Archive for the ‘Twitter’ Category


1. Secure your WIFI connection

secure your digital life from hackersHome users are particularly prone to leaving their routers open without passwords, in order to make sure that you’re protected check your router settings to verify whether encryption is turned on or not. leaving access unencrypted can be just a minor issue of bandwidth being stolen by unauthorized users freeloading off your connection to more serious cybercrimes like credit card fraud or hacking taking place using your internet connection, which may be traced back to you.

The majority of routers support encrypted connections, support either WEP or WPA/WPA2, always opt for WPA/WPA2 as it’s far more secure. If you have the option hide SSID broadcast, turn that on as well, it basically allows you to make your wireless router invisible to outsiders and they need to know your SSID to access the network.

2. Encrypt your hard drive

secure your digital life from hackersIt’s important to keep your data secure in case of loss of hardware or even theft. An encrypted hard drive basically prevents its contents from being access without the password. It is obviously more important to encrypt thumb drives and laptop drives. Windows 7 Ultimate and Business editions come with a built in hard drive functionality using a software called BitLocker which will encrypt your entire hard drive, but users with Home Premium or Basic users shouldn’t feel left out as there is a free way to encrypt your hard drive using trucrypt.

Mac users can use FileVault to encrypt their folders, and OSX Lion will allow you to encrypt your entire hard drive as well.You can also get hardware encryption which will use fingerprint recognition to unlock data inside the drive like the Lacie Rugged Safe.

3. Keep your software updated

secure your digital life from hackersIt’s a given that you need to keep your operating system, antivirus and web browser up to date in order to protect yourself from exploits, and if you haven’t got automatic update turned on for them, you should do it now.

However a lot of users often overlook other software such as Acrobat Reader, Flash, Java and iTunes when it comes to keeping software updated. It’s important to realize that many of these applications have direct access to the operating system, and an exploit in these applications can be used as a gateway into your system files. Flash and Acrobat are used heavily with web browsers which is the number one source of malware infections.

4. Upgrade your antivirus suite.

secure your digital life from hackersIt’s as important to keep your virus suite updated as much as it is to keep your virus definitions updated. The reason for this is because antivirus software evolve in the way they deal with malware, such as introducing heuristic technologies which identify common traits of viruses, the way they interact with the system and actively block these scripts. This is why having an outdated antivirus software, despite updated virus definitions may not provide the best possible protection. If you’re using an older version of antivirus software you may entitled to discounted upgrades to newer versions.

5. Secure your smartphones

secure your digital life from hackersMany people completely overlook this fact, but smartphones are essentially mini computers which hold swathes of personal information about you. They often hold logins to your facebook/twitter accounts which are set on auto login, online banking and other financial information as well as access to email. If someone gets hold of all these details it can cause a lot of stress and havoc to your life.

It’s vital to keep your devices with password lock activated, additionally you should take some precautionary measures in case you lose your device.

Apple has a very cool security software called Find my iPhone which is a free app by Apple, which lets you track your phone by GPS, lock and remotely delete data from it. You can even use it just to locate your iPhone if you misplace it, causing it to sound an alarm.

For Android users it’s important to stay protected, smartphones are just as vulnerable to viruses as a PC, although the android platform is more prone to them than apple due to the open platform nature of the former. Android phones require antivirus protection, all the popular desktop antivirus brands offer android support as well.

The app store is less prone to malware due to the fact that all apps are vetted by Apple before publishing, although if you’ve jail broken your iPhone, antivirus protection may be something you need to look at.

6. Vet web page links using a link checker

Cyber criminals are using sophisticated strategies to drive users onto their web pages, increasingly innocent websites are being targeted using exploits to find security holes to hack and implant code on them which can launch JavaScript applications and infect computers when users visit the infected site. Link checkers scan links on your search results and optionally other websites and indicate whether links are safe, websites are scanned by their own servers so it does not impair your computer performance. Link checkers are available with most anti malware security suites such as with AVG, McAfee and Symantec.

7. Laptop Security for mobile workers

secure your digital life from hackersLaptops thefts are common, and are easy targets due to their transportable nature. If you work away from your office it’s important to invest in a Kensington Lock. While a lock won’t prevent trained thieves armed with cable cutters, it will prevent opportunistic thieves which is the overwhelming majority of laptop thefts.

It’s also important to keep prying eyes away from your data, always password protect your login, and when leaving your laptop unattended, using the screen lock feature in Windows to prevent unauthorized users from looking at or accessing your information.

If you work with particularly sensitive data a privacy screen may provide an added level of protection, the screen is only viewable to the person sitting directly in front, so people sitting around you cannot look at your screen. Targus and 3M are well known for producing privacy screens for all manner of monitor sizes.

