IS A HACKERS BEST FRIEND An indepth look at the growing problems and evolving solutions of Internet Security Identity Theft Privacy and Data Protection Do you have specific questions Please use the blank 3x 5 cards on the tables to provide us with the following ID: 588775
Download Presentation The PPT/PDF document "IGNORANCE" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
IGNORANCE IS A HACKERS BEST FRIEND
An in-depth look at the growing problems and evolving solutions of
Internet Security, Identity Theft, Privacy and Data Protection Slide2
Do you have specific questions?Please use the blank 3x 5 cards on the tables to provide us with the following:
Name:Address:Phone:Email Address:
Write any question for me on the back – we will have a Q & A at the end of this seminar.Slide3
From Eric Howes, director of research services for security firm GFI Software:
"The user is always the weak link. Even the best anti-malware protection and security patches cannot protect a PC from malware if the user sitting at the keyboard is being irresponsible while surfing the Web.“Slide4
SEMINARE OVERVIEWHackers - Why do they do it?
Understanding the LingoAssess Your Risk LevelCurrent Amador County attacks
Knowledge is PowerSocial Media & Online EntertainmentThe CloudThe GOOD news!Effective Software SolutionsPassword RulesSmarter SurfingMacsSlide5
Understanding the Lingo
Trojans
BotsBotNetsZombiesRansom ware
Virus
vs
Malware
Spyware
Scareware
Adware
Polymorphic Virus
The CloudSlide6
• TROJAN VIRUSES
A
Trojan horse, or Trojan, is a type of malwareprogram containing malicious code that carriesout actions it was programmed for, typically causing loss or
theft of data, and possible
system harm.
It typically arrives inside of
something you downloaded.Slide7
• BOTS
A ’bot’, short for robot,
is a computer virus designed to control computers from a remote location. It waits for instructions, and upon receiving them
performs a specific task on
the infected computer. Slide8
• BOTNETSHundreds, thousands, even millions of
bot-infected computers can be placed underthe control of a command-and-control serverwith an attacker at the controls.
These infected computers area a BOTNETwhich can be used for malicious purposes such as sending out massive spam email and denial-of-service attacks on servers. Slide9
BOTNET EXAMPLESlide10
• ZOMBIE COMPUTERS
“Zombie computers” are bot-infected and come alive by themselves. Typically, the zombie computer is connected to a high speed internet service.
A task is activated (brought to life) by the remote hacker, or even by instructions from another zombie computer, while the computer is not in normal use.
The purpose is to run tasks such as decrypting parts of passwords which if performed
with just one computer could take over 200 years, but with the use of thousands of
zombies can be done in just a few hours.
This is the reason why our government servers have 5 password layers, and daily the
hackers get beyond level 3, sometimes level 4. Slide11
Don’t let your computer become a Zombie
If you have not installed security software and ensured that it is kept up-to-date, your machine is likely infected with all kinds of malicious software, including bots.
The best protection is to set your anti-virus and anti-spyware programs to automatically update (if possible), and to install every patch that your operating system and browser make available.Run your security software scans monthly or sooner if you feel you may have put yourself at risk. Slide12
• VPN – Virtual Private Network
The most important thing you need to know about a VPN:
It secures your computer's internet connection to guarantee that all of the data you're sending and receiving is encrypted and secured from prying eyes
.
More on this later….Slide13
• RANSOMWARE
Ransomware is any infection that attempts to
extort money from you to remove the infection.
Some Ransomware, such as the FBI Virus can be removed without paying the ransom.
The best advice is to call your tech the moment you receive the message. In some cases you have only 72 hours to pay the ransom with Bitcoin.Slide14
• VIRUS vs MALWARE
VIRUSES Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation or instruct the computer to perform a task.
They can cause the operation system to completely fail.Slide15
• VIRUS vs MALWARE - continued
MALWARE
The generic term "malware" essentially refers to "adware" and "spyware" programs that are loaded onto computers from the Internet, without your permission or knowledge.By nature it is malicious
Slide16
• SCAREWARE
Scareware is a form of Malware with one goal – Scare you into purchasing a product or paying a fee to avoid a worse fate.
Common Scareware:“You are infected – click here to run a scan”“You are wanted by the FBI”“Pending Hard Drive Failure – buy our repair software now!”Slide17
• ADWARE
Adware
programs often change browser settings, redirect your
browser to a new “home page”
and re-route your favorite websites
to advertising websites.
