Category: Internet Security

Important Safety Tips while Using Public WiFi

Safety Tips while using Public WiFi

You do not have very go far these days to access free public Wi-Fi. It is available in airports, libraries, cafes, hotels and government buildings. This is helpful but it is important for both adults and kids to make sure they do not trade safety and security for convenience. Just because the public building you are in is reputable, does not mean the Wi-Fi connection is secure.

When using your smart phone or computer in a public hotspot, you need to be careful to ensure the Wi-Fi network is encrypted. Otherwise, it opens you up to the risk of having your online accounts hacked. This could result in cyber thieves stealing your personal information.

Here are two basic safety tips to keep in mind to protect your information.  And then we will explore additional ways to stay safe while online in public.

1. Check if the Public Wi-Fi Network is Secure

As mentioned, we are not worried about the people who control the Wi-Fi network.  The risk is when others around us are in the business of hacking into the personal accounts using the network. safety-tips-that-both-adults-and-kids-need-to-know-while-using-public-wifi/ It could be the person sitting across from you in a coffee shop, or just outside on the street. 

If the public Wi-Fi network does not ask you to enter in a WPA or WPA2 password, the network is not secure. As you are probably thinking, this is most places.  The most common public Wi-Fi networks that require a password are internet providers with home you have an account.

2. Ensure the Websites You Visit Show https 

An example of this is https://youraccount.com or https://yourbank.com.  Secure websites will encrypt your information as you use the site.  Unsecured sites do not have the “s” in them, such as http:// (your information is not encrypted and kept safe if you don’t see the “s”)

Unsecured websites will also show a padlock that is unlocked.  Here is an example of what a secured website looks like.  Notice how with website URL with https also has a closed lock.

secure encrypted website

Clicking the lock will reveal more information about the secure site.  Now you can be sure you are on a secured website.

On a mobile website, it will look like this.

secure encrypted mobile website

If you are using a site that is not secure and locked, you open yourself up to hackers that can access your personal accounts and steal your data.  This could mean your name, address, phone number, address book and photos.

Hackers need to see you on a public WiFi to be able to monitor your activity, so one sure fire way to to prevent this (regardless of being on an unsecured network) is to encrypt your data by using a VPN. It can be turned on when you wish, such as when you are in public or traveling.

Here are more ways to protect your personal information when using public Wi-Fi.

  • It is good idea to have different passwords for each of your online accounts. This way if a cyber thief gets a hold of your email and password on one of your accounts, they will be unable to log into other accounts using the same password.
  • Educate yourself on the various ways cyber attacks happen even when you are in the safety of your own home network, such as Phishing, Vishing and SMishing. Hacking through public WiFi is less common than these other methods used.
  • Do not email important information about yourself for any reason.  This includes credit card details, bank account information and your personal government ID number. You should never do this even if a network is secure, not even from home.
  • Use a mobile proxy to mask your IP address and when accessing accounts in public, whether it is your own computer or a PC in a library, always log out when finished.
  • Take advantage of 2 step verification methods being offered within your personal accounts.  This will add further security because 2 step verification means you cannot log in until you enter a secret code that is sent to you by text or via the Google Authenticator App.

Proper Online Activity When Using Public Wi-Fi 

If you are in doubt about the security using any public Wi-Fi network or website, it is best to restrict your activity online to general use, such as searching Google while you are not logged into your Google account.

Do not log into any personal accounts and if you find it necessary to do so, disconnect from Wi-Fi and use your personal cell data.  Even then, it is always important to ensure the websites on your account pages start with https in the URL.  Most major accounts websites are secure, but if you do not see https something may be wrong.

If you are in doubt about the security using any public Wi-Fi network or website, it’s best to restrict your activity online to general use, such as searching Google while you are not logged into your Google account.

Don’t log into any other personal accounts and if you find it necessary to do so, disconnect from Wi-Fi and use your personal cell data.  Even then, it’s always important to ensure the websites on your account pages start with https in the url.  Most major accounts websites are secure, but if you don’t see https something may be wrong.   

Beware of Evil Twin Attacks

What does this have to do with protecting yourself on publish Wi-Fi? Well, an Evil Twin Attack happens when a cybercriminal sets up a Wi-Fi network that mimics a legitimate one. The goal is to trick you into the log into the wrong network by mistake. 

