Connect with us

Cyber Security

10 Tips for a Less Risky Internet Experience

Published

on

Reading Time: 3 minutes

Computer Security

The Internet can be a dangerous place to operate.  It is increasingly looking like a bad neighborhood when the police are on strike.  Even without the criminal element, there are plenty of risks from sharing information online.  Just ask that school teacher who got fired last year for criticizing her students on Facebook.

Here are 10 tips to make for a less risky experience on the Internet.

  1. Before you post anything, assume the whole world is watching.
    You simply have to assume that anything you post online will be seen by unintended parties and can be used against. Don’t post anything you would not want your boss or parents to see.
  2. Anonymity can’t hurt you. 
    Never use your real name on blogs and social media.
    Don’t use email addresses that reveal personal information such as your name, date of birth, school or business.  You should create an email address to use just online that won’t give anything way in the name.
  3. Read email in text mode.
    Email looks great in HTML mode, but spammers and scammers can use it to hide nefarious links and malicious scripts. They can include tracking active content that can carry malware.  You are much safer in text mode.
  4. Use strong passwords.
    A strong password is one that is difficult for a hacker to crack. Give a hacker a six character password with all lower case letters and he will have it cracked in 30 seconds.A strong password has more than 6 characters, has both alpha and numeric data, has a mixture of upper and lower case letters and includes at least one special character.
  5. Treat all email with suspicion.
    If you don’t open email from unknown sources, that is a good start.
    Unfortunately, hackers are very good at disguising malicious email as from sources you might trust. Before you click on any link in an email, right click and check the actual domain. Is it the one you were expecting? You can do the same on the senders email address.  You may find that it is not really what it pretends to be.
  6. Keep Your Operating System and Internet Software Up to Date.
    Hackers are working hard every day to find holes to exploit in your operating system and important Internet software like the browsers, Java and Adobe flash.  Make sure you always have the latest updates with security fixes.
  7. Never use Peer 2 Peer Filesharing.
    Filesharing networks works are the Typhoid Mary of malware. Unless you want to be infected, don’t use them.
  8. Check for secure sites.
    Before you enter any personal information online, including user names and passwords, stop and review the address bar to see if it is a secured site. It should display a padlock and the address should start with “https://” instead of “http://”.While you are at it, make sure the domain name is the one you are expecting. Scammers will sometime divert you to a fake site and it may include part of the name you were expecting, but not the actual domain name. For example, if you are expecting to be at  example.com they might make their address example.com.scammer.ru
  9. Take advantage of browser privacy protections.
    The most recent versions of the major browsers allow you surf the web anonymously. You can set it so your browser won’t save your surfing history, search queries, cookies, download history or passwords.For the safest and most secure web browsing use  Comodo Dragon browser.The Dragon is Chromium technology-based Browser that offers you all of Chrome’s features PLUS unique security and privacy protection. For example, it will warn you of web sites with low levels of assurance.  All digital certificates provide an encrypted connection, but some certificates offer more security than others. With the Comodo Dragon you always know what the risks are.Unlike other browsers, information about online exploration stays as much as possible within the user’s PC. Comodo Dragon does not transmit information about a browsing session to a remote server. Such a transmission exposes information about where the user has been on the Internet.
  10. Use protection.
    Windows comes with virus protection, but it is very minimal and poorly rated.On the other hand, you can download top rated Comodo Internet Security for free. AV-TEST labs has rated it a perfect 6 out of 6 for protection in its July testing.The free edition of comes with all of the protection of the subscription version, which is ranked number 1 in the Matousec.com Proactive Security challenge.

TEST YOUR EMAIL SECURITY GET YOUR INSTANT SECURITY SCORECARD FOR FREE

Source: https://blog.comodo.com/pc-security/1289/

Cyber Security

Apple bans Epic Games from App Store

Published

on

Apple bans Epic Games from App Store until all litigation is finalized

Epic Games CEO Tim Sweeney announced the indefinite ban with a series of tweets.

According to a series of emails published on Twitter and a blog post by Epic CEO Tim Sweeney, Apple has blocked Epic Games from returning to the App Store ecosystem indefinitely, despite the games developer claiming it would stop its own payments system.

