Ouch! Newsletter – Email Phishing Attacks

How would you feel if your best friend turned on you? If email is your best friend you better know how to deal with it. Otherwise you could end up being betrayed. February Ouch! Newsletter teaches you how to avoid the pitfalls of email phishing attacks.

http://www.securingthehuman.org/blog/2013/02/06/feb-ouch-newsletter-is-out-email-phishing-attacks

To view this newsletter in a different language, click here.

Public WiFi – Convenient – But safe and secure?

public wifiPublic Wifi is available in many of our favourite coffee shops and restaurants. You may be greeted with a sign, “Free WiFi”. That is a convenient service that lets us check our email or surf the web while we eat or have a drink. But what surfing can you safely do there? Continue reading Public WiFi – Convenient – But safe and secure?

Ouch! Newsletter – Java

What is Java? Why is it on your computer and do you need it? Read about living safely with Java, or living wihout it, in January Ouch! Newsletter.

http://www.securingthehuman.org/newsletters/ouch/issues/OUCH-201301_en.pdf

Links to other languages are available here:

http://www.securingthehuman.org/resources/newsletters/ouch/2013

HTTP vs. HTTPS

In an age when security on the internet is of the utmost importance, secure transmission of data is often an issue especially financial or other sensitive information.
That is why websites will begin with either http or https.

WHAT is HTTP and HTTPS?

HTTP stands for “Hypertext Transfer Protocol”. Add the “s” and you have “Hypertext Transfer Protocol Secure”.
HTTP is a request-response protocol. This means that the server is answering a request for information, and sends it without controlling how it gets there.
HTTPS uses a series of communications between the client (for example, your computer) and the server (the computer which will send you the information) to be sure that you are sending your information to only the server and to verify the source of the information and to ensure its security by using Transport Layer Security (TLS) or its predecessor, Secure Sockets Layer (SSL).

Using your computer at the coffee shop? Check out Using Public Wi-Fi Continue reading HTTP vs. HTTPS

The Confidence Man

Many advancements in computer and internet security have been made. Anti-virus, anti-malware, firewalls, rootkits scanners, spam filters and much more have made it increasingly difficult for the bad guys to get into your computer and steal your information.

So they are the “confidence man” of the 21 century. The confidence man of the past would devise a scheme where he would get you to trust him, sometimes by posing as someone you already trust, like a friend, local official or  business person, and then get you to give them what they want, whether it be money, information, or whatever.

Today they are using technology to fool people into giving them what they want, which is usually based on the ultimate desire to take your money.

One of the modern tools is social engineering. Here is a great video of how to avoid some of the snares used by these people.

Thanks to www.securingthehuman.org

 

THE WEAKEST LINK

You are THE WEAKEST LINK!

No. Its not an insult or a put down. But it is about you. You are the weakest link in the technology chain. Strengthening that link is our goal. Check back for tips, tricks and methods to protect yourself against cyber thieves. We’ll do our best to explain how to keep secure and what to avoid. Also check The Learning Curve where computer technology is explained in everyday terms you can understand.

Need help? Make an appointment for Remote Support or Contact Us with your questions.