Is Your Router Secure? Be Sure Your Network Is Encrypted Properly


Computer Security Tip of the Week

Scott Aurnou – Your router is the piece of equipment that connects your computer to the Internet. If it’s not set up (aka ‘configured’) properly, it can leave you vulnerable to a number of different electronic attacks. These can include stealing your business, financial and personal data, as well as a few other nasty surprises…

Websites referenced in this video include:
Secure Your Wi-Fi Router (it’s What Connects You to the Internet)

If you enjoyed this video, you can see more on TheSecurityAdvocate YouTube channel (and subscribe if you like).

Tagged with: , , , , , , , , , , , ,
Posted in Network Security, Security Tip of the Week

What Is a Rootkit?

Image courtesy of Sophos

Image courtesy of Sophos


By Scott Aurnou

‘Rootkit’ is a term used to describe stealthy – and frequently malicious – software that can give an attacker complete control over a system while remaining effectively invisible to a legitimate computer user or system administrator. One way to think of it might be like an unseen intruder able to wander though your home or office at will. A disconcerting image, to be sure. The name ‘rootkit’ comes from the term ‘root’ access, which in turn describes administrative or ‘superuser’ access on the older Unix computer operating system. Someone with root access effectively has system-wide control. This can be used to cause significant damage to a computer or network, though rootkits are generally geared towards stealth – they are more likely to alter other software running in the system to prevent detection and conceal themselves. This makes many of them very difficult to detect.

There are legitimate uses for rootkits – such as employer or parental monitoring software – though many of them are malicious.

What kind of damage can a rootkit cause? While the degree of access and control to a target computer depends upon where it is embedded in a system, a well-placed rootkit can do just about anything to a target computer. This includes hiding other malware from detection by security software and/or creating easy access (usually via a ‘backdoor’ in the target system) for the rootkit or other malware to surreptitiously spy on computer users, steal data, sabotage system resources or remotely control the computer for use in a botnet.
Read more ›

Tagged with: , , , , , , , , , , , , , ,
Posted in Laptops & Desktops, Network Security

Computer Forensics Is Never DIY – What Can Go Wrong?


Computer Security Tip of the Week

Scott Aurnou – Computer forensics is the science of identifying, acquiring & preserving potential electronic evidence stored within computers, networks and various electronic devices. Acquiring that evidence properly requires specialized equipment and training and, without it, the evidence you need can be rendered unusable or even destroyed. Learn more about it here…

If you enjoyed this video, you can see more on TheSecurityAdvocate YouTube channel (and subscribe if you like).

Tagged with: , , , , , , , , , ,
Posted in Network Security, Security Tip of the Week

The Phishing Gallery – August 2013

By Scott Aurnou

‘Phishing’ attacks are designed to steal your personal, financial and/or log in information. This can be done in a few ways, including via email or text message (referred to as ‘smishing’). They often contain links to websites that look legitimate but are really there to steal your account log in information or host malware ready to attack your computer as soon as you click on the link. These emails and messages can also be used to lure you into contact with scam artists posing as potential clients or officials offering to release substantial funds to you if only you would be so kind as to give them detailed personal information and/or a sum up front. Phishing attacks are generally designed to make you take action by either frightening or tempting you. Some of them are actually very well crafted. Some not so much. And some border on the ridiculous. Each month at The Security Advocate, we will present a few examples, along with explanations of what to look out for to avoid falling victim to one of the scams.
Fake Contract Message

This email tries to grab your attention with the ominous-sounding all caps subject ABOUT THE CONTRACT and reads:

Hello,
I got your email from the Internet index.
Can we discuss business? Please email me on
guanting.contact@yahoo.com.tw for details.
Mr Guan Ting

While this particular message is a rather clumsy attempt to entice the recipient with the possibility of a business arrangement, much better versions of this sort of scam are not uncommon. They often (but not always) target lawyers and other professionals who can ‘help’ them collect an allegedly unpaid debt. The debt will appear to be settled without much trouble and the new client will be happy with the fine work. He or she will then instruct the email recipient to deduct their fee and send over the balance of the amount collected. After the funds have been sent out, of course, the debt payment will turn out to be bogus and the overseas ‘client’ will never be heard from again. This sort of scam is not new, and the ABA and a number of individual state bar associations have warned attorneys about them. If you receive an email like this, don’t respond to it. If anything, consider forwarding it to the U.S. Attorney’s Office or the F.B.I.
Read more ›

Tagged with: , , , , , , , , , , ,
Posted in Fraud & Scams, Laptops & Desktops

What is BYOD and What Are the Risks That Come with It?


Computer Security Tip of the Week

Scott Aurnou – BYOD has become increasingly common as more and more businesses allow their employees to connect to company computer networks with their own smartphones and tablets. Learn more about the various ways a BYOD program can be set up, as well as the risks that can come with it here.

If you enjoyed this video, you can see more on TheSecurityAdvocate YouTube channel (and subscribe if you like).

Tagged with: , , , , , , , , , , , ,
Posted in Network Security, Security Tip of the Week, Smartphones & Tablets