Typically, infected systems are plagued
with new tool bars and a constant barrage
of popup ads.
.Slide18
• POLYMORPHIC VIRUS – “it’s alive”
Polymorphic viruses resemble nature’s own
viruses in their ability to mutate.As they travel from computer to computer, they change (MORPH) their file name and the software code
that is normally detectable by anti-virus
protection software. This morph
allows them to slip past your anti-virus
protection software.Slide19
• POLYMORPHICS GIVE BIRTHOnce the Polymorphic virus arrives into your computer, it immediately morphs again just in case your protection software noticed it’s arrival, and then immediately creates a second (baby) version of itself (the egg), which in turn morphs one more time. The egg is hidden in a new randomly named file within the Windows OS. The name changes each time it is spread from computer to computer.
Slide20
• POLYMORPHICS RESPAWNIF you are successful in locating and removing the Mother Polymorphic, the baby will hatch from it’s little egg and re-spawn another baby egg.
It requires a computer professional familiar with Polymorphic Viruses to successfully remove the mother
and the hidden baby with proper diagnostic tools PLUS manually within the system registry, before they have a chance to re-spawn.Slide21
HACKERS – why do they do it?
In order to understand why hackers do what they do, you only need to be focused on one expression; “The Achievement”.
Recognition, money, international terror, and the ultimate achievement of the impossible – Hacking the government and THE CLOUD!Slide22
HACKERS – why do they do it?
Most people think hackers are after credit card numbers or other similar information for financial gain. The reality is that most hacks are not motivated by instant financial gain. The vast majority are done simply because
THEY CAN, and often to cause embarrassment to the hacked entity.Slide23
There is $$$$ in HackingJob offers – it is very common for large corporations and governments around the globe to hire the very same people who have hacked into their data bases.
Keep your friends close, keep your enemies closer.Slide24
There is $$$$ in HackingKevin
Mitnick, the man widely regarded to be the world’s first convicted hacker. After a public pursuit by the FBI, he was arrested in February 1995 and ultimately sentenced to prison time. He served five
years.Today, Kevin Mitnick is chief hacking officer of a company called KnowBe4, which specializes in computer security education and testing.Slide25
There is $$$$ in HackingCommissions Earned
A hacker earns the most money by creating an enticing download, video or picture – one that the general public can’t resist clicking on. He then announces to the “Dark Web” that he is seeking other hackers who have a virus or malicious program that they wish to spread on the web.
He then opens a bidding auction for the rights to piggy back along with his destructive file. Slide26
There is $$$$ in HackingCommissions Earned
The “piggy back” hackers will bid to pay him anywhere from $.05 cents to $1.00 for every computer that he is able to get THEIR file into. The more “piggy
backers” he has, the more money he makes. Note: the majority of “piggy backers” compromise your security with keystroke loggers, adware popups, and data harvesters. They make their money by selling the information they gather from your computer to marketing firms and other hackers. Slide27
HACKER STATISTICS
According to statistics, about 90% of all computers in the world are infected with malware.
80 percent of U.S. businesses have been hacked and most don’t even know it. It takes only 1-7 seconds to completely hack a password if the word is found in a dictionary.
Slide28
HACKER STATISTICS
Simply stated, firewalls and anti-virus are no longer enough. There is not an anti-virus program on the market that cannot be defeated. Don’t lose sight of that
.The best protection you have, without a doubt, Is YOU. Knowledge is Power! Slide29
PASSWORD HACKING
A password-cracking expert
in 2012 unveiled a computer cluster that can cycle through as many as 350 billion guesses per second. At that time it was an unprecedented speed that can try every possible Windows passcode in the typical enterprise in less than six hours
.
The good news is that this will not work on any website that limits the number of failed password attempts before locking the account .
