Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Saturday, December 14, 2013

[UPDATE] Google Does Away With "Display Images Option" in Gmail



In an unexpected move, Google has gone head and removed the option of clicking the link "Display Images Option" in Gmail and has taken upon itself to keep out inboxes clean on unwanted spam email messages with unwanted images.

A good move indeed.




[NOTE: The article "[UPDATE] Google Does Away With "Display Images Option" in Gmail" first appeared on the Komputer Knowledge Blog.

[ABOUT: Devesh Prabhu is an avid blogger and has been blogging posts and rants on many subjects through his various blogs. He has been associated with the blogosphere for the past 8/9 years and inadvertently left the blogging scene albeit to concentrate on his personal life, but his desire to be among his readers brought him back.]


[DISCLAIMER: All content provided on this blog is for informational purposes only. The owner of this blog makes no representations as to the accuracy or completeness of any information on this site or found by following any link on this site. The owner will not be liable for any errors or omissions in this information nor for the availability of this information. The owner will not be liable for any losses, injuries, or damages from the display or use of this information. These terms and conditions of use are subject to change at anytime and without notice.]


Sunday, September 1, 2013

[AVOID] HOW-To Avoid Credit Card Scams [TIPS]

Over the past many years I've seen many people fall prey to Credit Card Scams over and over again in many places and at unsuspecting times.

Mostly you would have read about these scams on the Internet or heard about this in the news channels. The latest one was where some cops had their money taken by people somewhere else and it was all due to the fact that they had given out their Credit Card or Debit Card number and the number at the back of the card.

IMPORTANT:

1. Never ever give out your card details on shady websites where you have some doubt or the website does not look legitimate  There are many ways to find this out, but the most simple way to look at it is just by looking at the Unified Resource Locator (URL) in the address bar of the browser.

2. While doing online transactions check the URL and then only think about giving the details. Even if it is a legitimate website just double-check to be sure.

3. If want to purchase something online, do it mostly through Internet banking as it would be safe.

4. Use the option of Cash-on-Delivery, as it would avoid giving out your card details even if it means paying a little extra in the way of transportation costs or courier charges.

5. In any condition, do not, and I repeat, do not give out your CVV number to unknown people or fill in shady websites. With CVV number and your Credit Card details money can be withdrawn and products can be purchased online using your Credit Card details.




[ABOUT: Devesh Prabhu is an avid blogger and has been blogging posts and rants on many subjects through his various blogs. He has been associated with the blogosphere for the past 8/9 years and inadvertently left the blogging scene albeit to concentrate on his personal life, but his desire to be among his readers brought him back.]

[NOTE: The article "[AVOID] HOW-To Avoid Credit Card Scams [TIPS]" first appeared on the Komputer Knowledge Blog.

[DISCLAIMER: All content provided on this blog is for informational purposes only. The owner of this blog makes no representations as to the accuracy or completeness of any information on this site or found by following any link on this site. The owner will not be liable for any errors or omissions in this information nor for the availability of this information. The owner will not be liable for any losses, injuries, or damages from the display or use of this information. These terms and conditions of use are subject to change at anytime and without notice.]

Tuesday, August 20, 2013

[PC Basics] Where You'll Get Hacked: Common Mistakes, and How to Prevent It [INFOGRAPHIC]

Where You'll Get Hacked: Common Mistakes, and How to Prevent It



Where You'll Get Hacked: Common Mistakes, and How to Prevent It



[Devesh Prabhu is an avid blogger and has been blogging posts and rants on many subjects through his various blogs. He has been associated with the blogosphere for the past 8/9 years and inadvertently left the blogging scene albeit to concentrate on his personal life, but his desire to be among his readers brought him back.]

[NOTE: The article "[PC Basics] Where You'll Get Hacked: Common Mistakes, and How to Prevent It [INFOGRAPHIC]" first appeared on the Komputer Knowledge Blog.

