Tails Upgraded to Version 1.2

 Linux, Security  Comments Off on Tails Upgraded to Version 1.2
Oct 212014
 

The Tails project is asking users to upgrade to its newest release, Tails 1.2, stating that it has fixed a bunch of security issues and bugs in the new version.

Tails (an acronym for The Amnesic Incognito Live System) is the Debian Linux-based anonymous operating system that provides greater anonymity and privacy compared to other operating systems.

The free software is meant to be run off a DVD, USB stick, or SD card and leave no ‘fingerprints’ on the computer.

Highlights of Tails 1.2

* Fix for the POODLE vulnerability by replacing the Iceweasel-based browser with Firefox 31.2.0 extended support release Continue reading »

How To Stay Secure Online with Free Tools

 Security  Comments Off on How To Stay Secure Online with Free Tools
Oct 032013
 

The Internet is a wonderful invention with its vast treasure chest of text, image and video.

You can spend a lifetime and still skim but a tiny surface of the vast Internet.

Perils of the Internet

But as with all things touched by humans, the Internet is also a dangerous zone where all kinds of shady creatures lurk.

These shady elements install viruses and other malware on your PC, steal login information to your bank, Facebook and e-mail accounts, wipe out the contents of your hard drive, spy on you by turning on your PC’s camera and install malicious software that lets the bad guys use your computer as a bot to send out spam or attack other computers.

Important Security Tools

While it’s impossible to be completely safe from the predators, you can minimize the exposure to viruses and malware by using a bunch of free tools.

Here are 10 free tools to safeguard yourself from the malevolent beasts lurking on the Internet:

1. Ghostery – Last year, I lost one of my Windows XP PCs because of a Google Redirect virus. If only I had Ghostery running on that system I wouldn’t have suffered so much tension. Ghostery prevents redirects of web pages and tracking of your browsing habits through web trackers (hidden objects like scripts, pixels and other elements embedded in web pages).

A free browser extension, Ghostery is available for Firefox, Internet Explorer, Safari, Opera and Google Chrome browsers.

Do not enable GhostRank if you’re worried about the anonymous data Ghostery collects about tracking elements.

Where to get Ghostery – Search in the Extensions tab of your browser.

2. Prey – A free tool that helps to recover your stolen Windows or Mac desktop and laptop and mobile devices (iOS and Android).

Prey Tool To Locate Your Stolen Laptop, Smartphone or Tablet

Once you install Prey, it runs silently in the background although you won’t be able to see it. You can use Prey to safeguard your laptop, desktop computer, smartphone and tablet. If your device is stolen, Prey will take pictures of the thief (if your laptop has a Webcam), screenshots and geo-location and send them to you via the Prey control panel. You can then use the information and retrieve the stolen device yourself or seek the help of the police.

Supports Windows, Mac OS, Linux, Ubuntu, Android and iOS.

You can install Prey on up to three devices. The free version gives you 10 reports.

Where to get Free Prey – http://preyproject.com Continue reading »

Microsoft Starts Screwing Windows XP Users

 Security, Windows  Comments Off on Microsoft Starts Screwing Windows XP Users
Sep 092013
 

Windows XP Support Hard to Get

Microsoft has already started making life difficult for Windows XP users as the company gets ready to end support for Windows XP (and Office 2003) on April 8, 2014.

I recently got a preview of Microsoft’s non-support vis-a-vis Windows XP will be like.

I removed my hard drive from a legal copy of HP Windows XP Media Center Edition (purchased at the now dead Circuit City in 2005) and popped it into an old Acer machine whose hard drive had failed.

Since the hardware for the two computers was different, the Acer computer asked me to validate the copy of Windows XP. I tried doing it online but it didn’t work and the screen gave me a telephone number to call.

Since this is the era of outsourcing, my call went to India.

When I explained my activation problem, Microsoft’s activation center in India gave me an extremely hard time repeatedly refusing to help me in getting my legal copy of Windows XP activated on the new hardware (Acer).

Multiple excuses were offered by Microsoft’s activation team in India to refuse to activate my old Windows XP:

It’s an old product….Product key has exceeded the number of activations…..Windows has to live and die with the hardware.

None of the reasons were justifiable. Some like it’s an old product were outright illegal.

Plus, this was the first time I tried to activate Windows XP (when I bought the HP Windows XP Media Center Edition in 2005 it was already activated).

Only after more than 60-minutes of cajoling, pleading and escalating my requests through the support chain was I able to get my legal copy of Windows XP activated on the Acer computer.

My difficult time with Windows XP is a harbinger of what other XP users can expect starting April 9, 2014.

Only amplified a million times because of the absence of any support.

Windows XP – Security Nightmare Coming

Since Windows XP was the last fully baked operating system without too many issues, millions of customers sat on the sidelines when Microsoft released subsequent versions of its operating system – Windows Vista, Windows 7 and Windows 8.

