Swamp Geek
  Login or Register HomeDownloadsYour Account   
Navigation 
Site Info 
Last SeenLast Seen
Server TrafficServer Traffic
  • Total: 4,221,567
  • Today: 1,315
Server InfoServer Info
  • May 11, 2024
  • 07:53 pm CDT
 
 
Reviews, comparisons, and opinions about the latest technology products, services, trends and anything of interest to the thick glasses crowd!

Swamp Geek: Cybersecurity Awareness Month



Search on This Topic:   
[ Go to Home | Select a New Topic ]

Cybersecurity Awareness Tip 20: Avoid social media quizzes, surveys and public g More about
Cybersecurity Awareness Month

Cybersecurity Awareness Tip 20: Avoid social media quizzes, surveys and public groups

TMI

Hackers and other surveillance organizations (governments, companies) use social media, too. Surveys, quizzes, games,  pages and groups can all be used to collect personal information that can be used in indirect phishing or direct cybersecurity attacks.

Be Less Social

In its 10 Ways to Protect Your Personal Data poster, Cybersecurity education company InfoSec recommends:

"Be Less Social.
What to do: Minimize the amount of personal data you have on social media platforms.
Why: Information like your pet’s name or mother’s maiden name is sometimes used to recover account logins. Don’t give hackers an easy way into your online accounts!"

This is a good reminder to avoid surveys that ask for personal questions or other information that can be used to reset account passwords.

Your activity on Facebook groups is visible, too.  Views and likes on public groups are available to, well, the public.

Cybersecurity Awareness Tip 19: Check your privacy settings on social media More about
Cybersecurity Awareness Month

Cybersecurity Awareness Tip 19: Check your privacy settings on social media

Who Are You and How Can I Use Your Profile Against You?

Check the authentication options and enable 2-factor authentication or multi-factor authentication if possible.  Also check what personal information is collected (SwampGeek recommends to provide as little as possible), what is visible, and who can see your posts.

For Example

The privacy and security options supported by social media companies vary from basic (Minds) to complex (Facebook).  

Facebook's security and privacy settings seem almost intentionally complex, but also highlight the vast amount of data the company surveils.

  • Facebook
    • Privacy Checkup (yes)
    • Settingss require a Master's degree
    • Posts require a Bachelor's degree
    • Supports two-factor authentication via OTP (One-Time Passwords), Facial and Biometric authentication on mobile devices
    • Can limit logins to certain devices and can use application-specific passwords
  • Instagram
    • Privacy:
      • Private account (yes)
      • Hide commends (not sure who identifies offensive comments or how, but hiding them in generate is good)
      • Posts: hide like and view counts (yes)
      • Allow tags and @mentions from people you follow
      • Show Activity Status:  No
      • Who can add you to groups? Only people you follow
    • Security
      • Save Login Info: No
      • Two-factor Authentication: OTP (e.g. Authy, LastPass Authenticator) and SMS / Text message
    • Apps and Website: review and remove as appropropriate
    • Issue: you can view - but not remove - access data (i.e. advertising tracking data)
  • LinkedIn
    • Partners & Services: check who has access to your valuable LinkedIn information / contacts
    • Visibility: Who can see / download your email address?
    • Third-party Data: 
    • Two-step verification via SMS or OTP (e.g. andOTP, Microsoft Authenticator)
  • MeWe
    • Allow Chat Requests (from other members of a group): may no since it's difficult to verify the person is real
    • Limited to single-factor (password) authentication
  • Minds
    • Two-factor authentication via OTP (e.g. Duo Mobile and Google Authenticator) or email code
  • Twitter
    • Data Sharing and Off-Twitter Activity
    • Two-factor authentication via SMS, OTP (e.g. FreeOTP and Aegis Authenticator), U2F (e.g. Yubikey and others)
  • Venmo
    • Privacy: Yes, Venmo shares your payment description with the world by default.  What could possibly go wrong? (Change the default privacy option to Private)
      • You can also change Privacy For Past Transactions to Private
    • Friends & social: will you REALLY benefit from giving Venmo access to your Facebook friends list?  'Cause Venmo sure will!
    • Supports single factor authentication via PIN or biometric (thumb print)

Resources

Social Pilot Guide to Social Media Privacy Settings

Cybersecurity Awareness Tip 18: Don't open suspicious attachments More about
Cybersecurity Awareness Month

Cybersecurity Awareness Tip 18: Don't open suspicious attachments

Dangerous Attachments (It's Not a Lifetime Movie)

No matter what the King of a tiny foreign country promises in the attached instructions, what "Amazon" says you ordered in the attached shipping document, or FedEx charged you for shipping in the attached invoice, just don't open that attachment.