[DISCLAIMER: All content provided on this blog is for informational purposes only. The owner of this blog makes no representations as to the accuracy or completeness of any information on this site or found by following any link on this site. The owner will not be liable for any errors or omissions in this information nor for the availability of this information. The owner will not be liable for any losses, injuries, or damages from the display or use of this information. These terms and conditions of use are subject to change at anytime and without notice.]



Sunday, August 18, 2013

[PC Basics] Avoiding Viruses the Smart Way: Disabling Autorun Feature

Through the course of this article, I will help you avoid viruses by disabling a system feature that has its roots from the time PCs became mainstream.

An autorun.inf file is a text file that can be used by AutoRun and AutoPlay components of Microsoft Windows OS. For the file to be discovered and used by these components, it must be located in the root directory of a volume.

The AutoRun component was introduced in Windows 95 as a way of reducing support costs. AutoRun enabled application CD-ROMs to automatically launch a program which could then guide the user through the installation process.

By placing settings in an autorun.inf file, manufacturers could decide what actions were taken when their CD-ROM was inserted.

The simplest autorun.inf files have just two settings: one specifying an icon to represent the CD in Windows Explorer (or "My Computer") and one specifying which application to run.

A simple example:
[autorun]
open=setup.exe
icon=setup.exe,0
label=My install CD

- Via Wikipedia


VIRUSES & MALWARE

Autorun.inf can be exploited to allow malicious programs to run automatically without the user knowing.

If you have been infected with the autorun.inf virus, each time you insert the removable media and double-click your drive to open it, the virus file begins executing and infects your computer, which spreads itself on to the computer by making multiple copies of the autorun.inf and .exe files on every drive of your computer.

When your computer is infected, viruses might connect to malicious websites and install key loggers on your PC. Key logger steal your private information like usernames, account numbers, social security, passwords, credit card information, as well as other sensitive information.

It is very important that you remove the virus from the computer to avoid further spread.


AVOIDING VIRUSES & SAFETY

In this modern day and age, very few people have any use of this feature and it is best to disable this so as to avoid being infected with a virus that can propagate itself each time the removable media is inserted.

A very useful tool to remove or to nip it in its bud is to disable this feature altogether and not have Autorun run itself when removable media such as DVDs, USB drives, CDs, or Memory Sticks are inserted in the first place.

The easiest way to disable Autorun in just a few minutes and which will potentially save you from getting infected with a virus that takes time (or money) to clean is by downloading the utility “Disable Autorun.”

Click on the link and download and install the tool. Once it's installed, right click the shortcut on the desktop and click Run as Administrator.

Choose from the following options:

Disables AutoRun on drives of unknown type
Disables AutoRun on removable drives
Disables AutoRun on fixed drives
Disables AutoRun on network drives
Disables AutoRun on CD-ROM drives
Disables AutoRun on RAM disks
Disables AutoRun on all kinds of drives

I would recommend that you select all available options and, if you’re not sure of which options to pick, check the option "Disables AutoRun on all kinds of drives."



Click the Apply button and restart your computer to save and apply the changes. Repeat on other computers around you home or send to a friend to do the same.

[Note: this program must be run with administrator privileges, or you can right click the program and click "Run As Administrator" to run this program.]



[Devesh Prabhu is an avid blogger and has been blogging posts and rants on many subjects through his various blogs. He has been associated with the blogosphere for the past 8/9 years and inadvertently left the blogging scene albeit to concentrate on his personal life, but his desire to be among his readers brought him back.]

[NOTE: The article "[PC Basics] Avoiding Viruses the Smart Way: Disabling Autorun Feature" first appeared on the Komputer Knowledge Blog.

[DISCLAIMER: All content provided on this blog is for informational purposes only. The owner of this blog makes no representations as to the accuracy or completeness of any information on this site or found by following any link on this site. The owner will not be liable for any errors or omissions in this information nor for the availability of this information. The owner will not be liable for any losses, injuries, or damages from the display or use of this information. These terms and conditions of use are subject to change at anytime and without notice.]


