So this article about Twitter implementing a standard to fight phishing is good news for me. I appreciate it (and applaud it) when companies implement strategies and software so that their consumers can have a better experience. I use twitter a lot, and I would prefer to not receive emails that could potentially hack my account. DMARC - the technology being used by Twitter now - is also being used by Gmail, Hotmail, Yahoo, AOL, Facebook, Paypal, and Amazon. I was excited to see this news, which is why I am sharing it with you all. Going along with my security focus in this blog, be sure to always check thoroughly who is sending you an email, especially if they're asking you to re-login on a site. If you ever have any doubts about the email, contact the company directly and get verification. It's not worth losing access to your accounts and the data that you may have shared with any of them!
http://www.pcworld.com/article/2028993/twitter-implements-dmarc-standard-to-fight-phishing.html
Wednesday, February 27, 2013
Thursday, February 21, 2013
Younger Attackers
Not surprisingly, more malware and viruses are being created by children and teenagers. According to an article on PCWorld, an 11-year old Canadian boy was the creator of a piece of malware that was being used to acquire passwords to games. There are easy interfaces being created that allow children and teenagers to learn how to program and engineer these pieces of malware, so of course they're going to take advantage of it. Being so young, they may not have any real malicious intent, but that will be most likely to change as they get older. Children play more and more games that require higher skills, and so they're tempted to try something with a little more "thrill" to impress their friends. Again, we all need to be sure that we are keeping our devices protected from all different types of threats.
Tuesday, February 19, 2013
Big Data...
It's all the rage, and this article points out the challenges that are being faced by companies when it comes to collecting data. Consumers (like me!) are realizing that they don't always want their data being collected and tracked, and they are limiting what companies will collect. However, some companies are starting to take advantage of that, by allowing customers to have control and willingly share information that they are comfortable with giving the company. It's brilliant, in my mind, because then companies will be able to gain more specific information that pertains to the consumer, and it will allow the company to focus more directly on what matters to the customer. The article mentioned that, and I think it's a great idea. Consumers are looking to keep their data private and secure, and they want to make sure that information about them isn't being used in a way that's not acceptable. I recommend reading the article, because as much as there is a demand for data analysts, I feel like it's going to subside at least a little bit due to consumers protecting themselves.
http://www.pcworld.com/article/2027789/big-data-collection-collides-with-privacy-concerns-analysts-say.html
http://www.pcworld.com/article/2027789/big-data-collection-collides-with-privacy-concerns-analysts-say.html
Sunday, February 17, 2013
Protecting Your Wi-Fi
This article gave instructions of how you should change your wi-fi password. The nitty-gritty details weren't what I was too interested in, but I did enjoy that they pointed out that even the password to your network will need to be changed often, not just the ones to your accounts on online sites. People can still cause damage to you if you're not protecting the access to your network, so it's good to make sure that you have taken every necessary precaution to protecting yourself. It's not easy to have everyone in your household go and change their password, and they may all get really annoyed with you, but the protection that you gain from it is worth it.
http://www.pcworld.com/article/2026340/change-your-wi-fi-password-on-various-devices.html
http://www.pcworld.com/article/2026340/change-your-wi-fi-password-on-various-devices.html
Thursday, February 14, 2013
A Geeky Valentine's Day
Because it's Valentine's Day, I felt like it would be nice to share some fun articles I found for geeky/techy Valentines. I chose them because, well, I am a geek. Mashable's article is focused more on decorating/personalizing your gadgets, which is always fun. For example, I've had this phone case I bought last summer that holds my three most important cards: my driver's license, my debit card, and my room key. It's the coolest. Anyway, there's some cool cases and what-not on Mashable, so if you want ideas for gifts in general, it's a good place to start. PCWorld also did an article with 15 products they love. I love them, too. There's some really cool products there that I didn't know existed, like Up and Livescribe Sky, which I am now lusting after. They also pointed out the Steam platform (that I, of course, have) as one of the cool products. There's speakers, keyboards, software, and all sorts of fun stuff packed into their article. Go have fun with it!
