Monday 14 April 2014

67. How secure is your own wifi network?




Reproduced from the Zone Alarm blog

It’s easier than ever to set up a wireless network. Plop in a WiFi router and connect to a DSL or cable modem, or if you are one of the lucky ones, with a FiOS box. But before you start online banking, shopping, and surfing the Web, make sure your network is secure from intruders.

 

You may think that your neighbor hopping onto your wireless network to check email is harmless. Actually, there is more at stake than the fact that this unauthorized person may hog up the bandwidth by streaming HD videos. This person, once on your network, can intercept all the data you are sending, trick you into going to a malicious site, and break into computers and other devices you may have connected over the WiFi. Letting someone you don’t know on to your network is essentially letting that person see all the data flowing in and out.

If you have your own WiFi network, it’s important you secure it from unauthorized users and devices by configuring the wireless router appropriately. While specific steps in the management software vary from vendor to vendor, and from router to router, the options are fairly universal and shouldn’t be too hard to find.

Below are some tips on how to enhance your wireless network security.


1. Encrypt with WPA2
When you set up your wireless network, you had the option to turn on encryption. For home networking users, you should turn on encryption (as opposed to running an open network) and you should select WPA2 as the encryption method. WEP is not secure and some of the other methods are generally out of reach for most home users. Even if you didn’t enable WPA2 when you first set up the network, your management software should let you turn it on after the fact.

When you select WPA2, you will be prompted to create a passkey for users to enter when trying to connect to the network. It is important—no, critical—to make sure the password is unique and complex so that outsiders can’t just brute-force or guess a password and hop on to the network. Make sure to select a string of characters that is fairly long and a mix of both numbers and letters. If your passkey is flimsy, then determined attackers will be able to breach your network anyway.

Don’t turn on WPS (WiFi Protected Setup). It doesn’t always work consistently, and its nine-digit PIN is vulnerable to guessing attempts. Once the attacker figures out the PIN for WPS, there is nothing stopping the adversary from accessing any shared data that resides on your wireless network.


2. Change Default Passwords
Many of the routers ship with a default password for the administrator management software. It could be “admin,” or even a blank password, and is quite often printed somewhere in the documentation and available online. Users should immediately change the password for the management interface while setting up the wireless network so that outsiders can’t reach the management interface. If adversaries get access to the management interface, they have full control over your router and you would be in serious trouble.

While you are changing passwords, check to see if the router shipped with any pre-created SSIDs. SSIDs are the names of the wireless networks configured for the router. You should change the passwords for these SSIDs even if you aren’t using them, just in case.


3. Clean up the list of SSID names
Speaking of SSIDs, vendors tend to use very generic names for the SSIDs, such as ‘linksys’ or ‘netgear-wireless.’ Change them from the default to something unique. Attackers can launch man-in-the-middle attacks by using frequently used SSIDs for their rogue wireless hotspots which could be used to trick devices into connecting to that network. Having a different SSID name and password ensures that it will be harder for a person to guess and break in.

It may be just easier to delete all the SSIDs on the router (usually listed under “wireless” on the management software) other than the one you are using. Why increase the potential attack surface? After you have cleaned up your list of SSIDs, hide the name. Some vendors call this cloaking, but the idea is to prevent the SSID from broadcasting to all devices in the vicinity. You can connect by manually entering the name of your network, but other people won’t know that network is there.


4. Regularly Check Who Is Connected
The management software generally has a section called “Device List”, which shows the computer name of all the devices that are connected to the wireless network. It’s a good idea to periodically go in and check to make sure you recognize the names. To prevent unknown devices from ever being able to connect, you can enable Mac Address Filtering. This will require you to know how to get your device’s hardware address (MAC Address) so that you can enter it in the software. It can be a little manual and time-consuming, but it ensures no one will ever be able to get on the network without your knowing about it.

Your router has other advanced features, such as “guest networking”, which you should turn off, and a firewall, which you should turn on. If you aren’t already running a software firewall, turning on the router’s firewall is critical, but it’s not a bad idea to have both to boost your layers of security.

Regularly update your router firmware when they are available, and you’ll have a pretty secure wireless network. It’s worth the time to set it up properly as a closed network will save you tons of headaches down the road.

-----------------------------------



 
 

Saturday 5 April 2014

66. Watch out for that bogus call from "Microsoft"


Two articles related to the same problem:-

From PC Tips for Seniors www.pcforseniors.co.uk.

Microsoft Telephone Scammer Forced to Hang Up

 Its perpetrator has finally been caught and sentenced.

 Unlike most scams, which start with an email message, this one revolved around an unexpected telephone call. The caller would claim to be working for Microsoft and would try to convince you that your PC was infected by countless viruses. Somehow, without alerting you to these problems, your PC had contacted Microsoft, and Microsoft was kindly phoning you at its own expense to sort them out.

 If you hadn’t already hung up by this point, the caller would try to ‘prove’ his case by directing you to an area of Windows containing a long and worryingly-technical list of items. These, he’d claim, were all the viruses that had infected your PC. If you were convinced by this, you’d be encouraged to hand over remote control of your PC to the caller so that he could ‘fix it’ – but only after parting with payment for this service.

 Now, with a bit of luck, this scam has been shut down. You can read the full story on the BBC’s website at www.bbc.co.uk/news/technology-26818745, but the upshot is that the scammer has been caught, sentenced and fined. It’s not much of a sentence (or much of a fine, although the court costs help to inflate it), but it should ensure that he doesn’t do it again.

 Of course, there’s no knowing whether this scam was all the work of one man, or whether there are others still at large and still operating the same racket. In case there are, remember how it works and be sure to hang up if you receive a phone call making similarly outrageous claims.
--------------------
 
 
Telephone messages from “Windows.”

Earlier this year telephone calls were received purporting to be coming from Windows advising that the computer of the person called was putting out messages that were affecting a large number of other computers. It was requested that the person receiving these calls be talked through putting a programme on their computer to remedy the fault. Persons had agreed and an extortionate amount of money was demanded for this service. This was a scam and computers had to be taken to a computer shop to have the computers repaired.

The calls originated from Liverpool and Cairo in Egypt and could be made from all over the world and with today´s technology appear to have come from a telephone number anywhere else in the world. The British Police in the Liverpool area were aware of this but could only advise people to ignore this scam.
I have recently received again one of these calls. It was made by a man with an Asian accent who said that he was calling from Windows and was in America. My phone showed “Number Privado”.
BEWARE. THEY ARE STILL ABOUT
Do not give these any information ...just put the phone down
 
------------------------
Little computer tip in case you did not know The difference between http and https... the little thing that means a lot.

 
The main difference between http:// and  https://


It's all about security - HTTP stands for Hyper Text Transport Protocol.
 
The S (big surprise)stands for "Secure". If you visit a website or webpage, and look at the address in the web browser, it will likely begin with the following: http://. This means that the website is talking to your browser using the regular 'unsecure' language. In other words, it is possible for someone to "eavesdrop" on your computer's conversation with the website. If you fill out a form on the website, someone might see the information you send to that site.

This is why you never ever enter your credit card number in a http website!


But if the web address begins with https:// that basically means your computer is talking to the website in a secure code that no one can eavesdrop on. You understand why this is so important, right?

If a website ever asks you to enter your credit card information, you should automatically look to

see if the web address begins with https://

If it doesn't, there's no way you should ever enter sensitive information like a credit card number, PIN, Social Security #, etc.

Be very careful
 
 
-----------------------------------