Tagged: wireless security

https

From BEAST to CRIME: Another Attack Exposes HTTPS Vulnerability

You might remember how a few months ago we detailed how HTTPS (or secure web browsing) is not really as secure as it seems. Last fall, two security researchers demonstrated a program they called BEAST that allows hackers to gain access to restricted user accounts.

Well, the same researchers have found another vulnerability in HTTPS. And this one may be even worse than the first.

Why HTTPS Is Not Secure

But first, let’s provide a little background on HTTPS.

 

Ask the Expert: Can a Botnet Really Turn My Computer Into a Zombie?

Q: “I recently read about something called bots and botnets, and that these things can turn my computer into a zombie. What does that mean? Can you explain what botnets are and what they do?”

A: Botnets are a new and scary online phenomenon. In layman’s terms, a botnet is a network of infected computers that are controlled virtually by a botmaster.

With the rapid growth in bot infections, it’s vitally important that everyone get up to speed about this threat.

Night of the Living BotNets

Botmasters can take over computers in a variety of ways, but usually they do it by sending infected emails to unsuspecting users. When the user opens a file attached to the email, their machine becomes infected.

After a computer becomes infected, the botmaster adds it to his or her botnet, which is the network of infected computers. Infected computers are sometimes called “zombie” computers.

 

Fast, Free and Out of Control: Why Wifi Users Disconnect from Wireless Security Risks at Hotspots

Do you ever wonder why so many Americans are becoming victims of identity fraud? According to the 2012 Identity Fraud Report by Javelin Strategy & Research, one of the chief reasons is our irresponsible mobile behavior. Find out why Wifi hotspot users continue to ignore the risks to their wireless security – and what you can do to avoid getting burned.

 

insecure

Ask the Expert: Are ‘Secure’ Websites Really As Secure As We Think?

Q: “All of my important websites (email account, financial accounts, and social media) use HTTPS, so this means that they are totally secure, right? That’s what I have always been told and I just want to make sure that I have nothing to worry about.”

A: Most of us assume that if a website uses HTTPS, it’s completely secure. The reality is that sites that use HTTPS are not as safe as most people think.

In fact, new information from SSL Pulse has highlighted just how insecure HTTPS really is.

Why Protecting Your Wireless Security Should Begin at Home

By now, you’ve undoubtedly heard that revealing sensitive information at Wifi hotspots is like playing Russian Roulette with your identity.  But you may not know that your network security can also be easily compromised when you’re using Wifi in the privacy of your own home.

 

Ask the Expert: Does Secure Browsing Really Keep Me Safe On Twitter and LinkedIn?

Q: I have an active Twitter feed and occasionally use LinkedIn for work purposes, but I am unfamiliar with how those sites secure my privacy. I read that both sites have introduced “secure browsing” but what exactly does that mean, and how is it keeping me safer?

A: A secure website has “https” in its URL and has a small lock symbol next to it. It’s used by most banks and online retailers to provide secure transactions.

Using Unsecured Wifi Networks Could Jeopardize Your Right to Privacy

By now, you probably know that using unsecured Wifi networks is risky business. But did you know it could jeopardize your Fourth Amendment rights which protect you from unreasonable government searches? Find out why wide open Wifi networks can be an open invitation to intruders on both sides of the law.

lock icon

The Three Biggest Reasons You Can’t Rely On ‘HTTPS’ For Privacy Or Security Online

For years, we have been told that HTTPS was reliable and secure, but the sad truth is this is no longer the case. If we cannot rely on websites to provide security via HTTPS, what is the answer? I strongly believe that each person needs to take individual responsibility for the privacy and security of their own Internet communications. Consider this: you have a firewall and anti-virus software on your computer, because you do not expect all sites to protect you against viruses. Why would you think you could rely on those sites to protect your communication? The only way to adequately protect your Internet communications is with a personal VPN, or virtual private network. You need to use a VPN whenever you are using a public wifi hotspot. And I happen to know where you can get a good one. Just click here and you can try it for free.

online payment

Should You Google Your Wallet?

 

Remember the days when a phone was for calling people? Well, they are long gone now.  First there were phones, then car phones, then mobile phones and now Smartphones.  There will probably be a new name for this next generation of phones coming out which seems to do anything you can imagine… Superphones perhaps?  Now, one of the necessities the Smartphone has taken on to replace is the wallet.

 

encryption

WEP, WPA, WPA2 and Home Security

WEP and WPA are types of security that are used to protect wireless networks, including the one you may be using at home. This white paper provides details of each, and suggests why you might be safer using one over the other.

Lax Hotel Network Security Leads to Credit Fraud

When travelers watch their credit cards getting swiped at hotel check-in, they assume their information will be safe. But what they may not realize is that hotel wireless networks are a favorite haunt of hackers. Before you check in, check out what you need to know to avoid becoming a victim.