These method works best in OFFLINE password cracking. Slide30
PASSWORD HACKING
Example of its use: Cracking major databases of credit card numbers and user logins stored
on Windows servers for major retailers.TargetHome Depot
Lowes
Anthem Blue Cross
Linked In
Facebook
I personally have had my account hacked at three of these companies who were attacked by this very
tecnique
. Slide31
http://www.informationisbeautiful.net/visualizations
/worlds-biggest-data-breaches-hacks/ Slide32
5 MINUTE BREAKSlide33
CURRENT AMADOR COUNTY ATTACKS
RANSOMWARE:
FBIDepartment of justice PRISMCryptolockerSCAREWARE SCAMSMicrosoft Tech Support
Other tech support
Antivirus Warnings
EMAIL SCAMS
Court Appearance
Hospital notices
Payment due notices
SOFTWARE UPDATES
Adobe Reader, Java or Flash updatesSlide34
FBISlide35
FBI – VIDEO CAPTURESlide36
PRISM VIRUSSlide37
CRYPTOLOCKER - EncryptionSlide38
THREAT FINDER - EncryptionSlide39
FALSE PROGRAM – Security EssentialsSlide40
FALSE PROGRAM – NortonSlide41
FALSE PROGRAM – AVG or Windows Tech Support?Slide42
FALSE PROGRAM – AVG Anti-VirusSlide43
FALSE PROGRAM – McAfee Site AdvisorSlide44
FALSE PROGRAM – McAfee Security Scan PlusSlide45
FALSE PROGRAM – McAfee 800# ScamSlide46
SCAM – PDF reader / writerSlide47
SCAM - FLASHSlide48
SCAM - FLASHSlide49
SCAM - FlashSlide50
DRIVER UPDATER - WinZipSlide51
SCAM – PC TOOLSSlide52
SCAM - FACEBOOKSlide53
SCAM – JAVA UPDATESlide54
SCAM – TECH SUPPORTSlide55
SCAM – TECH SUPPORTSlide56
SCAM – TECH SUPPORTSlide57
SCAM – TECH SUPPORTSlide58
MICROSOFT TECH SUPPORT
MICROSOFT WILL NEVER, EVER CALL YOU!
NEVER BELIEVE THEM. HANG UP!
AND DON’T ANSWER THE PHONE WHEN THEY CALL BACK!
Never dial the “Microsoft” number they provide.
NEVER, EVER, FOR ANY REASON ALLOW THEM ACCESS INTO YOUR COMPUTER .
THEY WILL STEAL ALL YOUR DOCUMENTS, CONTACTS, PICTURES, ETC -
PLUS
INFECT YOU WITH KEY STROKE LOGGERS AND MANY OTHER MALICIOUS MALWARE!!
AND THEY WILL BILL YOUR CREDIT CARD AROUND $300 FOR THE “service”. Slide59
SCAM – Microsoft Tech SupportSlide60
How SAFE are YOU?Slide61
ASSESS YOUR RISK LEVEL!
If you participate in ANY
of the following you ARE at risk. The more you do, the higher your risk. Email – PC or WebmailShop online Click links in a web page
Have OR visit FaceBook
Download music or games
Play online games
YouTube – view, post or download
SKYPE
Visit adult sites
Download FREE stuffSlide62
ASSESS YOUR SECURITY LEVEL
How many of the following apply to you?
I have installed the following tools:
Required Monthly Maintenance
Current subscription Anti-Virus Software
Update and run
full hard drive scan
Malware Bytes Anti-Malware
Update and run
full hard drive scan
Firewall Utility
Download
updates from Microsoft or other program when available.
Current
version of Browser: not IE
Download
updates from Microsoft as available.
Microsoft OS Updates
Download
updates from Microsoft as available.
Current versions
of Flash, Java & Adobe Acrobat Reader
Download ONLY from get.adobe.com
and java.com. NOT from any other source.Slide63
TAKE 5Slide64
REALISTIC SOLUTIONSSlide65
EDUCATION IS PROTECTION
Software tools are not enough. YOU are a critical part of your defense.
This sections topics include:Email safetyOnline ShoppingWeb LinksFree stuffSlide66
eMAIL vs WEB MAIL
Is WEB Mail safer the PC Mail?Both can contain harmful links that if clicked can direct you to a website that may infect you. But email
delivered directly to your PC mail program does pose more risks of accidental infection from simply opening the message. Don't buy anything promoted in a spam message.Don't reply to spam or click on its "unsubscribe" link.
If your e-mail program has a preview pane, disable it to prevent the spam from reporting back to its sender. Also, the preview pane can enable a virus to launch without you fully opening the message.
Use one e-mail address for family and friends, another for everyone else.
If you get
too much spam
, check your Internet service provider's filtering
features and
attempt to increase the filter.
