Tuesday 12 March 2013

Top 5 Mobile Security Concerns for 2013



The market share for traditional PC's is falling apart as smartphones and tablets are replacing the desktops. As millions of users shift from PC's to mobile devices, hackers and malware authors who once targeted PC ecosystems are focusing on attacking mobile devices, which are miniature PC's storing huge chunks of sensitive data. Therefore users need to be aware of potential security vulnerabilities and various methods to safeguard their valuable information on mobile devices more than ever. Although many users are familiar about PC security it seems that only few users are actually aware of ways to protect the smartphones and tablets from attacks. The following is a concise review on top 5 mobile security concerns for 2013.

Outdated Operating Systems:

                Outdated operating systems pose serious security threats to the smartphones and tablets. With the current pace at which hardware components are stacked together to produce new and powerful devices each day, predecessors are losing the limelight at a rapid rate. The upgrades to the operating systems are not always compatible with the older phones; therefore a vast majority of users tend to stick with older versions of the OS. Also security patches to the identified threats and updates to existing versions are usually not installed properly by the average users due to their lack of concern over mobile security or lack of knowledge on installation processes. Another major issue especially relevant to Android OS which powers about 75% of the smartphones and tablets out there is its huge fragmentation, which causes upgrade processes dreadfully slow. In fact around 50% of the devices still run Gingerbread, while two major upgrades, Ice Cream Sandwich and Jelly Bean have already been rolled out.

Outdated Applications and Malicious Applications:

                People are shifting from Desktop PC's to smartphones and tablet PC's and so are the hackers and malware authors. Malicious application codes are often bundled with popular free applications found on apps stores, or with pirated copies of paid versions, and average users hardly notice the spying bots disguised within a popular service. Most trusted services like Google Play and Apple iTunes Apps Store too have been injected with malicious apps despite various security barricades, therefore chances of various third party app stores and web sites being infected with malware are quiet high. User modified versions of operating systems often known as Custom ROMs are usually vulnerable to attacks more than official stock ROMs, since users often root the smartphones to gain the super-user access for installing custom ROMs, and rely on pirated versions of popular apps. These third party markets usually are not monitored closely for potential threats by a professional body therefore malware authors can easily distribute their apps coated with malicious codes without getting caught.

Exploited Wireless Networks:

              Public wireless hotspots attract many savvy smartphone users looking for cheap data bundles and many prying eyes of malicious hackers looking for vulnerable targets. Network requests can be manipulated to redirect users to fake websites infected with malware or spyware exploiting the vulnerabilities of the network. User names, user passwords and even stored messages have been retrieved through public Wi-Fi networks without users consent in various occasions. Mobile phones are not typically equipped with firewalls to block insecure connections while surfing on a public Wi-Fi network, therefore potential intruders can steal sensitive data like credit card numbers and bank account numbers and hack into users’ email accounts as well. Using encrypted network connections at home and office, and avoiding accessing public Wi-Fi hotspots at airports and cafeterias are some basic precautions users can take to minimize security threats, until manufacturers and developers start bundling up security firewalls.

Rooting and Jailbreaking of Propriety Operating Systems:

              Gaining super-user access to the operating systems by rooting or jailbreaking exposes the system to plethora of security threats. This process allows users to gain full administrative privileges, and install any application including the ones not recommended by the manufactures over security concerns. Rooted devices are easily manipulated by malware including worms, Trojans and various viruses to steal user names and passwords, contact lists, messages and hijack email accounts behind users back. Rooting devices void manufacturers’ warranty, therefore users are not notified of security patches and security updates once devices are rooted and users typically have to manually address such concerns.

Vulnerabilities in Device to Device Connections:

              Device to device infections are quiet rare yet however that doesn’t mean they are impossible to be carried out. For instance malware authors can exploit the USB host feature introduced with Android Honeycomb for spreading malware. If the connected device’s USB debugging mode is turned on, chances of the device being infected with malware embedded in the host devices are quite high. This could either be accomplished by a bot running in the background of the host without the users’ consent, or by the owner of the infected host himself, by plugging the device into a target device and installing the malware on it. However it should be noted that device to device infections are quiet rare in earlier versions of Android which still powers up to 90% percent of the Android smartphones. It is also speculated that malware authors will utilize desktop PC's to spread smartphone malware in near future.




Author Bio:
This guest post was contributed by Dmitri Blackthorn, the online security expert, mobile technology specialist and a part of Stop-DDoS.net team - DDoS Mitigation Service provider.

Tips To Prevent Online Identity Theft



Identity theft rates one of the fastest growing crimes in America today and the Internet can make it even easier for some criminals to take your good name and drag it through the mud.

Identity theft involves criminals stealing your personal information such as credit card numbers, social security numbers and other information, usually to buy things on credit or to empty out your bank accounts.

Through your financial liability with your credit cards may be limited to $50 to $500, it can take years for you to clean up the mess online identity thieves leave behind.

As with any crime, an ounce of prevention may just cause the would-be identity thieves to leave you alone and move on to an easier target.

