Wednesday, January 18, 2017

Botnet Security- Must read for those who have smart devices or who will be buying new routers

As the communities move into the cable world, each homeowner will need to assess their router requirements.  I want to get this out now, though it is incomplete.  Though compliant routers may cost more, the newer routers on the market meet the requirements to protect your entire house of connected devices (Internet of Things:  IoT) from botnet invasions.  Compliant routers are only one factor in the equation, but an important one.  So, here is some preliminary information:  (Disclaimer:  Including a link to a web page that is associated with a product does not mean I am endorsing the product.)
BotnetsBotnets are networks of computers infected by malware (computer virus, key loggers and other malicious software) and controlled remotely by criminals, usually for financial gain or to launch attacks on website or networks.
If your computer is infected with botnet malware, it communicates and receives instructions about what it’s supposed to do from “command and control” computers located anywhere around the globe. What your computer does depends on what the cybercriminals are trying to accomplish.

Many botnets are designed to harvest data, such as passwords, social security numbers, credit card numbers, addresses, telephone numbers, and other personal information.  The data is then used for nefarious purposes, such as identity theft, credit card fraud, spamming (sending junk email), website attacks, and malware distribution.

http://www.itmanagement.com/research/how-to-ensure-youre-not-part-of-the-next-botnet-43164?mid=4293102&lgid=1722977&tfso=147236&lpid=699&mailing_id=2619711&success=yes&templateid=21

 Good read

From https://staysafeonline.org/stay-safe-online/keep-a-clean-machine/malware-and-botnetsProtect Yourself with these STOP. THINK. CONNECT. Tips:
  • Keep security software current: Having the latest security software, web browser and operating system is the best defense against viruses, malware and other online threats.
  • When in doubt, throw it out: Links in email, tweets, posts and online advertising are often how cybercriminals try to steal your personal information. Even if you know the source, if something looks suspicious, delete it.
  • Protect all devices that connect to the Internet: Along with computers, smartphones, gaming systems and other web-enabled devices also need protection from viruses and malware.
  • Plug scan: USBs and other external devices can be infected by viruses and malware. Use your security software to scan the device before using it (right click on the device and select the appropriate antivirus scan). 

Good summary, but I don't think it answers the question:


The real answer has to lie with your router- the one that actually connects to the internet.  And your firewall, the software that is on your router AND on your devices through which all network transactions must pass, whether intranet or internet. 


http://ca.pressfrom.com/news/technology/-7711-this-wi-fi-router-will-protect-your-smart-fridge-from-hackers/

https://www.privatetunnel.com/home/how-to-keep-your-smart-home-safe/

I was intent on writing a longer tutorial, but there are I have too much on my plate now.  If you have specific questions or recommendations, please use the comment form attached to this blog entry.  

Tuesday, January 17, 2017

Windows Vista- Going... Going... Gone April 1

If you are still on Windows Vista, be aware that Microsoft is dropping all support for that system come April.  You should find another operating system or another computer by then.

For replacements to Vista, consider a Linux "distro".  These operating systems are built on the same base as OS/X and the Android systems.  For full desktops, consider Mint if you like the a more Windows look or Ubuntu if you like a more OS/X look.  I can install both distros or any other.  Of special note are those distros that are for education use.  Education distros of Linux have more users in the world than any other operating system, including Windows.  I have both my grandchildren on old laptops that have a version of Edubuntu installed.  These systems help lock down access, with some work by you to define just what, and include a huge suite of age appropriate education tools and games.  You might consider this alternatve:  buy a new computer or tablet for yourself and give your old computer to your grandkids with Edubuntu installed.

You can google any of the terms I have listed here for further info.

Monday, January 16, 2017

Windows 10 Privacy Settings set you up to NOT be private; but that is kinda changing in the next version

When you install Windows 10 as an upgrade to any previous version, or when you buy a new device with Windows 10 on it, there are about 3 full pages of settings that are set, by default, to values that invade your privacy.  The only way to avoid these settings is to track them all down and switch them "off."  I won't list them all here, but the following article shows pictures of the some of the screens along with the announcement that the next "version" of Windows will be more explicit about telling you to review the settings (instead of saying "not recommended").  So check this forbes article out:

http://www.forbes.com/sites/gordonkelly/2017/01/14/microsoft-windows-10-privacy-update-controls/#5515984c3544 https://www.forbes.com/sites/gordonkelly/2017/01/14/microsoft-windows-10-privacy-update-controls/#5515984c3544.

