Monday, November 18, 2013

Protect your folder with password

How To Protect your folder with password

Well here is a way to do that. In this section I will show you how to make a password protected folder in Windows XP, Vista without using any additional software. Following is the step by step procedure to create a password protected folder.

1: Create a new folder (Right-click -> New -> Folder) and give it any name of your choice. For instance you name it as HME.
2: Now place all the important files, documents or any other folder in this folder that you want to password protect.

3: Now Right-click on this folder (HME) and select the option Send To -> Compressed (zipped) Folder.
4: Now a new compressed zipped folder gets created next to folder (HME) with the same name.
5: Double-click on this compressed zipped folder and you should see your original folder (HME) there.
6: Now go to the File menu and select the option Add a password. ie: File -> Add a password

You will get small pop up window here. You can set your desired password. Once the password is set, It will ask for the password every time it is opened. Thus you have now created the password protected folder.

Note: if you are using WinRAR software do the same but it creates .rar folder 

Saturday, November 16, 2013

Find your stolen iPhone

Find My iPhone
The technology available at iCloud it's now possible to locate your device provided it still has access to some sort of data connection (cellular or Wi-Fi). This won't work if your device is not using the Find My Phone service, has run out of battery or was last seen in Airplane Mode, but it's certainly worth a shot.

Open iCloud.com, login with your Apple ID and the same password you use to authorize app purchases and click on Find My iPhone. iCloud will attempt to locate your device, if found you can take a note of whether it's moving, whether it's down the back of the sofa or indeed whether it appears somewhere entirely different to you last had it in which case, it's probably been stolen.

Using iCloud.com it's possible to initiate a remote wipe of the phone, which will cause the phone to reset itself to factory settings and preserve your data. To do this by logging in, clicking on Find My iPhone then selecting the device and enabling Lost Mode. Don't forget to leave a message and a phone number in the hope that whoever took it might actually return it.If your phone has been stolen but remains traceable, you may want to hand the information over to the police. There have been a few examples, law enforcement have used Apple's Find My iPhone location data to recover stolen devices, though be prepared that this may not be the case.

If your phone has been updated to iOS 7, you've got another safety net in place in the form of Activation Lock. Even after wiping the device, it will require your own personal Apple ID and password to be usable. Until these credentials are provided, the phone will refuse to work as intended. It's useless to the thief, and not even Apple will unlock it.

You can tell if your phone has been updated to iOS 7 first and foremost by the graphical style. Apple introduced a new, cleaner interface. You can see the difference at-a-glance in the screenshot above (iOS 7 is on the right). You can also head over to Settings > General > About and look at the number under Version.

Thursday, November 14, 2013

CryptoLocker Ransomware Infections

Systems Affected
Microsoft Windows systems running Windows 8, Windows 7, Vista, and XP operating systems

Description
CryptoLocker appears to have been spreading through fake emails designed to mimic the look of legitimate businesses and through phony FedEx and UPS tracking notices. In addition, there have been reports that some victims saw the malware appear following after a previous infection from one of several botnets frequently leveraged in the cyber-criminal underground.

Impact
The malware has the ability to find and encrypt files located within shared network drives, USB drives, external hard drives, network file shares and even some cloud storage drives. If one computer on a network becomes infected, mapped network drives could also become infected. CryptoLocker then connects to the attackers’ command and control (C2) server to deposit the asymmetric private encryption key out of the victim’s reach.

Victim files are encrypted using asymmetric encryption. Asymmetric encryption uses two different keys for encrypting and decrypting messages. Asymmetric encryption is a more secure form of encryption as only one party is aware of the private key, while both sides know the public key.

While victims are told they have three days to pay the attacker through a third-party payment method (MoneyPak, Bitcoin), some victims have claimed online that they paid the attackers and did not receive the promised decryption key.

Following preventative measures to protect computer networks from a CryptoLocker infection: 
  • Do not follow unsolicited web links in email messages or submit any information to web pages in links 
  • Use caution when opening email attachments. Refer to the Security Tip Using Caution with Email Attachments for more information on safely handling email attachments 
  • Maintain up-to-date anti-virus software 
  • Perform regular backups of all systems to limit the impact of data and/or system loss 
  • Apply changes to your Intrusion Detection/Prevention Systems and Firewalls to detect any known malicious activity 
  • Secure open-share drives by only allowing connections from authorized users 
  • Keep your operating system and software up-to-date with the latest patches 
  • Refer to the Recognizing and Avoiding Email Scams (pdf) document for more information on avoiding email scams 
  • Refer to the Security Tip Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks 
Mitigation
Following possible mitigation steps that users and administrators can implement, if you believe your computer has been infected with CryptoLocker malware:
  • Immediately disconnect the infected system from the wireless or wired network. This may prevent the malware from further encrypting any more files on the network 
  • Users who are infected should change all passwords AFTER removing the malware from their system 
  • Users who are infected with the malware should consult with a reputable security expert to assist in removing the malware, or users can retrieve encrypted files by the following methods: 
  • Restore from backup, 
  • Restore from a shadow copy or 
  • Perform a system restore.

Source from: https://www.us-cert.gov/ncas/alerts/TA13-309A