Thursday, July 25, 2013

What to Do After You’ve Been Hacked

Evernote became the latest member of the “we’ve been hacked” club. And the thing is, what was once a pretty exclusive club now lets just about everyone in these days. I’m a member too. And as I discovered when I was hacked last year, my experience was distressingly commonplace. And yet while being hacked may be increasingly familiar, it isn’t getting any less stressful or confusing. It’s hard to know what to do, or where to begin, immediately afterward.
Whether you were hacked, phished, had malware installed or just don’t know what the heck happened but there’s somebody all up in your e-mail, here are a few good first steps to take following an incident. This is by no means comprehensive, but it’s a good start.
Ask Yourself Why
While you are fixing things, it’s a good time to take a step back, and ask yourself a more basic question: What was the reason for the breach? If it was your bank account, the answer may be obvious. In other cases, such as e-mail, it can be for a host of reasons — from using it to send spam, to requesting money from your contacts, to getting password resets on other services. An attacker may even be trying to gain access to your business. Knowing why you were targeted can also sometimes help you understand how you were breached.
Reset Your Passwords
Immediately change the password on the affected service, and any others that use the same or similar password. And, really, don’t reuse passwords. You should be changing your passwords periodically anyway as a part of routine maintenance. But if you’ve just been hacked, it’s now more urgent. This is especially true if you reuse passwords, or use schemes that result in similar passwords (like 123Facebook, 123Linkedin, 123Google).
“Password reuse is one of the great evils and its very hard to prevent,” says PayPal’s principal scientist for consumer security Markus Jakobsson. Sites can set up password requirements — for example a character length or that a password include symbols and numbers — but they cannot force people into not reusing the same or similar passwords. “It’s very common for people to use similar or the same password but it’s very rare for people to realize that it creates a liability for them to do it and that they need to change their password after they’ve been hacked.” 
Update and Scan
There’s a possibility that the attacker got in via your machine. Almost all malware is installed by victims themselves, if unknowingly. And if something nasty is on your computer, you need to get it off before you start a recovery process. Make sure you are running the most recent version of your operating system. Download a solid anti-virus product and run a scan for malware and viruses that may have been the source of the attack. This is the most basic thing you can do, so do it now. And moreover, use a brand-name commercial program that you pay for.
“Malware antivirus software isn’t perfect — they have a hit ratio of 50 to 75 percent and can miss almost as much as they find, but it’s better than nothing,” explains Jakobsson. And why should you pay for it? “Most people who search for ‘free antivirus’ end up installing malware.”
Take Back Your Account
Most of the major online services have tools in place to help you get your account back after it has been taken over by someone else. Here’s how to do that on AppleFacebookGoogleMicrosoft,Twitter and Yahoo. Typically, you’re going to need to be able to answer some questions about your account. Facebook has a novel method that relies on friend verification. Are you using a service not listed here? Typically you can find your way back in by searching for its name plus “account recovery.”
Check for Backdoors
Smart hackers won’t just get into your account, they’ll also set up tools to make sure they can get back in once you’ve gotten them out. Once you have your accounts back, you should immediately make sure there isn’t a back door somewhere designed to let an attacker back in. Check your e-mail rules and filters to make sure nothing is getting forwarded to another account without your knowledge. See if the answers to your security questions were changed, or if those questions themselves have changed.
Follow the Money
If there is an element of commerce involved in the affected account, thoroughly review any activity on that account. Verify that no new shipping addresses have been set up on your account, no new payment methods have been added, or new accounts linked. This is especially true of sites that let you make one-click purchases, or issue payment cards.
“Attackers do things for a reason,” says Jakobsson. “If we are talking about attacking your Bank of America account or PayPal the reason is obvious: They want your money. What criminals will often want to do is hook up a debit card to your account. If they add an address and then request a financial instrument, that is a way for them to monetize.”
Perform a Security Audit on All Your Affected Accounts
Often, one account is simply used as a gateway to another. Your Dropbox account may only be a means to get at something stored there. Your e-mail might only be a path to your online banking. Not only do you need to secure the account you know was hacked, but you need to check all the others it touches as well. Reset your passwords on those services, and treat them as if they have been compromised.
De-Authorize All Those Apps
This is one of those non-obvious but important steps. One of the first things you should probably do if you’ve had an account compromise is de-authorize all the associated apps that use that account for login or for its social graph. For example, Google, Twitter, Facebook, Dropbox and many others support OAuth, which enables third party apps to use account APIs without having to give them the account login information. But if a hacker has used it to authorize another device or service, and remains logged in there, simply changing your password won’t get them out. There could be a rogue client out there that you remain unaware of even after regaining access to your account. The best bet is to pull the plug on everything you’ve given access to. are on GoogleFacebook and Twitter. It may be a pain to go back through and re-authorize them, but it’s less so than leaving a malicious individual lurking in your account. And in any case, doing so periodically is just good hygene.
Lock Down Your Credit
It’s bad enough you had your email hacked, but you really don’t want your identity stolen as a result. Services like LifeLock will do this for you for a fee, but you can also do it yourself by contacting the three major credit reporting agencies directly. Depending on the state you live in, locking down your credit might be free, provided you’ve filed a police report.
Speak Out
“Say that your Facebook account gets hacked,” says Jakobsson, “there’s a good chance you won’t lose any money, but your friends might.” The mugged-in-London scam works by hijacking your identity to contact friends to request money. It’s also true, though less commonly so, on AIM and Google Talk and other services. There may also be data that you need to let others’ know has been accessed–from financial matters to sensitive personal information.
But there’s another reason to do this too, and it’s the same reason for this very article, which is to raise awareness. The best tactic of all is to do everything in your power to not be hacked: to run up to date software, use good password hygiene, and make backups of everything in your system.
“This is an amazing opportunity to educate people,” says Jakobsson. “”When you say, ‘wow, it could happen to him; it could happen to me,’ that’s when you change.”

