Security & Privacy – EducatorResourceCenter.org https://educatorresourcecenter.org Fri, 28 Sep 2018 16:05:03 +0000 en-US hourly 1 https://wordpress.org/?v=4.8.8 https://educatorresourcecenter.org/wp-content/uploads/2017/03/cropped-push-pin-32x32.png Security & Privacy – EducatorResourceCenter.org https://educatorresourcecenter.org 32 32 Facebookgate. As a social network for dating students has become a political weapon https://educatorresourcecenter.org/facebookgate-social-network-dating-students-become-political-weapon/ https://educatorresourcecenter.org/facebookgate-social-network-dating-students-become-political-weapon/#respond Wed, 15 Aug 2018 14:22:24 +0000 http://educatorresourcecenter.org/?p=878 The leakage of personal data more than 50 million users of social networks, through which influenced the elections in the US and Brexit. How it happened and how it can turn out for Facebook and the world. Due to the scandal with the leakage of information about users, the company has already lost 10% of […]

The post Facebookgate. As a social network for dating students has become a political weapon appeared first on EducatorResourceCenter.org.

]]>
The leakage of personal data more than 50 million users of social networks, through which influenced the elections in the US and Brexit. How it happened and how it can turn out for Facebook and the world.

Due to the scandal with the leakage of information about users, the company has already lost 10% of its market value this week, or more than 45 billion dollars, writes CNN. Those involved in the scandal inclusively with the founder of Facebook Mark Zuckerberg were already summoned for interrogation. What happened and what to expect in the future from the world’s largest social network.

Likes and data will all be told

Recently, The New York Times and The Guardian published a series of investigations about Cambridge Analytica. They talk about personal data 50 million Americans, which the company received through Facebook, then to sell them targeted political advertising.

Both journalistic investigations are based on the testimony of a former Cambridge Analytica employee, data analysis specialist Christopher Weill. And before that the topic of the likely impact on the elections in the United States and the referendum in Britain, thanks to the technology of targeted advertising in Facebook, raised the journalists of the Swiss Das Magazin.

It all began with a safe-looking psychological application-test, posted on Facebook in 2015. Its developer was an employee of Cambridge University Alexander Kogan. Interestingly, the scientist is of Russian origin and is an active assistant professor at the St. Petersburg University. Even more interesting is that he received grants from the Russian government to study the behavior of users on the network.

Officially, the test on the network was placed exclusively “for scientific purposes”, so it was allowed on Facebook. Scientists have tried to explore the psychological portraits of users based on their likes.

The initial idea belongs to Mikhail Kozinsky, writes Das Magazin. It is based on the so-called Ocean method (from the English OCEAN – anagram). As early as the 80s, psychologists proved that it is possible to add a portrait of a person by defining only 5 characteristics: openness, conscientiousness, extraversion, benevolence, neuroticism. The problem was to collect these data, but social networks allowed it to be solved.

In 2012, the Pole of Origin Kozinsky proved that analyzing 68 likes in Facebook is enough to determine the color of a person’s skin (with 95% probability), his homosexuality (88%) and adherence to the Democratic or Republican Party of the United States (85%).

After 70 analyzed likes, the system will know about you more than a friend, and after 150 – more parents.

Kozinsky claims that Kogan appealed to him with a proposal to use technology for research company SCL (Cambridge Analytica is a subsidiary), but he refused. And yet his methodology was used in a big political game.

Psychological test and big politics

Kogan posted a test on Facebook, offering respondents a small monetary reward for answering the questions. In general, about 270 thousand users (mostly Americans) disclosed about themselves during the test.

Whence the figure of 50 million, you ask? The matter is that for authorization in application the account in Facebook was used.

By allowing the processing of personal data, the person also “provided” access to information of friends in the social network. That’s collected about 50 million.

Then this data fell into the hands of Cambridge Analytica, which deals with the impact on the behavior of users in social networks. It is interesting that the company was established in 2013 with the participation of the Mercer family, the main donors of Donald Trump’s campaign headquarters, and the company’s vice-president is Stephen Bennon, a former adviser to Trump. In addition, in his time, Bennon was the editor of Breitbart News, a British publication that promoted Brexit’s idea, which was not too popular at the time.

After learning about the leakage of data, Facebook requires you to remove the application and destroy all information about users. Arrangements with Kogan and the SA somehow managed to be achieved, but recently it turned out that the collected data about users still exist. Journalists accuse Facebook of neglecting the proper protection of users’ personal data, and Vaili argues that the social network did not verify their destruction.

And it was these data that probably helped Trump win the US elections and provoked the British to vote for an exit from the EU. After all, based on information that is, users of Facebook “threw” targeted political advertising, which convinced them that their choice was correct.

“Psychological targeting, similar to the one used in CA, raises the number of clicks on Facebook advertising by 60%,” explained Kozinsky to Das Magazin.

The likelihood that after viewing personalized advertising people will go to action (buy one or another thing or vote for the right candidate) increases by 1400%.

Journalists of the British Channel 4 decided to prove that CA is interested not just in advertising on the network, but primarily affects the political choice of users. To this end, they organized a meeting of CA representatives with a “hackney” politician from Sri Lanka, who wants to come to power with the help of influence in Facebook.

Convinced of their reliability, political technologists boasted of preliminary “political achievements”, thus providing information on the impact on elections in other countries (for example, in Kenya).

What will happen with Facebook

In Facebook they assure that Kogan has deceived them, therefore the company is not formally to blame. However, it seems that such a large-scale data leakage will not pass just for the social network.

Zuckerberg “on the carpet” has already called in the US Senate and the British Parliament. Its investigation with respect to Facebook is going to be carried out by the European Commission, and the US Federal Trade Commission (FTC) has already begun research.

And what’s important, the FTC can cause big financial losses to Facebook. After all, the company signed an agreement with the FTC back in 2011, in which it committed to guarantee the confidentiality of users. Inattention, which Facebook allowed in the work with Kogan, could threaten the technological giant with huge fines.

For each case of unauthorized use of user data, a fine of $ 20,000 is threatened. And in such cases,

This could lead to the bankruptcy of Facebook, explains the managing partner of the digital communications agency PlusOne Maxim Savanevsky.

