Members are invited to contribute spiritual wisdom, teachings, channeled messages, uplifting content, healing sessions, and attunements to this network to bridge Heaven and Earth and unite Humanity as One.

Find your blog posts by visiting your profile page and clicking My Blog. 

Protect (2)

Eight ways to protect your privacy online

Eight ways to protect your privacy online

There are some ways you can take to protect your privacy in this climate of mass surveillance – and here we offer eight. Nothing, however, beats collective action and a bill of digital rights

Jon Lawrence and Sean Rintel

theguardian.com, Tuesday 3 December 2013 01.23 GMT

 

10900621087?profile=original

Step one: Use a password manager. Photograph: Lasse Kristensen/Alamy

The current climate of mass surveillance has led many people to ask if there are ways to protect their privacy online. There are, and Electronic Frontiers Australia recommends the following steps to minimise your individual online security risks.

Bear in mind two points. First, much of the information available from our near-ubiquitous Internet access is easily accessible not just to intelligence agencies, but also to online service providers, their advertisers, people who might want to steal your identity, and, increasingly, anyone with reasonable technical skill.

Second, a significant amount of online security risk is social, not technical. Easily guessed passwords used across a number of services and so-called "social engineering", in which a victim is tricked into providing login and/or identity information. For both issues, make security a conscious choice.

1. Use a password manager

A password manager makes it easy to have a unique password for every site and ensures that if one service is hacked, other services will not be vulnerable. Some are free, many are low cost, and they are available for all platforms, including mobile.

2. Disable GPS and Wi-Fi on your mobile device until you need them

GPS: Your mobile provider is able to identify your approximate location using cell towers. If you have a smart device with GPS enabled, much more precise location information is available to a whole range of entities, including your platform provider and app developers.

Wi-Fi: Wi-Fi broadcasts detailed information about your device, the apps on it, your location, and Internet usage. Disabling Wi-Fi except when you are using it will prevent promiscuous broadcast of personal information. Power management apps will help you avoid having to remember by turning Wi-Fi off whenever the screen is dark, which will also maximise your battery life.

3. Read the access privileges for apps carefully, and make good choices

In the digital world if a service is free then you are the product. Many free services and apps collect detailed information about you that allows them to sell highly-target advertising. Next time you download a "free" app, check the information it is asking to access, and decide if this app really deserves those privileges.

4. Guard your date of birth and telephone number

Never display your full date of birth. It is a key piece of information that many providers use for verification. The same goes for telephone numbers, especially if you lose your telephone and are trying to re-create your contact list.

5. Make yourself more difficult to find on social media

Consider using a pseudonym on social media sites. You can also use unique email addresses for each website you join. Most online email providers allow you to do this by appending extra letters (eg "fb+") to your existing email address. This will make it difficult for strangers to search for you on social media sites and if you start receiving spam at that address, you’ll know exactly where the spammers found your address.

6. Keep your work and personal presences separate

If you have a work email account, keep it for work only. Your employer has the right to access your work email account, so you really should keep your private emails separate. This will also save you the significant trouble involved in telling all your contacts and updating all your logins if/when you change employers.

You might also consider creating multiple social media identities: work, very private, and "publicly" personal, with different names and different contact lists as much as possible.

7. Encrypt your connections

Encryption is the process of encoding information so that it is only intelligible to those given access to read it. Many online services, such as Facebook, Twitter and Gmail, now offer encrypted connections. Ensure that your browser uses an encrypted connection wherever it’s supported by installing the "HTTPS Everywhere" plug-in. Email is an inherently insecure communications medium, but there are options available for encryption, such as Pretty Good Privacy. Unfortunately, your email messages will only be encrypted if the people you are communicating with also use a compatible encryption service, so this limits its usefulness.

8. Collective action

While these measures can provide you with some individual protections, the fact remains that the most powerful action is collaborative.

Globally, we should demand that all countries focus efforts on implementing the International Principles on the Application of Human Rights to Communications Surveillance. These are 13 principles that set out for the first time an evaluative framework for assessing surveillance practices in the context of international human rights obligations.

In Australia, citizens should also be demanding a much more fundamental and long-term solution: a bill of digital rights. Australians deserve a set of principles that underpin decisions made about legislation that regulates online freedom, access, fair use, and privacy.

http://www.theguardian.com/commentisfree/2013/dec/03/eight-ways-to-protect-your-privacy-online

Read more…

When you are most vulnerable to fraud


Whenever you answer the phone or use your card, fraudsters could be trying to con you out of money. So when are you most at risk and what can you do about it?

The number of people being scammed out of money at cash points has tripled in the first four months of this year, according to figures from Financial Fraud Action (FFA).

The rise has been attributed to ‘shoulder-surfing’ and ‘skimming’ – for example a fraudster reading your PIN over your shoulder after fitting devices to the ATM to either trap your card or read its details.

In January 1,173 cases were reported to be the number has steadily increased to 2,276 at the end of April.

However it’s not just cash points being targeted. The crime has also been reported at Transport For London ticket machines. And in a similar vein, more people are falling prey to theft by distraction at supermarkets, FFA found.