Epic’s iOS developer account was blocked in August of last year after the company introduced a new payment method designed to bypass Apple’s payment systems and 30 percent commission fees. Epic filed cases against Apple in response to the prohibition, with the US litigation resulting in a mixed court verdict a fortnight ago.

Apple was justified in cancelling Epic’s iOS developer account because it breached App Store criteria, according to the mixed court verdict.

Epic has subsequently challenged the ruling, and the court is currently deciding whether or not to hear the case.

SEE ALSO:

Iranian Hackers Recently Switched to WhatsApp and LinkedIn to Conduct Phishing Attacks

The games developer’s apps, such as its flagship game Fortnite, would not be permitted to return to the App Store until the US case was resolved, according to one of the disclosed emails reportedly received by Apple’s legal representatives on September 21.

“Apple has exercised its discretion not to reinstate Epic’s developer program account at this time. Furthermore, Apple will not consider any further requests for reinstatement until the district court’s judgment becomes final and non-appealable,” the emails reads.

The letter alluded to the mixed court judgement, which stated that Apple was within its rights to remove any Epic-related accounts from the App Store and that Epic’s developer account could not be reinstated.

Sweeney accused Apple of breaking its promise to enable Epic Games to return to the App Store if it agreed to “play by the same standards” in his tweets.

This was in response to an Apple spokesperson’s emailed remark from a week ago:

“As we’ve said all along, we would welcome Epic’s return to the App Store if they agree to play by the same rules as everyone else. Epic has admitted to breach of contract and as of now, there’s no legitimate basis for the reinstatement of their developer account.”

“Apple lied,” Sweeney tweeted.

SEE ALSO:

Top 10 Websites for Freelancers to Make More Money Online

“Apple spent a year telling the world, the court, and the press they’d ‘welcome Epic’s return to the App Store if they agree to play by the same rules as everyone else.’ Epic agreed, and now Apple has reneged in another abuse of its monopoly power over a billion users.”

Other repercussions of the US court judgement include Epic’s attempt to reintroduce Fortnite to the South Korean iOS App Store, which is now in jeopardy due to the company’s lack of an iOS developer account. Despite the fact that South Korea recently passed legislation requiring programme stores like the App Store to accept different payment methods, this is still the case.

Epic Games’ other pending lawsuits around the world, such as two in Australia, accuse Apple and Google of acting anti-competitively through their app store tactics, would be influenced by the court verdict.

PlatoAi. Web3 Reimagined. Data Intelligence Amplified.
Click here to access.

Source: https://cybersguards.com/apple-bans-epic-games-from-app-store/

Continue Reading

Cyber Security

Google Update on Memory Safety in Chrome

Published

on

Google shared details about its long-term plan for memory safety in Chrome this week. It also announced the first stable release Chrome 94 which addresses a total 19 vulnerabilities.

Google decided to address the issue before it gets worse by identifying memory safety issues as the root cause of over 70% of Chrome’s severe bugs last year.

The Internet search giant chose to concentrate on two solutions out of all the possible options. They introduced runtime checks to verify that pointers are correct and sought a different safe memory programming language.

“Runtime checks have a performance cost. Checking the correctness of a pointer is an infinitesimal cost in memory and CPU time. But with millions of pointers, it adds up,” Google notes.

However, it was considered a viable option and Google is currently experimenting with it.

“[T]he Rust compiler spots mistakes with pointers before the code even gets to your device, and thus there’s no performance penalty,” Google explains.

The company is currently only interested in how it can make C++/Rust work together. However, it has already begun non-user-facing Rust experiments.

Chrome 94.0.4606.54 is now available for Windows, Mac, and Linux. It fixes 19 security vulnerabilities, including five high-severity and ten moderate-severity issues, as well as two low-severity ones.

SEE ALSO:

Google: We’ve changed search rankings to reward ‘original news reporting’

CVE-2021-37956 is the most serious of the severe issues. This flaw can be used in Offline, and Google paid a $15,000 bounty.

The company also paid $7500 for a WebGPU bug, $3,000 for an inappropriate implementation of Navigation, and $1,000 to resolve a Task Manager issue.

