Browser Security Essentials for User Privacy Part 3

It is long time since I have delivered a post at my blog due to my busy schedule, but please remember one thing, that in absence of ready information, you should try to inculcate the habit of searching for latest trends related with Internet security.

And now we will further discuss Browser Security with respect to User's privacy, and how to handle the cookies that a user might come across while surfing the web. We will also discuss about scripts and flash running on a system in upcoming posts.

So now, lets settle down to discuss cookies. It is important to understand all the privacy issues associated with all types of cookies.

The types of cookies are tracking cookies( these are cookies specially designed to track the movements of a user when surfing the web),  session cookies, persistent cookies and and also the Local Shared Objects( Flash cookies ).

Session cookie are session based that are erased after a browser is closed, they are no longer stored on a users system, and that work with a typical session ID. They are stored in a temporary folder and automatically get erased.

Session Cookies are sometimes used as authentication cookies in order to log-in a customer into a restricted area, like chat clients, e mail, bank accounts and other authentication based user access websites. These cookies are specially designed both ways to protect a users account from intrusion from a hacker waiting in line to attack,  to record user's visit to a website and give seamless access to all the web pages associated with that website also recording your visit length simultaneously.

The persistent cookies are the one's which notes customer settings like language, Geographic location and other user preferences while visiting a site and stores this information in the form of a cookie to be placed onto the user's system. So, when user makes the next visit it is easy for him/her to be identified and offered services at a faster speed. But the problem with these set of cookies is same as ever, that it could to be used to target you knowing your preferences if a malicious user gains access to these cookies. It will be up to the user to clear the cookies when visiting a site. Or the level of trust a user place's with the site.

User need to focus on how to set privacy settings on the local browser, if you're using multiple browsers, you need to understand, where you need to look for the same privacy settings in different browsers. You need to understand how to clear cookies from your system, how often and when.

In the upcoming posts we will look into how other types of persistent cookies, flash objects and scripts pose privacy issues for a user.

Browser Security Essentials for User Privacy part 2

Before moving ahead we should understand what a term cookie is ?

 It is a small piece of Text string  placed in the user's memory ( System ), by  a host that is being visited. Why it is placed ? And How it is used ? are the two questions that a  user should understand and use it according to personal preferences, like the trust you place with a website being visited with respect to your online privacy.

 A cookie is used for many purposes including authentication, session tracking or  remembering the user preferences such as shopping carts and other data.

Authentication involves a host to know a particular user’s information and simultaneously it can allow it to log in at the terminal.  Here, a browser needs to accept the cookie,  without doing so, you may not be able to access the service.

Session tracking as the name itself suggests, is used to track the amount of time spent by a user at a website and other related info.

Also we understand, by remembering the preferences of a user such as shopping carts and other data, lets a host or other third party hosts know the details of user’s spending and this data further used in business targeting.

As you know now that a cookie is very helpful when it is used in a proper manner, but sometimes there are many bad sites which attack computers online, it is well advised to be cautious and you can enable switch it on and off  according to your preferences and trust which you place with the website. Browser security will be further discussed in the next post.

Browser Security Essentials for User Privacy Part 1

                                           
                                                       Source freepixels.com
One of the aspects of computer security mostly neglected or ignored is the browser security. 

Most users tend to neglect or ignore this important feature of securing their system from malware being run on their system when they inadvertently visit a bad site and click scrupulous  links thinking them to be safe. And let the malicious software’s intrude your system, the actions a wary user can avoid.

 This is a news story I followed this morning and this should be an eye opener,  how an unsuspecting consumer is led to click on malicious links and rogue anti-virus software’s getting installed onto your system without you knowing the veracity of the rogue software. 

The big part of the problem is removal, it is hard to get them removed from your system once you have installed them. So protection is better than cure here too. 

Check the authenticity of the security software you are downloading from the web.

One thing you will notice when visiting a website, you come across many other third party sites. Some times these third party sites are vulnerable and can pose a security risk to your system.

One thing a user should keep in mind when visiting a website, that the browser and the network are giving out information to the host. Like the IP address, the type of browser you are using, and other details, as most of us know this fact. So is akin walking onto an open street.

Besides this, our system also shares a level of security when visiting a host. That you allow a host to place a cookie on to your system and run scripts. You can simultaneously block these options. Why ? We will look into the reasons ahead in the next post Browser Security 2.

For Further Reading :

Browser Security Esssentials Part 2 

Broswer Security Essentials Part 3

Browser Security Essentials Part 4 
 

Bogus E-mails 'From' FDIC Link Computer Users To Viruses, Says Computer Forensics Expert

Cyber criminals are using fake messages claiming to be from the Federal Deposit Insurance Corporation to deliver a virus capable of stealing unsuspecting victims' bank passwords and other sensitive personal information, says a computer forensics specialist.