Via: http://www.wired.com/gadgetlab/2013/03/what-to-do-after-youve-been-hacked/

Sunday, May 3, 2009

Keep Your Passwords Secret On A Public Computer

Has anyone ever told you before that it is risky to use a public computer? The main reason for this is because there could be Keylogger software or Spyware installed in the public terminal that can capture your user name and password when you type on the keyboard. Can you imagine your Email/Bank/Paypal password being stolen? What loss would it cause to you?

KYPS is a Web service that allows you to log into your account from a public computer without disclosing your password to that computer. The way KYPS works is very simple: You register your website (be it an email account or any login site) with the KYPS server. Based on the username and password that you have provided, KYPS will encrypt the password and generate a list of one-time codes that you can use to login to your account.

Everytime you want to login to your site, KYPS will prompt you to enter the code from a certain pad. It will then decrypt the code, rebuild the password and auto-login to your site. After that, that particular code will be rendered useless. Even if there is a keylogger software that logs the one-time code, it won’t be able to login to your site. The image below show a graphical explanation of the whole process.

When you first use KYPS, you are required to register your login account with them. During the registration, you are asked to enter your username and password. From here, you can choose how many one-time codes you want to generate. The more codes you generate, the more times you can login to your site without using the actual password.

Once you have submitted the registration, it will prompt you to download a PDF file that contains your list of one-time codes. This is what it will look like:



The number on the left of each column is the pad while the string of characters on the right is the one-time code. Whenever you want to login to your site, KYPS will ask you to enter the code with number XXX. You just match the number to your list, enter the corresponding code and you will be securely logged in to your site.

In case you are worrying that KYPS is a phishing site that is out to collect your password, you can be assured that the password you have entered is not stored in the database. It is only used to generate the one-time codes and will be deleted after that.