Interestingly, Facebook is in the top five most expensive brands in the world in 2018. And within a year the brand value has grown the most among the ten companies – already by 45%.

And the company’s reputation loss cannot be avoided. Because of the scandal, Facebook has already lost 10% of its market value this week, which is more than 45 billion dollars.

In addition, Zuckerberg sold more Facebook shares in the last 3 months than any insider in any other company, CNBC reports. He explains this by planned charitable purposes, but many experts do not believe it.

The first lawsuits fell on the company. Facebook user from Maryland filed a lawsuit against the social network, CNN writes. The day before, the company’s investor Fan Yun filed a lawsuit on Facebook on behalf of other investors. The statement said that Facebook made “false statements” and did not warn about access to information from outsiders, which caused a significant drop in prices for the company’s shares.

Facebookgate

In the midst of the scandal, the world was enveloped in flashmob #DeleteFacebook. Users delete accounts from a popular social network or at least massively close their data from advertisers and third-party applications, which at one time were authorized through Facebook.

The world media already has hundreds of materials on how to do it correctly.

Interestingly, the call to remove the social network was one of the first to spread one of the creators of WhatsApp Brian Acton. “The time has come.” Remove Faybook, “he wrote shortly on Twitter.

Recall that in 2014, Facebook bought WhatsApp for $ 16 billion. In early 2018, Acton left the social network to work on a new project.

The action probably will not lead to a significant drop in the social network audience, but it definitely creates an additional reputational tension for the company.

Today, the social network is used by 2.13 billion people a month, while 1.4 billion visit Facebook every day.

The topic of harm and the threat of social networks in the West have recently been discussed more often. They did not escape it at the World Economic Forum in Davos.

Actor Jim Carrey removed his Facebook page and sold the shares because the company benefited from Russian intervention in the US presidential election. Billionaire George Soros has criticized the IT giants Google and Facebook, calling them a threat to democracy.

Gradually, the world media is leaving the Facebook-dependence, because recently the social network has changed the algorithm of tape formation (now more people messages are shown, not the media), so many media corporations feel cheated and are looking for other ways to reach the reader.

Zuckerberg for a long time kept silent and finally on the evening of March 21 commented on the situation with the leakage of personal data:

“We are responsible for protecting your data and if we cannot do it, then we do not deserve to provide you with services.”

Zuckerberg promised to make every possible effort to prevent this situation from happening again. Therefore, now in Facebook, removes applications that cause suspicion and restrict access for application developers. Only the name, photo and email of the user will be available to get the rest of the data the developer will need to sign a separate contract with the user.

However, after this scandal, the world will never be the same as before. It is likely that regulators in the United States and other countries of the world will begin to tightly monitor social networks and will adopt legislative restrictions related to the collection and use of personal data, as well as advertising on Facebook.

At least, the first steps to this already exist. March 21, 2018 European Commission announced plans to introduce a 3% tax on profits (from advertising, sales of digital data) technology giants like Google, Facebook and Amazon, writes Financial Times.

Companies with a turnover of over 750 million euros per year must pay tax regardless of where they are physically located. This decision can be considered an answer by the EU in the trade war with the United States, but European parliamentarians explain this by “reforming international taxation rules for digital companies.”

The post Facebookgate. As a social network for dating students has become a political weapon appeared first on EducatorResourceCenter.org.

]]>
https://educatorresourcecenter.org/facebookgate-social-network-dating-students-become-political-weapon/feed/ 0
The computer is my enemy. How to protect yourself from hackers? https://educatorresourcecenter.org/computer-enemy-protect-hackers/ https://educatorresourcecenter.org/computer-enemy-protect-hackers/#respond Tue, 07 Aug 2018 16:04:38 +0000 http://educatorresourcecenter.org/?p=870 After another series of effective cyber-attacks on the state financial systems, I suggest that citizens-users of computer networks protect their information space independently. After all, the protection of drowning people became a matter for the drowning. So, you have already installed on your computer a legitimate anti-virus application, a personal firewall, an anti-spam module, all […]

The post The computer is my enemy. How to protect yourself from hackers? appeared first on EducatorResourceCenter.org.

]]>
After another series of effective cyber-attacks on the state financial systems, I suggest that citizens-users of computer networks protect their information space independently. After all, the protection of drowning people became a matter for the drowning.

So, you have already installed on your computer a legitimate anti-virus application, a personal firewall, an anti-spam module, all the latest updates for the operating system – it would seem that they did everything to reliably protect themselves and their device from potential attacks of cybercriminals. But is it? Or maybe you missed something, and the attacker will easily find a weak spot in your defense? To test this assumption, it is necessary to conduct a pentest of its system, in fact, to analyze the structure of defense from the point of view of a cybercriminal.

Penetration Test or penetration test (briefly – pentest) is an assessment of the possibility of penetration and finding weaknesses in the defense system through which the attacker can actually penetrate. Of course, when it comes to the pentest of a large company with a powerful local network, dozens and hundreds of workstations, servers, routers and switches, this procedure is performed by a whole team of external high-class specialists. To conduct a pentest can be spent a few weeks and even months, and this service is quite expensive.

In the case of using a personal system, it makes no sense to employ external professionals, besides, a certain analogue of the pentest can be done independently. To do this, you only need to have some knowledge and skills. About how to make a pentest own hands and will be discussed in this material.

Entrance through the front door

Despite the fact that operating systems and applications regularly find new vulnerabilities, hacking the system through a “forehead” attack is a non-trivial task. Therefore, attackers much easier to enter into the system, luring all the necessary access information from the user. To do this, attackers use various variations of social engineering. For example, they can send him a letter or SMS allegedly from the bank manager with a request to call the specified phone and confirm their authentication data for Internet banking. Actually, by calling to the specified number, the user does not fall into the call-center of the bank, but directly into the paws of the attackers.

It is also possible to send spam with a malicious attachment, for example, a Trojan, under the guise of some useful program or an Excel or Word file. When you open a file, malware is installed on the system, and sends all the confidential information found to the cyber-fraudsters.