Friday, February 8, 2013
Mobile Updates
Yes, I'm paying attention to the cell phone tech world right now, so we get another post about iPhones! Apple released an iOS software update, and I have been delaying on updating for weeks (no real free time to just let my phone update itself). I actually decided to look up reviews about the new iOS before I got any of the problems that may be contained, and I'm glad I did. It has bugs. Vodafone (UK iPhone carrier) has announced that the update is causing problems with 3G connectivity for the iPhone 4S. One of the other problems that has come to light is that the new update drains the battery, and it's a huge problem. This isn't an unusual problem, but I just noticed it on headlines and articles while scrolling through updates about iOS 6.1. People who used to get through the day on one charge now can't. I can't make it through the day anyway on one charge, and I don't want to see what would happen if I got the new iOS. I'd probably make it a couple of hours before needing a charge, and that's not a possibility for me. Hopefully Apple will get this fully fixed soon, and I can get my phone updated.
http://www.wired.com/gadgetlab/2013/02/vodafone-warns-iphone-4s/
http://www.wired.com/gadgetlab/2013/02/vodafone-warns-iphone-4s/
Wednesday, February 6, 2013
Jailbreak
For the longest time, I never quite understood what "jailbreaking" your phone was. And I didn't really care about it, as I was perfectly fine with using my iPhone with only iPhone apps, and I felt it was other people's choices to jailbreak their phones or not. I came across an article on Wired about how Apple was trying to prevent federal regulators from legalizing jailbreaking. They stated that it could bring about "'potentially catastrophic' cyberattacks", however all of the cell towers are still up and working. Jailbreaking allows users to run whatever apps they would like, rather than being limited to just that particular App Store, by giving root access to your device.
I can definitely see the potential for attacks that this enables, but the jailbreak is able to be done by exploiting five bugs that are already in the code for iOS. I feel like if a person is serious about attacking others, then they wouldn't do it through their mobile phone or even their tablets. They would most likely want to use their laptop or desktop computers, but that's my opinion and I feel like I have more flexibility and control over my laptop than over my cell phone.
Apple has stated that they have put in these protection measures in the iOS devices to help prevent jailbreaking and the potential threats that accompany it. However, I feel like this needs to be treated similar to our computers. I have protective measures in place to help prevent myself from being attacked/exploited/damaged. I am sure that if I truly had the desire to attack others (which I don't), then I could. I don't have that desire, so instead I take protective and preventative measures to protect myself from those attacks. I would be okay with doing the same thing for my phone, honestly, if that would be what could help protect my data.
http://www.wired.com/threatlevel/2013/02/cell-towers-survive-jailbreak/
I can definitely see the potential for attacks that this enables, but the jailbreak is able to be done by exploiting five bugs that are already in the code for iOS. I feel like if a person is serious about attacking others, then they wouldn't do it through their mobile phone or even their tablets. They would most likely want to use their laptop or desktop computers, but that's my opinion and I feel like I have more flexibility and control over my laptop than over my cell phone.
Apple has stated that they have put in these protection measures in the iOS devices to help prevent jailbreaking and the potential threats that accompany it. However, I feel like this needs to be treated similar to our computers. I have protective measures in place to help prevent myself from being attacked/exploited/damaged. I am sure that if I truly had the desire to attack others (which I don't), then I could. I don't have that desire, so instead I take protective and preventative measures to protect myself from those attacks. I would be okay with doing the same thing for my phone, honestly, if that would be what could help protect my data.
http://www.wired.com/threatlevel/2013/02/cell-towers-survive-jailbreak/
Saturday, February 2, 2013
Surviving
I got a little "click-crazy" with searching articles... and I found a fun one about creating a "survival kit" with a flash drive. Seeing as how cheap they are and how most everyone has one, I thought that this would be a great idea to touch on. It kinda links back to the previous post about being prepared for disaster and having a back-up plan (or multiple back-up plans!). First, I learned that there are lots of portable apps! I don't know where I've been, but I was very excited to discover these. Second, you can use a second flash drive to store SystemRescueCD on it. It is a free live operating system, Linux-based, so you'll always be prepared.
Now I want to go buy a couple new flash drives and prepare!
http://rikkitechthoughts.blogspot.com/2013/01/encryption.html
http://www.pcworld.com/article/2021326/turn-your-flash-drive-into-a-portable-pc-survival-kit.html
Now I want to go buy a couple new flash drives and prepare!
http://rikkitechthoughts.blogspot.com/2013/01/encryption.html
http://www.pcworld.com/article/2021326/turn-your-flash-drive-into-a-portable-pc-survival-kit.html