Monday, August 26, 2013

Internet Farming

Are you fade up with ads when you open your browser?
Do you want to stop those disturbing ads appear in your browser window?
Now you can stop it, just ad most popular “ad block” extension to your Google chrome browser. That’s all! Now disturbing ads will be blocked by Google chrome. According to Google this extension is used by almost 20 million internet users’ world wide.

Screen Shots
Taking screen shots from OS level is known by everyone. Now Google providing a extension called “Awesome Screenshots”, now ad this extension to your Google chrome browser. It provides you screen shots in different shapes and in .png format.

Better English
Are you preparing some documents to publish on internet? Just wait, there is a extension called “ginger” provided by: www.gingersoftware.com as free tool, anyone can download it for personal use. It will help people who are weak in English writing and preparing documents support in spell check, grammar check and also help the users to write better English.

Tabs View
People who open many tabs while browsing the internet using Google Chrome browser. It supports internet users to open and to preview those tabs. This feature can be added to browser as extension “Too many Tabs”.

Translation
Google providing translation facility in chrome for many international and local languages by extension called “instant Translate”. Internet users can use this extension to get translate web pages from other languages to local language.

Photo Editing
Now Google Chrome providing another extension called “befunky” to edit (cut, rotate, adjustment) your online photos. This extension is providing 190 effects in photo editing.

Make web data as e-book
While browsing internet user may think some web pages are having more important data and while browsing internet it may not be possible to read the data. In this scenario Google chrome provides user an excellent extension called “dotepub”. Which convert web pages data into e-book and users can download it, save it and read it while offline.

Convert Videos
Smart phone users can down load videos from you tube and convert them in to smart phone compatible video format like; MP3, MP4, AV1, WMV, 3GP. This extension is available in www.freemake.com/free_youtube_converter as free tool.

Time and Weather Report
To display time and weather and other information use “Currently” extension in Google Chrome, so every time when you open the browser you will see them in the fresh browser window.


Saturday, August 24, 2013

Identify Threats and Security

Identity theft
The fraudulent acquisition and use of person’s private identifying information, usually for financial gain. It can be divided into two broad categories:

Credit card fraud
Credit card frauds committed by making use of credit/debit card of others for obtaining goods or services. The threat emerge due to stealing of information like Credit card number, PIN number, password etc. Theft of cards and cloning of cards are also employed to commit such frauds. Hackers use complex techniques like Phishing, Skimming etc. to gain credit card information from innocent users.

Phishing
Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail spoofing or instant messaging and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.

Skimming
Skimming is the theft of credit card / Debit card information. Thief can procure victim's credit card number using basic methods such as photocopying receipts or more advanced methods such as using a small electronic device (skimmer) to swipe and store hundreds of victim’s credit card numbers. Common scenarios for skimming are restaurants or bars where the skimmer has possession of the victim's credit card and makes note of card details for further use.

Vishing
It is one of the method of social engineering over the telephone system, most often using features facilitated by Voice over IP (VoIP), to gain access to private personal and financial information from the public for the purpose of financial reward. The term is a combination of  “voice” and “phishing” is called as “Vishing”.

Social Engineering
Social engineering involves gaining trust hence the fraudster poses as a member of staff or even security guard. The fraudster would then ask the customer to check the card for damages. The fraudster would have gained confidence from his prey using various tactics such as offering assistance to the customer who perhaps would have tried to use the ATM without success or perhaps the customer who is not familiar with use of ATM machine and requires assistance.

Steps to be followed before Credit card & Debit card/ATM card usage 
  •         Whenever you receive the card from the bank make sure the mail is completely sealed and there is no damage.
  •         Whenever you receive the card from the bank immediately sign on the card.
  •         Try to cover the last three digit number on the card.
  •         Register your phone number to check the account transactions.
  •         Change the pin number immediately.
Secure usage of credit/Debit cards at Shopping malls and Restaurant

  • Always keep an eye how the vendor swipe your card.
  • Always make sure that the transactions happen at your presence.
  • Never sign a blank credit card receipt. Carefully draw a line through blank portions of the receipt where additional charges could be fraudulently added.
  • Don’t give away your personal information in the survey forms given in restaurants/shopping malls.

USB Device Security

USB (Universal Serial Bus) storage devices are very convenient to transfer data between different computers. You can plug it into a USB port, copy your data, remove it and be on your way. Unfortunately this portability, convenience and popularity also brings different threats to your information.

Data thefts and Data leakage are everyday news now! All these can be controlled or minimized with care, awareness and by using appropriate tools to secure the information. The tips and recommendations provided in this document helps you to keep your information secure while using USB storage devices.

Threats
  1. The Conficker worm spreads via removable devices and drives such as memory sticks, MP3 players and Digital Cameras. 
  2. Also 30 percent of new worms have been specifically designed to spread through USB storage devices connected to computers.
  3. The Stuxnet worm was one of the year’s high-profile threats that spread through USB drives.
  4. Malware Spreads through USB storage devices. Somebody may intentionally sell USB storage devices with malware to track your activities, files, systems and networks.
  5. Malware may spread from one device to another device through USB Storage Devices using autorun.exe, which is by default enabled.
Unauthorized Usage

  • Somebody may steal your USB Devices for Data.
  • Somebody intentionally leave USB devices at your Desk or Place with Malware.
How to stop Data Leakage via USB Storage Device?

  • Design and adopt a good security policy to limit the usage of USB Storage devices.
  • Monitor the employees what they are copying.
  • Implement Authentication, Authorization and Accounting to secure your information.

What to do when you lose the Device?

  • If you have stored any personal or sensitive information inside the USB drive like passwords etc, immediately change all passwords along with security questions and answers provided during any account creation [There may be chances that hacker can retrieve your online account logon information by using data in the stolen drive].
  • Also ensure that all security measures have been taken against the data lost.

How to secure USB Device?

  • Always secure the drive physically by tagging it to a key chain.
  • Never leave your drive unattended anywhere.
  • Never keep sensitive information with-out encryption.

Types of Devices which supports USB:

  • Card readers
  • Mobile phones
  • PDAs
  • Digital cameras
  • Digital audio players
  • Portable Media Players
  • Portable flash memory devices

Guidelines for usage of USB Devices
Do’s

  • Always do low format for first time usage.
  • Always delete the drive securely to clear the contents.
  • Always scan USB disk with latest Antivirus before accessing.
  • Protect your USB device with a password.
  • Encrypt the files / folders on the device.
  • Use USB security products to access or copy data in your USB.
  • Always protect your documents with strong password.

For Small Business or Enterprises

  • Monitor what data is being copied.
  • Block the unauthorized USB from connecting.
  • Pick the device with features and correct level of encryption to meet compliance requirements and organization needs.
  • Educate employees on acceptable and unacceptable use of USB flash drives.
  • Document policies so that users know who is authorized and what they are authorized to do.

Don’ts

  • Do not accept any promotional USB device from unknown members.
  • Never keep sensitive information like username/passwords on USB disk.

Mobile as USB
The mobile phones can be used as USB memory devices when connected to computer. A USB cable is provided with the mobile phone to connect to computer.

Do’s

  • When a mobile phone is connected to a personal computer, scan the external phone memory and memory card using an updated antivirus.
  • Take regular backup of your phone and external memory card because if an event like a system crash or malware penetration occurs, at least your data is safe.
  • Before transferring the data to Mobile from computer, the data should be scanned with latest Antivirus with all updates.
  • Remember to remove the USB connection from your computer before you walk away.
  • Don’ts
  • Never forward the virus affected data to other Mobiles.