Also popular is the option of sending a URL link to a malicious site through social networks, Facebook or VC. To do this, cyber-criminals can use the hacked account of one of your friends – and if you receive a link from your friend, then, of course, you will open it without any doubt.

In addition, the Internet has a lot of seemingly quite “clean” sites offering listening and downloading music or video. While you are just listening to music on the site, nothing suspicious happens. But when downloading an MP3 file, the site suggests downloading a proprietary bootloader that supposedly significantly speeds up the download of the MP3 track, and, moreover, removes all restrictions on download speed. And here the problems begin. At best, the installed bootloader will be an adware-type program that will constantly display ads without the ability to disconnect. In the worst case, it will be spyware, a spyware utility that collects and sends confidential information to the control center, or even an aggressive Trojan that intercepts the control of the computer and turns it into a bot.

Obviously, it is the user (that is – you) that potentially is the weakest link in the cyber defense system. Therefore, when conducting a pentest “with your own hands,” try as though to evaluate your reaction to receiving various suspicious letters and SMS from strangers and people you know. Has it ever happened that you opened files enclosed in emails sent from suspicious addresses? Do you always unthinkingly accept and open files received from users from your Skype-list or Facebook friends? Do not you notice anything suspicious while doing this? For example, your friend turned to you in English, although this was not seen before, or wrote to you in his native language, but the style of his writing seems strange. For example, he did not say hello to you, and immediately sent a web link with a proposal to open it to see something very unusual and original.

If you receive such messages, do not be lazy to call your friend and ask if he really sent you a message and what’s in the attached file. After all, it is possible that his account was simply hacked and now he sends malicious spam from him.

Do not fully rely on the antivirus – it is possible that the antidote has not yet been added to the signature database and your anti-virus tool simply does not see anything dangerous in the attached file.

So, to insure against all sorts of scams of scammers, including those built on social engineering, it is necessary to adhere to several rules. First, never open attachments in letters received from strangers. Secondly, be wary of the messages received from friends. As mentioned above, their account may have been hacked and this message is not sent by your friends at all. Third, anyone cannot communicate their authorization data for any kind of services, especially when it comes to banking web services.

We check the reliability of password protection

It is recommended to perform a few more actions that will not significantly increase the complexity of the use of technology, but will add another level of protection. First of all, you need to strengthen your password to access e-mail. Email is actually the key to our personal cyberspace. Most online services when registering are attached to your mailbox, a web link is sent to them to recover a lost password or a temporary password. This is especially true if you use Gmail, since this mail service is associated with Google+, YouTube, Google Play, Google Chrome and many other services. In fact, if an attacker breaks your email account, he will gain access not only to your letters, but to tons of other personal confidential information, including access to various web applications. Therefore, it is critical to specify a reliable and password-resistant password. It must contain letters, numbers and special characters, and its length – at least 10 characters.

Most experts say that it is necessary to use a complex and maximally meaningless password, but I argue that this approach is not always optimal. Of course, using the password like “1234512345” is completely unacceptable, but also a variant of the type “xFt%8@mVc!” also not very good, because it is hard to remember. And this ends with the fact that you either write it on the sticker and stick it to the monitor, or put it in the browser’s memory for auto-drive – and then if the mobile gadget is lost or stolen, the cheater will easily gain access to your box. It is more optimal to use cunning and easily remembered combinations of numbers and letters, such as “P9a8r7o6l5$” or “^pA1Ro3L5&”, but instead of the word password, you need to substitute any other word, let’s say your name or patronymic, or the nickname of the dog, and t e.

In addition, many postal services today offer two-factor authentication, for example, every time you enter the mail you enter not only the classic password, but also the SMS that comes to your mobile number. In some cases, it is advisable to use such a service.

Today, the analysis of the safety of mobile devices has become urgent. We are talking about potential security vulnerabilities when using smartphones, tablets, phones, USB-drives, MP3-players and other gadgets.

Therefore, it is extremely important to strengthen passwords for access not only to the laptop, but also to the smartphone. If you still do not block your smartphone with a password or PIN-code – it’s very nonchalant. After all, the risk of losing the phone is much higher than the laptop. And then the fraudster will actually have access to all your personal information, including a bank account. Of course, the most convenient way to unlock a smartphone is to use a fingerprint scanner – such a device already exists in many mobile gadgets. Otherwise, you need to configure an access password or pattern.

Making order in the software

As mentioned above, attackers usually try to enter the system through the “front door” by stealing access passwords in any fraudulent way. And it is possible that you have already fallen for the bait of cyber-fraudsters, having previously downloaded and installed on your computer or gadget any adware or spyware programs, or even malware in its pure form. Therefore, you should put things in order in the installed software, check which applications you use, and remove all unnecessary ones. So, it is possible that you have several utilities for viewing or processing graphics, although you use only one, or several video players that you almost never launch, or there are suspicious game applications.

In addition, it is recommended that you install updates for installed programs, because software updates often contain critical patches that cover security gaps. This process can take a lot of time, but it’s worth it. In addition, in most cases, the update occurs in the background and does not distract from the main job.

Sometimes it makes sense to update the entire operating system at all, unless of course you can afford it. This proposal is especially relevant if you are using an outdated Windows XP that has not been supported by the manufacturer for several years.

Security of Wi-Fi networks and other

The next step of the pentest “with their own hands” is the analysis of network equipment configurations for compliance with safety criteria and recommendations to manufacturers. Using a Wi-Fi network without encryption means that any random person nearby can connect to it, and in the worst case – not only to connect, but also to intercept the signal. Make sure that your modern WiFi network is equipped with modern WPA2 encryption technology, and access to it is protected by a complex password combining numbers and letters. In addition, check and install the latest update for “flashing” the Wi-Fi router, set a complicated administrator password to enter the control panel, then reconnect all of your devices to the wireless network. Important enough point: keep all the passwords somewhere in a secluded place, at least do not put them on the refrigerator.

Also, study your Wi-Fi router. If this is an old noname-device, bought for a share in any supermarket, then it is advisable to replace it with a newer and proprietary device. As a result, you will provide a more powerful signal, faster connection and a higher level of security for all network users.

