mix

mix150.com MIX150 DOWNLOAD GAMES PLAYSTATION RIP FILMS
Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Monday, August 6, 2012

Tips on Mobile Phone Security

Ever since the first affordable mobile phone came out in the late 90s, it seems that every body has this nifty little gadget on their person wherever they go. The mobile phone has evolved from big clunky devices that showed pixelized images on a tiny screen. Nowadays, phones offer sharp and clear images and does more than just make and receive calls. It also does a number of things such as send and receive text messages, MMS, and email, allows the user to access the internet, offers short-range wireless communication, functions as a camera, portable music device, and gaming device as well. Mobile phones that have these features are also called smartphones. It is like having a tiny computer that can fit right in your pocket which you can bring wherever you want to go.

As mobile phones are turning into small computer-like devices, and becoming more and more sophisticated, it does not come as a surprise that the phone and the data inside the phone becomes more and more vulnerable as well. Not many people know this but mobile phones can be tracked and this is easily done. The location of the mobile phone is easy to determine through cell tower triangulation. And because the phone is almost always with the person, it is sometimes used to know where a person is also. The service provider of the mobile phone is also able to track the activities of the phone and law enforcement agencies can also perform surveillance using mobile phones.

Nowadays, most people use their phones beyond making calls and sending text messages. Most of the time, their mobile phones also contain personal and confidential information such as phone numbers, social security numbers, private text messages, and pictures. And because most phones also function as a GPS device or are GPS-enabled, it is becoming easier to track your phone from anywhere in the world. Because of this, it is important that you protect your phone and the data it contains. You can do this by buying a security software for your phone.

Aside from purchasing a security software for your phone, you can also set up a password for your device. This is the easiest thing you can do to protect it from unauthorized use. You can usually set up your password by accessing the security features of your phone or asking your service provider to help you with it. As much as possible, do not let other people use your phone or leave it unattended. Untrustworthy people can easily download a spyware on your phone within minutes and this spyware can access your phonebook, your text messages, and even allow other people to covertly listen to any conversations you might have when you use your phone. Last tip in securing your phone: when you get a notification that someone is attempting to connect with your phone, make sure that it is from a known and trusted device. Set up your device in such a way that it is not discoverable so that unknown devices cannot connect to your mobile phone immediately. Remember, it pays to be vigilant, whether it be protecting yourself, or protecting your mobile phone.

Mobile security is a big issue and is something you should take seriously. Take action now to protect yourself from attacks.


View the original article here

Friday, July 20, 2012

New technology tightens cyber security

ScienceDaily (Jan. 6, 2012) — Signcryption is a technology that protects confidentiality and authenticity, seamlessly and simultaneously.

For example, when you log in to your online bank account, signcryption prevents your username and password from being seen by unauthorized individuals. At the same time, it confirms your identity for the bank.

UNC Charlotte professor Yuliang Zheng invented the revolutionary new technology and he continues his research in the College of Computing and Informatics. After nearly a three-year process, his research efforts have been formally recognized as an international standard by the International Organization of Standardization (ISO).

News of the ISO adoption comes amidst daily reports of cyber attack and cyber crime around the world. Zheng says the application will also enhance the security and privacy of cloud computing.

"The adoption of signryption as an international standard is significant in several ways," he said. "It will now be the standard worldwide for protecting confidentiality and authenticity during transmissions of digital information."

"This will also allow smaller devices, such as smartphones and PDAs, 3G and 4G mobile communications, as well as emerging technologies, such as radio frequency identifiers (RFID) and wireless sensor networks, to perform high-level security functions," Zheng said. "And, by performing these two functions simultaneously, we can save resources, be it an individual's time or be it energy, as it will take less time to perform the task."

Recommend this story on Facebook, Twitter,
and Google +1:

Other bookmarking and sharing tools:

Story Source:

The above story is reprinted from materials provided by University of North Carolina at Charlotte, via Newswise.

Note: Materials may be edited for content and length. For further information, please contact the source cited above.

Note: If no author is given, the source is cited instead.

Disclaimer: Views expressed in this article do not necessarily reflect those of ScienceDaily or its staff.


View the original article here

Thursday, June 28, 2012

All About Bluetooth Security

These days, almost all communication technologies and gadgets face threats of identity theft and piracy and Bluetooth is no exception. This is because of the popularity of mobile phones. Almost all cell phones, including the cheap ones, have Bluetooth function these days and hackers and scammers are having a gala time by breaking the Bluetooth and stealing confidential data and information. Needless to say, mobile phones are bearing the maximum brunt from hackers these days. Hackers are always on the prowl to corner their next victim. Even cheap mobile phones and contract phones consist of the Bluetooth technology and the ever-increasing number of cell phone users has surely created abundant joys for the mobile phone hacker.

