Tag Archives: hackers

How to tell if your Wi-Fi network has been hacked

Wi-Fi networking is absolutely essential to the modern home. From smartphones to games consoles to intelligent thermostats like Nest, virtually every appliance now requires a wireless internet connection.

As a result, there is all kinds of valuable information being transmitted across your Wi-Fi network – credit card numbers, passwords and sensitive photos and files. Which makes your network a natural target for cybercriminals.

Introducing drive-by hacking

Because you can’t see wireless network signals, you cannot easily tell how far they reach. It is not unusual for your network to extend into the street outside your house – which provides an opportunity for hackers to get connected.

Using basic cracking tools, it is possible to bypass Wi-Fi network security in as little as 10 minutes. It may be that these hackers simply want to use your internet connection to get online – not as serious as stealing your sensitive personal information, but still stealing nonetheless.

So how do you know if your Wi-Fi network has been hacked?

The first sign that your Wi-Fi network has been compromised will probably be a general decrease in internet speeds. The more people connected to your network, the more problems you will have loading webpages or streaming videos

If you notice anything strange happening on your network, you must investigate. The first thing to check will be the Wi-Fi router itself.

The connected devices list

Log into your router using the username and password supplied when it was installed (they are often printed on a sticker on the rear of the unit). The specifics for each router are different, but you are looking for the Wi-Fi status page which lists all the devices that have connected, or are connected, to your network.

These details may be under a section called Attached Devices, Device List or Home Network for instance.

The list should look something like the image below (we’ve blocked out some of the most sensitive details):

pandasecurity-wifi-hacked

Have a look through the listing, looking for any devices that are unfamiliar. Any devices you don’t recognise indicate a hacker may have compromised your network security.

It is possible that some of the devices have “unfriendly” names that aren’t immediately recognisable, but which are completely legitimate. Make sure you check all of your Wi-Fi-attached devices before panicking!

Keeping Wi-Fi hackers out

There are a number of advanced techniques for improving your Wi-Fi network security, like locking down network access to pre-approved devices based on the unique MAC identifier. Far simpler, and almost as effective, is to simply choose a more robust security protocol.

The latest, most secure option is WPA2 as shown below:

pandasecurity-hacked-wifi

Just remember that if you do change the security protocol setting, you may have to reconnect all of your Wi-Fi devices – but that’s a small price to pay to prevent people cracking their way onto the network.

You should also add a second layer of security to deal with the eventuality that a hacker still manages to break in. A comprehensive security application installed on your PCs and Android phones will help prevent your personal data being stolen. This has the added benefit of blocking viruses and to protect younger members of your family from questionable web content.

Wi-Fi security is constantly evolving

you need to stay aware of what is happening on your network to keep the bad guys out. These tips will help you tell if something is wrong and help to formulate an effective response.

In the meantime, download a free trial of Panda Security to protect your PCs while you check your router.

The post How to tell if your Wi-Fi network has been hacked appeared first on Panda Security Mediacenter.

Black Mirror – How much is already real?

pandasecurity-black-mirror-threats
Warning – the following article may contain spoilers

What it’s true of Black Mirror?

Charlton Brooker’s Black Mirror television series has become something of a phenomenon thanks to its almost prophetic predictions about society and technology. Set in the very near future, Black Mirror borrows technology stories from the media, and imagines the worst possible outcomes to create a bleak view of the world that we are creating today.

What makes Black Mirror so compelling is that the storylines are simultaneously outlandish and plausible. More impressive is the fact that some of the predictions have actually come true.

As the third season of Black Mirror airs on Netflix, it’s time to consider how close to reality the latest round of predictions really are.

Episode 3 – Shut up and dance

Hackers take control of a Kenny’s laptop, and use the webcam to secretly film him in a compromising situation. Kenny then receives a string of ransom texts to his phone, demanding he follow the supplied instructions or risk the embarrassing video being leaked to his friends, family and the rest of the world online.

The reality is that malware already exists to hack into computers, activating the web cam remotely. And like most malware, you probably won’t even notice anything is wrong until you receive a ransom demand or similar.

To prevent being spied on, some people take the extreme step of taping over their webcam – a method favoured by Facebook CEO Mark Zuckerberg.

Just as effective (and much easier to manage) is to protect your computer with a robust antivirus application like Panda Security that can detect and block malware before it can install itself.

Episode 6 – Hated in the nation

The Metropolitan Police investigate the brutal murder of a journalist in London. All the evidence seems to point to the woman’s husband, but of the detectives assigned to the case suspects that social media may also play a part.

As more deaths follow, it is discovered that a swarm of robot bees has been programmed to kill anyone trending online with the hashtag #DeathTo. The mob mentality of social media users is unwittingly singling out individuals for death.

The robot bees may not yet exist, but the vicious hashtags that accompany each attack in Black Mirror certainly do. Cyberbullying is widespread, and really does cause lasting damage to the victim, leading to stress, depression and, in extreme cases, suicide.

Online bots that respond to trending hashtags already exist, helping to spread viral messages, or trigger specific actions for companies that monitor social media. The artificial “intelligence” to drive a swarm of robot bees is ready, even if the technology is not.

To avoid attracting the attention of trolls online, parents should consider installing a comprehensive internet security package like Panda Gold Protection (you can download a free trial here). This will allow you to block access to sensitive sites – including social media – protecting your family against simple, unintentional mistakes becoming headline (life-threatening) news.

Horrifyingly close to reality

Black Mirror makes for uncomfortable viewing – mainly because it is so close to the reality we know. The dire outcomes of each episode are just realistic enough to create a terrifying view of the future. Fortunately you can avoid starting some of these chains of events with some effective internet security software.

For more help and advice about staying safe online, please get in touch.

The post Black Mirror – How much is already real? appeared first on Panda Security Mediacenter.

Modern Day Fears – Don’t Let The Monsters Get You

pandasecurity-modern-days-fears-halloween-2It is this time of the year when we are all going to Halloween costume parties, playing pranks on each other and visiting haunted attractions. Why do we do it? Well, we want to ward off the evil spirits while having fun in the process. There is nothing wrong with that!

However there are plenty of scary things going on in real life too. Instead of going to Knott’s Scary Farm, turn on the TV. We’ve come up with a list of modern world fears. We sincerely believe that 10 years from now you will be more afraid of hackers in Eastern Europe than from going to the dentist. In the year 2025, the Bogeyman will no longer be after you, he most likely will be after your virtual reality goggles and your credit card information!

Here are a few things people are scared of this Halloween

DDoS-o-phobia

Early this week half the internet went down after an unprecedented DDoS attack. The attack was so big that people were unable to complain on Twitter, as Twitter itself was down. Experts say an army of smart fridges, webcams, DVRs and other IoT devices managed to ruin your Monday morning! This on its own sounds like the plot of a Hollywood blockbuster, a bad one obviously. The media reported that some manufacturers left their devices so vulnerable to hacking attacks that they now are having some of their products recalled.

Imagine telling someone, 20 years ago, that an army of smart fridges and webcams would cause a major disruption in people’s lives! They would probably have laughed and brushed you off as a joker. Today though it is reality and is a real threat to our everyday life. Twitter and Facebook are like electricity, people start panicking when these services go missing.

Hack-o-phobia

So far we’ve learned that there are millions of people literally begging to be hacked as they don’t have their cell phone passwords set. The good news is that the other 2/3 of the US adult population actually have their cell phone passwords set and they are not interested in giving it up easily. Monsters are scary, but sharing your precious moments and credit card information with complete strangers whose main purpose in life is to ruin yours, sounds even scarier.

People should be scared, especially if they are not doing much to prevent hackers from stealing information from their smart devices.

Cell-phone-damage-o-phobia

The dog used to be man’s best friend, now it is the smartphone! A recent study confirmed that every day we spend more than four hours staring at our smartphones. We’ve never been as reliant on smartphones as we are now. With this in mind, we are attached to our smartphones and one of our biggest fears is of damaging them, or even worse, having our device in the hands of people who want to take advantage of all the confidential information on it.

So before you start watching horror movies at home – turn on the news channel, the threat is real and your fears are justified. Be prepared, be very prepared… by downloading the best free antivirus software in the world.

Panda Security wishes you a very scary Halloween! Stay safe!

The post Modern Day Fears – Don’t Let The Monsters Get You appeared first on Panda Security Mediacenter.

Is it safe to connect to a public Wi-Fi hotspot?

Is it safe to connect to a public Wi-Fi hotspot?

Enjoy going for a drink at your local coffee store whilst getting some work done or browsing the web? With more and more cafes, bars and libraries these days resembling public workspaces and free Wi-Fi feeling like an essential part of daily life, it is very easy to go to a local café and feel at home.

But are public Wi-fi hotspots really safe places to browse the Internet or do we have to be on high alert anytime we’re online in a public place?

Let’s have a look at some of the dangers one faces when connecting to a public network:

Page Spoofing

 It’s easy to take for granted that a venue’s network actually belongs to that specific venue.

How many times have you sat down at a cafe and connected to the venue’s network at the click of a button? It’s this simplicity that hackers take advantage of when creating a malicious access point.

It’s very easy for an attacker to create a fake page that looks very much like the real thing. For example, when you sign up to the network you may be redirected to a Facebook sign in page. This could potentially be a fake, and entering your details would send them straight to the cyber attacker.

Luckily there are small indicators that can help us, on most occasions, to know if a page is definitely a fake.

Facebook for example, encrypts all data sent to its pages by connecting its users via SSL.

If any page that typically connects through SSL doesn’t show a padlock next to the page address it’s best not to give personal details!

Sniffing Apps

In an open network it is very easy for an attacker to capture the data traffic sent from your device. In fact, there are free easy to use apps, called “sniffing apps”, dedicated to this very purpose.

Although the common WPA2 routers do encrypt connections, these apps are capable of sniffing out the PSK (password). If an attacker does this they can then decrypt all traffic connected from a device to the network.

These risks have actually led police in Derbyshire in the UK to release a statement this month on the growing dangers of cyber crime:

“The UK now has more than 300,000 public Wi-Fi hotspots, which means more people than ever before are potential targets for cyber criminals, simply because they don’t know how secure the networks they’re using are.”

Third-Party Data Gathering

Sadly, even when you’re connected to a venue’s actual network you have no guarantee of privacy. In fact, venues often use their public Wi-fi hotspots to gather information about consumers.

Though third-party data gathering isn’t likely to end up with your passwords or your identity being stolen, your personal details are often being taken without your consent.

Whilst most venues directly ask a customer for an email address or number in order to access their Wi-fi, some go the extra mile of injecting cookies into your device’s network in order to track your browser history, typically resulting in an onslaught of targeted ads.

A great way to protect yourself against these attacks as well as against sniffing apps is to use a VPN (Virtual Private Network) service. This will ensure that all data traffic from your device is encrypted, whether the page you’re visiting is secure or not.

Another step that can be taken is to use a personal mobile broadband dongle, which, though slower, can be used in public spaces and is less likely to be compromised.

The best bet always, however, is simply to avoid sharing personal information, especially bank details, when on a public network. Stick to that principal rule and you should be ok.

Happy browsing!

The post Is it safe to connect to a public Wi-Fi hotspot? appeared first on Panda Security Mediacenter.

Yahoo Data Breach: Top 5 things you should do immediately

pandasecurity-yahoo-accounts-hacked

Yahoo’s biggest nightmare was confirmed yesterday – back in late 2014, a copy of certain user account information has been stolen from Yahoo’s network. The story started developing in early August when a hacker named “Peace” was openly trying to sell personal information of more than 500 million Yahoo account users on the dark web.

According to Yahoo, the account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords and, in some cases, encrypted or unencrypted security questions and answers.

Even though the breach happened two years ago it is not too late to take action, especially if you haven’t changed your password in a while.

Top 5 things you should do immediately

Change your password now!

It is as simple as that. Change not only your Yahoo password on your Yahoo account, but also review all your online accounts on which you’ve used the same or similar information. The sooner you do it, the better!

Turn on the two-step authentication that Yahoo offers.

Two-step verification uses both your password and an extra security code to verify your identity whenever you sign in to your account. If someone else tries to access your account, even if they can guess your password, they still won’t be able to get in without using two-step verification.

Pick better passwords.

We cannot stress more on the fact that using the same passwords for many accounts is not recommended. As you remember Yahoo are not the only one who’ve had similar issues. Back in 2014 eBay asked 145 million of their users to change passwords after a data breach. Changing your passwords often must be a habit!

Update your security questions immediately.

Yahoo says about 1 billion people globally engage with one of its properties each month. The chances your password is in the wrong hands are not minimal and the risk is real. Take action and don’t wait anymore, time is key here.

Go through old emails and remove sensitive content.

If your Yahoo account information is indeed for sale on the dark web, someone can hack into your email at any minute. There is tons of document scans, tax returns, credit card details and invoices that may be laying around your inbox. All these documents contain information you want to keep for yourself.

Remain vigilant! After Yahoo admitted the data breach you may be approached by fraudsters pretending to be someone they are not. It is important for you to not engage with online fee-based, toll-free-number services. Even though the incident happened nearly 2 years ago and you may be off the hook, we advise you to remain cautious and spend some time making sure you are fully protected.

The post Yahoo Data Breach: Top 5 things you should do immediately appeared first on Panda Security Mediacenter.

6 ways to protect your credit cards this holiday shopping season

Protect your credit cards from theft and fraud with these simple tips.

At this time of the year, your credit cards see a lot of action – online and at the stores. Credit card fraud takes place every day, but in the holiday shopping season you need to be extra diligent to keep cybercooks from getting hold of your cards and card numbers. Here are six easy tips that even the least tech-savvy among us can follow.

Christmas shopping online

Make it tough for cybercrooks to steal your credit card number

Keep a record of your cards

Some people scan their cards and save the copies on their laptop, others write all the numbers down and keep them in a safe place. Whatever method you choose, keep a record of your account numbers, their expiration dates and the phone number to report fraud.

Watch your accounts closely

When online shopping, it’s safer to use a credit card than a debit card. Credit cards come with consumer protections against fraud that debit cards do not have. Check your account regularly during the season for any strange charges and report the activity as soon as you can. Many companies have toll-free numbers and 24 hour service if you lose your card.

Another good practice is to use a single credit card for your online purchases. It’s easier to manage the account, as well as your holiday gift spending budget, without lots of other miscellaneous charges cluttering the statement.

Don’t use a public computer for shopping

Many web sites use cookies to save information that you input. On a public computer, you could accidentally leave your information accessible to the next user. Hackers could also install keylogger software that records your keystrokes, giving them access to usernames, passwords, and card numbers.

Avoid free Wi-Fi hotspots

It’s tempting to use a store’s free Wi-Fi to do price comparisons when you are out shopping. But you risk losing your personal information to hackers if you log on to an unprotected Wi-Fi. Our Avast research team recently set up some fake Wi-Fi hotspots to see how many people would connect and what kind of information they could collect. In only 7 hours, 264 people connected to the fake Wi-Fi network end generated 512,000 data packets. It’s just too easy for a hacker to have access to your data.

You can safely use a public Wi-Fi hotspot if you first connect to a VPN (Virtual Private Network). Avast SecureLine VPN is an easy way to hide all your online activities from prying eyes. You simply launch the VPN and it will connect to a nearby server and encrypt all data flowing in or out making it invisible to anyone outside.

Beware of phishing attempts

Email phishing attacks increase during the holiday season. Sophisticated cybercrooks design their emails to look like they come from legitimate companies. For example, you may receive a fake email from an online retailer or a shipping company such as UPS, DHL, or FedEx alerting you that your order did not process or cannot be delivered. A typical scenario is that they ask you to follow a link to a website where you can re enter your credit card information.

Do not click links in emails. You run the risk of malware infection, or voluntarily giving your card number to a crook. Instead, go directly to the website or call their customer service department.

Make sure the shopping site is trustworthy

Well known websites like Amazon or or large retailers are most likely safe. But the small, unknown websites could be riskier.

If you use Avast SafePrice extension in your browser, then you can trust the safety and integrity of the online shop, as well as getting the lowest price. Learn more about the extension in Can shopping extensions help you find the best prices?


 

Follow Avast on FacebookTwitterYouTube, and Google+ where we keep you updated on cybersecurity news every day.