The above information security audit will take you from several hours to several days, but it will significantly increase the level of protection for your devices. Such ” own hands’ pentest ” should be held regularly, every one to two years.

These procedures will allow all information to be more secure than the state, which is hacked with an enviable regularity.

The post The computer is my enemy. How to protect yourself from hackers? appeared first on EducatorResourceCenter.org.

]]>
https://educatorresourcecenter.org/computer-enemy-protect-hackers/feed/ 0
Facebook and Google are watching you: how to deal with it https://educatorresourcecenter.org/facebook-google-watching-deal/ https://educatorresourcecenter.org/facebook-google-watching-deal/#respond Wed, 01 Aug 2018 13:38:11 +0000 http://educatorresourcecenter.org/?p=865 Popular Internet services collect almost all available information about their users. According to Meduza, once searching, for example an umbrella, you will be shown advertising banners with an umbrella on all Internet sites. Thus, technological giants are trying to understand what kind of advertising is best to show, and what most like one or the […]

The post Facebook and Google are watching you: how to deal with it appeared first on EducatorResourceCenter.org.

]]>
Popular Internet services collect almost all available information about their users.

According to Meduza, once searching, for example an umbrella, you will be shown advertising banners with an umbrella on all Internet sites. Thus, technological giants are trying to understand what kind of advertising is best to show, and what most like one or the other user.

Completely someone is unlikely to be able to ban information about yourself. However, you can reduce the amount of data transferred or at least prohibit their use.

Disable personalized ads on Facebook and Twitter. Understand with Google. Install the Ghostery or Disconnect extension.

What to do with Facebook

First, you can see what information Facebook uses to show you advertising. Under this link you will see that, according to the social network, you are interested. There may be publications that you read, or places you have never visited (for example, Facebook believes that I’m interested in the province of Entre Rios in Argentina, although I have never heard of it). In addition, the service displays information about advertisers whose ads you clicked on. All this information the service uses to show you banners, which you click more likely.

To prevent Facebook from using the information collected about you, you need to go to the “Ads on Facebook” settings and set all the switches in the “no”, “none”.

What to do with Twitter

Twitter behaves much like Facebook. In the settings, you can find out how many advertisers are interested in you. To get into this section, you need to click on your userpic in the upper right corner, then: “Settings and Security”> “Your data is on Twitter”. And to pass to the point “Target Audiences”.

To prevent Twitter from showing personalized ads (this is the maximum that can be done, information about you will still be collected), you must disable all the checkmarks in the “Personalization and Data” menu.

What to do with Google

Google knows which sites you visited, which videos you watched on YouTube, monitors your preferences in advertising, and even remembers the history of voice search. We have already written a detailed instruction on how to protect ourselves from all this.

How to reduce the amount of data collected about you in principle

To begin with, you should realize how much the browser knows about you (it gives this information to other sites). Your location, what kind of computer you have, what operating system, what social networks you are logged into. Just go to this page and scroll down.

To limit the amount of information collected, you need to install an extension that prevents the browser from connecting to all sorts of counters and trackers. To do this, you can use Ghostery or Disconnect. They work roughly the same, only in Ghostery you first need to select what you want to block; in Disconnect, you do not need to choose anything.

Almost certainly these extensions will block advertising; remember that the online media live off of advertising.

Installing these applications will get rid of the fact that you are watching trackers (including Facebook), but not a browser. To prevent the browser from receiving the above information, you will need to enable the hardest locking mode in extensions such as uBlock Origin (for Google Chrome) or No Script (for Mozilla Firefox). After that, however, you will stop working many sites, for example, YouTube.

The post Facebook and Google are watching you: how to deal with it appeared first on EducatorResourceCenter.org.

]]>
https://educatorresourcecenter.org/facebook-google-watching-deal/feed/ 0
Every fifth site is still using SHA-1 https://educatorresourcecenter.org/every-fifth-site-is-still-using-sha-1/ https://educatorresourcecenter.org/every-fifth-site-is-still-using-sha-1/#respond Fri, 23 Mar 2018 14:55:11 +0000 http://45.76.226.68/?p=237 The SHA1 formula is certainly period “to relaxation”. At the conclusion of Feb 2017 for Bing, using the assistance of researchers in the Netherlands Centrum Wiskunde & Informatica (Center for arithmetic and Informatics) has demonstrated that it produced in 1995 SHA1 is susceptible to crash problems. That’s, a phony file can be, really created by […]

The post Every fifth site is still using SHA-1 appeared first on EducatorResourceCenter.org.

]]>
The SHA1 formula is certainly period “to relaxation”. At the conclusion of Feb 2017 for Bing, using the assistance of researchers in the Netherlands Centrum Wiskunde & Informatica (Center for arithmetic and Informatics) has demonstrated that it produced in 1995 SHA1 is susceptible to crash problems. That’s, a phony file can be, really created by assailants, counting on the crash of hash capabilities using the same SHA1 hash by the file’s present edition.

Image result for sha 1

But specialists state SHA’S uncertainty significantly more than 10 years, and evidence of the algorithm’s weakness is improbable to become the breakthrough of someone. Therefore, the builders of Microsoft Bing and Mozilla have stopped to aid the job with records with SHA1, as well as Facebook will do exactly the same. Nearly all accreditation regulators from 2017’s beginning additionally no longer working with SHA1. Nevertheless, all of this appears to be only a little worried about the website owners. The research was performed by the Business’s professionals Venafi based on which, one website out-of-five continues to be applying SHA1 records.

Generally, the organization Venafi’s brand new statement suggests that from December 2016 modifications for that greater. Then your scientists examined 33 thousand openly- IPv4 assets that were noticeable and found the final outcome the records are SHA1 utilizes 35% of the websites, that’s, each source that was next. Today this number is 21%.

“in my opinion that lots of businesses may possibly not be conscious they nevertheless utilize SHA1 records on the systems, since for records and controlling secrets they depend on options supplied by the accreditation specialist. The issue with this specific strategy, particularly today, when free or inexpensive records broadly accessible, is the fact that any worker business might acquire and deploy inside your community a certification that utilizes vulnerable hashing calculations,” creates Venafi expert Shelley Drops (Shelley Boose).

