Advertisement
Guest User

Untitled

a guest
Oct 23rd, 2016
135
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
C 7.70 KB | None | 0 0
  1. INTRO:
  2. Protecting  your family’s digital assets used to be easy. You just turned on your  PC’s built-in firewall settings and turned on an antivirus program. As  long as you didn’t install strange software or do anything stupid, you  were usually OK.
  3. Times  have changed. Now you can get infected just by visiting a compromised  website. Organized gangs of cybercriminals are trying to break into your bank account, steal your identity, or take control of your home network  to send spam and launch attacks against other machines.
  4.  
  5. And instead of just one machine to protect, you might have a dozen —  including mobile phones, game consoles, streaming video boxes, and smart  appliances — all vulnerable to attack. Just like a big, juicy corporate  network. In fact, as big companies make their networks harder to break  into, cybercrooks are moving to home networks.
  6. There are several things you can do to persuade the bad guys to move on to easier targets. It starts with the  gateway to most of the digital devices in your home: your wireless router.
  7.  
  8.  
  9. ROUTER :
  10. Use WPA or WPA 2 Encryption
  11. Hopefully, by now you’ve changed the default log-in name and passwords for your WiFi router and turned on WPA or WPA 2 encryption.
  12. It is recommended to use WPA or WPA2 security since it is more secure than WEP. However, for compatibility with some older devices, such as gaming consoles, and other network devices, WEP may be the only security option possible to use. Using WEP is still better than no security at all.
  13. 
  14.  
  15. Disable remote administration
  16. When enabled, remote administration allows anyone close  enough to your router to view or change your router settings. If you never plan on remotely administrating your network, e.g. wirelessly connecting to the router, it is recommended to disable remote administration.  With routers that support this option, it is often disabled through the Administration section.
  17.      
  18.     When disabled, the router settings can still be  changed using any computer that is directly connected to the router using a network cable.(safer solution)
  19.    
  20.  Change the default SSID name
  21.       The SSID is the name that identifies your wireless router. By default, many  routers will use the name of the router as the default SSID. For  example, Linksys routers use 'Linksys' as the SSID. Using a default SSID  is a security risk since it identifies the brand of the router and  would let any attacker immediately know what exploits to use.
  22.  
  23. Update your firmware
  24. You also need to make sure your router’s internal sofware (aka firmware) is up to date. Last February, security researchers Team Cymru discovered a security hole in more than 300,000 routers that could allow a remote attacker to hijack any home network and access all the machines attached to them
  25.  
  26. ANTIVIRUS:
  27. 
  28. This should be obvious, but according to Microsoft’s annual Security Intelligence Report only one out of four PCs in the US is not running up-to-date antivirus  software, making them nearly six times more likely to get infected than those that are. The numbers for mobile devices are also shocking —  only one in 20 smartphones is protected.
  29.  
  30. I'm sure that in Belgium we're not far from those statistics : So i'm going to ask two questions
  31. First, Who has an antivirus up to date on his computer ?
  32. Second , Who has an antivius on his tablet/phones ?
  33.  
  34. Malware scanners won’t catch everything, but a properly licensed anti-malware program can protect you against the vast  majority of online threats, even some “zero day” threats that have never been seen before.
  35. At  the moment, malware that targets phones and tablets is still somewhat rare. Over the next couple of years, that is guaranteed to change.  Fortunately, there are plenty of security apps for your mobile devices,  many of them free. Some of the top iPhone security apps are made by Trend Micro, McAfee. You can also find highly recommanded anti-malware Android app from Avast and Avira.
  36.  
  37. UPDATE :
  38. Update your operating systems early and often.
  39. Attackers love crawling through holes in your computer’s operating system, which  is why you always want to be running the latest version of your OS. Yet,  according to security vendor Secunia, nearly 13 percent of operating systems aren't up to date.
  40. The easiest way to keep Windows up to date is to tell it to automatically download and install updates as they appear. This will cause your system to reboot, which could  thoroughly bollix any work you haven’t saved or quit your on-going game.
  41.  
  42. Patch your software till it hurts.
  43. You know those seemingly constant reminders to update various bits of software? Odds are it’s because there’s a security hole that needs to be plugged. According to Secunia, one in nine software programs is left unpatched. And two of the least frequently updated programs — Oracle  Java and Adobe Reader — are also among the most vulnerable to attack.
  44.  
  45. Ditch outdated applications.
  46. Once  software has reached the end of its commercial life and the publisher has stopped supporting it, it’s really time to move on. (I’m talking to  you, the 24 percent of people who still run Windows XP)  Why? Because if some enterprising hacker finds a new security hole,  there will be no patch to add.
  47.  
  48.  
  49. Password protection:
  50.  
  51. Get real about passwords.
  52. Until  something better comes along, we are still mostly stuck using passwords  to protect our most sensitive devices and accounts. Hopefully you’ve  read enough stories about people's accounts being hacked because they used “password” as a password or “qwerty” or “azerty”. Or you can use an encrypted password manager like 1Password, Dashlane, LastPass, or MaskMe to generate complicated passwords and remember them for you.
  53.  
  54. Turn on two-factor authentication.
  55. Even complex passwords can be cracked with enough effort.
  56. Adding a second “factor” — like a PIN code sent via SMS that you  have to enter into a form along with your password — helps cut down on a  stranger’s ability to access your account. If someone attempts to  access your account from an unknown device, you’ll receive an alert,  giving you an opportunity to go in and change your password before the  bad guys get your stuff.
  57.  
  58. There is a Youtube channel called computerphile where you can find very inetersting videos. There is one talking about  passwords. I invite you to look at it  : https://www.youtube.com/watch?v=3NjQ9b3pgIg
  59.  
  60. Social engeneering:
  61.  
  62. Shut up on social media.
  63. You don’t have to go dark on Facebook or bury your Twitter account. But you don’t need to share every facet of your life with total strangers,  either. Avoid exposing personal information that could also be the answer to password reset security questions (your first pet, your high school, your favourite teacher in primary school).
  64.  
  65. More over, nowadays hackers are using social engeneering to get sensible informations about their "victim".
  66. 
  67. Social engineering, in the context of information security refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick or the purpose of information gathering, fraud, or system access.
  68.  
  69. Let's take the most basic example : imagine you receive an e-mail from a stranger asking you to download a certain file. You'll most likely delete it or put it in the spam category (I hope so) because you know something is going on, you've got that 6th sense that tells you : don't even open it.
  70. But , if this e-mail is from a new friend you've enjoyed having time with, a few days ago. You'll be less suspicious and you'll probably download it .  What kind of inetersting thing did he send to me ?
  71.  
  72. These hackers are ready to make false friendship to achieve their goal.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement