Tag Archives: data security

Microsoft to Store Data on DNA — 1,000,000,000 TB in Just a Gram

In Brief
Do you know — 1 Gram of DNA Can Store 1,000,000,000 Terabyte of Data for 1000+ Years.

Microsoft has purchased 10 Million strands of synthetic DNA, called Oligonucleotides a.k.a. DNA molecules, from biology startup Twist and collaborated with researchers from University of Washington to explore the idea of using synthetic DNA to store huge amount of data.

Microsoft is planning to

Cleaning Up Your Online Identity

Spring is here! Out with the old and in with the new – a new opportunity to put winter clothes away .Why not clean up your digital life as well?

In my previous blog, I talked about cleaning up your cell phone.  How about cleaning up your online identity?  It’s an important piece of your digital life.  Here are 5 steps to scrubbing your online identity:

  • Google Yourself – You are your own personal brand image. So what are people saying about you and what have you said that might be public? Google yourself to find out where you’re mentioned and what images have been tagged with your name.  Then you can work to clean up what you find.
  • Delete old email accounts – Are your friends receiving weird emails from you? Sometimes the source is that old email address you used a dozen years ago and never check now.  Your contacts are still in the account and vulnerable to hackers and the password you used back then is probably not as strong as it should be. Deleting old email accounts stops hackers from abusing your identity to attack your friends and family.
  • Review old social media posts – Determine if what you posted when you were 18 is still appropriate for you today and consider what an employer or even your kids might think when they see them. And it’s not just about you, if there are pictures of friends that may have been funny at the time, consider taking them offline as well.
  • Strengthen passwords – Use secure passwords to guard yourself against hackers and other vulnerabilities. There are free tools like Dashlane that help you manage your passwords and guide you to make them stronger.  Use different passwords on sites as you never know when your favorite e-retailer could get compromised and you don’t want your password making your whole digital life vulnerable.  For an added layer of protection, you should also turn on two –factor authentication so your smartphone can identify you with your fingerprint or with face recognition.
  • Scrub your history – your surfing history that is. Safeguard your personal information and your location online with a VPN (virtual private network).  VPN protects your data from snooping by encrypting it and it also stops snoopers on public WiFi networks from grabbing your data. A VPN will also hide your location preventing websites you visit from targeting with unwanted ads.  You can download a free one from HMA! here.
  • Check privacy settings – Now that the past is cleaned up, make sure your future posts are in check by managing the privacy settings across your social media platforms and online accounts. There may have been changes to the settings and privacy policies in recent product updates, so ensure you have the level of privacy protection that matches the level of your online activity.  Go and review the settings today.

Even though your online identity is squeaky clean, don’t wait until next spring to do a digital clean up.

To learn more about me and receive the latest news from AVG:

Follow me on Twitter @TonyatAVG

Follow AVG on Twitter @AVGFree

Cleaning Up Your Digital Life

Spring is here! The sun is shining, winter clothes are pushed to the back of the closet, and people are heading to the beaches and parks to embrace spring weather.  Well, at least here in California.

For many of us, we view spring as a time to purge and clean – out with the old and in with the new – a new opportunity to throw out old clothes or to make the garden look a little tidier.  So why not clean up your digital life as well?

Your phone may not be the first thing you think of when you think of Spring Cleaning but if your phone is like mine, then your entire life is on it!  Looking at my photos alone, I have 944 pictures.  Many of them are duplicates, as I always take more than one to make sure I get a good one and then I forget to delete them later.   If I go through them one-by-one it will be time consuming, not to mention that I’ll probably get distracted by messages and other notifications.

That why I recommend you install AVG Cleaner™ for Android™ from the Google play store.  It has a great photo cleaning app that identifies “bad” photos and allows you to review them the way you could review photos in some dating apps, swipe right to keep or left to reject.  It also shows duplicate photos and makes automatic recommendations.

Because photos contain a lot of data, it’s also a good time to review the settings on your phone to ensure that you don’t fall foul of publishing your location when you did not mean to.  Here are a couple things to keep in mind:

–        Photos can contain specific location information stored in metadata within the image itself.

–        The location data usually includes the precise GPS coordinates of where the photo was taken, as well as the time and date it was captured.

It’s an easy task to switch off the feature that allows location data to be stored in the photo.  Here are the steps:

  • Disable location services for the camera on your smartphone.
  • Be aware of location options in apps or online services and social media.

In addition to cleaning out photos, AVG Cleaner™ for Android™ also identifies apps and games that you don’t use, which allows you to delete them to save valuable space.  It also contains tools that give you data on which apps use the most storage, battery and data – all so you can make the decision whether to keep them.  In my phone, I deleted 13 apps; including a parking payment apps in cities where I visited one time and apps I downloaded once just to see what they do.

And of course, I can’t write a blog about cleaning up your phone without mentioning updating your antivirus.  If you have AVG AntiVirus for Android™, open it up to run a scan for viruses.  If you don’t have the app, you can always download it here.

Not only does cleaning your phone make the phone perform better but it’s like new again!  Mine is ready for the next round of stuff that I am going to load on it.  All I need is a new screen protector!

To learn more about me and receive the latest news from AVG:

Follow me on Twitter @TonyatAVG

Follow AVG on Twitter @AVGFree

 

 

 

Your money or your data!

The scene unfolds like a cyber thriller. You fire up your PC and a message appears saying your files have been encrypted. Your screen looks like it’s from the FBI. Sometimes it identifies itself as malware. Sometimes it’s a plain-text message. When you click around in your PC (assuming you still can), you find that your photos and text files are indeed unavailable.

The screen also asks for money. To get the key to unencrypt your files, you must pay, usually in some form of untraceable currency, such as bitcoin. In most cases, there’s a firm deadline when payment must be made. If you miss it, the fees shoot up. At some point, your files are permanently encrypted.

Welcome to the world of ransomware.

While this form of malware can slip into devices in any number of ways, phishing is probably the most common vehicle. Basically, bad guys send innocent-looking emails that ask recipients to click on a link or download an attachment. (Phishing is also used to ask for money directly. A tiny piece of software infects the machine and goes about encrypting files before demanding cash. Sometimes the message pops up automatically. Sometimes there’s a time delay or a switch that lets hackers turn it on when it’s convenient to them.

And sometimes attacks are big and bold. Two assaults on major hospitals in the US, for instance, used multipronged ransomware infiltration to shutdown key networks and records. But experts largely agree that most attacks are on individuals. Mass emailing allows criminals to take advantage of long-tail effects and the fact that many people would rather just pay a few hundred (or thousand) dollars to have their data – which many consider their life – returned to them rather than fight back through various law enforcement channels.

Data hostage taking is on the rise

Given the efficacy of ransomware, the number of attacks is set to grow. In its annual Threat Landscape report, published in January 2016, the European Union Agency for Network and Information Security (ENISA) characterizes 2015 as “the year of ransomware”. According to the study, the number of reported incidences nearly doubled in 2015 compared to 2014, with aggressive phishing campaigns a hallmark of many attacks. Targets tended to be in North America and Western Europe, as residents are perceived to have the money to pay.

ENISA also notes that 2015 was a year of innovation in ransomware development and deployment. The number of new ransomware types quadrupled in the first half of the year alone. Criminals have set up service centers, allowing the non-technical to buy crimeware-as-a-service, further expanding the reach of ransomware. And stealthier delivery methods are still being developed.

Do I know you? Did I ask for this?

Phishing is still the most common delivery method. Which is convenient, in a way, as there are some practical steps you can take to avoid getting scammed. Probably the most important is to maintain an online “stranger danger” mindset. If an email looks even the slightest bit suspicious, don’t open it. If it’s from someone you don’t know, don’t open it. If it says you’ve won the lottery, are being watched by some security agency, asks about an order (you did not make), or promises rewards in some other way, don’t open it. (Similar phishing attacks also appear on Facebook.)

For emails you’ve opened, if they include links or attachments you weren’t expecting or didn’t ask for, don’t click or download. If you feel that you must do either, reply to the sender (if you know them), and ask if they did indeed send you something. If you do not know the sender – delete the email.

And of course, you should build a fortress around your device. This is where AVG can help. We provide antivirus, link scanners, attachment and download checkers, enhanced firewalls, spam blockers, and file encryption to help keep your photos, videos, files, contacts, and devices safer. If you haven’t done so already, give us a try on your PC or Android phone.

This Android Malware Can Root Your Device And Erase Everything

A new Android malware has been making waves recently that have the capability to gain root access on your smartphone and completely erase your phone’s storage.

Dubbed Mazar BOT, the serious malware program is loaded with so many hidden capabilities that security researchers are calling it a dangerous malware that can turn your smartphone into a zombie inside hacker’s botnet.

Mazar BOT

AVG‘s Winning Game Plan for “Secure” Bowl Sunday

The biggest football game of the year is a big day for being online – whether you’re traveling to Santa Clara to watch it in-person or heading to a friend’s party (or two).  Either way, it’s important to protect yourself while you’re on your phone, and there is no doubt there will be a lot of social media activity from kickoff to half-time to when the clock reaches zero.

If you’re like the majority of us and don’t have a ticket to the game, you’ll most likely be watching the extravagantly funded commercials and your Twitter or Facebook feed from a friend’s house.  Here are some things to keep in mind while online.

