‘Watershed’ United States v. Cotterman Decision Limits Border Searches

GavelBy Scott Aurnou

In February 2013, this website discussed the effective non-existence of 4th Amendment protections at U.S. border crossings. For years, under what is known as the ‘border search exception,’ U.S. border agents have had unfettered authority to examine and search any luggage – including any cameras, laptops, mobile phones, tablets and other electronic devices – of anyone entering the United States without any justification needed.

Less than a month later, a major decision from the United States Court of Appeals for the Ninth Circuit Court (a Federal appellate court encompassing the states and territories of Alaska, Arizona, California, Guam, Hawaii, Idaho, Montana, Nevada, the Northern Mariana Islands, Oregon and Washington State) in a case called United States v. Cotterman has added a new wrinkle. While the Court ruled that border agents can still perform a standard search of electronic devices at will, they must have a ‘reasonable suspicion’ of criminal activity before the devices can be subjected to a deeper forensic analysis used to uncover data not readily apparent upon the initial examination on the device. This reasonable suspicion can be based upon the ‘totality of the circumstances,’ as opposed to a single specific incriminating item or event.
Read more ›

Tagged with: , , , , , , , , , , , , , ,
Posted in Laptops & Desktops, Privacy Issues, Smartphones & Tablets

What Is HTTPS and How Can It Keep Your Bank Account From Getting Hacked?


Computer Security Tip of the Week

Scott Aurnou – HTTPS is essentially an encrypted version of the Internet which allows you to connect to and use many of the websites you visit more securely.

Helpful websites referenced in this video include:
HTTPS Everywhere: https://www.eff.org/https-everywhere

If you enjoyed this video, you can see more on TheSecurityAdvocate YouTube channel (and subscribe if you like).

Tagged with: , , , , , , ,
Posted in Laptops & Desktops, Security Tip of the Week

The Phishing Gallery – March 2013

By Scott Aurnou

Cyber criminals hackers and scammers use ‘phishing‘ attacks to steal your personal, financial and/or log in information. This can be done in a few ways, including via email or text message (referred to as ‘smishing‘).

These attacks often contain links to websites that look genuine but are just there to steal your account log in information or host malware that will attack your computer or mobile device. If it’s an email, it can also include an attachment – needless to say, opening it won’t lead to anything good. Some of these attacks are actually very well crafted. Some not so much. And some border on the ridiculous. Each month at The Security Advocate, we will present a number of examples, along with explanations of what to look out for to avoid falling victim to one of the scams.
Fake Auction Message

Phishing emails will generally try to either frighten or tempt the recipient into clicking on the links in the message (and triggering the attack). This is an example of the latter, with an organization you’ve never dealt with before offering top-flight electronics at prices that are literally too good to be true. Another red flag is that the email address listed at the ‘send’ field doesn’t match the site name (‘ZBiddy’) found in the message. Hopefully that would be enough to keep you from clicking but, if you’re curious, you can hover over a given web link with your computer’s cursor and the destination web address will appear on the lower left of your screen. If that address doesn’t match the link displayed, don’t click on it.
Read more ›

Tagged with: , , , , , , , , ,
Posted in Fraud & Scams, Laptops & Desktops

What Are Pentesting & Vulnerability Assessments and How Can They Protect Your Network?


Computer Security Tip of the Week

Scott Aurnou – Vulnerability assessments and pentesting are very important early steps to protecting your business’ computer network. Learn more about these basic risk management techniques here.

If you enjoyed this video, you can see more on TheSecurityAdvocate YouTube channel (and subscribe if you like).

Tagged with: , , , , , , , ,
Posted in Network Security, Security Tip of the Week

Eight Steps to Secure Mobile Phones & Tablets

By Scott AurnouLocked Smartphone

While threats to smartphones and tablets are only increasing as hackers and cyber criminals get more creative, taking a few basic (and relatively easy) steps will go a long way towards securing your device. Here are eight suggestions:

1) Don’t jailbreak or root your phone or tablet. ‘Jailbreaking’ or ‘rooting’ a mobile device refers to overriding the manufacturer’s settings – including disabling the device’s security settings and future updates – to allow it to download and use apps and other features that are normally not enabled on the device (‘jailbreaking’ refers to the process as it applies to an Apple iPhone, iPod Touch or iPad and ‘rooting’ is much the same for a smartphone or tablet running the Android mobile operating system). The vast majority of mobile malware affects these devices since their security systems are badly compromised by the jailbreaking or rooting process and they should never be connected to a business computer network.

2) Update your software. Updates to your mobile operating system and any apps on your smartphone or tablet often include security fixes and should be downloaded as soon as they’re available. There are notable differences between the various mobile operating systems and their updating procedures and it’s a good idea to be familiar with them so you know what to expect.
Read more ›

Tagged with: , , , , , , , , , , , , , , , , , ,
Posted in Network Security, Smartphones & Tablets