NEVER
use your email password when creating a login for a website Slide67
EMAIL ATTACHMENTS
If you receive an e-mail with an attachment - DO NOT open it unless it's expected
(not JUST from someone you know. Examples would be: invoices for unknown purchases bank statements (which are never e-mailed)
court appearance notices, medical record notices
sweepstakes winnings
confirmation of trip reservations
Email from Microsoft (unless you signed up to receive
them).Slide68
EMAIL SCAMS - AirlinesSlide69
EMAIL SCAM – AMAZON INVOICESlide70
EMAIL SCAM – UPS OR FED EXSlide71
EMAIL SCAM – UPS OR FED EX
This is a valid notification. Note that BOTH the sender and recipient addresses are displayed, along with the tracking number.
But…… if in doubt…..Write down the tracking number and go directly to UPS.com and track the package directly from their site. Slide72
ONLINE SHOPPING There are risks to online shopping.
Infections from false websites promising a product but delivering viruses/malware.
Malicious keystroke logging software which transmits your credit card info to a hacker. Company you purchased from experiences a data breach on credit card files.Slide73
SOLUTION! ONLINE SHOPPING
Obtain a credit card that has a very low credit limit. Use this card ONLY on websites that you trust.
Open a “Private Browsing Window” or “Incognito Mode” browsing window to make your purchase.Always look for the HTTPS:// at the beginning to ensure you are on a SECURE payment site. Use a VPN – CyberGhost
is recommended - FreeSlide74
WEBSITE LINKS Even the most well know and respected websites are falling victim to hackers who swap a valid link for a dangerous one.
Cases in point: The Yahoo Weather link has been attacked by hackers resulting in the user being re-routed to a page that instantly infects them. Google Ads have been rerouted to various sites not affiliated with the actual ad. Music and video links are notorious for redirecting the user to an infected page.
SOLUTION: Hover over the link and read the text as to where it will take you – before you click!Slide75
Downloading RisksDownloading from friends can be risky.
Always use extreme caution when downloading information or files from someone whose computer is not protected – and you can never be sure anyone else’s computer is virus free. Are you even sure yours is?
Be sure the link you click on is for the program you want – often MANY download links will be on the download page – but only one is what you wanted. Mouse Hover to see the link URL.Slide76
Downloading RisksSlide77
SOCIAL MEDIA & ENTERTAINMENT
YouTube
FaceBookTwitterVideo SitesTeen sitesP2P Gaming SitesBusiness NetworkingFree Stuff DownloadsSlide78
YOUTUBE.COMCan I get infected from just watching a YouTube Video?
Not if you simply watch the videos and use the site as it was intended. It perfectly safe. YouTube re-encodes all videos into their proprietary Flash-based format, and that would remove any macro viruses that could be stored in something like a WMA file.Slide79
YOUTUBE.COM continued -1YouTube is full of links and the average human user has trouble refraining from clicking when presented with a video of cute kittens and a promise of more at the other end of a simple mouse click.
However
, don't click on links which are in the videos or in comments, because they can send you anywhere, out of reach of the Google Police.Don’t click on the Comments, Side Links, Descriptio
n Box Links, basically anywhere outside the video itself.Slide80
FACEBOOK.COM - hacked!
Facebook malware has been proven to be able to get aroundtheir website security controls and take control over accounts. It can collect
info from your account, send status updates or messages that look like they're from you, or cover your account with ads that are filled withmore infections.You can get Facebook malware from any of the following:
Trying to watch a "shocking video" in a post
Visiting a website that claims to offer special features for your
Facebook
page.
Don’t click the link. Locate the real
Facebook
features at Facebook.com
There are sites and add-ons that claim they can show you who's viewing your profile, change the color of your profile or help you remove your Timeline.
These features don't exist.Slide81
ONLINE VIDEO PLAYERSOnline videos account for a huge amount of the traffic on the Internet, and as such are one of the best conduits for malicious code that can infect your computer.
As anti-spam technology improves, hackers are finding new vehicles to deliver their viruses, with some being embedded in online video players, according to a new report from the Georgia Tech Information Security Center
.Solution: When in doubt- Don’t CLICK. Is that video REALLY worth the risk?Slide82Slide83Slide84Slide85Slide86
PHOTOS AND VIDEOSHackers often embed their malicious code in images or PDF files.
An infected computer can spread the infection through photos and videos attached to emails or posted on websites.
Recommended solutions: view them but don’t click on or save them. OR… save them to a memory key and then instruct your Security Software to scan the key BEFORE you either open the file or transfer it to your Pictures or Videos folder on Drive C. Slide87
DOWNLOADS - GAMES / MUSIC / SCREEN SAVERS
The term “Nothing in life is FREE” is especiallytrue when it comes to the internet.