CISO Magazine identified the how to detect suspicious email attachments during the COVID-19 pandemic.

Any Way You Want It, Just the Way You Don't Need It

Attachments may look like they were sent by some from Amaz0n.com or another legitimate looking website.  They might be described as containing some salacious or otherwise must-know-right-now information.  Definitely don't open something compressed (.zip, .7z, .arc, .rar, etc.) or with an executable (.exe, .com, .iso, .dmg).

If it looks legitimate (i.e. it comes from a possibly valid source and has a common extension (.pdf, .docx, .pptx, .xlsx - but not .docm, .pptm, .xlsm), download the file on a home computer (not a mobile device) instead of opening from the email. Your system's antivirus or other anti-malware tool may identify issues, but to be safe, upload it to an online virus scanner like VirusTotal, which scans the file with almost every available anti-malware scanner for quick and fairly complete detection.

Petya is a family of encrypting malware first discovered in 2016 which propagated via infected email attachments.

Resources

Cybersecurity Awareness Tip 17: Don't Take the Click Bait More about
Cybersecurity Awareness Month

Cybersecurity Awareness Tip 17: Don't Take the Click Bait

All the Time, On Every Channel

Spammers, phishers, hackers and surveillance organizations (governments and companies) don't care how they reach you - only that you take the clickbait.  They'll put clickbait in email, text, social media, comments on online posts or news stories, instant messengers, chat rooms, TV or on paper in snail mail, newspaper or magazine ads.  Some even look like stories from the site you're visiting, often mixed with real stories from the site you're visiting.

Stop It Before It Starts

You can stop many malicious communication attempts before they start by using:

Think Before You Click

Even the best malicious communication blockers won't catch everything, and they can't stop you from visiting sites that might have malicious links in comments or articles. And there aren't any good tools for blocking malicious text or instant messenger communications. So think before you click.  Think, and check:

  • Check the URL, especially if the URL doesn't match the website you think you're going to visit - use a link checker to see the final destination and a website reputation checker to determine if it's safe
  • Use a URL expander to see the end final destination of shortened URLs (e.g. goo.gl, bit.ly, etc.)
  • Remove tracking parameters from links. The ability to remove tracker parameters from links is built into Brave, you can also add browser plugins to do this. Some email clients (e.g. FairEmail) can also prompt you to remove tracking parameters.

Resources

Link Checkers

Website Reputation Checkers

Link Expanders

Tracker Removers

  • ClearURL (Firefox, Edge, Chrome and other Chromium-based browsers, including Brave)
Cybersecurity Awareness Tip 16: Security Privacy (and you need both) More about
Cybersecurity Awareness Month

Cybersecurity Awareness Tip 16: Security <> Privacy (and you need both)

Not the Same

Privacy-focused search engine DuckDuckGo explains the difference between security and privacy, concluding:

"Security without privacy is like having a house made of bullet-proof glass. Sure, no one is getting inside, but your personal life is still on display."

Can't Have One Without the Other

Privacy-focused email provider ProtonMail argues that security depends on privacy (specifically, encryption). SwampGeek suggests that privacy contributes to security by reducing the knowledge hackers use to social-engineer attacks against you. Use a secure DNS server, VPN (especial when connecting to public WiFi), private email, and check your cybersecurity preparedness annually, including your social accounts. Just say "No" to Facebook quizzes.

Image by Slane for The State of Queensland, Australia (Office of the Information Commissioner)

Cybersecurity Awareness Tip 15: Check Your Cybersecurity Preparedness Annually Comment
Cybersecurity Awareness Month

Cybersecurity Awareness Tip 15: Check Your Cybersecurity Preparedness Annually

Auld Lang Syne

The end of the year is a good time to reflect on the past, and look forward to the future. It's also a good time to check your cybersecurity.  New threats emerge constantly. Google recently announced it's tracking 270 state-sponsored hacker groups from over 50 countries. But there is some good news: Ransomware Hackers Who Attacked Over 100 Companies Arrested in Ukraine.