Google claims it also paid high rewards to five vulnerabilities of medium severity: $10,000 each for tab strip flaws and one in Performance Manager; $3,000 each side-channel information leakage and ChromeOS Networking inappropriate implementation, and Background Fetch API inappropriate implementation.

Google paid out more than $56,000 in bounty payments to researchers who reported on the issues, though the actual amount could be much greater, as the company has not yet revealed the rewards for seven of them.

PlatoAi. Web3 Reimagined. Data Intelligence Amplified.
Click here to access.

Source: https://cybersguards.com/google-update-on-memory-safety-in-chrome/

Continue Reading

Cyber Security

A New Vulnerability Found in Apple’s macOS Finder Lets Attackers Run Commands Remotely

Published

on

New macOS zero-day bug lets attackers run commands remotely

A new vulnerability in Apple’s macOS Finder was revealed today, allowing attackers to run arbitrary instructions on Macs running any macOS version up to the most recent release, Big Sur.

Zero-day vulnerabilities are defects that have been publicly published but have not yet been patched by the vendor and are sometimes actively exploited by attackers or have publicly available proof-of-concept exploits.

The flaw, discovered by independent security researcher Park Minchan, is caused by the way macOS processes inetloc files, which permits it to mistakenly run any commands encoded inside by an attacker without any warnings or prompts.

Internet location files with on macOS.

inetloc extensions are system-wide bookmarks for opening internet resources (news:/, ftp:/, afp:/) or local files (file:/).

“A vulnerability in macOS Finder allows files whose extension is inetloc to execute arbitrary commands,” an SSD Secure Disclosure advisory published today revealed.

“These files can be embedded inside emails which if the user clicks on them will execute the commands embedded inside them without providing a prompt or warning to the user.”

SSD Secure Disclosure
Image: SSD Secure Disclosure

Apple botches the patch and fails to assign a CVE ID.

As Minchan later revealed, Apple’s patch only partially addressed the weakness, as it can still be exploited by changing the protocol used to execute the embedded commands from file:/ to FiLe:/.

SEE ALSO:

Guardicore Labs are Sharing Details of a Critical Vulnerability in Hyper-V

“Newer versions of macOS (from Big Sur) have blocked the file:// prefix (in the com.apple.generic-internet-location) however they did a case matching causing File:// or fIle:// to bypass the check,” the advisory adds.

“We have notified Apple that FiLe:// (just mangling the value) doesn’t appear to be blocked, but have not received any response from them since the report has been made. As far as we know, at the moment, the vulnerability has not been patched.”

Although the study did not specify how attackers may exploit this flaw, it might be exploited by threat actors to generate malicious email attachments that, when opened by the target, execute a packaged or remote payload.

BleepingComputer further examined the researcher’s proof-of-concept exploit and found that it could be used to perform arbitrary commands on macOS Big Sur without any prompts or warnings by utilising specially designed files received from the Internet.

An.inetloc file containing the PoC code was not recognised by any of the antimalware engines on VirusTotal, implying that macOS users who may be targeted by threat actors employing this attack vector will be unprotected.

PlatoAi. Web3 Reimagined. Data Intelligence Amplified.
Click here to access.

Source: https://cybersguards.com/a-new-vulnerability-found-in-apples-macos-finder-lets-attackers-run-commands-remotely/

Continue Reading

Cyber Security

Roku Will Launch an App on Shopify App Store to Offer SMB advertising

Published

on

Roku, Shopify partner to offer SMB advertising ahead of holidays

Roku will release an app on the Shopify App Store that will allow small businesses to create and manage ad campaigns.

Through a partnership with Shopify, Roku plans to assist small businesses with local advertising.

The streaming media company has announced the release of an app that would allow Shopify clients to create, buy, and measure TV streaming ad campaigns. Roku will be the first streaming app available in the Shopify App Store as a result of the transition.

About 7,000 apps and integrations are available in Shopify’s App Store. Roku’s app should be out before the holidays.

Roku is aiming for the cable and TV ad industry with the Roku app. Roku stated it would be able to give more exact information throughout the marketing funnel if it partnered with Shopify. At the conclusion of the second quarter, Roku had 55.1 million active accounts.