Nearly 34% of desktop computer users were still running Windows XP in August 2013.

The majority of computer users in China and India are on Windows XP.

If customers don’t upgrade to newer versions of Windows and newer hardware, then Microsoft and its hardware partners like Dell, HP, Acer, ASUS and Lenovo won’t make money. One of the reasons the PC market is in a big slump today is that customer upgrade cycles are getting longer.

To ensure that customers get the message on upgrading, Microsoft has been driving home the point that after April 8, 2014 Windows XP users will not get new security updates, non-security hotfixes, Windows updates, free or paid assisted support options (there’s been some backtracking on the support but at a very high cost of $200 per PC per year) or online technical content updates.

In other words, Windows XP customers are screwed from April 9, 2014.

As Microsoft’s Director of Trustworthy Computing Tim Rain wrote in the company’s security blog last month:

The very first month that Microsoft releases security updates for supported versions of Windows, attackers will reverse engineer those updates, find the vulnerabilities and test Windows XP to see if it shares those vulnerabilities. If it does, attackers will attempt to develop exploit code that can take advantage of those vulnerabilities on Windows XP. Since a security update will never become available for Windows XP to address these vulnerabilities, Windows XP will essentially have a “zero day” vulnerability forever.

In short, a security nightmare awaits Windows XP users starting April 9, 2014.

IBM Buys Israeli Cybersecurity Specialist

 Security  Comments Off on IBM Buys Israeli Cybersecurity Specialist
Aug 152013
 

To help banks and other financial institutions thwart the plague of cybercrimes, IBM is strengthening its cybersecurity business with the acquisition of Israeli startup Trusteer.

IBM is setting up a new cybersecurity software lab in Israel that will bring together its researchers as well as Trusteer’s 200 security specialists.

The cybersecurity lab will address mobile and application security, counter-fraud protection, malware detection and financial crimes.

Trusteer’s strengths include cloud-delivered security services for fast response against new security threats, end-point security software for PCs and Macs, mobile software for account takeover prevention and compromised device detection, complex device fingerprinting and a global fraudster database.

Seven of the top 10 U.S. banks and nine of the top 10 U.K. banks are said to use Trusteer’s products to secure customer accounts against financial fraud and cyber attacks.

Besides causing millions of dollars in losses to banks, cyber attacks are reducing consumer confidence in online banking.

IBM said the new cybersecurity lab will be separate from its existing development facility in Israel.

Financial terms of the Trusteer acquisition were not disclosed.

Time to get Serious on Securing Your Mac

 Apple, Security  Comments Off on Time to get Serious on Securing Your Mac
Dec 102012
 

If all ye proud Mac owners (iMac, MacBook Pro and MacAir) still think viruses, trojans and malware are only destined at the lesser mortals inhabiting the Windows world, it’s time to get out of that la-la land state of mind.

The success of the Mac OS X platform – the Mac Minis, iMacs and MackBook Pros –  in recent years means virus and trojan authors are working overtime to turn your pricey Apple computer into a piece of junk.

In 2012, the biggest malware for Mac systems was the Trojan downloader Flashfake, which accounted for over 50% of the attacks targeted at Mac systems.

Mac OS Viruses

A Flashfake botnet consisting of 700,000 computers running under Mac OS X was discovered in the early 2012.

Cybercriminals in Eastern Europe and Russia also unleashed targeted attacks on influential politicians and prominent businessmen to access information stored on their computers.

Security software firm Kaspersky Lab created 30% more signatures in 2012 to detect various Mac Trojans compared to 2011. If you go back to 2010, the number of signatures created annually has increased six times.

Other security software firms are working overtime on bolstering the defenses of the Mac systems to the malware threats.

Antivirus signatures for Mac OS

How to Secure Your Mac

Here are some steps you can take to minimize the chances of your Mac computer being hit by one of those deadly malware and causing you considerable grief.

* Turn off Java in the Safari browser and for the full the Mac OS X. To turn off Java in Safari, open the browser, pull down the menu, select “Preferences” and click on the “Security” tab and uncheck the box next to “Enable Java.” Continue reading »

Major Internet Security Threats in 2013

 Security  Comments Off on Major Internet Security Threats in 2013
Dec 072012
 

The Internet is a reflection of how people behave in general.

As a rule, the majority of people in the world will try to do you and others harm if they think they can get away with it.

Don’t expect the Internet to be any different.

People will do their best to hack your web site or e-mail account, introduce malware into your PC, steal your bank passwords and generally make your life miserable.

Some will engage in bad behavior on the Internet to make money while others will do it out of sheer boredom.

As the Joker puts it aptly, Some men just want to watch the world burn.

Internet Security software company Kaspersky has released a list of the core threats you should expect to see in 2013.

Security Predictions for 2013

* Continued rise of targeted attacks
* Ongoing march of “hacktivism”
* More nation-state sponsored cyber-attacks Continue reading »