The mind of protection strategy Bocek (Bocek) provides: “even though that lots of businesses want to depart the usage of SHA1, they’ve automated and no noticeable is essential to accomplish this move. This problem has been observed by us when the business went right on through occasions that were challenging, attempting to organize the alternative of records and secrets to Heartbleed issue in reaction, and regrettably, I am sure it will be seen by us all again.”

The post Every fifth site is still using SHA-1 appeared first on EducatorResourceCenter.org.

]]>
https://educatorresourcecenter.org/every-fifth-site-is-still-using-sha-1/feed/ 0
If you forgot pass from your router https://educatorresourcecenter.org/if-you-forgot-pass-from-your-router/ https://educatorresourcecenter.org/if-you-forgot-pass-from-your-router/#respond Mon, 26 Feb 2018 13:19:42 +0000 http://45.76.226.68/?p=98 The balance of the Web link depends upon the router’s configurations. If neglected code of my modem how to proceed? You are able to execute many procedures, that’ll recover use of the router and web connection, nearby network, etc. Link With a nearby and instant network, the Web can just only be achieved by placing […]

The post If you forgot pass from your router appeared first on EducatorResourceCenter.org.

]]>
The balance of the Web link depends upon the router’s configurations. If neglected code of my modem how to proceed? You are able to execute many procedures, that’ll recover use of the router and web connection, nearby network, etc. Link With a nearby and instant network, the Web can just only be achieved by placing the right configurations of the modem, where it will additionally designate usernames, accounts, secrets. Usually, the supplier, when it starts to supply solutions towards the person performs such procedures. If there have been no resets accounts and usernames are seldom utilized. But when there’s a scenario the person has overlooked the code of the modem and also once the information is needed? How to proceed?

These concerns could be resolved efficiently and individually. Usually, customers that are regular to not explore the settings’ particulars, make use of the drive that came for a fast startup with the gear. At one phase, usually, you’ll be motivated to alter qualifications, such as the password in the modem, the protection key for connecting to Wifi, etc., of course, if the information loss of use of the LAN, the submission of Wifi won’t trigger good issues for that restoration, the loss of information to sign in towards the Internet software of the router a significant considerable reduction. In this instance, you’ll require a complete reset to manufacturer configurations after which will require complete repair of the necessary guidelines that’ll guarantee steady and dependable conversation entry Web, over an area wireless community.

Image result for wifi router password

Recovery Wi-Fi

To be able to recover the code in the community that is instant, do the next: find within the lower-right part of the image exhibiting the bond via perhaps a pictogram of the check or a network. Click one of these; within the listing of contacts that seems, press the best mouse-button about the point that points to your LAN link and choose qualities; visit the protection bill and examine the container for “display figures”, subsequently, simply above (field “network security key”) rather than the groups may show the particular code, with that you are linking wirelessly.

To displace follow these actions: Open any browser of course if you’ve not formerly transformed the information about the modem to gain access to, enter the next target: 192.168.1.1 (this address may vary with respect to the design, therefore, about the back-side of the unit, watch the address and enter it within the address club of the visitor). Enter the password for that router (had been mentioned previously that automatically, the password generally – admin, however, it is much better again to determine this information about the back-side of the modem). Visit the Web bill (this bill may also be named WAN Configurations). Within the SSID password and is likely to be typed out inside your username is visible within the field PRE – by choosing the check box alongside the field, that’ll let it show Key. Hence, this information can be acquired, without browsing work Web supplier and without an option.

Recover modem entry

There’s Also instances once the person can’t access the router’s Net software since the qualifications have transformed and neglected them. In this instance, to find some methods useless, the choice that is very best would be to reset all configurations towards the manufacturer. About the rear cell of the modem on, push and store for many moments the reset switch (this might have a slim item). Once the modem all of the lamps set off to get a handful of moments after which the sign energy reset is likely to be applied, LAN link (if community wire is blocked in) lamps up. Generally, may be the easiest and only method to reunite use of the modem.

You Will Find instances once the login is remembered by the person can’t or code from Wi-Fi, access to the internet, protection key. In this instance, you are able to recover all of the information in two methods: application, equipment. A trip is involved by the very first technique towards the Internet-software, as the minute can be used using the aid of applications that are unique that provide all of the necessary data entirely and check the registry. For that first technique, it’s obligatory to understand at least the tackle, code for that modem and log in. The tackle for nearly all hubs is 192.168.1.1 should you choose not alter them. The exclusion is routers D-Link, where the tackle is created within the following method: 192.168.0.1.

Additionally, password and the username in just about all instances exactly the same: administrator. Spend your and so as to not speculate time, if this information has not been altered by you, you observe about the container or can consider them in the backside of the modem. It is simple to discover all individual log-ins and accounts for entry when you reach the modem startup site. For discovering code of use of a LAN community, visit watch information and its configurations. Exactly the same moves to get a key to gain access to a Wifi community. You’ll begin to see the username and if visit the Web bill and password. You may also utilize an application that is unique. The absolute most effective resources of this type are dialupas; PC move view that is distant; modem move view.

Obviously, this really is a listing of application items within the area, everything depends upon the consumer what type of application he employs. The software for them certainly will not trigger any issues actually for beginner customers and is very obvious. The one thing to notice, some small- items that are recognized might include spyware that may damage your PC. These applications check some files (most of them are concealed) that are accountable for the community link, etc. to be able to possess these documents, you’ll want quite a bit of understanding, therefore for all it’ll be considered a really complex and uncertain, but this power may execute this procedure rapidly and with no issues.

 

Suggestion

The Specialists suggest to keep accounts and consistently the log-ins for community entry in another text document, or at least edit them within the laptop. Operate and this can permit to prevent several issues certainly not the motion a significant very long time will be taken by that. Additionally, to not bother within the documents of usernames and accounts, you are able to conserve record configurations (it may be whenever you manage the modem if you use the CD-ROM) and this information is likely to be gathered in one single text document.

The post If you forgot pass from your router appeared first on EducatorResourceCenter.org.