Unsuspecting victims will think they have connected to the “safe dedicated network” associated with the public area they are visiting.  Scammers and then can steal your information or infect your devices.

Captive portal pages can also be used by hackers to funnel you to malicious websites or infect your device with malware. 

Red Flags to Look Out For

Seeing multiple networks with similar names should raise suspicion. Stay alert for security notices on your device. It will often let you know if you’re about to connect to an unsecured network.

These networks are dangerous because there are no built-in security protections to keep hackers out. Using your personal data or a friend Hot Spot is a safer alternative when you encounter unsecured public Wi-Fi networks. 

Additional Resources:

Share This Article

How Browsing Fingerprinting is Used to Track You

How Browsing Fingerprinting Tracks You

The internet has enabled a lot of things in today’s modern world. In the early 2000s, the internet changed how businesses advertise their products and services. Many businesses dumped the traditional offline techniques and adopted online advertising through the internet.

Later, they realized that they could not advertise to everybody out there. The need to advertise to relevant audiences gave rise to behavioral tracking. By that we mean, businesses track your online movements and decide whether you’d be interested in what they do before sending ads your way.

This method relies on web cookies and not only tracks previously visited sites but the location, etc. But then, internet users in the mid-2000s discovered ways they’d stop this snooping. They’d disable cookies and use ad blockers, making it daunting for businesses.

But in a bid to keep up behavioral tracking, advertisers are now using new and much more sophisticated techniques. The latest trick that has made tracking possible is device or browsing fingerprinting.  This article will look more into what it is and how it can help companies and advertisers track you.

What is Browsing Fingerprinting?

Device or browsing fingerprinting is a technique initially designed to track internet users for security purposes. It involves browsers gathering individual information of internet users and availing it where needed. This information includes location, device type, screen resolution, language, etc.

Trackers do not need to collect your information at a go. It can take a few browsing attempts to match details and create a unique and accurate fingerprint for every user. Consequently, they can track your online activity and movements without a problem.

This technique has evolved a lot from the time it first got introduced. Recent developments have made cross-browser fingerprinting possible, consequently making tracking more effective. According to experts, this dynamic technique is capable of identifying internet users 99% of the time.

On the positive side, browsing fingerprinting has played an important role in shaping the digital environment. It has enabled analytics and tracking for website owners. You can now know the number of visitors visiting your site and how many visitors return to it.

Online safety that wasn’t a guarantee before fingerprinting is now almost one. For instance, it has played a great role in identifying and preventing credit card and bank fraud. E-commerce fraudsters also now have a headache to try and defeat the wall fingerprinting has built.

How they fingerprint you

Although trackers cannot match fingerprints with real identities, there’s so much they can do you’re your information. Businesses are hiring third-party companies to collect the information we mentioned earlier. Now, their work is to discreetly monitor your digital movements and keep bits of data about you.

The data brokers hired to collect your information create a general profile of you. They look at your interests, from the sites you visit, consider the language you use, your location, and age range to create a pseudo profile for you, and that most of the time turns out to be an accurate representation of you.

Fingerprinting, as mentioned earlier, got developed to foster online security. Website owners create digital fingerprints to prevent identity theft, credit card fraud, software piracy, etc. Thus, many businesses and websites that benefit from it will tell you that it isn’t all that bad.

However, online privacy has been a concern for years, and browsing fingerprinting interferes with it. Companies exploit the information received from data brokers, and that is a consistent privacy violation. Thus, many internet users would rather protect themselves using security tools than have someone collect such critical data without consent.

Browsing Fingerprinting – How to Fight Back

Internet users get faced with a dilemma whenever the browser fingerprinting topic comes up. Of course, people want to find ways to stop it like they do with traditional behavioral tracking. However, the downside is that browsing fingerprinting is naturally difficult to circumvent.

A more positive thing that has come about is that you can, to some extent, prevent browser fingerprinting. Some privacy-first browsers like Tor make every device look the same. That makes it difficult for bots to collect the information required to create a digital fingerprint.

Safari, a browser that belongs to Apple, is another difficult one to fingerprint. Apple has a smaller product line than many mobile devices and PC manufacturers, making most of its devices look similar. Consequently, you become immune to fingerprinting if you’re using an iPhone or Mac.