Here are a few crucial points:

  1. Users of Shopify will be able to specify an audience, budget, timing, and duration for their campaigns.
  2. Creative will be uploaded by the company.
  3. Small businesses will be able to create campaigns in a matter of minutes.
  4. Birthdate Co, Jambys, MoonPod, and OLIPOP are among the first merchants to use the Roku ad app.

SEE ALSO:

TrueFort Raises $30 Million Series B To Grow its Application Protection Platform

Roku’s platform, which is installed on a variety of televisions, has been gaining popularity as an advertising medium. Roku’s second-quarter revenue increased by 81 percent year over year to $645 million, with average revenue per user up 46 percent to $36.46.

The company does not break out advertising income, but monetized video ad impressions more than doubled in the second quarter compared to the same period a year earlier, according to the firm. In its August 4 shareholder letter, Roku also stated that it was expanding SMBs on its OneView ad platform.

PlatoAi. Web3 Reimagined. Data Intelligence Amplified.
Click here to access.

Source: https://cybersguards.com/roku-will-launch-an-app-on-shopify-app-store-to-offer-smb-advertising/

Continue Reading
Esports17 mins ago

Kena: Bridge of Spirits Patch 1.05: Full Change List

Esports18 mins ago

NBA 2K22 MyCareer Best Big Man Jump Shot: Current Gen and Next Gen

Esports18 mins ago

Can You Turn Off Click-and-Move in Diablo II: Resurrected?

Esports18 mins ago

Is The Forgotten City Coming to Steam?

Energy39 mins ago

Hollow Microspheres Market to Record $ 1.93 bn Incremental Growth | Discover Company Insights by Technavio

Energy39 mins ago

Tekni-Plex Acquisition Bolsters Food & Beverage Capabilities

Esports49 mins ago

How to Catch Zarude in Pokemon GO

AR/VR53 mins ago

Zero Caliber: Reloaded Survival Mode Drops Today, PlayStation VR News to Come

Esports1 hour ago

Free Fire reveals movie collaboration with Venom: Let There Be Carnage

Esports1 hour ago

Does Diablo 2: Resurrected have split-screen multiplayer?

Energy1 hour ago

Global Lights Out Manufacturing Market Report 2021: Top Nine Technologies Companies Must Consider Switching to a Lights-out Manufacturing Environment

Esports1 hour ago

Does Diablo 2 Resurrected have crossplay and cross-progression?

Esports1 hour ago

Diablo 2: Resurrected’s ‘issue occurred while communicating with the game servers’ error explained

Esports1 hour ago

Diablo II: Resurrected Playable Classes Listed

Esports1 hour ago

Bayonetta 3, New Kirby Game Leak Ahead of Nintendo Direct

Esports1 hour ago

FIFA 22 Career Mode: Players With the Highest Potential

Energy1 hour ago

Bostik participa con éxito en la Big 5, su primera exposición en Oriente Medio

Russia
Esports1 hour ago

1WIN crowned Malta Vibes Knockout Series 2 champions

Esports1 hour ago

Riot reveals broadcasters, hosts for 2021 League World Championship

Energy1 hour ago

Bostik zum ersten Mal bei der Big5 als Aussteller im Mittleren Osten

Esports1 hour ago

TCL shutting down its studio, going fully remote for 2022

AI1 hour ago

Ex-hedge fund manager’s startup hits $2B value

Energy2 hours ago

STANLEY+Techstars Accelerator Announces Open Application

Energy2 hours ago

ITW Performance Polymers lanza un revestimiento superior resistente al desgaste, Devcon® Wear Guard ™ 300RTC

Energy2 hours ago

Ritchie Bros. to host Inside Edge online construction panel on September 30

Esports2 hours ago

Respawn keeps Titanfall 3 hopes alive: ‘Who knows what the future holds…’

Esports2 hours ago

Can You Play Diablo II: Resurrected Offline?

Esports2 hours ago

Pokémon the Movie: Secrets of the Jungle Special Research in Pokemon GO

Esports2 hours ago

How to check Diablo 2: Resurrected server status

Energy2 hours ago

FirstEnergy Honored by Women’s Business Enterprise Center for Supplier Diversity Programs

Trending