Are there any pitfalls to using OpenDNS- Is it "faster"?

Loaded question.  OpenDNS and all similar services change where you go to process your url requests from browser, email, or whatever.  They can also "manage" your search engine.  Most readers use the DNS provided by their internet service provider (eg, AT&T)  

There are advantages and disadvantages to going to another DNS provider.  This was an interesting article:  https://securityspread.com/2013/08/20/opendns-it/  It seems relatively complicated to say yeh or neh.  Your DNS is presumably at&t.  Apparently, the at&t DNS servers are overloaded, so you can get a slow response. It could be faster using another DNS, but there are lots of options, some associated with antivirus companies.  I've used one associated with my firewall.   When residents in the communities switch to the cable company, we will switch DNS.  So that may change performance.  

Thinking about it, we all might benefit by changing the DNS now, so that we won't have a lot of complicating issues when we change to cable.  But remember, all DNS solutions that are free make money somehow, and it can include sharing your queries and adding advertising to your experience. 

BTW, did you follow all the installation steps?  Here is the list:  http://www.howtogeek.com/201312/how-to-use-opendns-on-your-router-pc-tablet-or-smartphone/   All the steps involving cleaning out your cache can be done in one step by using CCleaner, available from the Piriform web site.  Use the free version. 

Tuesday, January 10, 2017

2017 Computing Device Security Software

Short and sweet points:

  • Malware and ransomware will dominate, with botnets (bad people using your internet attached devices to do bad things without you knowing) close behind.  Viruses are old news
  • That said, the industry is saying antivirus ware is still needed.  This is partly because antivirus ware has mutated to include the hunt for malware, et al.  However, botnets are not covered. It is hard to protect from lazy users who want to use default login ids and passwords on internet-connected devices.  It is interesting to note that the FTC is offering $25K to someone to demonstrate a tool that would warn homeowners of their botnet vulnerabilities (https://www.ftc.gov/node/1010523)
  • 2017 review of antivirus ware:  http://www.pcmag.com/article2/0,2817,2372364,00.asp
  • Malwarebytes is still a necessary and its got better.  It might be worth paying the annual price now.
  • For those going to charter who use the free McAfee, you will need to change your antivirus to what they offer:  comments on the internet on their antivirus:  https://www.dslreports.com/forum/r29844305-HSI-Charter-security-suite-upgraded

Friday, January 6, 2017

Detail on How One form of Ransomware Works, What it Looks Like, and What to do About it (Windows 10)

I found this article, https://blogs.technet.microsoft.com/mmpc/2016/12/21/no-slowdown-in-cerber-ransomware-activity-as-2016-draws-to-a-close/?MC=MSAzure&MC=Windows&MC=SQL&MC=SecSys with the interesting headline:

No slowdown in Cerber ransomware activity as 2016 draws to a close

The picture that went along with the the title was:  

I thought it was kind of peculiar, no?  No slowdown?  Hmmm.  Well, maybe they are discounting the last couple weeks. 

However, the article itself was very interesting and educational and a must read for those serious about their on-line security.  You'll see how it works, how it is coded, and how to fix it. 

Ransomware kits can be bought or, in some cases, just downloaded by anyone.  Couple that with freely available botnet software to distribute the emails, and it is clear that everyone will get compromised emails from multiple sources.  If you think that just because you can't do it, it has to be some very sophisticated "state-sponsor" that is doing it, you're wrong!  Even a 14 year old living in Somalia  can do this!  And make it look like anyone else they want to point the finger at has done it.

Again, the key security point is to not open attachments or click on links.  I urge everyone to keep hammering any vendors, such as insurance companies, credit card companies, and your own clubs and social groups, to not send attachments or rely on links  Tell them you won't open the attachment or click on a link.  The organization should use a document repository instead and tell you to go to the website, not follow a link.  

It is important to remember that most email addresses and address books are in the black domain, so even if you get an email from an email address you know, and it might even show in the address detail as the right address, it is kindergarten work to spoof a valid email address.   

Printfriendly

Print Friendly and PDF