If you are still not convinced, you can leave out the password field when registering your site. KYPS will then bring you to another site where you can disconnect your computer from the network and use the java applet to generate the one-time code.

Apart from logging you into your account, KYPS also acts as a reverse proxy that you can use to hide your online trace. All of the website is delivered with the “https” protocol and the URL does not contain the original link of the webpage. In this way, your privacy is protected and you don’t have to worry about other people finding out which sites you have been to.

KYPS may not be the only way to fight against keyloggers, but it is definitely one good way that anyone can use to protect themselves. The only troublesome thing is that you have to pre-register your login accounts with KYPS on a keylogger-free/spyware-free computer before you can use the service on a public computer. If you have the sudden urge to log into an account that you did not register with KYPS, you have to subject yourself to the same risk as others.

In addition, if you have plenty of accounts, the generated codes will form quite a huge list (imagine 200 codes for each account). If you mind carrying a huge list of codes everywhere you go, then KYPS might not be suitable for you.

Wednesday, April 29, 2009

Ubuntu 9.04 (Jaunty Jackalope)



Ubuntu is a community developed, Linux-based operating system that is perfect for laptops, desktops & servers. It contains all the applications you need - a web browser, presentation, document & spreadsheet software, instant messaging & much more. Ubuntu is free software. Whether you use it at home, at school or at work Ubuntu contains all the applications you'll ever need, from word processing & email applications, to web server software & programming tools.

Ubuntu is & always will be free of charge. You do not pay any licensing fees. You can download, use & share Ubuntu with your friends, family, school or business for absolutely nothing. We issue a new desktop & server release every six months. That means you'll always have the the latest & greatest applications that the open source world has to offer. Everything you need on one CD, which provides a complete working environment. Additional software is available online.

Ubuntu comes with full commercial support from Canonical & hundreds of companies around the world. Ubuntu includes the very best translations & accessibility infrastructure that the free software community has to offer. Ubuntu CDs contain only free software applications; we encourage you to use free & open source software, improve it & pass it on.

With Ubuntu Desktop Edition you can surf the web, read email, create documents & spreadsheets, edit images & much more. Ubuntu has a fast & easy graphical installer right on the Desktop CD. On a typical computer the installation should take you less than 25 minutes. The graphical installer enables you to get up & running quickly & easily. On the desktop you have a full set of productivity, Internet, drawing & graphics applications, & games.

The Server Edition - built on the solid foundation of Debian which is known for its robust server installations - has a strong heritage for reliable performance & predictable evolution. As your business grows, so does your network. More applications need to be deployed & more servers are required. Ubuntu Server Edition offers support for several common configurations, & simplifies common Linux server deployment processes. It provides a well-integrated platform enabling you to quickly & easily deploy a new server with any of the standard Internet services: mail, web, DNS, file serving or database management. A key lesson from its Debian heritage is that of security by default. The Ubuntu Server has no open ports after the installation & contains only the essential software needed to build a secure server.

Get Ubuntu

MS Malicious Software Removal Tool 2.9

The Microsoft Windows Malicious Software Removal Tool checks computers running Windows XP, Windows 2000,Windows Vista,Windows Server 2003, & Windows Server 2008 for infections by specific, prevalent malicious software including Blaster, Sasser, & Mydoom & helps remove any infection found.

When the detection & removal process is complete, the tool displays a report describing the outcome, including which, if any, malicious software was detected & removed.

Link: Malicious Software Removal Tool 2.9

Tuesday, April 28, 2009

10 Fixes for the Worst PC Security Nightmares (Repost)

In the world of comic books, every bad guy is an evil genius. On the Web, hackers, spammers, and phishers may be evil, but they're not required to be geniuses. They can make a healthy living just by exploiting known security holes that many users haven't bothered to patch. Or by relying on the propensity of millions of people to do things they've been told over and over not to do.

