKA: “Deep Web”

I encourage you visit the source link below to learn about the “Dark Web” (aka: Deep Web). Did you know that only 5% of the Web is easily accessible to the general public and that many other sites can only be visited if you have a direct URL. I often referred to the “Dark Web” here on the blog as the underbelly of the internet…

Before you go to read the article (which is very interesting), you need to learn some terminology:

  • Surface Web is what we would call the regular World Wide Web that is indexed and where websites are easy to find.
  • The Deep Web is the unindexed part of the Web. Actually, anything that a search engine can’t find.
  • The Dark Web is intentionally hidden, anonymous, and widely known for illicit activities.

Explained: the Dark Web

SOURCE: Malwarebytes Labs – Explained: the Dark Web

Many of the warning phrases you probably heard from your parents and teachers are also applicable to using computers and the Internet….

I am reblogging this information from US-CERT Security Tip (ST05-014) – Real-World Warnings Keep You Safe Online

U.S. Department of Homeland Security Seal. United States Computer Emergency Readiness Team US-CERT

Why are these warnings important?

Like the real world, technology and the Internet present dangers as well as benefits. Equipment fails, attackers may target you, and mistakes and poor judgment happen. Just as you take precautions to protect yourself in the real world, you need to take precautions to protect yourself online. For many users, computers and the Internet are unfamiliar and intimidating, so it is appropriate to approach them the same way we urge children to approach the real world.

What are some warnings to remember?

  • Don’t trust candy from strangers – Finding something on the Internet does not guarantee that it is true. Anyone can publish information online, so before accepting a statement as fact or taking action, verify that the source is reliable. It is also easy for attackers to “spoof” email addresses, so verify that an email is legitimate before opening an unexpected email attachment or responding to a request for personal information. (See Using Caution with Email Attachmentsand Avoiding Social Engineering and Phishing Attacks for more information.)
  • If it sounds too good to be true, it probably is – You have probably seen many emails promising fantastic rewards or monetary gifts. However, regardless of what the email claims, there are not any wealthy strangers desperate to send you money. Beware of grand promises—they are most likely spam, hoaxes, or phishing schemes. (See Reducing Spam and Identifying Hoaxes and Urban Legends.) Also be wary of pop-up windows and advertisements for free downloadable software—they may be disguising spyware. (See Recognizing and Avoiding Spyware.)
  • Don’t advertise that you are away from home – Some email accounts, especially within an organization, offer a feature (called an autoresponder) that allows you to create an “away” message if you are going to be away from your email for an extended period of time. The message is automatically sent to anyone who emails you while the autoresponder is enabled. While this is a helpful feature for letting your contacts know that you will not be able to respond right away, be careful how you phrase your message. You do not want to let potential attackers know that you are not home, or, worse, give specific details about your location and itinerary. Safer options include phrases such as “I will not have access to email between [date] and [date].” If possible, also restrict the recipients of the message to people within your organization or in your address book. If your away message replies to spam, it only confirms that your email account is active. This practice may increase the amount of spam you receive.
  • Lock up your valuables – If an attacker is able to access your personal data, he or she may be able to compromise or steal the information. Take steps to protect this information by following good security practices. (See the Tips index page for a list of relevant documents.) Some of the most basic precautions include locking your computer when you step away; using firewalls, anti-virus software, and strong passwords; installing appropriate software updates; and taking precautions when browsing or using email.
  • Have a backup plan – Since your information could be lost or compromised (due to an equipment malfunction, an error, or an attack), make regular backups of your information so that you still have clean, complete copies. (See Good Security Habits.) Backups also help you identify what has been changed or lost. If your computer has been infected, it is important to remove the infection before resuming your work. (See Recovering from Viruses, Worms, and Trojan Horses.) Keep in mind that if you did not realize that your computer was infected, your backups may also be compromised.

Geek Squeak #17-020: An Advanced Users’ Malware Killer

Curious if any of the folks out there with technical expertise have ever used RogueKiller? I typically go to Malwarebytes AntiMalware; however, I see RogueKiller has pretty darn good reviews.  The main point that jumps out at me is that RogueKiller is for advanced users (see video below)…

Roguekiller is a popular and an effective tool to remove some stubborn malware but be warned; you better know what you’re doing. While a lot of more well-known tools will only scan and delete for you, this tool will show you everything it finds that is a possible problem. You need to know what to remove and what not to remove, or you could delete something you want, or need. Your results may vary, but just use caution and do your homework before removing anything or ask someone who is computer savvy.

SOURCE: Major Geeks -RogueKiller 12.11.1.0


Thank You For Visiting

MAKE SURE YOU ALSO VISIT

Main Page

Bookmarks4Techs  –  GEGeek  –  Downloads
Tech News  –  Tech Deals  –  Archives (of all articles)


Leave A Comment

Powered by WordPress.com.

Up ↑