8. HTTPS encryption for websites

secure your digital life from hackersMost people are well informed with the necessity of using https secure connections with online shopping when entering sensitive personal information. However, it can be argued that websites like facebook, twitter, gmail and others hold equally sensitive information about you.

Did you know you can elect to use https secure connections on these websites? For case by case uses, you can insert a ‘s’ after the http on the web address, if there isn’t one already to access the site securely. However if you want to access the sites securely every time you visit, you can login select the option to always use https in the profile settings.

9. Use online backup to keep an offsite storage of your files.

secure your digital life from hackersA great way for mobile workers to keep data kept safe and secure while on the move is to use online backup, this provides great peace of mind if your computer gets lost, as it allows you to recover your files from the cloud. Online backup services like Sugar Sync also provide users with high level synchronization features which can be used as a great time management tool as well, as it keeps data across all your computers consistent and up to date. You can look up various online backup reviews here to compare their features and read up user reviews.

10. Avoid public wifi and public computers.

Using public computers can be incredibly risky as malware and key loggers can be installed to track your keystrokes and cached files in order to gain access to your private information.

secure your digital life from hackersAdditionally, public wifi connections can be risky as the servers can be breached with malware additionally phantom hotspots can be set up which appear like legitimate hotspots, but are actually other ordinary laptops which act as a middleman eavesdropping into the connection.

An example on how cached data can be hijacked to login to your web accounts can be demonstrated using FireSheep.

Thankfully mobile 3G internet connections are becoming more affordable, and are often faster than public wifi hotspots. 3G connections are far more secure, additionally you may be able to tether your Smartphone internet connection to work on your laptop. I hope this article helped you all for sure. And do follow these above 10 steps and secure your digital life from hackers.


3 hours ago

Anyone else seeing an influx of blog headlines that go “Updated: [Thing That We Just Wrote About] Is A Hoax”?

While Internet hoaxes have been around since the Soviet Union wanted to join Usenet in 1984 (remember LonelyGirl15?), we’ve had quite a few doozies this week, from the woman who got a tattoo of 152 of her Facebook friends on her arm, to the eHarmony user tearing upover her love of cats, to the kidnapped lesbian Syrian blogger turning out to be a not kidnapped married guy in Scotland. Heh.

People have always been gullible, and gullible people having access to methods of dissemination like Facebook and Twitter only turns their folly up to eleven. But aren’t we as reporters paid to be filters of news, in essence paid to know better? Then why the rampant media coverage of every single one of these hoaxes?

The only answer I can come up with is that the demands of churnalism (or the recently dubbed “hamsterization” of journalism) and the quest for advertising traffic are only increasing for bloggers as more and more readers spend more and more time and money online.  This begs the question: How many of us uncritically posting on incredulous rumors and unverified viral stories are cynically calculating how even more traffic will inevitably come from our correction posts (“Update: This Was A Hoax, Again”)?

Perhaps the more innocent among us are fooled by the fact that the Internet has also increased the amount of ridiculous but true news. Media frenzies like #Weinergate and Sarah Palin’s description of Paul Revere’s ride remind us that there is plenty of bona fide news that people wish was fake, making the tech media landscape pretty much a crapshoot for bloggers focused on speed.

Even we covered that Facebook Friends tattoo story as if it were serious news. And how I wished that that story were real, letting me transform it into some bloated pseudo-intellectual weekend think piece about the ephemerality of online friendships and the quest for permanence in a digital age. Instead you guys get this.

It was only after I discovered that the  YouTube user account only had uploaded one video prior to “My Social Tattoo” and any kind of identifying details about the poster were nowhere to be found did I drop it as a viable source for reblogging, moving on (quickly as always) to the next source of news. But man, like everybody else, I wanted to believe that some idiot got this breathtakingly dumb tattoo. I mean it could happen, right?

In 2011 a retweet can function as the online equivalent of gawking at a car crash, even when the story seems too good (or more likely, bad) to be true. Perhaps this is why the hashtag#SeriouslyMcDonalds was a trending topic this morning, after a sign mandating African American McDonald’s patrons pay a $1.50 surcharge went viral.  Even McDonald’s Twitter account quickly declared this a “hoax”, but the #SeriouslyMcDonalds hashtag continues to appear in around 20 tweets a second.

Perhaps the most interesting hoax story to come out of an slow summer week  otherwise filled with Apple news, was the tale of a David Voelkert, who was arrested after his ex-wife lured him into revealing his plans to murder her, by posing as a teen admirer on Facebook.