Cell phone experts are however of the opinion that it's not difficult to maintain Bluetooth security. In fact, they say that the scare of Bluetooth hacking is mostly exaggerated and dramatized. Keeping the Bluetooth of your contract phone or cheap mobile phone secure is no big deal and it's effortless to manage. Several measures have been adopted by authorities in various countries to keep the Bluetooth of cheap cell phones and contract phone out of the reach of scammers and hackers. The experts say that the uncomplicated specifications of Bluetooth use an encryption algorithm which is absolutely safe. At the same point of time, there's no denying of the fact that thousands of mobile phones across the world have fallen prey to miscreants.

So how does a hacker hack into a Bluetooth device? First, he forces a couple of paired devices, such as a contract phone or a cheap cell phone, to break their connection. He then steals the packets that are used for re-sending the pin. Finally, he decodes the pin and tampers with the data. Of course, the hacker has to be within the reach of the device.

The pairing system is one of the most basic levels of security for contract phones and cheap cell phones that have Bluetooth. As a mobile phone user, always make sure that you use a secure pin to connect two Bluetooth devices. This pin would be known only to the persons who are connecting their Bluetooth devices. Moreover, it's always advisable to establish Bluetooth connectivity with a device whose owner you know. Avoid establishing any connectivity with a cheap cell phone or contract phone or any other Bluetooth device.

But we usually tend to ignore little pieces of advice and go on doing the obvious. This often leads to data theft from our gadgets. It is indeed a worry at a time when an increasing number of financial transactions are executed by our cheap mobile phones and contract phones. Besides, as most phones these days are able to connect to the internet, we must be more careful in keeping our mobile handsets out of the reach of hackers. Danger never comes with any prior information and even before we blink, we may fall victim to a hacker. So exercise caution when you use the Bluetooth of your contract phone cheap cell phone and you can have peace of mind.

Select from a wide range of contract phones, attractive mobile phone deals, cheap handsets & economical call plans.


View the original article here

Wednesday, May 30, 2012

All About Smartphone Security

With the number of smartphone users increasing and applications becoming more and more popular, the number of those falling prey to mobile hackers is also on the rise. And this is one issue which is overlooked by most smartphone users.

Many people still find it hard to believe the power that a smartphone commands. Most smartphone handsets are more powerful when compared to desktops. Because of this, it appears impossible that a similar set of vulnerabilities that computers face almost everyday, would pose as a threat to the mobile phone.

Smartphones are part of our everyday life and most online transactions, including banking, are carried out through it. Scammers and hackers are thus always on the prowl to capture valuable information out of a smartphone.

Smartphone users usually indulge in increased internet activity and it's quite possible for them to click on a malicious link which captures valuable personal details like the username and password of an online baking account. While the link itself may look innocuous, the harm has already been done and information has already passed on to the hackers.

Another recent activity being carried by scammers and hackers is the creation of applications that can be freely downloaded from several online stores. These applications comprise a virus. Once the application is downloaded and installed on the smartphone, the virus becomes active. Moreover, there are many applications that cause the user to send text messages at a premium rate, often costing up to £5 per message, without the user knowing anything about it. Such a type of scam is quite rampant these days and has shocked several subscribers at the end of the month.

These security threats, however, aren't entirely unavoidable. First, buy or download applications only from a genuine and authorized online store. This would significantly reduce the chances of being a victim to scams. Also, never try to pilfer with the smartphone. This could lead to someone running unauthorized software on your handset and chances are high that such software could be consisting of malicious elements. Besides, pilfering the handset would nullify the manufacturer warranty.

One must exert proper precaution while using the Wi-Fi or Bluetooth facility on the smartphone handset. The Wi-Fi of the smartphone must never be accessed from any unsecured location and both the Bluetooth and Wi-Fi must be switched off after use. These will prevent hackers from accessing your phone. Keeping the Bluetooth on for a long time can greatly reduce the battery life of your phone.

A good way to keep hackers and scammers at bay is to install good anti-virus software on your smartphone. The software will prevent any malicious program from entering your phone. Many updated anti-virus software also prevents pirated applications from being installed on your handset. But make sure that you always install genuine anti-virus software and not any copied version.

A little bit of cautiousness and prudence on your part can save your smartphone from falling prey to hackers. Always check your monthly smartphone bill for ensuring that there's no suspicious activity.

Select from a wide range of 3G smartphones, attractive smartphones deals, cheap handsets & economical call plans.