Read the full story at Science Daily

Dane Morgan on Mobile Security : A Guest Post

 Today we have a Guest Post by one of the popular Blog Catalog names Dane Morgan, Dane has started a new venture on freelance articles and reports.. I requested him for the more increasingly important topic of security concerning our Mobile Phones and since security being an important theme within the sphere of technology on this blog. Here's is his valuable insight into the issue.


Constantly increasing computing power and the data storage that comes with it, combined with increasing speeds of 3G networks are making mobile devices more attractive to hackers, spammers and scammers as the rewards are rising faster than the risks. - Dane Morgan

                    Until recently Mobile Security hasn't been taken very seriously by most mobile users and the companies that employ them, but that is changing.

Research has shown that a good majority of lost or stolen mobile devices contain confidential personal and company information and communications that can be used to target the employee or the company for fraud and other mailcious attacks.

Additionally, Mobile security is moving rapidly towards similar methods to those used to protect PCs, such as firewalls, anti-malware and virus detection.

At this point most experts agree that mobile security measures are required on every smartphone to protect agaisnt malware. malicious software that infects a mobile device can cause false billing, disclosure of sensitive stored information, and can be used to delete, corrupt, modify or steal personal and company data stored on the device.

The biggest threats mobile users face today really centr around:
  • Privacy when they access the internet through a WiFi connection
  • Data protection in the face of a malware attack
  • Data loss and compromise when when a mobile device is lost or stolen
  • SMS spam, which a steadily growing number of users report as a problem.

Constanly increasing computing power and the data storage that comes with it, combined with increasing speeds of 3G networks are making mobile devices more attractive to hackers, spammers and scammers as the rewards are rising faster than the risks.

Some protection methods include using passwords, data encryption, spam filters, antivirus software and firewalls. But the real first line of defense in mobile security is an educated user.

  • Mobile users should avoid visiting websites that they are unfamiliar with or that they may not really have a reason to trust.
  • Install a security solution that provides anti-virus and firewall functionalities.
  • Don't open strange or unexpected MMS you receive, even from people you know.
  • Keep your Bluetooth connection hidden at all times.
  • Never install an application from a mistrusted or completely unknown source.

Anti-virus and anti malware solutions should automatically retrieve newest updates whenever any data connection is used, and use advanced SMS update mechanisms for critical updates when a data connection is not available.

Users should also take advantage of new technologies that allow for storage of sensitive data on a removable card that becomes inactive when inserted into a different phone. There are also mobile security systems available now that can disable smart phones and even lock down or delete stored information in the event that they are lost or stolen.

Mobile security is important in this day and age. It is up to both companies and those who work with them to take mobile security seriously and develop a security plan for their mobile devices and the sensitive information that contain.

Dane Morgan is a freelance writer and web designer. Visit his portfolio of freelance articles and reports.

Identifying ID Theft And Fraud

                                   Sun hat with sunglasses isolated on white background photo

                   
                           
                   If the wife of FBI boss Robert Mueller has warned him not to use internet banking because of the threat of online fraud, then what hope is there for the average Joe? The results of research suggests that more of us are no longer entrusting our finances to virtual accounts.

Read the full article at sciencedaily.com

Introduction Posts :

1. Are you secure online ? gives a good introduction overview on the Internet Security threats we face today. I recommend to give it a read along with the post Mobile Security in Focus

People Are Still The Weakest Link In Computer And Internet Security, Study Finds

                                        
                                      
  Two decades ago, studies showed that computer users were violating best practices for setting up hack-proof passwords, and not much has changed since then. What's clear, say researchers , is that until human factors/ergonomics methods are applied to the problem, it isn't likely to go away. --- Science daíly



This article at Science daíly highlights the issue of security being taken lightly by the users, and further discusses in detail how the user ergonomics and other human factors can lead to change in the user behaviour concerning security.

Introduction Posts

1. Are you secure online ? gives a good introduction overview on the Internet Security threats we face today. I recommend to give it a read along with the post Mobile Security in Focus

Mobile Security in Focus

                                                               
                                                            Source : FreeFoto

The growth in the multimedia applications along with new advanced technology smart phones, the security issues concerning this sector is just beginning to unfold. Virus, Trojans etc., affect the Mobiles the same way they affect a computer, as now 3G/4G mobiles look and behave more similar to a computer. Additional to this, user privacy and data have more increasingly come under threat.

Here is a link to Symbian OS press release in July stating how a Trojan work horse passed out its security tests.

You can have a look at Mcafee’s 2009 report  on wide ranging issues concerning security of Mobile platforms.

It is important to understand the aspect of security, when it comes to using the communication devices like PDA’s, Laptops, PC’s or mobiles, that when you are accessing the outside world, you need to have a good security mechanism to prevent threats to your mobile security, privacy and data from being hacked, stolen and manipulated.

