Thursday, May 8, 2014

Manage all your passwords with one password

Using a different password for every online site and service is critical to your cyber security.

There's a war raging between hackers and companies, and you're caught in the crossfire. Every time a company gets hacked, you have to change your password. And don't you dare reuse it somewhere else.

Dreaming up a different password for every site and service is the only way to keep your stuff safe online, but it's also a gigantic nuisance. There's one thing you can and should do to help: Get a password manager program. Password managers hide your information behind a master password that only you know.

There is a way to manage all your passwords together i.e., password manager, here are the password manager softwares; 1Password, Dashlane, LastPass and PasswordBox.

LastPass is a good choice for people who use newer technology like fingerprint scanners. For the really paranoid, 1Password offers the most control over where your encrypted vault of passwords gets stored.

For most people, I recommend Dashlane. It's simple, so you'll actually use it. It may even save you clicks.

Nothing is 100% guaranteed, but all four of these managers take the additional security step of never sending your master password over the Internet. They're like a safe-deposit box that a professional keeps without knowing what's inside, or even holding a key to open it.

In an age where more of our personal information lives, password protected, up in the cloud, we need defenses beyond antivirus software. Using a password manager is the next step.

Now keep all your passwords in a password manager and relax.


Wednesday, May 7, 2014

Cyber Attacks and Data Breaches in April

The large revelation of the Heartbleed vulnerability this month caused chaos across the globe. While organizations were ensuring that they weren’t vulnerable, cyber criminals were busy stealing valuable information and defacing websites.

The list below contains a collection of some of the largest breaches, as well as some of the most bizarre.


Data Breaches via Cyber Attack
Malware on Kaiser Permanente server since 2011 impacts 5,100 members
Security breach at AOL. Users told to change passwords
Iowa State server breach exposes SSNs of nearly 30,000
Hackers may have accessed details of 500,000 considering cosmetic surgery
German space centre endures cyber attack
French hard-drive maker LaCie cops to YEAR LONG card data leak
Medical staffers fall for phishing emails, data on 8,300 compromised
Chicago doctor’s email account accessed, held info on 1,200 patients
Deltek suffers cyber attack
Breach impacts thousands in Bibb County that applied for gov’t jobs
Unauthorized access gained to about 800 JSTOR accounts


Data Breaches via Physical Attack
Second burglary breach within a month for Coordinated Health
Tufts Health Plan data stolen, 8,830 members impacted
Fate of unencrypted drive unknown, PHI of 5,500 in Virginia at risk
Three laptops stolen from New York podiatry office, 6,475 at risk
Data on 55,000 VFW members impacted by attacker seeking military intel
More than 1,400 medical records compromised in Texas breach
GovWin IQ hacked, payment card data of 25,000 Deltek customers at risk
Drives containing info on 2,500 stolen from Michigan health department
Theft of computers from Texas non-profit risks data on nearly 3,000
Germany suffers biggest ever data breach in its history


DDOS
Games Maker Blizzard Suffers From European DDoS Attack
UK webhost 123-Reg in DDOS attack


Other Attacks, Breaches & Mistakes
Jailbroken iPhones at risk from new malware
Japan airport staff dash to replace passcodes after security cock-up
Google kills fake anti-virus app that hit No. 1 on Play charts
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Viber mobile messenger app leaves user data unencrypted
Triathlon camera drone falls out of the sky, owner claims it was hacked
Microsoft Xbox pwned by 5-year-old security researcher


Monday, May 5, 2014

Clean Windows Registry and Speed up your PC

The Windows registry is not exposed, are protected at all times for maximum speed and performance. In addition to topics such as hardware, memory problems, incompatibility of device drivers and problems that can not be removed from the registry, but most of them do I have to deal with themes of Windows registry problems with the Windows registry. You have to be repaired, or as soon as possible to keep your computer updated and corrected effectively.

You can find many problems in the registry now and have to run again. All modern operating systems Windows, the registry database or registry stores all the configuration settings for the respective components in the computer system.

If you have a program to install add value to the registry and configuration settings in the installed application. But if the program is not fully the location and other information are furnished partially saved or corrupt manner, that many problems and issues register later purchased.

Another important reason is that when you remove programs from your computer, some of the residue remains in the Windows registry, and delete them gradually collect debris and create more unwanted records in the database. These elements generate a lot of problems such as slow computer later, blue screen error and many such cases in your system.

Another important factor is computer viruses and other malicious programs. The virus can cause great damage to the Windows registry. He has the potential, and that it was designed to the registry is damaged before you do anything else. The virus changes the basic registry entries so that the safety of things can not detect or catch it, and they can do, what role is actually exercised.

These three things or issues that are important for Windows, sometimes corrupt registry, and then the system creates more questions. For the latter reason, for example, virus removal, you are a good and effective virus protection to all malicious entries must be deleted from your system and registry, anti-virus software is usually not intended to restore the damaged Registry. Since a reliable registry cleaning software is not required.

All the many thousands of corrupt registry keys as empty, directories, file path, the class ID, interface, font, links and many other similar and undesirable elements necessary for safe and effective registry repair tool that really convinced that it takes to be removed from the registry without the system and other programs on your computer.

Use Necessary Software to Keep System Clean
There are many tools available on-line registry cleaner, but not all of them are very efficiently and reliably. Most of them just happened to be the best is, but they do not work, and they are ineffective. In this case, choose the best thing you can do is download a trial version of the software in a while and watch the results of the software will decide whether further action: to buy or use.

Get the free CCleaner (www.piriform.com/ccleaner) which is available for both Windows and MAC. It makes short work of cleaning up your system's temporary files. MAC users can also use OnyX (www.titanium.free.fr) which offers advanced cleaning options.

SpeedUpMyPC (www.uniblue.com/software/speedupmypc) is the updated and successful program, designed to clean and repair all the unwanted stuff from your computer in an efficient manner.

Defraggler (www.piriform.com/defraggler) is a great tool that offers the option to defrag the entire hard drive or just specific folder. It displays a drive map that shows how the space of your hard drive is utilized.

TuneUp Utilities (www.tune-up.com) as you install more programs, you might notice that your PC takes longer to boot up. This happens because many applications and services automatically initialize during the boot process. Tune Up Utilities can analyses your PC's boot up time and removes unnecessary startup programs. It even lets you individually select the programs you want to remove from startup. MAC users can do the same by going to System Preferences > Accounts > Login Items and removing applications that you do not want to open automatically when you log in.