The silver lining is that you don't have to be a genius to avoid these common attacks either. Implement a few simple fixes, and you'll avoid most of the bad stuff out there.

Fix 1: Patch Over the Software Bull's-Eye

Have you turned off automatic updates for Windows and other programs on the rationale that "if it ain't broke, don't fix it?" Then consider this: Your programs may be very, very broken, and you don't know it. The days of big splashy viruses that announce themselves to PC users are over. The modern cybercriminal prefers to invisibly take control of your PC, and unpatched software gives them the perfect opportunity to do so.

Today, a hijacked Web page--modern digital crooks' attack of choice--will launch a bevy of probes against your PC in search of just one unpatched vulnerability that a probe can exploit. If it finds one, better hope your antivirus program catches the ensuing attack. Otherwise you likely won't even notice anything amiss as it infects your system.

Luckily, you can completely block the majority of Web-based exploits by keeping all your programs--not just the operating system or your browsers--up-to-date. Attack sites ferret out holes in seemingly innocuous applications such as QuickTime and WinZip as well as in Windows and Internet Explorer. So turn on automatic update features for any software that offers the service--it's your quickest and easiest option for getting patches.

Fix 2: Find the Other Holes

If every program used easy automatic updates--and we were all smart enough to use them--the thriving malware business would take a serious hit. Until then, a free and easy security app from Secunia can help save the day.

The Secunia Personal Software Inspector, available as a free download, scans your installed software to let you know which out-of-date programs might be making your PC unsafe. But it doesn't stop there--for each old program it finds, it offers quick and easy action buttons such as one labeled Download Solution, which retrieves the latest software patch without you even having to open a browser.

The program also gives you links to the software vendor's site as well as Secunia's full report about the vulnerability on your system. You can choose to block future warnings about a particular program (but you should, of course, be careful before doing so).

Secunia PSI isn't perfect, and doesn't always make it easy to update unsafe program components. But for most apps it provides a quick--and very important--fix.

Fix 3: Let the Latest Browsers Fight for You

The most insidious hijacked Web pages are nearly impossible to spot. Tiny snippets of inserted code that don't display on the page can nevertheless launch devastating behind-the-scenes attacks.

Trying to avoid such pages on your own is asking for trouble, especially since crooks like to hack popular sites--attacks against sites for Sony games and the Miami Dolphins are just two well-known examples. But new site-blocking features in the just-released Firefox 3 and Opera 9.5 browsers provide some shielding.

Both browsers expand on the previous version's antiphishing features to block known malware sites as well, whether they're hijacked pages on legitimate sites or sites that were specifically created by bad guys. Neither browser completely eliminates the risk of landing on such pages, but every additional layer of protection helps.

Microsoft plans to add a similar feature to Internet Explorer 8, but this version won't be ready for prime time for a good while. For more on the browsers' improved security, see "New Browsers Fight the Malware Scourge."

Fix 4: Sidestep Social Engineering

The most dangerous crooks use clever marketing to get you to do their dirty work for them and infect your own PC. Lots of social engineering attacks are laughably crude, with misspelled words and clumsy grammar, but that doesn't mean you should dismiss the danger. Every now and then, a well-crafted attack can slip past your defenses and lure you into opening a poisonous e-mail attachment or downloaded file. A targeted attack might even use your correct name and business title.

To fight back, turn to a simple but powerful tool:Â VirusTotal.com. You can easily upload any file (up to 10MB) to the site and have it scanned by a whopping 35 different antivirus engines, including ones from Kaspersky, McAfee, and Symantec. A report tells you what each engine thought about your file. While some (such as Prevx) are prone to false alerts, if you get multiple specific warnings that include the name of the particular threat, then you almost certainly want to delete the file.

A lack of warnings doesn't guarantee a file is safe, but it does give you pretty good odds. Use VirusTotal to check every e-mail attachment and download you're not 100 percent sure about, and you'll avoid insidious social engineering.