Just ask yourself one question – Why would asoftware programmer with skills spend hisvaluable time designing software for FREE?Answer – Someone else is paying him to
deliver the software into your computer
–
Who is it
?Slide88
The HIDDEN MOTIVE in FREE
A hacker needs a delivery method to get his virus/spyware/malware into YOUR computer.
The most common way for malware to work its way into your system is to piggyback on a free program that is downloaded from the Internet.Statistics show that 84% of “free downloads” contain other programs bundled inside - the infamous Trojan Horse concept. Give them a gift and then declare war on their computer!Slide89
The HIDDEN MOTIVE in FREE
Most users click on an "I agree" or "I accept" button without reading the long and complex license agreement that expresses consent to place the malware onto their systems.
Solution – Download the “free” item to a memory key and scan it for infections BEFORE you install it to your computer. Slide90
TAKE 5Slide91
P2P - PEER TO PEER
P2P file sharing is the process of sharing and transferring digital files from one PEER (computer) to another PEER (computer) over the internet, without going through an intermediary server.
Slide92
P2P Examples
Napster was an early and famous example of P2P file sharing. They have since done away with risky P2P and now only offer downloads from their protected servers.
If you use SKYPE, you are using P2P technology.TOR is a technology that allows computers to pass files between each other via an internet connection. (Windows 10 has the ability to use TOR to spread its updates to the world). Slide93
FILE SHARING P2P NETWORKS
File Sharing DangersFile-sharing peer-to-peer networks like Kazaa , Morpheus , iMesh, eDonkey, Gnutella, LimeWire and Grokster accounts for thousands of illegally downloaded music files, games, movies and software.
Computer security experts warn that use of file-sharing operations usually leads to situations in which computers -- and even networks -- are infected with spyware, malware and backdoors left ajar for hackers.Slide94
BE CAREFUL IN a P2P NETWORK
DISCLAIMER - I NEVER RECOMMEND P2P FILE SHARING. IT’S JUST TOO RISKY. BUT IF YOU MUST DO IT….
Before you start, make sure your computer’s security software is up-to-dateCheck that your firewall hasn’t been disabled Stick to legal file-sharing services
Joost, Miro, Babelgum, and BBC’s iPlayer
Use your computer’s security software to scan downloads
If any files are flagged as risky, quarantine and/or delete them immediately.
Don’t upload (or download) copyrighted material
Want to share your digital copy of Iron Man 3 with the world? Your generosity could get you into costly legal trouble. One famous case was
Sony BMG Entertainment v. Tenebaum
, which went all the way to the Supreme Court. Slide95
Continued…
Pay attention when you install P2P programs
Make sure you’re clear which folders on your computer will be made public – you could be exposing private data on your hard drive. Close the P2P connection when you’re finishedWhen you close a file-sharing software program’s window, your connection to the P2P network may remain active. This could give others access to your shared files and increase your risks.
Refrain from using P2P file sharing at work
Employers often have policies against using P2P programs on work computers.
Make sure your kids understand the risks
Youth often feel invincible and believe “it won’t happen to me, my parents are paranoid”.
P2P file sharing has its advantages, but it does come with dangers, so proceed cautiously. Keep our tips in mind when you’re utilizing P2P programs.
And if you have any doubts, just don’t do it.Slide96
PEER-TO-PEER MUSIC SITES
Spyware is a by-product of peer-to-peer file-sharing. People are generally unaware of how easily spyware gets into their computers.
The programs required to participate in peer-to-peer networks do not just help people share music files. They share whatever they can find on the hard drive and the network.Slide97
P2P FILE SHARING SERVICES TO AVOID – OR USE WITH
GREAT
CAUTIONKazaaMorpheusGroksterBearShareLimeWire
LimeRunner
LimeZilla
LuckyWire
Vuze
Warez
Nodezilla
VIP Torrent
Blubster
BitTorrentSlide98
Safer MUSIC SITES – (NOT P2P)
iTunes
Rhapsody (Napster)Spotify AmazonMP3.comPandoraSoundcloudSlide99
ITUNES.COM
Can I get a virus from ITunes?
iTunes is not a P2P file sharing program, when you download from ITunes, you don't download from other people, you download from Apple's server. The short answer is YES, but HIGHLY unlikely. There is the potential to get viruses from iTunes. They are careful but it has happened. However, it requires a hacker to attack the iTunes server. Very low risk level compared to open share servers like LimeWire or MP3 Juices.Slide100
RISKY ONLINE GAMING SITES
AddictingGames.com – adware plus known infections that prevent system from booting
POGO.com –hacker target and occasional infectionsMiniClip.com – requires you accept a MiniClip toolbar that promotes advertisers and their websites
Kongregate.com
– online complaints in forums regarding infections after playing online games at this site.Slide101
CLOUD FILE SHARING SERVICESSlide102
What is a FILE SHARING SERVICE?