Firefox is another potential option for internet users looking to avoid fingerprinting. This browser has invested in aggressive default privacy protection features. Besides, there is a word that it is also advancing its protection features to block fingerprinting in the future completely.

You can also use an SSL proxy to fight back browsing fingerprinting. The best thing about using this proxy is that it enhances your online security and privacy at the same time. Besides, they help you remove ads that you do not like and aid in ad verification to reduce online fraud.

Although fighting back on new technology isn’t easy, it is best to give it a try. Technology itself has made it possible to fight back, thanks to the software developments and protection features being added to browsers.

Conclusion

The digital landscape is increasingly becoming complex every day. Consumers are becoming careful about what they have to do to browse securely and privately. Conversely, marketers and advertisers are hungry for customer information as they look to up their marketing game and reach business goals.

New tracking techniques like browsing fingerprinting are becoming popular since traditional reliance on cookies is no longer reliable. However, internet users are also becoming aware of new ways to curb fingerprinting. The use of protective browsers, proxies, and developing new privacy rules seems to work.

With browsing fingerprinting constantly changing with new advancements like cross-browser fingerprinting, you have to be smart enough to prevent it. One of the best things you can do is investing in reliable software, using protected browsers, or purchasing well-protected devices.

Additional Resources:

How to talk to kids about cybersecurity.
Can apps track your location?

Share This Article

Can Hackers Breach Microsoft 365 Accounts?

Can Hackers Breach Microsoft 365 Accounts

Microsoft 365 accounts have come under increasing attacks by hackers. It seems like no organization is safe if reports are anything to go by. It seems like no organization is safe if reports are anything to go by.

Microsoft released a report that the level of threat sophistication is rising. It makes it harder for them to identify cybercriminals. Key areas of concern are the internet of things (IoT) devices. Other threats are ransomware, and credential harvesting. In 2019, the company blocked 13 billion suspicious and malicious emails.

Foreign governments are also playing dirty. They are working with hackers to monitor US treasury department emails. They also used software and Microsoft Office 365 to get access. Hacking is, without a doubt, a major concern for everyone. It is crucial to prevent such attacks.

Parents must also be extra watchful. You must take the necessary steps to keep kids safe while online.

We will show you everything you need to do to secure your Microsoft 365 account.

How to Secure a Microsoft Office 365 Account and Keep Your Kids Safe While Online

Microsoft Office 365 accounts are critical for most businesses. But, they have also become quite popular amongst hackers. Once the cyber criminals are in your system, they access services and applications. Such include the calendar, SharePoint file, email, and Onedrive.

It will compromise your online security and expose you to different threats. Hackers will use several methods to get excess. Such include:

  • Phishing through the use of fake login pages. They will often ask you to change your account settings, including the password.
  • Business email compromise where the hacker uses a genuine Office 365 account. You get an email asking for specific information or action. Be careful about opening links whose source you do not know. Be wary of emails that have a lot of urgencies, especially to send money.

How to Know When a Hacker Compromises Your Microsoft Office 365 Account

There are specific things that show that your Microsoft Office 365 account is not safe. Such include:

  • An increase in email deletions due to the mailbox rules.
  • Difficulty accessing account.
  • Changes to your account that you did not allow.
  • Suggestions for new actions including Mail forwarding or moving orders.
  • Requests for password changes from location to do not know.
  • Many login attempts.
  • An increase in inbox activities that you are not taking.
  • Changes to your profile, contact details, signatures, and credentials.

Steps To Take To Secure Your Microsoft Office 365 Account

If you are on the receiving end of hacking, it can be scary. There are steps you can take to restore safety on Microsoft 365. Remember online security starts with you. Watch the sites your children visit.

If possible, restrict access to some of the sites. Only use secured networks when you are online. Also, enable the firewall and install the necessary antivirus protection on your devices.

1.   Work Offline

When you always connect your computer to the internet, hackers have an easy way of finding access to you. The alternative is to work offline as much as you can. It is a good idea to consider if the kids use the computer a lot, especially for school work.

Install the desktop version of Office 365. It eliminates the need to depend on the cloud to access the applications. You still have access to your programs without needing internet connectivity.

