Ransomware is a type of malware that tries to extort money from you. One of the nastiest examples, CryptoLocker, takes your files hostage and holds them for ransom, forcing you to pay hundreds of dollars to regain access.
Most malware is no longer created by bored teenagers looking to cause some chaos. Much of the current malware is now produced by organized crime for profit and is becoming increasingly sophisticated. Read more >>
A security researcher recently discovered a backdoor in many D-Link routers, allowing anyone to access the router without knowing the username or password. This isn’t the first router security issue and won’t be the last.
To protect yourself, you should ensure that your router is configured securely. This is about more than just enabling Wi-Fi encryption and not hosting an open Wi-Fi network. Read more >>
Windows has a built-in firewall that blocks inbound connections. If a program wants to act as a server, Windows will prompt you. Some geeks don’t like the built-in firewall because it doesn’t offer the same prompts for outgoing connections.
The Windows firewall allows all programs on your computer to connect to the Internet without asking you. There’s a whole firewall industry bent on convincing average users that they need additional protection, but you really don’t.
Outbound Firewalls vs. Inbound Firewalls
The Windows firewall only shows you a single type of application-related firewall prompt. When an application wants to function as a web server — for example, if you install web server software, start using a BitTorrent client, or host a game server — you’ll see a prompt saying the application wants to function as a server. If you consent, the application can then receive incoming connections from the Internet or your local network. Of course, you’ll still have to forward ports on your router if the application doesn’t support UPnP to automatically forward the ports. Read more >>
Just because an email shows up in your inbox labeled [email protected], doesn’t mean that Bill actually had anything to do with it. Read on as we explore how to dig in and see where a suspicious email actually came from.
See an example of scam that has been sent to me, pretending it is from my friend, claiming she has been robbed and asking me for financial aid. I have changed the names — suppose that I am Bill, the scammer has send an email to
[email protected], pretending he is
[email protected]. Note that Bill has forward to
[email protected]. Read more >>
Some people’s networked printers, cameras, routers, and other hardware devices are accessible from the Internet. There are even search engines designed to search such exposed devices. If your devices are secure, you won’t have to worry about this.
Follow this guide to ensure your networked devices are properly isolated from the Internet. If you configure everything properly, people won’t be able to find your devices by performing a search on Shodan.
Secure Your Router
On a typical home network — assuming you don’t have any other devices plugged directly into your modem — your router should be the only device that’s connected directly to the Internet. Assuming your router is correctly configured, it will be the only device that’s accessible from the Internet. All other devices are connected to your router or its Wi-Fi network and are only accessible if the router allows them to be. Read more >>