The following tips can help you avoid having your identity stolen:

1.) Never give out your social security number, online or otherwise. No company you buy things from needs your social security number.

If you do business on the web, obtain a a Federal Tax ID number to use instead of your social security number.

Once criminals have your social security number, along with your birth date and address, they have virtually everything they need to start wreaking havoc in your life.

2.) Use a good anti-virus program. One of the ways criminals get your credit card numbers, passwords and other sensitive information is through "Trojan horse" viruses that log your keystrokes and transmit information to the evil doers.

The "Bad Trans" virus that has caused so much havoc is just such a virus.

3.) Always use a "secure" server when transmitting credit card information over the web and know something about the company before handing over your information.

You can feel pretty confident that you are using a secure server if a little lock displays in the status bar on the bottom of your web browser.

4.) A popular new way to pay for goods and services online is to "use your checking account just like a credit card".

Be extremely cautious about paying this way through the web. By giving a company your checking account numbers you give away much of the information necessary to empty your bank account!

5.) Never give out information such as your birthday, marital status, education level or other personal information.

This additional information makes it extremely easy for criminals to make themselves appear legitimate when they pose as you. Websites should ultimately only require you to provide your name, email and billing information for a purchase.

You should avoid any site requiring more information than that.

These criminals prey on people's ignorance and you can usually defeat them simply by making it too hard for them to get your information.

If you do find yourself a victim, immediately contact police and get legal help. Do not wait because you feel embarrassed or "stupid" over what happened.

Waiting only lets the trail grow cold and limits how much law enforcement can do to help you.



Author Bio:
            Jim Edwards is a syndicated newspaper columnist and the co-author of an amazing new ebook that will teach you how to use free articles to quickly drive thousands of targeted visitors to your website or affiliate links... Click Here for more information on "Turn Words Into Traffic" at http://www.turnwordsintotraffic.com.

Trick To Boot Or Start Computer Faster

Many computers take a lot of time to boot (or start ).This is due to many reasons.













Some slight changes can do wonders for your system:

1.) Press start->run then type msconfig and press enter.

Go to the startup tab. Here you will see a list of startup items. These are all the programs that automatically start when you boot your PC. It is these that slow down the boot up process.

        So uncheck all the unwanted items like ms-office, messengers other utilities that u may not need at startup). Don't uncheck your antivirus software.

Restart your Pc to and see for yourself, your pc will now boot faster....

   
2.) A great new feature in Microsoft Windows XP is the ability to do a boot defragment. This places all boot files next to each other on the disk to allow for faster booting. By default this option is enabled, but on some systems it is not, so below is the information on how to turn it on:

Go to Start Menu and Click Run
Type in regedit then click ok
Find "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Dfrg\BootOpt imizeFunction"
Select "Enable" from the list on the right
Right on it and select "Modify"
Change the value to Y .
Reboot your Pc and see the change yourself.

 
3.) SPEED UP BOOT BY DISABLING UNUSED PORTS.!!
You may have tried many tricks like modifying windows XP start-up applications, prefetches, unload DLLs method, etc. And yes those methods do work for me.
                    I have just accidentally found out another way to give you an extra boost in windows XP's boot performance. This is done by disabling your unused devices in Device Manager. for example, if you don't have input devices that are connected to one of your USB's or COM ports, disabling them will give you an extra performance boost in booting. Go to Control Panel -> System -> Hardware tab -> device manager Disable devices that you don't use for your PC and then restart.

Trick to Disable Others Changing Wallpaper In Windows


Here is the trick for “Banning the changing of wallpaper and theme of your personal computer”
You can also use this trick to change the wallpaper of public comp , say your  comp for example. and make it unchangible from others.












Set the wallpaper and theme to the one which you want to lock your screen with and go to ‘RUN’ from the start menu (or click windows key + r key to open ‘run’, This is a short cut- Note this)

In RUN type ‘regedit’ and press enter as in the image below

This will open the Windows Registry Editor.

Then click on the folders given below :

Computer >
HKEY_CURRENT_USER >
SOFTWARE >
Microsoft >
Windows >
CurrentVersion >
Policies >
Explorer>

After this create a new DWord (32 bit) Entry. Give it a Name of ‘NoThemesTab’.



Now after this double-click on this Entry and change the value its data from 0 to 1.


Thats all , now once after logging off from the current user account will make the comp lock the editing option of desktop and also make those options gray indicating that there is no option to edit them.

Now when you want to turn off this locking at any time visit the Registry Editor again and change the value of the ‘No Themes Tab key’ from the current 1 to 0



Trick To Earn More Points On Yahoo Answers


If you find difficulty in getting your answer to be chosen as best on yahoo answers, so that you can earn more points then you are at right place.

Here is a trick which i personally use to earn more points on yahoo answers, Iam going to share it with you.