2.   Use Microsoft Office for Chromebook

To increase security, consider installing Microsoft Office for Chromebook.  The Chromebook’s design focuses a lot on security features. It makes it safer than Linux, Android, iOS, and even windows.

Chromebook works by blocking any installation attempts. If there is a malicious virus in an email, it will not attack your system. Everything you do when using Chromebook is cloud-based.

It makes it harder for hackers to get access to your system. The developers are always rolling out updates. Verified boots, and sandboxing also help prevent infection. In the long-term, you save a lot. You do not need external malware or virus protection.

3.   Use Strong Passwords and Multi-Factor Authentication

A weak password can compromise your safety. Take the time to craft a strong password for your accounts. A combination of numbers, letters, and symbols is a good idea. Avoid the use of birthdays, anniversaries, and 1234 as passwords.

Enable the password expiration so that you only use the password for several days.

Multi-factor authentication requires the use of an extra password to access the account. It uses information that only you would know. It may ask questions like who was your first teacher. What was the first object that you ever bought for yourself? Who is your favorite author? The answer you give becomes your second password.

4.   Configure Your Office 365 Accounts

Be careful about how you use the administrative account. Do not give access to everyone and assign privileges. You should not use the admin account for administrative use.

Before you access the admin account, make sure you close all other browser sessions. Do the same for any email accounts that are currently running. Once you finish using the admin account, make sure you log out completely.

Do not let anyone else get access to your emails or calendars. Avoid Mail forwarding to external domains. Remove global mail forwarding that the attacker may have created.

Also, take advantage of the security measures that Microsoft Office has in place. The company is even using artificial intelligence to improve the Microsoft defender.

5.   Secure Mobile Devices

Take note of the mobile devices you use as well. Microsoft Intune is a mobile device management tool that helps you secure your data. You can use it on IOS, Windows, Android, and iOS devices. If you lose your device, you can wipe out the data remotely.

Final Thoughts

From our article, we have shown that hackers can breach Microsoft Office 365. The good news is that there are specific steps to prevent breaches. Come up with a strong password and take advantage of the multi-factor authentication.

Download the desktop version of Office 365 so that you do not depend on the cloud. The other option is to use Microsoft Office for Chromebook. You get to enjoy the security features of the latter.

It is important to keep the kids safe while online. Use some of the tips we have shared above and enjoy peace of mind knowing they are safe.

Educate yourself and your family on how to protect your computer at risk.

Learn how hackers can access your computer via a session hijacking attack.

Share This Article

TikTok and Online Security | Is TikTok Safe for Kids?

Is TikTok Safe for Kids?

You might have recently heard about some of the scandalous accusations that have been aimed at TikTok. Their accused lack of respect for peoples’ privacy and for online security has led to people wondering if they are spying and even seen calls for the app to be banned in the USA.

In this guide, we’re looking at some of the reasons why people are so suspicious of TikTok and going in depth on whether or not you should trust this social media giant.

The Basics of TikTok Explained

TikTok is a social media company that is similar in some respects to other visual platforms like Vine and Instagram. It focuses on short, snappy videos. There are effects you can add as well as songs and soundtracks, and these make a lot of the videos perfect for sharing. There are TikTok celebs in the same way that there are YouTube celebs as the younger generation especially become infatuated with the platform.

The TikTok Controversy: Is TikTok Safe?

People suspect that they are less than honest for a few different reasons. The Chinese company that owns TikTok has been accused of working with the Chinese government and the CCP in order to spy on Americans and other nationalities using the app.

Also, TikTok has had a chequered past where 42 million user profiles were exposed in a massive data leak, and because it is quite an open platform it can be abused by some scammers.

Why would TikTok want to steal peoples’ information?

It is hard to know the exact motives, but the accusations of links to spy groups suggest that they could wield some very powerful information. If the TikTok security was breached (something that a lot of people are concerned about) then this information, and the huge amount of data that the app requests to store when you use it, could be utilized for those with sinister intentions.

One of the things that has made people suspicious is the fact that TikTok records so much, including your location and even your device’s keystrokes.

Identity Theft Facts

Did you know that cybersecurity statistics show that nearly 1 in 3 DATA breach victims (30.5%) also suffered from identity fraud In 2013 – up from 22.5% in 2012. And this was years ago, Identity theft has been on the rise ever since, before TikTok was even on the scene. This type of theft is becoming more viable, and more easy to implement for certain criminals and this means that it is growing. Identity theft could well overtake physical forms of theft. People can use your details to borrow money or even to commit crimes, so it is important to be really cautious about what information you make available.

Identity theft can seem like something a bit abstract and like it is not relevant to you, but over 60% of those hit by scams say they have no idea how it happened to them. You can never be too careful as it can happen to anyone out there.

How to protect yourself and your children from Identity Theft

If you are at all worried then you should remember that you don’t have to get a TikTok account, and even if your children are desperate to have one, you might want to discourage this use of social media wherever possible. Though it doesn’t seem fun, it is worth actually reading the privacy policy and terms and conditions of the app. If you aren’t comfortable, steer clear.

If you do create an account, ensure that it is a private account, and see if your device will allow you to stop apps and third parties tracking your use of the device while you use the apps as this can be a way to prevent identity theft and stop loads of details about you and your life from being collected. 

How Safe is TikTok for Kids and Teens?

TikTok Safety and Online Security

As with any social media platform, there are certain risks associated with the app that parents should be aware of. One risk includes the potential for exposure to inappropriate content. While it’s true that the app’s official guidelines prohibit illegal or inappropriate content to be shared, it’s worth noting that there aren’t real people managing this process. Instead, TikTok relies on digital algorithms to automatically filter out content that violates the app’s official guidelines. The reality of this is that some illicit content will inevitably fly under the radar and end up on users’ screens.  

Another area of concern is the potential for communication with strangers. With over one billion users on the app, the risk of contact with strangers shouldn’t be ignored. Teens aged 16+ that create an account will have their profile set to public by default, and their account activity is visible to anyone. While accounts made by children between the ages of 13 and 15 are automatically set to private, it’s not hard to bypass this restriction—all they have to do is enter a false birth date when they register for an account. 

While there are many parental controls parents can activate to mitigate many of these risks and create a safer experience for their children who use the app, it’s still important to be educated on the potential dangers that come with any social media platform. Knowing what privacy settings you can manage and taking time to set technology boundaries with your kids are some of the best ways you can ensure your kids are protected on TikTok.

Cyberbullying on TikTok

TikTok has taken steps to combat this issue by implementing reporting mechanisms, content moderation, and algorithmic changes to promote positive interactions. However, parents should be diligent to recognize the signs of cyberbullying to protect their children.

One of the main reasons why cyberbullying thrives on TikTok is the ability to hide behind a screen. Users can create anonymous accounts or use pseudonyms, making it difficult to identify the perpetrators. This anonymity emboldens cyberbullies, allowing them to engage in hurtful behavior that not only affects the victims’ mental and emotional well-being, but it also creates an environment where bullying can persist unchecked.

Because of the viral nature of TikTok’s content, well meaning videos that gain popularity can quickly attract negative attention, leading to a barrage of hurtful comments, insults, and even threats. The comments section, where users can interact and leave their thoughts, can easily become a breeding ground for cyberbullying.

What Will Happen To TikTok?

Nobody has specific proof that TikTok is being used to spy on people or to steal identities. In the world of politics there is plenty of debate about the app and its use as people realize just how much power the owners of the app, ByteDance, who first acquired musically then transformed it into TikTok, could have if they really are tapping into that personal data.

If the claims are valid then it is probably a good idea to come off the app, but also to protect yourself in other ways. You can use identity monitoring services to try and establish whether data about you has leaked or become available on the black market. If some of the claims that have been made about TikTok and the Chinese government links then there is every chance that there will be some really drastic measures taken very soon.

The Future of Tiktok

TikTok seems to be tightening up some of its security.  The recent bad PR has led to the app trying to build confidence from consumers that they are not trying to steal data from people or collude with parties who are less than trustworthy.  It still remains to be seen how safe TikTok can be for kids.

The app could be removed from app stores if it is not up to scratch in terms of its privacy policies, so there are real threats to whether it will continue to exist within the western hemisphere. The threat of this will surely lead to the app becoming more watertight and giving users a lot more security controls. If not, the days of cute cat videos on TikTok could be numbered.

Share This Article