  • Big events are popular among spammers:  Recognize spam as spam; meaning, don’t click on video links or open any attachments from unknown senders.  Only open emails from reputable vendors and people you know.
  • Watch out for fake offers: Don’t think you’re going to buy a last-minute cheap ticket.  They don’t exist!  If you are in the market for a ticket, only buy from a reputable ticket agent.
  • Be a REAL fan:  You only want official NFL gear, right?  Watch out for knock-off or unofficial team merchandise, as it will not look good after the first wash.  Only buy from a retailer you recognize.
  • Phishing for your money: AVG’s Web Threats Team found the top brands misused by scammers in phishing scams are payment systems like PayPal and American Express and logistics companies like UPS / FedEx  -all companies you might expect an email from if you bought tickets or merchandise online. Do NOT reply or send personal data to these fake emails.  They are trying to get your bank and other personal information.  If you have ordered and want to track the package, use the tracking option directly on the retailer’s site.

For the lucky ones who were able to get a ticket to the big game, you’re going to be in one of the most high-tech stadiums in the country!  It is Silicon Valley, right? Did you know that there are 1200 access points for WiFi at Levi Stadium?  That’s 1 WiFi point for every 100 seats!  Plenty of connection points for posting all those selfies!   Here are some tips for staying safe in the crowd: 

  • Turn off your phone and watch the game! You paid a lot of money for that ticket, so why do you want to watch it on a small screen?
  • Encrypt personal data: Access points at Levi Stadium are public but how do you know the access point you’re connecting to isn’t a criminal faking the WiFi name?  Download a free VPN like Hide My Ass! and encrypt your data.
  • Don’t advertise where you are to strangers: If you must post on social media, make sure you have your location settings turned off on your photos (geotagging) and don’t display your location.  You don’t want a burglar in your neighborhood knowing you’re at the game.  Your friends and family will know where you are when they see your photos. Just go to your phone “Settings”, find your camera app and turn off the location setting.
  • In case you lose your phone: Before you head to the big game, make sure you download anti-theft software, like AVG AntiVirus Pro for Android or make sure your anti-theft settings on your iPhone are active.  That way if you lose your phone or get pick-pocketed you’ll be able to disable, locate, or wipe it.

Stay safe at the game and have a great Sunday!!

World’s 25 worst passwords revealed! Is yours one of them?

According to this report, the world’s most used passwords from 2015 were “123456” followed closely by “password” itself. And to make matters worse, out of the Top 25 over a third (40%) were lazy combinations of those first two passwords.

Also on the list were shockers such as “solo”, “starwars” and even “princess” more than likely referring to the latest Star Wars movie that has been top of mind for many.

Perennial favorites like “qwerty” and “1qaz2wsx” also appear on the list, as people continue to think that using a pattern on their keyboard will thwart the cybercriminals – who, by the way, have known about that technique for years!

 

1 123456
2 password
3 12345678
4 qwerty
5 12345
6 123456789
7 football
8 1234
9 1234567
10 baseball
11 welcome
12 1234567890
13 abc123
14 111111
15 1qaz2wsx
16 dragon
17 master
18 monkey
19 letmein
20 login
21 princess
22 qwertyuiop
23 solo
24 passw0rd
25 starwars

 

Okay yes, I’ll put my hand up, I’ve been guilty of using one of these passwords myself – have you? But the important question is why we do it.

Having to think of a new and unique password these days is annoying and frustrating, especially when we’re all being told to create different passwords for every online account we have.  For some of us, that’s hundreds of accounts!

So what is the solution?  Here are some password tips.

  1. Watch this video on why you should never use the same password twice – and understand how you can “separate” a common password for use across multiple sites in a reasonably secure way.
  2. When thinking up a new password, learn about the four common mistakes that people make with passwords, as I explain in this video.
  3. Where available, especially for important accounts like Email, Banking and Facebook, consider activating “2-Factor” or “2-Step” authentication where you can – it’s no excuse for creating a lazy password, but it does add another layer of security.

Until next time, stay safe out there.

 

Top 10 — 2016 New Year's Resolutions for Cyber Security Professionals

Billions of dollars are spent in securing business operations, and yet attackers still find ways to breach a network.
With the ever increasing growth in security attacks across all threat vectors, you should consider these New Year’s resolutions to help solve your security challenges in 2016:Take stock of what you have
Segment your Network
Setup controls with ACLs
Secure protocols, network ports,

Avira starts lawsuit against adware distribution site

Avira has filed a lawsuit against the German Freemium.com download site for unfair business practices and misleading consumers into installing unwanted programs (PUA). We’re the first security vendor to stick up for customer rights and go directly after a software publisher.

The post Avira starts lawsuit against adware distribution site appeared first on Avira Blog.