]]>
https://educatorresourcecenter.org/if-you-forgot-pass-from-your-router/feed/ 0
Apple and Google fixed the vulnerabilities used by the CIA https://educatorresourcecenter.org/apple-and-google-fixed-the-vulnerabilities-used-by-the-cia/ https://educatorresourcecenter.org/apple-and-google-fixed-the-vulnerabilities-used-by-the-cia/#respond Wed, 07 Feb 2018 14:53:13 +0000 http://45.76.226.68/?p=236 The world thrilled the main fresh “drip” arranged by Wikileaks’ news headlines. This time around the website started posting dump codenamed Container 7 comprising information on the job of the Main intellect Company (CIA). The very first book was named “Yr zero” (Yr Zero) and possesses 8761 files and documents in the shut community of […]

The post Apple and Google fixed the vulnerabilities used by the CIA appeared first on EducatorResourceCenter.org.

]]>
The world thrilled the main fresh “drip” arranged by Wikileaks’ news headlines. This time around the website started posting dump codenamed Container 7 comprising information on the job of the Main intellect Company (CIA). The very first book was named “Yr zero” (Yr Zero) and possesses 8761 files and documents in the shut community of the Middle Of stereo and digital cleverness of the CIA in Langley.

Image result for cia

Mass store sheds light about the hacker Arsenal including explanations of methods particular weaknesses, methods, and resources. The dump just includes the choice to prevent posting and submission, ready to function cyberweapons, obviously, and also some paperwork was planned. Reps of Wikileaks genuinely believe that you need certainly to know how precisely to review and counteract these devices, considering governmental and specialized facets of the issue. And just next they’ll be feasible to write.

I would like to advise you that information has been found by the files about that in the intellect services’ removal there are proof of several – intrusions and evening weaknesses prepared for them. Within the documents, they claim about zero-day intrusions in items from Bing Apple, Microsoft along with other large businesses. For instance, therefore, via-evening, the CIA bargain of the cellular gadget and intercepts communications common instant messengers (WhatsApp, Sign, Telegram, Weibo, Confide and Blackman). Actually, the security, they bargain the unit itself, which it’s mounted was not cracked by protection.

Reps for Bing and Apple was fast to reduce steadily the level of interests and also to assure customers. Hence, the top of Division of info protection and solitude Google, Louise Adkins (Pascal Adkins), informed Recode:

“Whilst The research files, we were persuaded that safety and protection upgrades of Android and Opera to safeguard customers from several weaknesses that are supposed. We supply further essential safety and will proceed the evaluation. Security happens to be our concern that is primary and we plan to continue steadily to provide the attention that is unique to our safety.”

Very remarks that were similar were obtained from reps of the Apple. I would like to advise you that within the CIA files would be the intrusions for iOS. Based on the document, intellect specialists made for them no less than 14 intrusions and were able to discover iOS seven various insects. But Apple declares that the newest iOS edition (10.2.1) makes many of these issues.

“Your items and made to rapidly provide finish customers protection upgrades, and almost 80% of our users are employing the most recent edition of our system that was operating.

Though an initial evaluation suggests that several released [doc] the issues have now been set within the newest variations of iOS, we shall continue steadily to work at the quick recognition and eradication of every other weakness,” — stated Apple reps to correspondents Vice Motherboard.

The post Apple and Google fixed the vulnerabilities used by the CIA appeared first on EducatorResourceCenter.org.

]]>
https://educatorresourcecenter.org/apple-and-google-fixed-the-vulnerabilities-used-by-the-cia/feed/ 0
Zero-Day Study by RAND Corporation https://educatorresourcecenter.org/zero-day-study-by-rand-corporation/ https://educatorresourcecenter.org/zero-day-study-by-rand-corporation/#respond Wed, 31 Jan 2018 14:45:17 +0000 http://45.76.226.68/?p=234 A zero-day weakness – a frustration of the builders, promoting products about the tool with that the intelligence companies and hackers aren’t in a rush to depart and also the black-market. But whether or not they are helpful and just how extended to stay related? What many hackers depend on ” card ” within as […]

The post Zero-Day Study by RAND Corporation appeared first on EducatorResourceCenter.org.

]]>
A zero-day weakness – a frustration of the builders, promoting products about the tool with that the intelligence companies and hackers aren’t in a rush to depart and also the black-market. But whether or not they are helpful and just how extended to stay related? What many hackers depend on ” card ” within as type – insignificant or evening phishing, social engineering and simple accounts? Lastly, if information to be withheld by the government about zero-day weaknesses while continuing to manipulate their motives that are presumably great? Remedy and scientists in the RAND Company attempted to comprehend these concerns, analyzing over 200 zero-day weaknesses.

Image result for zero day

the RAND Company was posted from by research, obtained a title that was graceful Tens and Thousands Of Evenings, Zero-Days. For this evaluation, the specialists analyzed over 200 zero-day intrusions and weaknesses for them information for the 14 decades that were last. Particularly, this checklist contains assaults against Google Mozilla items and Adobe, in addition to intrusions for Linux and Microsoft systems.

The scientists create that about 50% of the analyzed weaknesses continue to be unfamiliar towards the public, that’s the actual evening, that we’ve no patches and don’t expose their resources. The one thing identified concerning the source of that information – they awarded a particular number of scientists, which contains BUSBY’S name, but this really is only a code-name, created especially for this statement. The specialists in the RAND Company mentioned that the federal government is worked for by some individuals BUSBY.

One of the very fascinating numbers within the statement and the very first may be the average ‘s “lifetime” – intrusions and evening weaknesses for this. Zero-day ended up that weaknesses, the typical “reside” i.e. 2521 evening. 1 / 4 of weaknesses stay static in ‘s standing -evening only 1 / 2 of the entire year, while their importance is not lost by another fraction despite nine 5 decades. The scientists create they didn’t identify any link between “lifetime” and also vulnerability kind, that’s, to forecast what 0- bug “reside” longer isn’t feasible.