If using VirusTotal starts to become a habit (not a bad idea) and you want to make sending files for scanning to VirusTotal really easy, download the free VirusTotal Uploader. Once you've installed the utility, just right-click a file, and you'll see an option (under Send To) to upload it to the VirusTotal site.

Fix 5: Get the Jump on Fast-Moving Malware

Traditional, signature-based antivirus software is getting snowed under by a blizzard of malware. Attackers try to evade detection by churning out more variants than security labs can analyze. So besides signatures, any antivirus program worth its salt today uses proactive detection that doesn't require a full signature to spot sneaky malware.

One promising approach uses behavioral analysis to identify malicious software based solely on how it acts on your PC. But your antivirus software by itself may not be enough. ThreatFire, a popular free download from PC Tools, adds such a layer of behavior-based protection. In recent tests, it correctly identified 90 percent of malware based on its behavior alone.

PC World's ThreatFire review provides a thorough analysis of the program and a quick download link (as well as a warning about installing too many security programs on one PC). And for more on behavioral analysis and proactive virus detection, see "When a Signature Isn't Enough."

Note: If you use the AVG Free antivirus program, hold off on trying ThreatFire until PC Tools releases a new version. The current 3.5 version conflicts with AVG, but PC Tools says it's working on a fix.

Fix 6: Rescue Your Inbox From Spam

Spam filters are getting better, but some junk still makes it through even the best of them. Instead of resigning yourself to hitting delete for all those hot-stock and Viagra come-ons, try disposable e-mail addresses.

Such an address is something you create every time you encounter an online shopping site, forum, or other service that requires you to enter an e-mail address. If that address gets flooded with spam, you can terminate it. That's a better system than the alternative, creating a free Web mail account that you use only for purchases and Web signups. With a single separate account, you have to throw the baby out with the bathwater and cancel the whole account if it gets too much spam.

Yahoo Web mail users can opt for the $20-a-year Plus service, which includes the AddressGuard disposable e-mail service (among other benefits). With it, you can click a bookmark to create a new, disposable address for any given site in about 10 seconds.

Gmail users can simply append "+ whatever" to their regular e-mail address before handing it out, but if that address starts to receive spam you can't simply turn it off. You'll have to create a filter in Gmail to block all mail to that address.

For everyone else, we suggest a good, free service from Spamgourmet.com that's quick and easy to set up and use; it allows you to create disposable addresses on-the-fly that will forward e-mail messages to your regular address.

Fix 7: Develop an Antiphishing Habit

The dastardly practice of phishing for personal information is still alive and well, and many fake sites can be hard to distinguish from the real ones. But a few simple practices can ensure you'll never be snagged by a phishing hook.

The best approach, and the most straightforward, is never to click a link in any e-mail message to access your financial accounts. Instead, always type the URL or use a bookmark. That one habit will protect you from almost every phishing attack.

If you can't make that change, then at least use the latest version of Internet Explorer, Firefox, or Opera to browse the Web. All have built-in features to block known phishing sites (and, as described in Fix 3, Opera and Firefox now also block known malware sites). Avoid Safari, which lacks any built-in antiphishing protection.

Finally, keep an eye out for the common phishing tactic of using URLs like "http://adwords.google.com.d0l9i.cn/select/Login." If you glance at the URL (an actual recent example listed by Phishtank.com), you might think the site's domain was google.com. In fact, it's heading to d0l9i.cn, a site in China where operators are standing by to swipe your personal details.

Internet Explorer 8 will use an innovative feature called Domain Highlighting that will make spotting such trickery easy. But until it becomes available, watch URLs carefully.

Fix 8: Keep Your Own Site Safe

It's not a good time to run a Web site. The Web may look like a digital wonderland, but behind the scenes it's a war zone. And the guns are trained on your site.