And this aspect gives rise to another question, Is there any security in place when you are roaming with your communication device and are required to access a Wireless network located at a hot spot ? The answer is no.

This article reflects here. Discusses other issues too.

Here's another link to a document giving some simple but useful info regarding, How we can help protect our mobile phone in general, which almost all of us know, but its still better to take a look, in case if  missing out on anything. So, remember always to browse safely when you are mobile.

1. Are you secure online ? gives a good introduction overview on the Internet Security threats we face today. I recommend to give it a read

How to Secure yourself Online?

                                          
Computer and Network Security has become one of the most crucial sector nowadays with viruses, Trojans, malware, bots etc., wreaking havoc on computer systems day in and out. The most shocking thing is, even when you are fully updated with the latest security software and regularly scan your system, you are still not safe, with the new viruses hitting the web every minute. It is an ongoing battle, the only way we could remain safe is through constant vigil when using computer systems and also now the mobile phones.

And on the other hand you have website hacking, impersonation ( identity theft ), DOS ( Denial of service attacks), Phishing etc., and lots of other threats to computer networks across the world. Victims of such attacks come from a wide spectrum including popular government websites and other important public figures.

Also in the recent past there was a strong speculation of Network attacks being used as a modern form of warfare by targeting the adversary’s vital communication networks.

I will suggest using best practices in the industry to prevent any data loss on your computer system and more importantly protecting your online identity, it being so crucial nowadays, as we are now transacting more and more on the internet.

I will suggest keeping yourself updated every now and then with latest security features and scan your machine regularly.

I will suggest you to use anti-virus software’s scanning for viruses and using separate dedicated software for scanning Spy wares.

Registry checkers are very tough things to use and only users with expert knowledge can handle it, as tinkering with the registry is like playing with the soul of your machine and if anything goes wrong it’s very hard to revert back.

Never trust every other website for software’s when downloading, always buy authentic software from the original vendor, and always check the necessary credentials of a website before downloading anything like music, video or games. Many websites are attack websites and can pose a threat to your computer security.

If you are using Firefox, though it consumes little bit of more memory, but should work fine on faster machines, you have a good add-on in it like WOT. WOT (Web of Trust) is an add-on for Firefox which lets the user have knowledge of a site’s worthiness and other features with indicators of green, orange and red. So, that you don’t visit a website which might attack you by running malware’s on your machine or copying sensitive information from your computer.

If you have sufficient knowledge you can add your vote, it’s basically a user shared experience of a website, mostly it is true and sometimes it can be misleading or wrongly suggesting an authentic site to be an attack site.

Always be in touch with what processes your machine is running on your system, as there are many methods through which Trojan’s and Spyware’s get activated on your machine, they may be lying hidden in a program that you might think safe, but they get activated as soon as you run that program.

Image objects in the email many times have a malicious code embedded into it and they get activated when you open your email and click the object, the spamming follow the same procedure affecting the networks traffic besides fraudulent information solicitation emails.

Password thefts are serious, a threat to your identity being impersonated online; there are many ways that you could lose your password, by losing your physically stored details in the form of a diary or other object, by selecting easily guessable passwords in the form of names or other popular places and public figures or even your favourite dish.

There are several password breaking methods available unless you use a strong password in the form mixing upper case, lower case letters, adding some numbers and some special characters on your keyboard to it, so that it is at least eight characters strong.

Your password is an input to the encryption scheme employed by an online service and sometimes if you reverse that scheme (decryption) the password could be guessed, using strong passwords makes your password hard to break.

So, as you can see there are two elements in this security, you need to rely on your password and the encryption scheme being employed, if anything is weaker then the integrity of the information being transmitted or accessed could be compromised, mostly many popular online services like email and chat clients use latest encryption methods, but what if you have landed into an unchartered territory and are required to use a service whose encryption scheme is not as strong as it should be, your strong password could save you the day.

Mostly passwords are easiest thing that bad guys rely on breaking into someone’s online account either email, bank or any other online service.

Here’s a link for Microsoft’s password strength checker page

I will try and keep updating you on this topic from time to time. Thanks for reading, enjoy :) !

Denying Denial of Service (DoS) attacks

ScienceDaily (2009-09-30) -- A way to filter out denial of service attacks on computer networks, including cloud computing systems, could significantly improve security on government, commercial, and educational systems.

In the past few years we have heard about a large scale DoS attacks across the globe, the more recent in the memory are the one's which took place at the Georgian Government networks just prior to the war breaking out there, researchers noticed at that point of time huge amount of web traffic directed towards the networks and it was viewed new form of modern IT warfare which reflects in how the future wars might take place.

Also there has been large scale attacks on the government websites in US such as NASA and other important government websites, it was suspected to be an attack originiating in Asia particularly in North Korea.

Science daily.com.