View the original article here

Monday, August 15, 2011

Friday, July 29, 2011

Wi-Fi Hotspot Security


Many people don't think twice about logging onto Starbuck's free wi-fi or using their hotel's wireless network when traveling, but the truth is, although public wi-fi hotspots like these are very convenient, they also carry a lot of risk. Open wireless networks are prime targetsfor hackers and identity thieves. Before you connect to a wi-fi hotspot, use the security guidelines below to protect your personal and business information, as well as your mobile devices.


Disable Ad-Hoc Networking

Ad-hoc networking creates a direct computer-to-computer network that bypasses typical wireless infrastructure like a wireless router or access point. If you have ad-hoc networking turned on, a malicious user may gain access to your system and steal your data or do pretty much anything else.

  • Turn off ad-hoc networking in Windows XP by going to your Wireless Network Connection's properties and make sure you have "Access point (infrastructure only)" as the one option selected for type of networks to access. Kenyon College has visual instructions for turning off ad-hoc wireless for Windows XP, Windows 7, Vista, and Mac operating systems.


Do Not Allow Automatic Connections to Non-Preferred Networks

While you're in the wireless network connection properties, also make sure the setting to automatically connect to non-preferred networks is disabled. The danger if you have this setting enabled is that your computer or mobile device may automatically (without even notifying you) connect to any available network, including rogue or bogus wi-fi networks designed only to lure unsuspecting data victims.

  • In Windows XP, make sure the checkbox that says "Automatically connect to non-preferred networks" is not checked (About's Wireless/Networking Guide has steps for disabling auto-connect for Windows XP); Windows 7 and Vista by default prompt you to approve new connections. Also make sure you only connect to known, legitimate networks (ask the hotspot provider for the SSID if you are unsure).


Enable or Install a Firewall

A firewall is the first line of defense for your computer (or network, when the firewall is installed as a hardware device), since it's designed to prevent unauthorized access to your computer. Firewalls screen incoming and outgoing access requests to make sure they are legitimate and approved.

  • Both Windows and Mac operating systems have built-in firewalls that you should make sure are enabled, especially before connecting to a public wi-fi hotspot. You can also install third-party firewall software if you need more granular control of the firewall settings or rules.


Turn file sharing off

It's easy to forget that you have file sharing turned on or files in your Shared Documents or Public folder that you use on private networks but wouldn't want shared with the world. When you connect to a public wi-fi hotspot, however, you are joining that network and may be allowing other hotspot users to access your shared files.

  • Before connecting to a public hotspot, make sure you disable file and printer sharing (disable sharing in XP in the network connection's properties; Windows 7 and Vista will turn off discovery for you if you specify the network is a public one, but you can check the Network and Sharing Center to make sure).


Log On Only to Secure Websites

The best bet is not to use a public, open wi-fi hotspot for anything that has to do with money (online banking or online shopping, for example) or where the information stored and transferred may be sensitive. If you need to log in to any sites, though, including web-based email, make sure your browsing session is encrypted and secure.

  • Check the address bar to see if it starts with HTTPS (encrypted) rather than HTTP (not encrypted) and/or if there is a padlock in your browser's status bar. Note that some webmail programs encrypt the login page but not the rest of the browsing session -- make sure the setting in your email program requires using HTTPS or SSL encryption for the entire interface; Gmail has this option.

  • Most instant messaging programs are also typically not encrypted; Aim Pro is one business-friendly IM program that can send instant messages over a secure connection.


Use VPN

VPN creates a secure tunnel over a public network, and therefore is a great way to stay safe when using a wi-fi hotspot. If your company provides you with VPN access, you could, and should, use the VPN connection to access corporate resources, as well as create a secure browsing session.

  • Remote accesss solutions such as LogMeIn can also create a secure tunnel to a second computer at home, from which you can access files or use do other computing.

  • You can also use a free personal VPN service like Hotspot Shield, designed specfically to protect you when using an unsecured network.


Beware of Physical Threats

The risks of using a public wi-fi hotspot aren't limited to fake networks, data intercepted, or someone hacking your computer. A security breach could be as simple as someone behind you seeing what sites you visit and what you type, a.k.a. "shoulder surfing." Very busy public locations like airports or urban coffeeshops also increase the risk of your laptop or other gear getting stolen.

  • For these reasons, you need to also keep in mind physical security measures like laptop security cables and laptop privacy screens.


Note: Privacy Protection Isn't the Same as Security

One last note: There are many applications that help you mask your computer address and conceal your online activities, but these solutions are only meant to protect your privacy, not encrypt your data or protect your computer from malicious threats. So even if you use an anonymizer to hide your tracks, the security precautions above still are necessary when accessing open, unsecure networks.

source from about.com