Another fascinating reality: the opportunity that various people will have the ability to obtain the same zero-day weakness, is minimal. Specialists calculate that collisions’ “regularity ” just 5.7% each year. Hence, it seems the protection providers, “collect” 0- vulnerability in its Toolbox, and set thus by an incredible number of customers and also the “entire business” under attack, because they prefer to state info protection specialists? Since the opportunity that hackers found and used the same issue is extremely little. Former NSA worker Mark Eitel (David Aitel), that the correspondents Vice Motherboard requested this query, responded: “It Is trustworthy a hundred percentage meaning.”

Specific findings are not themselves made by the scientists. They create: “the Typical hat scientists that are white are far more prone to notify suppliers on zero-day intrusions the moment they certainly were discovered. Others, for instance, companies supplying providers of gray and pen testing that businesses are far more prone to collect weakness. Nevertheless, your decision to gather and openly reveal details about-evening weakness (or manipulate the precisely described exported) is just a sport of compromises, primarily in the degree of authorities”. In addition to this, the scientists observe that fragile accounts, obsolete and phishing, not been updated to get a very long time frequently signify a danger that is significantly higher compared to “promoted” 0- vulnerability, is enclosed by the hoopla.

Accept this placement, the consultant of the organization AlienVault, Jawad Malik (Javvad Malik). ” A zero day weakness isn’t a large problem for that person that is typical. They’ve created efficient procedures, such as for instance phishing and exorbitant to assault customers, cybercriminals progressively embracing confirmed techniques. 0 and element focused assaults -evening weaknesses more requirement for assaults on bigger businesses: crucial commercial infrastructure, financial services and also the government “, — stated the specialist.

Image result for zero day

Nevertheless, their difference has been already indicated by some specialists using the findings offered within the Corporation’s statement. For instance, Craig young (Craig Young), a worker of the organization Tripwire, Generally named the statement “unscientific”, since the 200 analyzed weakness, in his viewpoint, it’s not enough, since from year to yr, specialists determine tens and thousands of various issues. The typical period, which, based on the RAND Company, is needed to produce a functioning use: 22 times was named by another difference truly youthful. Yang notices that the exploit’s improvement period may differ significantly, also it all hangs about the weakness that is particular.

The post Zero-Day Study by RAND Corporation appeared first on EducatorResourceCenter.org.

]]>
https://educatorresourcecenter.org/zero-day-study-by-rand-corporation/feed/ 0
Wikileaks will reveal the exploits of the CIA to manufacturers https://educatorresourcecenter.org/wikileaks-will-reveal-the-exploits-of-the-cia-to-manufacturers/ https://educatorresourcecenter.org/wikileaks-will-reveal-the-exploits-of-the-cia-to-manufacturers/#respond Mon, 29 Jan 2018 14:34:46 +0000 http://45.76.226.68/?p=232 Wikileaks started posting the dump, codenamed Container 7 comprising information on the job of the Main intellect Company (CIA). The very first book was named “Yr zero” (Yr Zero) and included 8761 files and documents in the shut community of the Middle Of stereo and digital cleverness of the CIA in Langley. Ultimately, the general […]

The post Wikileaks will reveal the exploits of the CIA to manufacturers appeared first on EducatorResourceCenter.org.

]]>
Wikileaks started posting the dump, codenamed Container 7 comprising information on the job of the Main intellect Company (CIA). The very first book was named “Yr zero” (Yr Zero) and included 8761 files and documents in the shut community of the Middle Of stereo and digital cleverness of the CIA in Langley. Ultimately, the general public was the info concerning the hacker Toolbox of the CIA, including infections spyware exploits for zero-day weaknesses such like. The tool itself hasn’t been printed, however, the paperwork sheds light on the particular methods and ways of key providers, causes it to be obvious what weaknesses you will find within the Toolbox of the CIA, and claims, for instance, that a SmartTV may spy on its proprietor.

Image result for wikileaks

After huge information breaches, obviously, the reaction was instant. Big businesses and businesses (Bing, Apple, Samsung, Microsoft and also the Linux Basis) were fast to discuss the items of the dump, stating that just about all weaknesses that are used by intelligence companies was already set, as well as in regards to additional problems performed a comprehensive analysis. Additionally, some businesses have previously started initially to create methods that were free to identify other spyware CIA along with rootkits. For instance, the builders for Intel Protection (previously McAfee) offered a reader that registers EFI rootkits, including those explained within the once-secret documents.

Additionally, following the info protection community’s book has delivered to an energetic dialogue of the issue-morning weaknesses. The truth that it is a type of an open solution: the support that is secret, discover details about zero-day weaknesses, applying them, although not in a rush to generally share details about them using the producers of items that are difficult. By what the possible damage such conduct of the regulators of fighting professionals decades may cause to customers and also the business most importantly. In a brand new research, for instance, specialises in the RAND Company found the final outcome that individuals that were various are impossible to concurrently identify the zero-day that was same use. Specialists evaluated collisions’ “regularity ” just 5.7% each year. Nevertheless, a number of scientists that are other and one of these computations eventually differ, and out of this perspective. They’re persuaded that “hoarding” 0- vulnerability cleverness is extremely harmful, and also a brand new circular triggered within this countless and warm conversations. A piece of the business is visible, for instance, here.

Another fascinating occasion associated with Container 7, transpired at the conclusion of a week ago. Wikileaks creator Julian Assange kept a web-based press meeting (Assange continues to be residing in a place of Embassy of Ecuador in Birmingham, which means this may be the only accessible choice of conversation using the press). In a training course, a press conferences Wikileaks’ top accepted that it’s problematic for businesses to repair weaknesses in its items based exclusively on the info learned in the files. Builders are restricted by the truth that the use wasn’t printed, seriously. Consequently, Wikileaks has gone to producers to generally meet.

“We chose to cooperate to supply extra specialized info, which we get they could create areas and launch them with unique access, therefore guarding the folks. Next, whenever this program “disarm” by detaching the elements that were crucial, we shall submit extra information on the event,” — stated Assange.

The post Wikileaks will reveal the exploits of the CIA to manufacturers appeared first on EducatorResourceCenter.org.