Steps to do:

  • Try to answer as many questions as possible without limit.
  • Make sure your answers are somewhat reasonable and related to the question so that it is not going to get marked as spam.
  • If you are lucky some of your answers would be chosen by the asker as the best, so that you can earn 10pts.
  • If you are not lucky follow the below trick to make your answers to get marked as the best by you yourself.

The Trick:


  • To make this trick work you must have answered more and more answers the previous days.
  • You might have came to know that every answers goes for voting after 4days.
  • This is where you can do this trick.
  • Go to your my activity in yahoo answers and in the My Answers sections on that page check for the questions which has been set to Voting.
  • Open that question and choose(Vote) the answer you wrote as the best answer.
  • After some times you will came to know that you have earned 10 points as, Your answer was chosen as the best by the voters.
How it works:  Voters on the yahoo answers are rare as this make them to earn only 1point. So, they choose other way rather than voting answers. So, that in some of the unvoted answers even if it receives one vote it will be chosen as the best.
Friends Don't forget to Share or Comment if you found this useful.

Tips to Prevent Data Loss!



How do you protect yourself from losing important data? Do you save your work as often as possible? Do you do backups? Here are a few effective tips on how to prevent data loss:

Backup your work:

             Backing up your work is simple thing to do: you can use USB’s, CD’s, or external drive, among others, to have a duplicate or backup of your work. Just in case your file was corrupted by whatever reason, you’re sure that you have a secured file stored. You can also try partitioning your hard drive into two: one for the operating system and some programs, while the second partition would be for backup. This way you won’t need to have a separate storage device while preventing data loss.

Use Antivirus and Antispyware Programs:

             Viruses, worms and spywares can delete, modify and corrupt your files. Right after installing programs on your computer, it is a must to install an antivirus and antispyware. Keep your antivirus updated so that it could be effective in preventing viruses. Always scan your computer using antispyware program because spywares could attack your files and give attackers access to it.

Use UPS (Uninterrupted Power Supply):

            Brownouts are unavoidable, so it is advantageous to use UPS. A sudden surge in current could corrupt your files as well as some programs on your computer. While in a middle of encoding your project, you could prevent data loss by using UPS. UPS, could allow you to properly save your work and shutdown your computer, which otherwise would cause files and programs to malfunction.


Don’t try to repair your computer if you’re not qualified to do it:

           If you think that you need to open up your computer because it needs repair, don’t attempt to do it unless you really know what you’re doing. Trying to solve the problem without assistance from a qualified professional could do more damage than good. You could lose not just data, but you could rupture the hardware inside. Or you could harm yourself from electric shock.

Don’t share your file with strangers:

          To protect yourself from data loss, never allow anybody you don’t know to access your important file. You’re never sure what they could do to it. They could steal your work, modify or delete it.

Don’t modify the registry of your Operating System:

          Unless you’re sure what you’re doing, never do changes to the registry. It could harm your operating system that could result in malfunction and loss of some important files.

Top 3 Windows Password Recovery Softwares


              Today more and more computer users lose of forget their computer password. If you are easy to forget password, creating a password reset disk in advance is necessary. The password reset disk could help you reset Windows password when you forget it. But if you forget to create such a disk, what should you do to regain access to your computer when you forget the logon password? There is no need to worry about because you can recover or reset your lost Windows password with the help of Windows password recovery softwares. In this article you can find 3 excellent Windows password recovery softwares which can help you to recover or reset lost Windows password effectively.


1.) Ophcrack:

           Ophcrack is an free Windows password recovery software based on rainbow tables. It provides an easy and safe way to recover lost Windows password. It is a very efficient implementation of rainbow tables done by the inventors of the method. It is claimed that these tables can crack 99.9% of alphanumeric passwords of up to 14 characters in usually a few minutes.

Ophcrack is regarded as the best free Windows password recovery software. But its disadvantage is that the size of its ISO image file is 496MB. It will cost you much time to download it to recover lost Windows password.

2.) Offline NT Password & Registry Editor:

           Offline NT Password & Registry Editor is another excellent free Windows password recovery software to reset Windows logon password. It allows you to reset the password of any user that has a valid local account on your Windows system. And You do not need to know the old password to set a new one. This software works offline, you have to shutdown your computer and boot off a CD or USB disk to do the password reset. By the way, it is also an almost fully functional registry editor.

         The password reset speed of Offline NT Password & Registry Editor is faster than Ophcrack's. It is a good option for you to reset lost Windows password. But please note that Offline NT Password tool is completely text based, so it is a little inconvenient.

3.) Rekeysoft Windows Password Recovery:

            Rekeysoft Windows Password Recovery is professional Windows password reset software which can help you reset Windows logon password by creating a password reset disk. It enables you to reset the lost Windows password. This software compatible with any version of Windows system, including Windows 7, Windows Vista, Windows XP, Windows Server 2008/2003 and so on. So you can perform Windows 7 password recovery with this software. It has 3 editions to meet your different needs. And the enterprise edition of this software provides an safe way to reset lost Domain administrator password.
Perform Windows 7 password recovery with Windows password reset software.