The increase in so-called ‘crude fraud’ comes after security for online transactions and banking has become been beefed up.

Britons are being urged to protect their details when using a card – either to pay or take cash out of an ATM. If your card is swallowed by a machine for any reason, report it to your card company immediately – ideally using your mobile phone while you are still in front of the machine.

If a cashpoint looks as though it’s been tampered with, don’t use it.

But this is far from the only time you're vulnerable to fraudsters. So we've taken a look at the key times and places fraudsters target people, as well as what you can do to protect yourself.

When the phone rings

‘Courier fraud’ takes place when a victim gets a fake call under the guise of a bank or financial provider to say that the victim’s account has been compromised and they would like to collect the card.

The target is then tricked into handing over their PIN and card.

However, a bank will never ring to tell you that they are coming around to pick up your card, so never hand it over to anyone who comes to ‘collect it’. Financial services providers never ask for PINs – even through typing it into the phone

– so don’t give it out.

Mobile phone fraud has become more of a problem in recent years. Among the tricks, is the ‘missed call’ scam - when people call back a number that they don’t recognise and are directed to a premium rate number. Consumers are therefore urged not phone or text unsolicited numbers.

Also beware any unsolicited calls. Anything from someone trying to sell you shares through to telling you your child has played truant and there is a fine to pay. If it's a real call you will never be penalised for not paying immediately and in most cases fine notices are issued through the post.

When you check your email

Despite the increase in online security, there are still some fraudsters who have found ways to get around it, notably through phishing and cloning.

This is when fraudsters trick consumers into disclosing information by copying reputable websites or sending emails in the name of a trusted brand.

More recently fraudsters have fooled people into paying for passport advice or information through copycat emails and websites.

Consumers should always be suspicious of unsolicited emails that are supposedly from a reputable organisation, such as your bank or the tax office.

Never go to the site by clicking on a link in an email. Check the web address when you do get there too - the login page on your bank’s website address should start with “https”, for example.

Don't forget traditional mail/post

It's hardly new, but it's still something to be aware of. Fraudsters still send out unsolicited letters with "special offers" or telling you "you've been selected" for a special prize.

More worryingly, they also still intercept mail. You need to be especially careful if you live in shared accommodation or have just one front door to multiple addresses.

It only takes one or two bills or card statements for as fraudster to gather enough information about you to impersonate you and take out debt in your name. Make sure these aren't left around unopened and make a list of which bills you're expecting so you are aware if one doesn't arrive.

10900582301?profile=original

Hackers target more than eight million computers
lovemoney.com – Mon, Feb 11, 2013 15:05 GMT

A cyber-scam network, which has infected more than eight million computers around the world in the past two years, has been shut down.


Microsoft and Symantec combined forces and closed down the hackers' network last week


The hackers used an online virus, known as the “Bamital Botnet”, to gain access to personal details stored on PCs.

Cyber-crime network
The botnet was used by criminals to access people’s PCs and hijack online search results. It would then lead the user to an unknown website which could start downloading malware, steal their personal information or charge businesses for false online advertisement clicks.


It also led users to websites they never intended to vist. For example, one user was redirected from an official Norton Internet Security Page, which appeared in a list of search results, to a rogue antivirus website distributing malware.


Although exact numbers aren’t known, Microsoft says more than eight million computers have been targeted with this virus in the past two years and 300,000 were disconnected this week from the network.


On 31st January Microsoft filed a lawsuit which was supported by Symantec to the botnet’s operators to sever communication lines. This didn’t happen, so data centres across the US were raided and the infected servers were disrupted.


Those computers which had been infected were then disconnected from the virus network. Users were directed to get rid of the virus.


This is the sixth time in the last three years that Microsoft has stopped a cybercrime network and the second in cooperation with Symantec.


“It was done in such a sneaky way that most victims wouldn’t have even noticed a problem while the botnet was still operating,” explained Richard Domigues Boscovich, assistant general counsel for Microsoft Digital Crimes Unit.


“Because the data gathered from this takedown will become part of Microsoft’s ongoing research in support of protecting its customers from a range of evolving online security threats, we can actually use the criminals’ infrastructure against them and make it harder and more expensive for them to commit cybercrime,” he added.

How to disinfect your computer
Computers which are currently infected with the virus were contacted with a message from Microsoft.


It appeared when the user attempted to search for something on the internet and told the user their computer was very likely to be infected with malware which was redirecting the results of their search queries.


Two free programmes were then listed, Microsoft Safety Scanner and the Norton Power Eraser, which users were encouraged to run to disinfect their computers. More information on how to clear the virus from your computer can be found on the Microsoft Support website.

How to avoid cyber crime
The best way to avoid being hacked is to keep your computer’s security systems up to date and regularly scan for infections. It’s also vital to use different passwords for all the accounts you use online and to use a password which isn’t likely to be hacked.


If your personal details have been stolen criminals can use them to get access to your accounts or apply for credit in your name. Therefore check your bank statements regularly and your credit record as this is where you’ll be able to spot any irregularities.