A file hosting service allows you to share large files securely over the internet.
Uploading large files or images to server where you can share access with friends and family is the most popular form of sharing files online. It's easy and free. Slide103
FILE SHARING SERVICES – security
One of the most important security tools to require of a file sharing service is the
remote wipe. With remote wipe, you can make sure that you can remotely delete files from any device attached to your account. If an employee leaves your company or a device is stolen, you can remove the files even though you don't have access to the device. Slide104
ONLINE FILE SHARING SERVICES – OVERALL PERFORMANCE REVIEW
Online File Sharing Services: Our Verdict and Recommendations
The best file sharing service in our review is Hightail. Not only does this service offer unlimited storage, but it also provides unlimited bandwidth. When you combine this with the comprehensive sharing features, security and file tracking, it's the clear winner of our Gold Award. Slide105
ONLINE FILE SHARING SERVICES –SECURITY REVIEWSlide106
THE CLOUD
The Cloud has great potential to simplify all our technology and enable great leaps in advancement of communication, science, and areas still undiscovered…
OR…create a tremendous technology disaster world wide. Slide107
WHAT IS “THE CLOUD”
The cloud can be compared to an apartment building in which multiple tenants live and share the public resources of the complex.
The prime difference is that in an apartment building you can see and meet your neighbor. You can visually evaluate the apartment complex and the neighborhood to determine if you would feel safe living there. With The Cloud, you are required to make your selection based only on their advertisements and internet reviews, which can be misleading. Slide108
COMMON CLOUD USESBACKUP:
Services such as Carbonite and BaracudaPersonal file sharing space: Dropbox, Mozy,
Google Drive, photos, work projects, etc.PROGRAM ACCESS:Microsoft OfficeAdobe PhotoshopQuicken / QuickBooksSlide109
CLOUD RISKS- UNKNOWN UKNOWNS
To quote former U.S. Secretary of Defense Donald Rumsfeld:
“ There are known knowns; things we know we know. We also know there are known unknowns; that is to say, we know there are some things we do not know. But there are also unknown unknowns -- the ones we don't know we don't know.Slide110
FAITH IN THE CLOUDI believe that most public cloud vendors do a far better job securing data than their customers do. But you need to know where your cloud vendor stands and the measures it takes to mitigate risk as compared to what you or your company alone could provide
.
I offer a full seminar on Data Back Options where this topic if further explored. Slide111
LAST BREAKSlide112
THE GOOD NEWS!!!Just as hackers are evolving, so is prevention technology
Software solutions get stronger every dayNations are uniting to put a stop to the global terrorism that exists on the web
YOU are 90% of the solution!Slide113
TOP 6 WAYS TO STAY SAFE ONLINE
From
Roger Thompsonchief research officer, PC security firm AVG:
"Good software designed to detect this stuff helps, but unfortunately, these are areas where the problem is in relative infancy, and is going to get much worse."
Stay up-to-date, stay paranoid, stay protected. That's the message from the security experts.
Here
are a few of their top tips and suggestions for protecting your computer against malware and hackers.
Keep up on
patches
Be
password
smart
Use
security
software
Don’t Over Google It!
If it sounds too good to be true... well, you know the
rest
Assume
that everyone's out to get
you
– It’s OK to be skeptical!Slide114
HOW TO TURN OFF THE MICROSOFT “TOR” FILE SHARINGSlide115
HOW TO TURN OFF THE MICROSOFT “TOR” FILE SHARINGSlide116
HOW TO TURN OFF THE MICROSOFT “TOR” FILE SHARINGSlide117
HOW TO TURN OFF THE MICROSOFT “TOR” FILE SHARINGSlide118
HOW TO TURN OFF THE MICROSOFT “TOR” FILE SHARINGSlide119
PASSWORD RULESSlide120
PASSWORD DO’SCreate your own “style” of password - for example1 upper case letter, 2 numbers, 1 unique character, 4 lower case
letters. Example for Amazon.com password –
Arf26@az! ( this is translated from a r
ain
f
orest
2
01
6
(at
@
)
a
ma
z
on
!