While the initial wave of stories were along the lines of “Man Arrested After Wife’s Facebook Teen Ruse SHOCKER ,” the updates to the story provided a very interested interesting twist, as it turns out that Voelkert suspected that his wife was behind the fake profile and went to a notary in order to prove himself innocent before sending the otherwise incriminating messages.

Voelkert did what we bloggers should be doing more of, taking what happens online with a grain of salt. Granted, he probably had way more time.


British Soccer Star Sues Twitter Over Privacy Issue

For weeks, British tabloids were prohibited from outing a soccer star who allegedly had a longtime affair with former supermodel and reality-TV star Imogen Thomas. It was due to something issued by British courts called a “super-injunction,” which many British celebrities and personalities obtain, so salacious personal details aren’t published by the papers.

Of course, information wants to be free, so that little roadblock didn’t hold back the aptly named @InjunctionSuper, who went public with the allegation May 8 with the above-mentioned tweet. Now the soccer player (still officially unnamed) has turned to the courts yet again, this time with a decidedly harsher legal action.

In papers filed Wednesday with the High Court, an individual identified only as “CTB” sued the social media giant and at least one anonymous user for violating the super-injunction. Of course, after @InjunctionSuper’s tweet, many media outlets began relaying the information.

Ryan Giggs, who’s named in the reports, is one of the most decorated players in the history of Manchester United, the most valuable sports franchise in the world and Britain’s most legendary soccer club.

London-based lawyer James Quartermaine told Bloomberg that there’s little chance Twitter will cooperatewith the suit, even though the British courts claim worldwide jurisdiction. Twitter is headquartered in San Francisco.

“Twitter will probably just ignore it and consider it to be offensive to their First Amendment rights,” he said. “It’s probably an attempt to try and show that actions have consequences in cyberspace.”

Twitter has so far refused to comment on the legal proceedings.


U should Fear The Government Instead Of Hackers

I think this post will interest the people who thought that they are save be’cos they have passwords to login into their Social Networking Sites. Well U are dead wrong. Hackers are the least u should worry about. Those u need to fear are the United States Government. To me They have control over Everything that goes on on the internet. There is no privacy with Computers now a days so stop worrying about computer hackers breaking into ur accounts rather worry about the damed fucking government. leave the Hackers alone be’cos one day u will need their help. Belife me when i say one day. Be’cos that day is almost near.
Guss u’have been watching those tech movies, u see wht the governments do in this movies. Well this movies are not just made they are messages and i think we should all try to listen other than criticize Hackers be’cos when that day comes u will be rashing to learn how to hack to be able to protect ur self. When we come to security hackers have the tight security be’cos they beak them so they make sure that theirs is unbreakable.


Social Network Analysis

One common form of surveillance is to create maps of social networks based on data from social networking sites such as Facebook, MySpace, Twitter as well as from traffic analysis information from phone call records such as those in the NSA call database[38], and others. These social network “maps” are then data mined to extract useful information such as personal interests, friendships & affiliations, wants, beliefs, thoughts, and activities.

Many U.S. government agencies such as the Defense Advanced Research Projects Agency (DARPA), the National Security Agency (NSA), and the Department of Homeland Security (DHS) are currently investing heavily in research involving social network analysis.[43][44] The intelligence community believes that the biggest threat to U.S. power comes from decentralized, leaderless, geographically dispersed groups of terrorists, subversives, extremists, and dissidents . These types of threats are most easily countered by finding important nodes in the network, and removing them. To do this requires a detailed map of the network.

Jason Ethier of Northeastern University, in his study of modern social network analysis, said the following of the Scalable Social Network Analysis Program developed by the Information Awareness Office:
The purpose of the SSNA algorithms program is to extend techniques of social network analysis to assist with distinguishing potential terrorist cells from legitimate groups of people … In order to be successful SSNA will require information on the social interactions of the majority of people around the globe. Since the Defense Department cannot easily distinguish between peaceful citizens and terrorists, it will be necessary for them to gather data on innocent civilians as well as on potential terrorists.
—Jason Ethier[41]

AT&T developed a programming language called “Hancock” which is able to sift through enormous databases of phone call and Internet traffic records, such as the NSA call database and extract “communities of interest” — groups of people who call each other regularly, or groups that regularly visit certain sites on the Internet. AT&T originally built the system to develop “marketing leads”[47], but the FBI has regularly requested such information from phone companies such as AT&T without a warrant,[47] and after using the data stores all information received in its own databases, regardless of whether or not the information was ever useful in an investigation.[48]

Some people believe that the use of social networking sites is a form of “participatory surveillance”, where users of these sites are essentially performing surveillance on themselves, putting detailed personal information on public websites where it can be viewed by corporations and governments.[39] About 20% of employers have reported using social networking sites to collect personal data on prospective or current employees.[49]