Secure Your Wi-Fi Router (it’s What Connects You to the Internet)

Wi-Fi RouterBy Scott Aurnou

A Wi-Fi router broadcasts a wireless signal to connect your computer and/or network to the Internet (often via a modem). While routers typically do the job of connecting you to the Web effectively, they are also vulnerable to a number of different attacks if they aren’t set up (aka ‘configured’) properly. Recent studies have noted that many popular routers can be hacked fairly easily. In addition to stealing your business, financial and personal data – and then your identity to empty your bank accounts – a network interloper can also infect your system with malware to force your computer into a botnet or ‘piggyback’ on your wireless signal to use the Internet and download whatever they wish. While using your wireless signal may not sound all that threatening, significant downloading can slow down your whole system. Also, consider the 2011 case in which an upstate NY man was subject to a violent late night police raid on his home and arrest after a neighbor used his unprotected network to download child pornography.

In case you’re wondering how your router would even get noticed amid all of the wireless network traffic out there, potential hackers use methods like wardriving to find vulnerable routers and networks that they can exploit. All of this begs the question: what can you do to better secure your router and protect your home or office computer (and network)?
Read more ›

Tagged with: , , , , , , , , , , , , , ,
Posted in Network Security

What is Two-Factor Authentication and How Can It Save You If an Attacker Has Your Password?


Computer Security Tip of the Week

Scott Aurnou – If hackers ever get your password, two factor authentication can literally be the only thing standing between them and your personal or business data… or even your bank account. Learn more about it here.

If you enjoyed this video, you can see more on TheSecurityAdvocate YouTube channel (and subscribe if you like).

Tagged with: , , , , , , , , , , , , , ,
Posted in Laptops & Desktops, Security Tip of the Week

Computer Basics: What is ‘the Cloud’?

By Scott Aurnou

We hear the term all the time, but what does ‘the cloud’ actually refer to? Literally speaking, ‘the cloud’ is just a marketing term. It refers to some sort of computer-related function (like data storage or a web-based program) that’s just located someplace else and accessed through the Internet. The concept is relatively straightforward, but calling it ‘the cloud’ makes it sounds more ethereal and alluring.

Cloud ComputingPlenty of familiar programs, including Facebook, Twitter (as well as any other social network), Gmail, Outlook and Dropbox, are accessed through the Internet (aka the cloud). A program that runs on the Internet (rather than directly on your computer), is referred to as a ‘Web app,’ which is short for ‘Web-based application.’ ‘Application’ is just another way of saying program, so it’s a program hosted someplace else that you access via the Internet.

Cloud storage allows you to back up your data off site (always a good idea in case anything happens to your own computer or network) or simply store it somewhere else. In effect, instead of putting papers in your own filing cabinets, you’re essentially storing them at an off-site warehouse (except you can access them a lot quicker).
Read more ›

Tagged with: , , , , , ,
Posted in Cloud Security

Ransomware Locks You Out of Your Own Computer – How Can You Avoid It?


Computer Security Tip of the Week

Scott Aurnou – Getting hit with ransomware can be a very unwelcome surprise. This type of attack will disable all or part of your computer’s functionality and/or encrypt your own data so you can’t read it and then ask for payment to release it. This week’s security tip discusses how you can safeguard your computer against it and what to do if it happens to you.

Helpful websites referenced in this video include:
Computer Security Tip of the Week – Update Your Software
Secunia: http://secunia.com/
AppFresh for Mac: http://metaquark.de/appfresh/mac

If you enjoyed this video, you can see more on TheSecurityAdvocate YouTube channel (and subscribe if you like).

Tagged with: , , , , , , , , , ,
Posted in Laptops & Desktops, Security Tip of the Week

The Phishing Gallery – April 2013

By Scott Aurnou

‘Phishing’ attacks are designed to steal your personal, financial and/or log in information. This can be done in a few ways, including via email or text message (referred to as ‘smishing’). They often contain links to websites that look legitimate but are really there to steal your account log in information or host malware ready to attack your computer. These emails and messages can also be used to lure you into contact with scam artists posing as potential clients or officials offering to release substantial funds to you if only you would be so kind as to give them detailed personal information or a sum up front. Phishing attacks are generally designed to make you take action by either frightening or tempting you. Some of them are actually very well crafted. Some not so much. And some border on the ridiculous. Each month at The Security Advocate, we will present a number of examples, along with explanations of what to look out for to avoid falling victim to one of the scams.
Smishing Text Message
This is a somewhat obvious smishing text message, complete with spelling errors, the temptation of ‘Quick Emergency Money’ and a link to a fake ‘survey’ website that can only lead to trouble. While this sort of message will often reference some sort of payment or prize for participation, those promises are empty ones. A text like this is only designed to trick you out of your information… and then your money. You should ignore anything like it, as well just about any text message from someone you don’t know.
Read more ›

Tagged with: , , , , , , , , , ,
Posted in Fraud & Scams, Laptops & Desktops