Use a different password for every siteSlide121
PASSWORD DO’S – test your password!
Want to know how fast a hacker can crack YOUR password?
Visit http://random-ize.com/how-long-to-hack-pass/ This site enables you to enter your password in an analyzer field to determine just how long it will take to crack YOUR chosen password!
Awesome Tool!
Save in your FAVORITE sitesSlide122
PASSWORD DONTSYou are advised to never…
Use anything that is pubic record – your name, address, phone number, SS #, DL #, Never use common words, it’s too easy to decode
NEVER use your email password anywhere else than for email accessNever use anything that can be found in social sites (pet’s name, favorite movie, favorite song)AND NEVER use the same password twiceSlide123
PASSWORD MANAGEMENTSlide124
PROTECTION TOOLS Use It or Loose It
It is important to remember the importance of
updating anti-malware and anti-virus programs. New malware is designed every day, and whenever an update to a protection software program is released, it is only a matter of time before the malware designers find creative ways around it. This continuous game requires you to
constantly update your protective software. Slide125
HOW TO CHOOSE PROTECTION
This is a personal choice depending upon:
CostNumber of computers / devices to protectProtection (virus, malware, identity)Performance (negative impact on computer/device)
Usability by novice computer user
Visit this link for a complete review of 22 programs.
https://www.av-test.org/en/antivirus/home-windows/windows-10
/
Slide126
VIRUS PROTECTION REVIEW 2017Slide127
Another opinion…..Slide128Slide129
CONSUMER REPORTSSecurity Software Buyers Guide
A step-by-step buyer’s guide to selecting the right Security Software for YOU can be found at:
www.consumerreports.org/cro/security-software/buying-guide.htmlSlide130
MALWARE BYTES ANTI-MALWARE
Older Logo
NEW LOGOSlide131
Malware Bytes – DashboardSlide132
Malware Bytes – Threat ScanSlide133
Malware Bytes - scan resultsSlide134
Malware Bytes - scan optionsSlide135
Malware Bytes – Custom ScanSlide136
Malware Bytes – SettingsSlide137
Malware Bytes – Ransom Blocker
https://forums.malwarebytes.org/topic/177751-introducing-malwarebytes-anti-ransomware-betaSlide138
Malware Bytes – Ransom BlockerSlide139
PASSWORD MGR - featuresSlide140
PASSWORD MGR – Browsers & OSSlide141
PASSWORD MGR – Mobile DevicesSlide142
SMARTER SURFINGSANDBOXIEONLINE BANKING TIPS
BROWSER REVIEWSPRIVATE SURFINGW.O.T.
MAC COMPUTERSSlide143
PLAYING IN THE SANDBOXieA Sandbox is a utility that protects your computer software from viruses, spyware and malware by containing your entire browsing experience inside the box.
Nothing leaks out.
Configure your own sandboxes to meet your specific needs - install new software directly into a sandbox. What happens in the Sandbox stays in the Sandboxhttp://www.sandboxie.com/Slide144
ONLINE BANKING TIPSUse a safe browser in privacy mode
Change your password frequently
Check your online bank balance daily – weekly at the very leastNEVER do online banking with Internet Explorer NEVER do online banking at a hotel, public eatery, coffee shop, library, or any other public
WiFi
. Slide145
PRIVATE BROWSINGSlide146
PRIVATE BROWSING
FIREFOX: Private Window BrowsingGOOGLE CHROME: Incognito ModeEDGE:
In-Private BrowsingImportant: Private Browsing doesn't make you anonymous on the Internet. Your Internet service provider, employer, or the sites themselves can still track what pages you visit. Private Browsing also doesn't protect you from keyloggers or spyware
that may be installed on your computer.Slide147
PRIVATE BROWSING
Private Browsing Will:
allow you to browse the Internet without saving ON YOUR COMPUTER any information about which sites and pages you’ve visited. Private Browsing also includes Tracking Protection in Private Browsing
, which prevents companies from tracking your browsing history across multiple sites.
A shield icon will appear in your address bar whenever Firefox blocks tracking domains.
Slide148
GOOGLE CHROME - IncognitoIn the top-right corner of the browser window, touch the Chrome menu icon (lo0ks like 4 bars).