Crooks use automated tools to search sites for the most common vulnerabilities. If they find one, they blow the hole wide open to plant harmful code that will attack your loyal visitors.

To help keep your site safe, start with some quick, free scans that ferret out the most obvious problems. First, fill out a form at Qualys.com to request a free scan of one IP address.

Next, download the also-free Scrawlr tool from HP. After a quick install, use Scrawlr to scan your site for SQL injection vulnerabilities (a type of hole targeted in a recent Sony site hack).

A clean bill of health from both scans won't guarantee that your site is safe. For instance, neither will find problems with custom JavaScript code, another common type of attack. And while requesting or running either scan is easy, fixing a reported hole might involve a fair bit of work. But that job will still take far less work than repairing your site and your reputation after your site has been hijacked.

Fix 9: Make Your Passwords Secure - And Easy to Remember

Online passwords are starting to seem about as safe as tissue paper protecting a bank vault. The supply of stolen logins is now so huge that crooks can hardly make any money selling them unless they add other ripped-off data, like addresses or Social Security numbers, according to security researchers. And thieves don't stop with stealing logins to financial accounts--the bad guys regularly pilfer access information for Web mail accounts as well. In one recent case, a scammer broke into Web mail accounts and sent messages to the victim's friends asking for money.

Experts say we should use strong, unique passwords for all our accounts. But they don't tell us how we're supposed to remember them, so most of us end up using the same, not-so-safe password at all our accounts.

Here's an easy fix that allows you to remember just one password, yet still have a strong, unique password for each site you use. The Password Hash (or PwdHash) add-on for Firefox and IE takes that simple password you type and runs it through an algorithm that uses the site's domain name as part of the calculation. The utility subs in the resulting strong password before you send it to the site. All you have to do (after installing Password Hash) is hit the F2 key in a password box before you type.

Fix 10: Get Extra Cleaning Help for Stubborn Infections

Sometimes even the best antivirus program misses an infection. And once a virus or Trojan horse gets in, removing it can be incredibly tough. If you suspect some nasty got past your defenses, then it's time to bring in extra help.

Many antivirus makers offer free and easy online scans through your Web browser. The scan will take time, as the scanning service will need to download large Java or ActiveX components before it can get started, but they're easy to kick off. You can run them in addition to your already-installed antivirus application for a second (or third, or fourth) opinion. Here's the lowdown on your options.

- Trend Micro HouseCall: Will detect and remove malware; works with both IE and Firefox.

- BitDefender Online Scanner: Detects and removes malware; requires IE.

- Kaspersky Online Scanner: Detects malware, but doesn't remove it; works with IE and Firefox.

- F-Secure Online Virus Scanner: Detects and removes malware; requires IE.

- ESET Online Scanner: Detects and removes malware; requires IE.

Monday, February 23, 2009

Security Alert 4 Adobe PDF Users

If you use Adobe to read PDF files you are at risk for having your PC infected by a new unpatched security flaw in Adobe Reader Acrobat.

Adobe issued the advisory on Thursday that it's Reader and Acrobat software are vulnerable to this attack and it could allow the attacker to take control of your PC if you open an infected PDF file.

This applies to even the most recent version of Reader (Version 9). Adobe has said they will release a patch by March 11. Thanks for the sense of urgency Adobe!

Here's what the experts are recommending you do to avoid being infected:

1. Disable JavaScript in Adobe: Open up your Adobe Reader and Select "Edit," "Preferences," "JavaScript," and uncheck the box next to "Enable Acrobat JavaScript."

2. Be very careful opening any PDF's until Adobe releases a patch.

3. Update your anti-virus and overall PC Security. If you want to see a checklist of Free Security Programs to protect your PC then visit my Free PC Protection page.

If you'd like to verify this info you can learn more about it from Brian Krebs at the Washington Post in his Security Fix Blog at:
http://voices.washingtonpost.com/securityfix/2009/02/attackers_exploiting_unpatched.html