]]>
https://educatorresourcecenter.org/wikileaks-will-reveal-the-exploits-of-the-cia-to-manufacturers/feed/ 0
The Creator of Stack Overflow has criticised modern password rules https://educatorresourcecenter.org/the-creator-of-stack-overflow-has-criticised-modern-password-rules/ https://educatorresourcecenter.org/the-creator-of-stack-overflow-has-criticised-modern-password-rules/#respond Mon, 15 Jan 2018 14:11:17 +0000 http://45.76.226.68/?p=230 Jeff Atwood, the founder of notorious online Stack Overflow, has published on his blog a detailed letter addressed to all without exception developers. His tirade Atwood titled lucidly and succinctly: “Rules of passwords is bad”. Atwood writes that modern passwords there are many different problems, but the main of them – terrible rules of these […]

The post The Creator of Stack Overflow has criticised modern password rules appeared first on EducatorResourceCenter.org.

]]>
Jeff Atwood, the founder of notorious online Stack Overflow, has published on his blog a detailed letter addressed to all without exception developers. His tirade Atwood titled lucidly and succinctly: “Rules of passwords is bad”.

Atwood writes that modern passwords there are many different problems, but the main of them – terrible rules of these passwords. Not to be unfounded, the developer gives several vivid examples and even gives links to two Tumblr blog (1 and 2), the main theme of which — the odd password requirements.

Image result for passwords

Atwood explains that it often happens that the password requirements go beyond the borders of common sense and simply not allow the use of a generator is really reliable and random passwords. Because according to the rules, such randomly the password can contain enough digits. Or special symbols. Or certain letters. In the end, the user is forced to manually create a short and simple combination, because automation fails. According to the expert, such rules only hurt and worsen the already unfavorable situation. While Atwood says:

“These days, given the power of cloud computing and the cracking password hashes using GPU to have any password length of eight characters or less is almost the same as not having a password at all.”

Password length in General, the expert has devoted a large part of the text, explaining that these days passwords must have at least ten characters in length. Even if we consider the list of the 25 worst passwords used and only five of them longer than ten characters. Call all the long passwords are reliable, of course, is also a mistake because “passwordpassword” or “0123456789012345689” can hardly be considered passwords.

So Atwood brings the reader to the main point of your post: “Seriously, for God’s sake, tie this heh*it and arbitrary rules of drawing up of passwords. If you don’t believe me, read the official NIST recommendations 2016 relative to passwords. All right there: “no rules of making a password”. However, here I see one error, there should write “no heh*oriented rules of making a”password”.

Further, the developer lists the methods of strengthening passwords that really work and can be useful. For example, he often advises using Unicode as this can significantly lengthen and complicate the password. Atwood also urged to check the entropy of passwords and understandable way to convey to users than a bad password “aaaaaaaaaa”, despite its length. In addition, he recommends that developers often consult the dictionary and database leaks, simply forbidding the users to use the most simple and common passwords. You should also prohibit and passwords coinciding with a user name and email address (the same principle applies to the URL, domain and application name for which you are creating the password). As an illustration of his words, the researcher gives a simple and very illustrative statistics:

  • 1.6% of users have passwords from among the worst 10;
  • 4,4% of users have passwords from among the worst 100;
  • 9.7% of users have the password from among the worst 500;
  • 13,2% of users have passwords from among the worst 1000;
  • 30% of users have passwords from among the worst 10 000.

The post The Creator of Stack Overflow has criticised modern password rules appeared first on EducatorResourceCenter.org.

]]>
https://educatorresourcecenter.org/the-creator-of-stack-overflow-has-criticised-modern-password-rules/feed/ 0
What to do if Android got a virus https://educatorresourcecenter.org/what-to-do-if-android-got-a-virus/ https://educatorresourcecenter.org/what-to-do-if-android-got-a-virus/#respond Thu, 11 Jan 2018 14:03:50 +0000 http://45.76.226.68/?p=228 The virus is entrenched in the phone — a rather unpleasant thing. It can transfer your information outside to turn on the camera and microphone or even try to steal money from your Bank account. Or completely lock the phone and extort money from you for unlocking. To catch the virus easier. They are often […]

The post What to do if Android got a virus appeared first on EducatorResourceCenter.org.

]]>
The virus is entrenched in the phone — a rather unpleasant thing. It can transfer your information outside to turn on the camera and microphone or even try to steal money from your Bank account. Or completely lock the phone and extort money from you for unlocking.

Image result for android virus

To catch the virus easier. They are often disguised as popular applications, lifting the program of malicious code. Infected files can be picked up on porn sites, in a weird blogging about instant earnings and on various forums where absolutely free distribute new versions of valuable applications. Viruses are increasingly coming in the form of SMS: if someone “accidentally” sent a link to personal photos, or anything else tempting, the probability that a link will eventually lead you to the download APK. Most of these viruses get into the Downloads folder.

The next step will be trying to get you to install a downloaded app. Be careful and always read the permissions requested by the program. In such cases, you can never hope for the best — one touch can seriously mess things up.

But what if the virus is already entrenched in the system and no backup? Here are some basic steps that can help.

  1. Immediately turn off the mobile connection, so the virus could not spend your money.
  2. Make a backup. In an extreme case, then try to dig out its data after a full system reset.
  3. If the phone is not locked, try to install any antivirus from Google Play and walk them.
  4. Podley all unknown or suspicious apps. Best of all — everything that was installed shortly before the appearance of suspicious symptoms.
  5. If you caught the screen locker and can not install anything, plug your phone to the computer and allow the storage of a full-fledged antivirus. They often know about the signatures malware for mobile phones and can help.
  6. In any case, last time reboot the phone — it is hoped that the blocker will shloshim and will not boot, then you will have a chance to salvage something from the phone.
  7. Try to boot in safe mode and deal with malware from it. Ways to activate safe mode vary depending on manufacturer and model.
  8. If you have root on your phone, try to replace the firmware old data.
  9. If all else fails, do a factory reset. With data, you’re leaving, but at least will regain the machine.

And of course, in any situation try not to panic and not to hurry.

The post What to do if Android got a virus appeared first on EducatorResourceCenter.org.

]]>
https://educatorresourcecenter.org/what-to-do-if-android-got-a-virus/feed/ 0