Tag Archive | Virtual private network

Five Ways to Secure a Web Browser for a Tablet

It is important to secure your tablet’s web browser before you go internet surfing. Here are five ways to do it…

  1. Use a secured wireless network for WiFi or 3G/4G connection. Using unencrypted wireless networks are very insecure and can be a way for hackers and other threats to happen to your device.
  2. Use a Virtual Private Network (VPN). VPNs are available through your mobile service provider (if you have one, like 3G/4G access). They provide an extra layer of protection (sometimes multiple layers of encryption) to secure your web browsing.
  3. Keep the OS and apps up-to-date. Check for updates at least twice a week for the OS and apps. System upgrades provide multiple security and functionality updates. It’s good to keep apps up-to-date to avoid security exploits.
  4. Only download from trusted sources. If it looks bad, it probably is. Stick to trusted apps stores such as Apple App Store, Google Play, Amazon: App Store.
  5. Have a good secure plan. Use a pin code or passphrase to secure access. It’s important to use adequate mobile protection. Because hackers and virus makers are always crafting new threats. Monitoring the latest security threats is a great idea as well, to know how to stay protected from them also.

DEF CON Adventures 2012 Explored

DEF CON Logo from defcon.org

Many fun adventures occurred at DEF CON this year, with many interesting new things going on.

Here is the brief summary:

  • Man’s cell phone battery catches fire, explodes in his back pocket.
  • Private phone network created called “NinjaTel”.
  • Possible crack of PPTP encryption found.
  • National Security Agency (NSA) director visited.
  • Hacker explores the world of warranties.

Man’s cell phone battery catches fire, explodes in his back pocket

Credit: Elinor Mills, CNET – Click Image to News Article

Private phone network created called “NinjaTel”

NinjaTel phone network is part of a new initiative by hackers. They were giving them away at DEF CON to good contributors. Probably used as a play phone for hackers. Apparently, the initiative is based on a large unencrypted GSM network with a large open base transceiver station. With approximately 600 customized Android phones on the market, the phones are filled with silly apps and other apps that can help hackers.

Possible crack of PPTP encryption found

Tools were developed at the conference to crack PPTP encryption. Encryption specialist Moxie Marlinspike showed off his usual handiwork.

According to CNET, the tools crack WPA2 (Wi-Fi Protected Access) and VPN passwords used by corporations and organizations running networks that are protected by the PPTP (Point-to-Point Tunneling Protocol), which uses MS-CHAPv2 for authentication.

As for hacking warranties, read more here.

And that’s a wrap for this year’s DEF CON. Kudos!

Defense-in-Depth PC Strategy (mini-whitepaper)

Defense-in-depth is a security strategy that provides multiple layers of protection for a network. Security strategy like this involves making an attacker have to work through a bunch of issues before he/she can have access to your network. The idea is to make them give up before they get too far.

We’ve provided a few tips on doing a defense-in-depth strategy (works for home/small business):

  1. Virtual Private Network – This is a tool to be used to allow all traffic in/out of your network to be encrypted. This makes it impossible for any data to be read easily. This is the best first layer, and should provide the top protection for your data. Many services offer VPN services for as little as $5 USD per month: StrongVPNWiTopiaoverplay. It is best to note that you need a VPN capable router for VPN to work.
    Nederlands: Typische opstelling bij site-to-si...
  2. Network Firewall – Using your router’s firewall will help prevent incoming attacks.
  3. Install antivirus software and firewall software – See a list of the best antivirus/anti-malware software
  4. Install a second opinion anti-malware scanner – Malwarebytes’ Anti-Malware Pro or HitMan Pro.
  5. Create a strong password for all devices and accounts online, etc.
  6. Encrypt your files. Use BitLocker or similar tools.

There is not a perfect defense-in-depth strategy, but hopefully this will work out for you!

%d bloggers like this: