dallas genealogical society technology special interest group · spyware • focused specifically...

103
Dallas Genealogical Society Technology Special Interest Group Thursday, January 8, 2015 Tony Hanson Webmaster Technology Special Interest Group Leader Director - Education

Upload: others

Post on 14-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Dallas Genealogical Society Technology Special Interest Group

Thursday, January 8, 2015

Tony Hanson Webmaster

Technology Special Interest Group Leader Director - Education

Page 2: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Personal Digital Security & Privacy

Tony Hanson Webmaster

Technology Special Interest Group Leader

Page 3: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

12/2014 3

Page 4: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

12/2014 4

Page 5: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

12/2014 5

Page 6: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

12/2014 6

Page 7: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

12/2014 7

Page 8: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

12/2014 8

Page 9: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

12/2014 9

Page 10: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Fraud is big (illegal) business

Credit Card Fraud is on the rise – Retailers computers systems are vulnerable – The US is still using 1950’s-era magnetic strips…

the rest of the world is using chip enabled smart cards (which are harder to reproduce)

Identity theft is increasing & more profitable – Fraudulent claims for insurance, Medicare,

Medicaid or to obtain drugs – Fraudulent tax refund claims

12/2014 10

Page 11: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

There is a way to eliminate the threat

1. Cancel all your credit cards 2. Get rid of your cell phone 3. Never use a computer

12/2014 11

Page 12: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

For the rest of us….

• Understand the existing threats • Learn how they can be minimized or

countered • Take steps to improve your personal security

and privacy

12/2014 12

(Tonight's objectives)

Page 13: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Why you’ll keep getting hacked

12/2014 13 http://money.cnn.com/2014/06/13/technology/security/hack-data-breach/

Page 14: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Don't like getting hacked? Sorry, you'd better get used to it.

Half of American Adults were hacked this year. How? Why?

– We’ve moved our lives online – Expanded data collection – Hackers are getting more tactical – Even boring data is now dangerous

12/2014 14

Page 15: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

What Are The Threats?

12/2014 15

Page 16: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Malware

12/2014 16

A broad term used to describe all kinds of undesirable, unwanted or malicious code.

Page 17: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Virus

• A piece of software that can copy itself and spread, just like a biological virus. This is the most recognizable term because it's been around the longest.

• It can infect different parts of a single computer or grow to infect multiple systems. In the past, viruses would destroy your data or cause other chaos. These days, they're a bit more refined.

12/2014 17 “12 security terms you need to know” by Kim Komando

http://www.komando.com/tips/12103/12-security-terms-you-need-to-know/all

Page 18: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Worms

• An advanced type of virus that replicates and spreads with little or no action on your part.

• You can get a worm as a Trojan (more on that in a bit) or from a drive-by download. If you're on the same network as a computer with a worm, it can infect your machine with little effort.

12/2014 18 “12 security terms you need to know” by Kim Komando

http://www.komando.com/tips/12103/12-security-terms-you-need-to-know/all

Page 19: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Botnet

• A collection of computers that has been infected with a specialized virus, usually a worm. The hacker that created the worm can control the infected computers, sometimes called "zombies."

• A botnet can send spam, launch attacks on websites, funnel stolen money around the world, or anything else a hacker wants. In fact, most of the spam you get is from botnets.

12/2014 19 “12 security terms you need to know” by Kim Komando

http://www.komando.com/tips/12103/12-security-terms-you-need-to-know/all

Page 20: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Trojan

• The most popular kind of attack online. Also called a Trojan horse, which makes sense if you know Greek mythology.

• Like the original Trojan horse, a computer Trojan looks like something good - a cool video or photo - but when you bring it inside your computer, it turns out to be malware.

12/2014 20 “12 security terms you need to know” by Kim Komando

http://www.komando.com/tips/12103/12-security-terms-you-need-to-know/all

Page 21: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Rootkit

• A more advanced version of a Trojan. "Root" in computer lingo almost always means increased or unlimited control. If a rootkit is installed on your computer, a hacker can do just about anything they want to your machine.

• Even worse, a rootkit can hide itself from your operating system and security software, making it hard to detect and remove.

12/2014 21 “12 security terms you need to know” by Kim Komando

http://www.komando.com/tips/12103/12-security-terms-you-need-to-know/all

Page 22: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Spyware

• Focused specifically on gathering information about you. It could be as serious as trying to find out your bank information or as minor as advertisers trying to grab your personal data for targeted ads.

12/2014 22 “12 security terms you need to know” by Kim Komando

http://www.komando.com/tips/12103/12-security-terms-you-need-to-know/all

Page 23: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Keyloggers

• A program that copies everything you type and saves it to a file or sends it to the keylogger's owner. Some can even take pictures of your screen or take over your webcam.

• Though keyloggers are technically spyware, they're so dangerous they get their own category.

12/2014 23 “12 security terms you need to know” by Kim Komando

http://www.komando.com/tips/12103/12-security-terms-you-need-to-know/all

Page 24: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Malvertising

Malicious software being delivered through on-line ads (a relatively new form of attack)

12/2014 24

Page 25: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Remote Access Trojans (RAT)

Software that enables others to take over your PC’s camera, record keystrokes and obtain your files.

12/2014 25

Page 26: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Ransomware

• Spooks you into surrendering your hard-earned cash. Sometimes called "Scareware," this nasty malware can take many forms.

• One common version is a fake anti-virus program that claims you have multiple viruses and need to pay for a full version of the program to get rid of them.

• Nastier versions take over your computer and accuse you of inappropriate activity such as viewing child porn or illegal fire-sharing. Some versions just claim to have encrypted all your files. Either way, the ransomware demands payment to give your system back.

12/2014 26 “12 security terms you need to know” by Kim Komando

http://www.komando.com/tips/12103/12-security-terms-you-need-to-know/all

Page 27: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Other Terms

12/2014 27

Page 28: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Drive By Download

When malware takes advantage of security flaws in your programs to download to your computer without your permission. All you have to do is visit a website that hosts the malware and your computer is infected.

12/2014 28 “12 security terms you need to know” by Kim Komando

http://www.komando.com/tips/12103/12-security-terms-you-need-to-know/all

Page 29: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Zero-Day Exploit

A serious security flaw that exists in a piece of software before it's released. If hackers can find and use it before the developer releases a patch, they can do serious damage.

12/2014 29 “12 security terms you need to know” by Kim Komando

http://www.komando.com/tips/12103/12-security-terms-you-need-to-know/all

Page 30: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Backdoor

A secret entrance to your computer that lets someone bypass your security. You won't even know they're inside! Backdoors come from program flaws or are intentionally built into software by the developer.

12/2014 30 “12 security terms you need to know” by Kim Komando

http://www.komando.com/tips/12103/12-security-terms-you-need-to-know/all

Page 31: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Phishing

An attempt to acquire information (usernames, passwords, credit card details) by imitating a trustworthy entity in an electronic communication. Usually widely distributed in the hope of tricking a small percentage or recipients.

– Can be a fake web site – Can also be sent as email

12/2014 31

Page 32: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

PUP

“Potentially Unwanted Program”

12/2014 32

Page 33: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

What Do They Want?

12/2014 33

Page 34: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Information About You

• Your name, address, phone number, SSN, etc. • Credit Card & Bank account numbers • UserID’s and Passwords to anything you have

access too • Your email (the source of much of the above

information) • Your email contacts (so they can try to scam

them too)

12/2014 34

Page 35: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

12/2014 35

Page 36: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

• Demanded $500 (in Bitcoins) within 1 week – Cost raised to $1000 the second week – Files would be destroyed after that that time

• They accepted her explanation of why her $500 payment was late

“They almost always honor what they say because

they want word to get around that they’re trustworthy criminals who’ll give you your files

back.”

“Welcome to the new ransomware economy, where hackers have a reputation to consider.”

12/2014 36

Page 37: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

5 signs you may have a computer virus

• Increased number of pop-up ads • Messages you did not send • You are locked out of your computer • Cannot access programs and tools

– Windows users: Ctrl – Alt – Del does now work

• Internet connection is slower than normal

12/2014 37

http://www.komando.com/tips/12164/5-signs-you-have-a-computer-virus/all

Page 38: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

4 Lessons from a Hack: My Airline Miles Were Stolen

“Hack Lesson #1: If a site or app behaves oddly, you should pursue it, sooner rather than later. If something seems odd, some thing is odd.” Dan Rosenbaum Yahoo! Tech December 27, 2014 https://www.yahoo.com/tech/4-lessons-from-a-hack-my-airline-miles-were-106263365844.html

12/2014 38

Page 39: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Things you can do to minimize the threat

12/2014 39

Page 40: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

• Keep Software Up To Date • Use Anti-Malware Software • Always Be Suspicious • Don’t Trust Public Wi-Fi • Smart Answers to Security Questions • Let Technology Help • Use Two Step Verification • Good Password Habits • Tighten Up Social Media Settings • Use HTTPS • Suspect Flash Drives • Don’t Keep Sensitive Information • Prepare NOW for the worst case scenario 12/2014 40

Page 41: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Keep Software Up To Date

• Older software has well understood weaknesses that can be exploited more easily

• New software (and software patches) frequently correct these weaknesses

• Be especially diligent about Windows, Browsers, Flash and Java are these are frequent targets

12/2014 41

Page 42: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

12/2014 42

http://whatbrowser.org/

Page 43: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Use Anti-Malware Software

These products protect you in a variety of ways: – Check email for threats – Scan files for threats – Identify questionable or dangerous sites in your

web browser – Check flash drives – Some (increasingly) also protect mobile devices

12/2014 43

Page 44: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Anti-Malware (a.k.a. Anti-Virus)

• There are good products available for free • Fee versions usually offer more features • Keeping these (the program and the

definitions/databases they rely on) up to date is crucial!

• Re-examine your choice annually as the threats, and the software products, change rapidly

12/2014 44

Page 45: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Which one is best?

• The Difference Between Antivirus and Anti-Malware (and Which to Use)

– http://lifehacker.com/the-difference-between-antivirus-and-anti-malware-and-1176942277

• The Best Antivirus for 2015 – http://www.pcmag.com/article2/0%2c2817%2c2372364%2c00.asp

• The Best Free Antivirus for 2015 – http://www.pcmag.com/article2/0,2817,2388652,00.asp

• The Top 10 Antivirus Software – http://www.top10antivirussoftware.com/

12/2014 45

Page 46: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

AntiVirus

Top Products Recommended by PC Magazine – Webroot SecureAnywhere Antivirus (2015) -

(Mac, Windows and iDevices) – Bitdefender Antivirus Plus – (Windows Only) – Kaspersky Anti-Virus (2015) - (Windows Only)

12/2014 46

Page 47: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Free Antivirus Software

• PC Magazine recommends these two: – Malware Anti-Malware 2.0 – Panda Free Antivirus 2015

• “Stay Protected From Every Type Of Malware With Avast Free Antivirus” – MakeUseOf’s Recommendation – http://www.makeuseof.com/tag/stay-protected-every-type-malware-avast-free-antivirus/

12/2014 47

Page 48: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

What about Firewall Software?

• Windows users have a good product incorporated into Windows

• Unless you are a power user or security expert it is sufficient

• See “Why You Don’t Need to Install a Third-Party Firewall (And When You Do)”

– http://www.howtogeek.com/165203/why-you-dont-need-to-install-a-third-party-firewall-and-when-you-do/

12/2014 48

Page 49: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

What about Mac’s?

Security shipped with you Mac – Gatekeeper (prevents you from loading anything

not obtained from the Mac App store) – Sandboxing – limits programs access to the rest of

the system – XProtect (File Quarenting) – anti-malware

program you did not know you had

12/2014 49 http://www.makeuseof.com/tag/think-mac-virus-3-ways-can-tell/

Page 50: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Always Be Suspicious

• Don’t open attachments unless you know where they came from – Big name companies will rarely send you

attachments in email – Scan them or delete them

• Don’t use web links provided in email – They may take you to a fake site – Navigate to the company web site using your own

links

12/2014 50

Page 51: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Phishing

What to watch for: • The ‘From’ address • Poor grammar • Bad Formatting • In-Body Links • Non-Corporate Phrases • Unsolicited offers/requests • It seems too good to be true

12/2014 51

Page 52: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

-----Original Message----- From: Bush Wave [mailto:[email protected]] Sent: Sunday, December 14, 2014 6:21 PM Subject: Job Offer Hello, I am Bush Wave, Recruitment Specialist with Sights On Service Inc. “We have a mystery shopping assignment in your area and we would like you to participate". Secret Shopper® has been in business since 1990. We are a charter member of the Mystery Shopping Provider's Association (MSPA), the professional trade association for the Mystery Shopping industry. ...

Kindly Fill Out the application form below and we will get back to you shortly with the assignment: PERSONAL INFORMATION: First Name: Middle Name: Last Name: Street Address: City, State, Zip Code: Cell Phone Number: Home Phone Number: Age: Current Occupation: Email Address: 52

Page 53: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Don’t Trust Public Wi-Fi

• Honeypot Wi-Fi networks – Fake WiFi site set up by hackers – Once connected, they can probe your PC for

exploitable weaknesses or redirect you to a malicious web site

• Packet sniffing – Device that allows hackers to view what you are

typing and viewing • Shared folders

– If your has public/shared folders they may be available for others to view

12/2014 54 3 ways crooks attach on public Wi-Fi

http://www.foxnews.com/tech/2014/10/03/3-ways-crooks-attack-on-public-wi-fi/

Page 54: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Good Public Wi-Fi Habits

• Save sensitive surfing for home • Don't automatically connect to Wi-Fi networks • Use security software • Look over your shoulder • Use the App instead of connecting with a

Browser • Turn off sharing

12/2014 55

“Share nothing and don’t be nosy” Kim Komando

3 ways crooks attack on pubic WI-Fi

Page 55: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Windows 7

12/2014 56

Page 56: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Mac

• System Preferences >> Sharing – Un-Check all of the sharing boxes – You will need to un-do this when you return home

and want to share you files again

12/2014 57

Page 57: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Smart Answers to Security Questions

Good passwords are important, but this apparently is the area most hackers use to hack into sites

– How hard would it be for you to identify my mothers maiden name?

– There are a relatively small number of possible answers to questions like:

• ‘What was your first car’ or ‘What is your favorite color’? – Many answers are publicly available from social

media profiles

12/2014 58

Page 58: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Alternative Answers

Start using unpredictable answers to questions

– What is your favorite color? • chardonnay

– What was the name of your high school mascot? • uncle buck

– What was your mothers maiden name? • strawberry icecream

12/2014 59

Page 59: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Tighten Up Social Media Settings

• Don’t reveal too much about yourself outside your circle of friends – Information can be used to guess answers to

security challenges

• See “Step-by-step guide to lock down your Facebook profile” for step by step instructions http://www.komando.com/tips/12299/step-by-step-guide-to-lock-down-your-facebook-profile/all

12/2014 60

Page 60: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Let Technology Help

• Register your Smartphone with critical accounts and allow them to send you alerts and notifications

• Especially with Banks

12/2014 61

Page 61: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

12/2014 62

My Christmas Eve Present!

Page 62: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Use Two Step Verification

• Adds a second layer of authentication to the login process

• When accessing an account with this protection, it will send text message containing a string to the cell phone associated with the account

• You must enter the code before you will be granted access

• Available on Amazon, Twitter, LinkedIn, Facebook and Google

12/2014 63

Page 63: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Google Two Step Authentication

12/2014 64

Page 64: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Passwords for Programs

12/2014 65

Page 65: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

12/2014 66

One-Time (first time) authentication

required for Outlook and on my iPhone

Page 66: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Can Be Enabled on Facebook

12/2014 67

Page 67: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Bank’s Use This Too

• Chase asks you to register you cell phone number with them

• They will use this to contact you if they detect suspicious activity – This helps them quickly identify fraudulent

transactions – It also prevents them from wrongly disabling your

card when you use it in an unusual location (i.e., vacation!)

12/2014 68

Page 68: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Accessing From A New Device

12/2014 69

Page 69: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Good Password Habits

It is important to develop good password habits • Strong passwords • Unique for each site • Changed frequently

12/2014 70

Page 70: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Strong Passwords

• Combination of the following: – Letters (A -> Z), UPPER CASE and lower case – Numbers (0 -> 9) – Special Characters (anything not a letter or a number)

• 8 – 12 characters in length • Should NOT contain:

– Words found in a dictionary – Predictable strings

• 123 • User ID • Birth Date

12/2014 71

Page 71: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Unique for each Site

• It is a bad idea to use the same password on multiple sites

• If one site is compromised, hackers will try that password on other sites – This is becoming an increasingly common line of

attack

12/2014 72

Page 72: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Changed Frequently

• The frequency may depend on the sensitivity of the information on the site – Sites that have financial and personal information

should have stronger (longer and more complex) passwords that are changed more frequently

– Sites with less sensitive information can be changed less frequently with less risk

– You should be prepared to change all passwords quickly if you suspect that you have been hacked or compromised

12/2014 73

Page 73: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Password References

• Don't make these common mistakes with your passwords

– http://www.komando.com/tips/9092/dont-make-these-common-mistakes-with-your-passwords/all

• How To Create Strong Passwords That You Can Remember Easily

– http://www.makeuseof.com/tag/how-to-create-strong-password-that-you-can-remember-easily

12/2014 74

Page 74: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Consider a Password Manager

• The number of sites requiring passwords is increasing

• The frequency of major hacking events is also on the increase

• Doing ‘the right thing’ is getting harder to do • Many security experts are now recommending

the use of commercial password management software to help you manage your passwords

12/2014 75

Page 75: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Advantages of using Password Management Software

• Creates strong passwords • Facilitates frequent and rapid changes • Minimizes redundant password use • Bypasses keyloggers • Avoids Phishing scams • Keeps Passwords secret

12/2014 76

Page 76: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

How to use a Password Manager?

1. Let it manage all sites 2. Let it manage your less critical sites

– You continue to manage your really important, critical sites that have financial or personal information

– Let the password manager take care of all the other sites

– This greatly reduces the number of sites and passwords that you need to keep track of

12/2014 77

Page 77: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Choosing A Password Manager

• There are several good free packages • Moderate fee’s provide better features • Two packages that are consistently rated

highly: – Lastpass 3.0 – Dashlane 3

12/2014 78

Page 78: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Reviews

Like anti-virus software, the ratings on these change frequently as new versions are released… • 2015 Best Online Password Manager Reviews

– http://online-password-manager-review.toptenreviews.com/

• The Best Password Managers – http://www.pcmag.com/article2/0,2817,2407168,00.asp

• Review: The best password managers for PCs, Macs, and mobile devices

– http://www.infoworld.com/article/2607798/security/review--the-best-password-managers-for-pcs--macs--and-mobile-devices.html

12/2014 79

Page 79: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Use HTTPS

• HTTP sessions are the backbone of the internet, but they are not secure – Vulnerable to a “man in the middle” attack, which

may expose you to malicious monitoring or to being re-directed

• HTTPS sessions are more secure, are becoming widely supported and should be used whenever available

12/2014 80

Page 80: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

12/2014 81

https://www.yahoo.com/tech/s/google-mark-http-pages-insecure-134003394.html

Page 81: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

How do you know?

12/2014 82

Page 82: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

HTTPS Everywhere

• HTTPS Everywhere is a browser add-on that will automatically force web sites to use HTTPS if it is available (and it provides other security features) – Available for Chrome, Firefox and Opera – https://www.eff.org/https-everywhere/faq

12/2014 83

“As of early 2012, the Safari extension API does not offer a way to perform secure rewriting of http requests to https.”

Page 83: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

You Still Won’t Be Invisible….

“Perhaps most alarming, the NSA seems to have completely circumvented the HTTPS system, which is used to secure connections between websites and browsers. By late 2012, the agency expected to be able to intercept 10 million HTTPS connections per day.” New documents reveal which encryption tools the NSA couldn't crack Russell Brandom The Verge http://www.theverge.com/2014/12/28/7458159/encryption-standards-the-nsa-cant-crack-pgp-tor-otr-snowden

12/2014 84

Page 84: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Suspect Flash Drives

• They can be used to distribute malware • You anti-malware software should scan them

for you…

12/2014 85

Page 85: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Don’t Keep Sensitive Information

• If you send sensitive information via email delete the message from your sent file – Hackers frequently scan these files looking for this

kind of information • Keeping sensitive information in files not a good

idea – Lists of passwords, banking/credit card information – Consider encrypting such files if you to need them – See “How to encrypt (almost) anything”

• http://www.pcworld.com/article/2025462/how-to-encrypt-almost-anything.html

12/2014 86

Page 86: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

How to Delete Something Permanently From Your Computer

Your computer's trash bin only removes a file from your desktop. And even if you empty the trash bin, it only deletes the virtual pathway to it. The file is still saved in your hard drive, but now it's just more difficult to access.

