How Do I Know If an App Is Safe?


Computer Security Tip of the Week

Scott Aurnou – What are the risks when downloading apps to your mobile phone or tablet? The apps can be infected with mobile malware that can force your phone to send premium rate text messages, steal your personal and/or financial information and even co-opt your device into a mobile botnet; or adware (aka ‘madware’) that places unwanted ads throughout your phone. Here’s what to look out for to avoid these unwelcome guests.

If you enjoyed this video, you can see more on TheSecurityAdvocate YouTube channel (and subscribe if you like).

Tagged with: , , , , , , , , , , , , , , , , ,
Posted in Security Tip of the Week, Smartphones & Tablets

What is ‘Wardriving’ and How Can It Affect Your Company’s Computer Network?

Sneaky MalwareBy Scott Aurnou

Computer networks can be threatened by a host of potentially unexpected sources. Some of these start with ‘wardriving.’ Naturally, this begs a few questions…

What is ‘wardriving’? Literally speaking, it refers to hackers driving around with laptops or mobile devices connected to high-powered antennas, scanning for unlocked (i.e., no password needed for access) or poorly protected networks. The name is a variant on ‘wardialing,’ which was inspired by a scene in the movie WarGames in which the lead character used an old-style telephone modem to search for open computer networks. Strictly speaking, wardrivers log and collect wireless network info, without actually jumping onto the networks. Using another’s network without permission is called ‘piggybacking.’

What can wardriving lead to? Wardriving is often used to locate networks vulnerable to attack. If hackers identify yours as unlocked or relatively unprotected, they can download malware onto the system and/or surreptitiously search the computers and devices connected to the network for personal, company and financial data, log in credentials, passwords, etc. One relatively common scam involves spotting a vulnerable network via wardriving, infiltrating it to steal online banking log in information and then using it to transfer or withdraw funds from the company’s accounts.
Read more ›

Tagged with: , , , , , , , , ,
Posted in Network Security

What is Computer Forensics?


Computer Security Tip of the Week

Scott Aurnou – Computer forensics can be used to preserve electronic evidence and determine the methods used and damage caused by a data breach.

A longer course on computer forensics is available here (and can be viewed for free):
Computer Forensics: Deleting Does Not Mean What You Think

If you enjoyed this video, you can see more on TheSecurityAdvocate YouTube channel (and subscribe if you like).

Tagged with: , , , , , ,
Posted in Network Security, Security Tip of the Week

Cloud Service Contracts: Breaking Down the All Important Service Level Agreement (SLA)

By Kaiser WahabCloud Storage

For many businesses, storing company and customer information in the cloud may seem like the cheapest and most convenient option. Too often however, businesses rarely realize that with one-click ease they are putting critical data (personal info, trade secrets, intellectual property, etc.) in the crosshairs of a security disaster, due to compliance issues over privacy, data security, and other laws and regulations. Hence, the ease of a cloud solution can lead to a legal headache if a strong contractual foundation is not put into place. The most critical of those contracts may be the SERVICE LEVEL AGREEMENT (“SLA”) between the client and the cloud service.

By making both parties aware of their responsibilities and when they may be held liable for failing to live up to those responsibilities, a strong SLA can help prevent many of the hassles and dangers that can come with switching over to the cloud. This article provides insight into the major parameters and provisions that drive the SLA.

The provisions of an SLA generally fall into three broad categories:

Data Processing and Storage;
Infrastructure and Security; and
The Provider-Client Relationship.
Read more ›

Tagged with: , , , , , , , , , , , , ,
Posted in Cloud Security, Guest Posts

What is Whitelisting and How Can It Protect Your Network?


Computer Security Tip of the Week

Scott Aurnou – Whitelisting is a method of protecting a computer network by blocking programs and incoming Web traffic unless they are specifically approved to connect to the network.

If you enjoyed this video, you can see more on TheSecurityAdvocate YouTube channel (and subscribe if you like).

Tagged with: , , ,
Posted in Network Security, Security Tip of the Week