If you do see something untoward, such as a payment you haven’t authorised, call your bank immediately and let it know.

10900582301?profile=original

 

How to protect your PINs and passwords
by Cliff D'Arcy on 25 September 2012

As new research reveals some of us are making it far too easy for criminals to guess our passwords and PINs, here are some ways to ensure you protect yourself properly.

New research has found that a staggering one in nine of us use '1234' as the PIN for our bank cards. While it might be easy to remember, it's also one of the first numbers a criminal would try if they got hold of your card.


Other popular, and therefore dangerous, combinations include the James Bond-influenced '0007' and '1984', which might show good taste in literature but could leave your bank account cleaned out.


So how do you set a safe password or PIN? Here are my top tips.


Pathetic passwords

The worst of all passwords – and one of the most common – is 'password'. This is as bad as no password at all. Don't use it, ever.


Other poor passwords include '123456', 'abc123' and 'qwerty' (the first six letters from the top left of the letter keyboard). Using your first and last names (such as 'cliffdarcy') is weak, too.

Also, 'computer' is a pretty silly password.


'Monday' is another bad password – when we discovered our IT master was using it at school, we promptly changed it to 'Tuesday'. 'Letmein' (let me in) and 'iloveyou' (I love you) are also pretty feeble.

Many passwords require a minimum of six letters and, for some reason, 'monkey' is a popular choice.

Other easily found passwords may be your favourite football team or a family member's name. Thanks to public databases and social networking, your supposedly private life may be laid bare for cyber-crooks to sift through.


Another terrible password is the name of the website you're visiting. For example, Barclays customers using 'Barclays' as a password are frankly asking for trouble.


One key opens many locks

Another problem arises if you use a single password to access many different websites. In this scenario, once I have one password, I have access to all your accounts. In effect, you're giving me a master key to open all your locks and make a 'clean sweep'.

Nevertheless, almost half of us use the same or similar passwords to access multiple sites. Naughty, naughty!


Passwords should be unique to each website you visit and every account you use. If you can't remember them, then write them down in a coded message and securely hide this piece of paper. Alternatively, use a Password Safe such as that developed by American cryptography expert Bruce Schneier.

How to create stronger passwords

Of course, strong passwords are more complicated than weak ones, but that's the whole point. They are harder to guess or find with a 'dictionary attack' (searching around 200,000 commonly used words in English).


To create strong passwords, you should:


1. Use at least eight characters and, ideally, more.
2. Use a mix of upper-case and lower-case letters, numbers and keyboard characters accessed via the shift key and non-letter keys.
3. Don't use your name, family names, slang words, swear words, words found in dictionaries and first names. These are easy meat for the professional cracker.


For more advice, read this report from online-security firm Imperva (PDF document) on the infamous hack of 32 million passwords from the RockYou.com website in December 2009.


Protecting your PIN

It's not just passwords where we need to be careful. To use a credit, debit or store card, you'll need the four-digit PIN (Personal Identification Number) linked to that plastic card. There are 10,000 combinations of PINs, from 0000 to 9999.


Of course, if you enter the wrong PIN three times, then your card will be locked. This prevents a 'brute force' attack to find PINs, which involves checking all possible combinations.


Even so, PINs aren't as secure as you'd imagine. This is because millions of cardholders change their default PINs to numbers which they find easier to remember. Often, this weakens the security of their cards.


Let me give three examples of weak PINs:

1. In the late Nineties, my boss challenged me to guess his PIN. Knowing him to be a proud Scot, I suggested 1314 – the year of the Battle of Bannockburn. Right, first time.
2. In one of his books, controversial Scottish author Irvine Welsh describes a banking scam to rip off supporters of Glasgow Rangers FC. His crooks steal lots of credit cards and try 1690 as the PIN – the year of the Battle of the Boyne. They successfully steal a fortune.
3. Your year of birth. Possibly the worst PIN to choose, full stop. When I was at university, I found scores of students naively using their year of birth (or birthday as Day-Day-Month-Month) as PINs. If you do this, change your PINs today.


To create a safer PIN, choose a random four-digit number, or simply stick with the default PIN given to you by your bank. Otherwise, you may inadvertently be putting your credit card and current account at risk of fraud.


Loose lips lose money

About five years ago, my father gave me an old laptop. When I went to use it, I found it to be password-protected.

Thinking hard about my dad's life, I tried two passwords before getting it right third time. It was the name of the British Army cavalry regiment he joined way back in the late Sixties.


In short, the more you know about someone, the easier it is to guess their passwords.


That's one of many reasons why I don't belong to social-networking sites such as Facebook, and why my Twitter posts link only to my articles. The more information you post on Facebook, Twitter and the like, the more personal data you give to crooks, criminals and fraudsters.


(Modern-day 'digital villains' also use Facebook and Google Street View to find out when people are on holiday, before burgling their empty homes.)


This is a lovemoney classic article that has been updated

Read more…

Blog Topics by Tags

  • of (300)
  • - (207)
  • to (192)
  • in (121)
  • A (115)
  • a (104)
  • + (89)

Monthly Archives