New threats target all platforms. All. Platforms. HowToGeek suggests you don't need antivirus protection on your iPhone because malware on iOS is rare by design.  Antivirus BitDefender reminds us that iOS isn't safe either.

South Florida Seasons: Summer and Hurricane

In South Florida, many use a checklist to prepare for hurricane season each year (our other season is summer).  Even though the threat of cybersecurity attacks are constant, schedule a reminder to check your cybersecurity preparedness at least annually. Schedule it a calendar that you're sure to see and remember to take action.

SwampGeek Recommends...

SwampGeek recommends (without affiliate or any other compensation):

  1. Is your personal info on the dark web?
  2. Review, reset passwords and implement multi-factor authentication where possible)
  3. Make sure your software and browser plugins are updated automatically and often
  4. Review mobile app permissions and remove unused apps
  5. Check your anti-malware strategy
  6. Check your backup strategy
    • Make sure backups are running correctly on all devices
    • Use an online backup (or multiple) to prevent loss from theft or natural disaster and can help protect against ransomware
    • Encrypt confidential files on device before backing up
    • SwampGeek recommends (without affiliate or any other compensation):
      • pCloud (also good for file sharing, can automatically backup photos from your smart phone)
      • IDrive (supports local backups and sync with other systems on the same networrk, can automatically backup photos from your smart phone)
      • Look for significant discounts the week of US Thanksgiving holiday
  7. Review your social media, instant messenger, text and email privacy and security settings
    • Personal information available to the public can be used in phishing attacks - make sure your posts aren't public (this includes Venmo!)
  8. Review your financial account security, privacy and notification settings

Resources

Free Online Security Check Ups and Tools

 

Cybersecurity Awareness Tip 14: Use private email to limit snooping to governmen More about
Cybersecurity Awareness Month

Cybersecurity Awareness Tip 14: Use private email to limit snooping to governments

Nothing to Hide

40% of emails are spam, and 70% contain email trackers, and hackers, spammers and surveillance organizations (companies, governments) use this to target individuals.  What about the email providers who may have direct access to your email communications?

Glenn Greenwald, author of No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State, explains why email privacy matters when people tell them they have nothing to hide: 

"Here's my email address. ...Email me the passwords to all of your email accounts, not just the nice, respectable work one in your name, but all of them, because I want to be able to just troll through what it is you're doing online, read what I want to read and publish whatever I find interesting. After all, if you're not a bad person, if you're doing nothing wrong, you should have nothing to hide."

Greenwald doesn't mention being able to reset the passwords for all your financial accounts, find your phone and much more, just by being able to access your email.

Google insists it no longer reads your email and neither do 3rd-party app makers. Preveil and Guardian disagree. And even if Google, Yahoo, Microsoft and other providers of "free" email services don't scan your messages, they can (and do!) still use the meta data - who sent and received the email, when, what was the subject - for marketing or other purposes.

Snooping Governments Will Still Snoop

Even privacy-focused email providers must respond to the force of courts and other government agencies, including top providers ProtonMail and Tutanota. After a recent event, ProtonMail explained why it scrubbed its website of "no IP logging" content, how it transparently reports incidents of government force, and how you can use its free ProtonVPN service to mitigate the impact of government force.

Keeping Your Email Yours

There are better options for private email without the surveillance incentives of the major free email providers.  Some of them have free versions with limitations. These offer end-to-end encryption, but beware:

  • Many encrypted email providers use standard PGP encryption only applies to the message content - not the meta data (from, to, date and subject). But privacy focused email providers 
  • You can also send unencrypted email, and the contents are visible on the recipient's potentially-surveilled inbox.
  • You must use secure email clients on all devices. Most secure email providers offer clients on major platforms, but beware of using other clients, especially without encryption, via POP or IMAP.

SwampGeek Recommends...

SwampGeek recommends (without affiliate or any other compensation):

  • ProtonMail - Switzerland-based with good free service with most features and low cost, fully-featured commercial service
  • Tutanota - Germany-based with good free service with most features and low cost, fully-featured commercial service

You can also use email forwarding to further protect your inbox.

Resources

Privacy Tools - provides services, tools and knowledge to protect your privacy

Least Secure Email Providers

Google Privacy Checker - see how much of your info is collected by the company whose motto is "Do No Evil" 

Restore Privacy's List of Secure and Private Email Services

Privacy Tools List of Private Email Providers

ProPrivacy's List of Free and Commercial Secure Email Providers

Cybersecurity Awareness Tip 13: Use Email Forwarding to Protect Your Email Addre More about
Cybersecurity Awareness Month

Using a password manager with unique passwords is one of the most common cybersecurity recommendations (and SwampGeek agrees). But, when creating new accounts, why not use a unique email address, too? 

Use a Unique Email Address

There are many reasons for using unique email addresses when creating accounts:

  • Limit the reach of image trackers used in 70% of emails
  • Limit the impact of hacked accounts that contain your email address (billions have been included in data dumps - check yours at Have I Been Pwned? )
  • Limit the impact of surveillance companies, governments and organizations that collect and sell your email address and associated personal data

 

To Be, or Not to Be? Which Alias is the Question

There are multiple ways to use unique email addresses, including:

  • Free email accounts with or without email aliases 
  • Email forwarding using disposable email addresses (random or user named)
  • Temporary disposable email, which generates a random address, but email is available temporarily to anyone who knows the address

Hackers, spammers, scammers can use this information to target you for phishing or other harmful activities.

Choosing Options

Generating multiple free email accounts (e.g. Gmail, Outlook, Yahoo Mail, etc.) can get tedious and requires connecting multiple accounts to an email client or checking multiple websites for mail.  Using aliases in these accounts can also be tedious and is often limited to a small number. However, Google allows tags (e.g. user#tag@gmail.com) or variations of the user account (e.g. u.s.e.r@gmail.com, us.er@gmail.com are all delivered to the same inbox as user@gmail.com).  Free email providers with good privacy protection and reasonable commercial options include:

Forwarding disposable email addresses are best for creating online accounts, especially with the possibility that your email addressed can be sold, shared or stolen. They can be deactivated at any time, blocking the inevitable spam that comes with linking your email address to any other marketable personal information.  Better free options include:

Temporary disposable email is only useful when combined with VPN and other privacy protection for when you don't want to be tracked.  And since email is publicly available, it shouldn't be used for anything you wish to keep private. Options include:

SwampGeek Recommends

SwampGeek recommends:

  • Free / paid email accounts
  • Email forwarding
    • ManyMe -  with ability to manage (change, block, etc.) unique emails offline using a qualifier that doesn't need to be created in advance, e.g. sabrina.walmart@manyme.com or sabrina.mewe@manyme.com
    • DuckDuckGo Email Protection (@duck.com) - strips tracking information before fowarding and generates random addresses that forward to your primary address via a browser extension

Specifically:

  1. Register for accounts using ManyMe (yourmanyme.account@manyme.com),
  2. Forward your ManyMe email to DuckDuckGo (yourduckuser@duck.com)
  3. Forward your DuckDuckGo email to your regular email account (youruser@tuta.io)
  4. Block or delete spammers and hackers in ManyMe

Resources

Can You Trust HaveIBeenPwned.com?

The Best Temporary Disposable Email Services​​​​​​ with descriptions of when and how to use different types of disposable email services, recommendations and pros and cons

Cybersecurity Awareness Tip 12: Disable automatic image display in email More about
Cybersecurity Awareness Month

According to Spam Laws, 14 billion spam emails are sent daily, accounting for 45% of all email. 40% of emails contain a tracking pixels (aka tracker images, web beacons, web bugs, tracking bugs, web tags, page tags, pixel tags, 1 x 1 GIFs, and clear GIFs). A journalist who used a tracking tool to research email tracking believes Apple CEO Tim Cook read his email using a Windows computer.