– Eraser (Windows) – CCleaner (Windows) – Secure Empty Trash (Apple)

12/2014 87 http://mashable.com/2014/07/14/delete-files-permanently/

Page 87: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Don’t log in as Administrator (Windows)

• The administrator has the ability to install and modify software

• Malware will take advantage of this capability to install its own code

• If you are using a non-admin account you will be asked to provide the admin password before this can occur

12/2014 88

Page 88: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Get Smarter Credit Cards

12/2014 89

Page 89: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

• Chipped cards are more difficult/expensive to duplicate (equipment currently costs ~ $1 Million)

• Already in use in much of the rest of the world • Retailers must accept these cards starting in

2015 or “bear the legal burden of future credit card breaches”

• Apple Pay runs on the same security model as these cards.

12/2014 90

Page 90: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Prepare For The Worst Case

12/2014 91

Page 91: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Keep Current Backups

There are three components to an effective backup strategy: • Local copy/copies

– Easy to do, convenient to have • Off-site copy/copies

– Protection against local disaster • Off-Line copy/copies

– Cannot be accessed/modified/infected by malware

12/2014 92

Page 92: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Off-Line Copies

• Disks • Flash Drives • USB or NAS devices

– Only attached to/accessible by your system while you are actively making backups

– Powered off or disconnected except when actually making backups

12/2014 93

Page 93: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Make a System Repair Disk

Floppy disk or CD/DVD that will allow you to re-boot you PC if: • Use it if your Hard Disk has failed • Use this if your system has been hacked,

infected by a virus or hijacked by ransomware – May be able to clean up your system this way

http://windows.microsoft.com/en-us/windows7/create-a-system-repair-disc

12/2014 94

Page 94: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Recovery Software on a Flash Drive

• The industry seems to focus on Malwarebytes Anti-Malware and HijackThis as the go-to tool when a systems is severely infected

• I now keep a copy of these programs on the flash drive I use on a regular basis – I make it a point to update it monthly to be sure it

(and its virus definitions) are up to date

12/2014 95

Page 95: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Good to know if you are hacked (From “10 Network Security Tools and Tests Everyone Should Use”)

• Malwarebytes – https://www.malwarebytes.org/

• HijackThis – http://www.hijackthis.com/

• Microsoft’s Windows Defender Offline – http://windows.microsoft.com/en-us/windows/what-is-windows-defender-offline

12/2014 96

Page 96: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Advanced Reading

“A Universal Guide To PC Security” – This is a good overview to help you get grounded http://www.makeuseof.com/tag/hackerproof-your-guide-to-pc-security/

12/2014 97

Page 97: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Additional Software Tools

If you are interested in advanced tools you can use to secure and clean up your PC look for this article:

– “10 Network Security Tools and Tests Everyone Should Use” by James Michael Stewart

– It is available as a free PDF file

12/2014 98

Page 98: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

12/2014 99 http://promos.mcafee.com/offer.aspx?id=797115&culture=EN-US&cid=161311

Page 99: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

The Secret Life of Passwords

• This is a really interesting, non-technical article about how and why we choose the passwords that we do.

– http://www.nytimes.com/2014/11/19/magazine/the-secret-life-of-passwords.html?_r=0

12/2014 100

Page 100: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Keep Software Up To Date Use Anti-Malware Software Always Be Suspicious Don’t Trust Public Wi-Fi Smart Answers to Security Questions Let Technology Help Use Two Step Verification Good Password Habits Tighten Up Social Media Settings Use HTTPS Suspect Flash Drives Don’t Keep Sensitive Information Prepare NOW for the worst case scenario

12/2014 101

Page 101: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Questions?

12/2014 102

Page 102: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

Thank You!

12/2014 103

Tony Hanson Webmaster

Technology Special Interest Group Leader

Page 103: Dallas Genealogical Society Technology Special Interest Group · Spyware • Focused specifically on gathering information about you. It could be as serious as trying to find out

http://www.dallasgenealogy.org