Select New Incognito Window
.Tips:You can also use the keyboard shortcuts Ctrl+Shift+N.If you're using a Chromebook, you can use the
guest browsing
feature as an alternative to incognito mode. Slide149
EDGE: In-Private Browsing
To open: Click the Tools button , point to Safety, and then click InPrivate Browsing.
What InPrivate Browsing does:Dumps cookies, temporary internet files, browsing historyWhat InPrivate Browsing doesn't do:It doesn't prevent someone on your network—such as a family member, network administrator or hacker—from seeing where you went.
It doesn't provide you with anonymity. Websites might be able to identify you through your web address, and anything you do or enter on a website can be recorded by that website.
It doesn't remove any favorites or feeds that you add when you close your InPrivate Browsing session. Changes to Internet Explorer settings, such as adding a new home page, are also retained after you close your InPrivate Browsing session.Slide150
BROWSER REVIEWSSlide151
BROWSER REVIEWSSlide152
FIREFOX – TOP RECOMMENDEDSlide153
FIRE FOX – SECURITY OPTIONS
To access the
FireFox Security options…Left click on the three bars in the top right hand corner. The menu will display.Select OPTIONS to access the security features.
Note: This is also where you can click on NEW PRIVATE WINDOW to browse without your history being saved in the computer. Slide154
FIRE FOX – SECURITY OPTIONSSlide155
FIRE FOX – MASTER PASSWORDSlide156
FIRE FOX – SAVED PASSWORDSSlide157
FIRE FOX – PRIVACY OPTIONSSlide158
BROWSER SAFETY TOOLSWeb Of Trust- W.O.T.
protects you against scams, untrustworthy links and rogue web stores Reputation ratings guide you to find trustworthy sites
It's fast, easy to use and free! https://www.mywot.com/Slide159
Web Of Trust - reputation guidesSlide160
Web Of Trust – warning screensSlide161
CyberGhost VPN – FREE – No Acct!
The most important thing you need to know about a VPN:
It secures your computer's internet connection to guarantee that all of the data you're sending and receiving is encrypted and secured from prying eyes.Slide162
CyberGhost VPN – Download SiteSlide163
CyberGhost VPN – Wait QueSlide164
CyberGhost VPN – Connecting…Slide165
CyberGhost VPN – Ready to UseSlide166
AD BLOCK PLUS – FREE!Available for all Windows Browsers:
FireFox, Edge, ChromeSlide167
“I LOVE MY MAC”Slide168
APPLE/MAC INFECTIONSBusting The Myth:
Apple MACs Do Get Viruses!
However, the likelihood of an Apple Macintosh user getting a virus when compared to a Microsoft Windows
user is very little to none. In fact,
many of the Apple Macintosh users don't even run an
antivirus protection program.Slide169
WHY MACs ARE SAFER…
Below are some of the reasons why Apple Macintosh computers donot have as many viruses as Microsoft Windows.
Newer Macintosh operating systems, such as the Mac OS X, is built on the Unix kernel, which is one of the oldest and most secure operating systems available.Microsoft Windows is used by a lot more people than the Apple Mac OS. Because more people use Microsoft Windows, it is a much better target and makes it easier for viruses to spread.
Most of the computer virus writers are more familiar with the IBM platform and Microsoft Windows, which means its easier for them create a virus for that platform.
Many of the tools, scripts, and code used to create viruses or other malware are designed for Microsoft Windows. Slide170
I’M INFECTED! Now What?
Run all the protection software recommended in this seminar.If still infected, or if system does not perform normally after removal of infections, call CPU Computers or another professional computer repair company right away. Otherwise, you are likely spreading the infection to friends and family.Slide171
FINAL CONCLUSIONS…The internet is a wonderful tool.
I cannot imagine our society going forward without it.I realize the risks and accept them as necessary part of my life
. I am the BEST protection!I will empower myself with knowledge and explore all the web has to offer…. SAFELY.Slide172
UPCOMING SEMINARS…
I wish to thank all of you for joining me today!Our next
seminar topic in November will be:PERSONAL DATA BACKUPS Who, What, When, Where, Why and How?
Please visit
http://cpu-onsite.com
for event dates. Slide173
Access additional BONUS material at our website…cpu-onsite.com
Visit the SEMINARS
linkThank you for joining me today!
Presenter: Tori Moody 209-296-0660 CPU Onsite Computer Services
All rights reserved. Copyright 2016. Reproduction or distribution of this
presentation is strictly prohibited without written consent from Tori Moody