Reading or Previewing an Email Can Harm You

Just opening - or previewing - an email can display tracking images that can be used to collect all kinds of information about recipients, including:

  • when, where, with which email client, using which email provider and on what device the email was opened
  • how long the message was opened
  • how many times the message was reopened
  • whether or not you clicked any links within the message
  • what type of device you used to open the email
  • how many times and to whom the message was forwarded

Hackers, spammers, scammers can use this information to target you for phishing or other harmful activities.

A Simple Solution: Don't auto-display images

The simple solution is to disable the display of remote images or remote content.  Even better, some providers can block all remote content.  A few offer the ability to block embedded images, which can be used to transmit malware when displayed.

Privacy focused email providers like ProtonMail and Tutanota block external images by default.  Tutanota doesn't even allow external images to be displayed by default, but it allows you to identify trusted senders so future emails can display images without prompting.

Superhuman offers a service for tracking the emails you send, and it doesn't allow its customers to block images on the email they receive.

 

More Help is On the Way

Privacy and security focused providers are developing new ways to eliminate - or eliminate the benefit of - tracking pixels.  Apple is deploying a proxy server to disguise the recipient. Privacy-focused search engine provider DuckDuckGo is testing a proxy email service that removes trackers before forwarding them to recipients.

For now, the most effective way to protect yourself is to simply not display images in email.  And watch out for similar techniques in texts and instant messages, too.

Resources

How to Stop Images from Automatically Downloading in Emails

Cybersecurity Awareness Tip 11: Consider a Passphrase Instead of a Password Comment
Cybersecurity Awareness Month

Cybersecurity Awareness Tip 11: Consider a passphrase instead of a password

Even if you use more than one factor to identify yourself, chances are one of those factors is something you know, typically called a password. But you can often use a passphrase instead of a cryptic, hard-to-remember password. You should still use a password manager with unique passwords (or passphrases) to help remember them. In fact, Lastpass recommends using a passphrase for your Lastpass Master Password.

How is a Passphrase Different From a Password?

The main difference between a passphrase and a password is that passwords do not have spaces. Passphrases are usually longer than a random string of letters and have spaces. But passphrases can also contain symbols. Although it might make it easier to remember, a passphases does not have to be a proper sentence or be grammatically correct.

Image: XKCD.com/936/

Passphrases Are Better Than Passwords

Password Dragon offers 5 reasons why passphrases are better than passwords:

  1. Passphrases are easier to remember than a random of symbols and letters combined together. It would be easier to remember a phrase from your favorite song or your favorite quotation than to remember a short but complicated password.

  2. Passwords are relatively easy to guess or crack by both human and robots. The online criminals have also leveled up and developed state of the art hacking tools that are designed to crack even the most complicated password.

  3. Satisfies complex rules easily. The use of punctuation, upper and lower cases in Passphrases also meets the complexity requirements for passwords.

  4. Major OS and applications supports passphrase. All major OS including Windows, Linux and Mac allow pass-phrases of up to 127 characters long. Hence, you can opt for longer passphrases for maximum security.

  5. Passphrases are next to impossible to crack because most of the highly-efficient password cracking tools breaks down at around 10 characters. Hence, even the most advanced cracking tool won’t be able to guess, brute-force or pre-compute these passphrases.

The FBI agrees.

But privacy-focused email provider ProtonMail argues passphrases are only sometimes more secure than passwords: ProtonMail recommends you keep the folloowing in mind when using passphrases:

  • Four words should be sufficient. Five words is better.
  • Don’t choose from the most common words, and don’t choose quotes or sayings. The words should be as random as possible.
  • Use a unique passphrase for every account you own. That way, if one passphrase is ever exposed, the other accounts remain secure.

Even though Lastpass recommends using a passphrase for your Lastpass Master Password, the otherwise fully-featured password manager can't generate passphrases yet. You can use an online passphrase generator, but be careful to use one that doesn't log the generated passwords.

SwampGeek recommends

SwampGeek.com recommends using the Diceware passphrase generator with EFF wordlist wIth multi-factor authentication. And, if you can't switch from a bank or other online account that allows password resets with correct (and easily guessable) answers to security questions, try answering with lies.

Resources

How Secure is your password? (password checking tool)

Diceware passphrase generator with EFF wordlist

 



Page 2 of 3 (30 total stories) [ << | < | 1 | 2 | 3 | > | >> ]  

Old Articles