Technology 7 steps to completely secure your home computer

16:50  11 august  2017
16:50  11 august  2017 Source:   T3

Russian hackers can reportedly take over unsecured hotel WiFi

  Russian hackers can reportedly take over unsecured hotel WiFi Security-conscious travelers typically avoid public WiFi hotspots, instead using VPNs and other tools to make sure their data is safely encrypted as it transmits from computer to unsecured wireless router to the internet. According to FireEye, the EternalBlue exploit could let hackers access anyone's computer connected to the hotel WiFi and silently gather usernames and passwords without victims even having to type them in. "It's definitely a new technique" for this Russion hacker group, FireEye's Ben Read told Wired. "It's a much more passive way to collect on people. You can just sit there and intercept stuff from the WiFi traffic.

No one wants a computer wide open to the various threats and nasties that lurk on the web, and you could be forgiven for thinking that the fight against hackers, malware and viruses is pretty much futile, considering how often they hit the tech news headlines.

As a result, your computer , whether at work or at home , still remains a primary target for cyber criminals. By following the seven simple steps outlined below, you can help secure your computer and protect it against most known attacks.

Courtesy of T3: T3 image© Courtesy of T3 T3 image No one wants a computer wide open to the various threats and nasties that lurk on the web, and you could be forgiven for thinking that the fight against hackers, malware and viruses is pretty much futile, considering how often they hit the tech news headlines.

In fact you can minimise a lot of the risk by taking some simple and straightforward steps to protect yourself. No system is ever 100 percent guaranteed safe - there are just too many variables for that - but follow this guide and you can sleep much more easily at night.

1. Keep your software updated

  7 steps to completely secure your home computer © Provided by Future Publishing Ltd. It's boring, but it's effective: make sure your operating system and all the programs that run on it (especially your browser, email client and antivirus application) are always updated with the latest patches and upgrades. This makes sure any existing security threats are protected against and gives you a good chance of standing up to new ones.

Hacker given computer access after pleading not guilty to malware charges

  Hacker given computer access after pleading not guilty to malware charges A British cybersecurity researcher credited with helping curb a recent worldwide ransomware attack was granted computer access after entering a not guilty plea to charges accusing him of creating malicious software to steal banking information three years ago. Marcus Hutchins and an unnamed co-defendant were charged with conspiring to commit computer fraud in the state and elsewhere. "Marcus Hutchins is a brilliant young man and a hero.

As a result, your computer , whether at work or at home , still remains a primary target for cyber criminals. By following the seven simple steps outlined below, you can help secure your computer and protect it against most known attacks.

Interested in trying this out, I encrypted my / home filesystem – meaning that at boot time I had to enter a lengthy passphrase to decrypt it and then, whilst If you're not acting as a secure shell server, sshd should be disabled. Not only will it free up resources on your computer , it'll protect you should a

Software updates are so important that the likes of Windows, macOS, and all the popular web browsers now make it very difficult to avoid updating your stuff (that's why Windows reboots even when you've told it not too). It's always worth double-checking that automatic updates have been set up though, so run an audit through your programs.

2. Install an antivirus program

  7 steps to completely secure your home computer © Provided by Future Publishing Ltd. You can risk it and just about get by without an antivirus program these days but we'd still very much recommend you install one, even if it's just activating the Windows Defender software that comes as part of Windows 10. You've got lots of decent programs to pick from, including packages from Bitdefender, AVG, Kaspersky, Norton and numerous others.

The Commodore 64, the bestselling computer of all time, turns 35

  The Commodore 64, the bestselling computer of all time, turns 35 August 1982 will be remembered as the month the Commodore 64, the legendary spearhead of the home computer revolution, was launched. Unveiled a few months earlier at the Consumer Electronics Show in Las Vegas, the Commodore 64 went on to be a colossal commercial success. Along with its office applications, the wide range of games, with the rapid launch of several thousand titles, made the machine extremely popular.

10 steps to better secure your Mac laptop from physical data theft. John Gruber, author of Mac blog Daring Fireball2, says: “My primary computer is a PowerBook that I use both at home and on the road. Figure 4: Using Secure Empty Trash to completely delete files.

This article describes techniques a user can use to secure his or her 802.11b/g/n wireless home network. Using at least WPA is recommended, because it is much more secure , but is sometimes a bit harder to set up correctly than WEP is, and isn't completely secure .[1][2] Some older access

On macOS the debate continues to drag on about whether antivirus software is really necessary but there's no doubt that the threats are real, so you've got no one but yourself to blame if you get caught out. The same big names in Windows security (see above) also have products for macOS, all ready to add extra protection beyond what Apple provides.

3. Set up VPN software

  7 steps to completely secure your home computer © Provided by Future Publishing Ltd. VPN (Virtual Private Network) software is of most use when you're on public Wi-Fi, but it also has its place at home, encrypting the data flowing to and from your computers and making it harder for anyone sniffing around your network to see what you're doing. It also makes it more difficult for websites, ISPs and governments to log your online activities.

We've covered the best VPNs out there in depth elsewhere, but it's a good idea to pay for a service so you're guaranteed of getting a decent service, and you've got a bit more peace of mind about how the VPN is funding itself. Take your time in making your pick, because you're ultimately trusting your chosen VPN provider with details of your browsing activity.

Couple tried to scam Lowe’s out of $258,000 in merchandise, authorities say

  Couple tried to scam Lowe’s out of $258,000 in merchandise, authorities say A New Jersey couple used a website glitch to try and get more than $258,000 worth of goods — everything from a gazebo to an air conditioner to a stainless steel grill — for free from a home improvement store, authorities said. Ultimately, the couple was only able to secure nearly $13,000 worth of merchandise from Lowe’s after exploiting "weaknesses" in the company’s website to have the items shipped to their home in Brick for free, according to a release from the Ocean County Prosecutor's Office.

Say you have an iPhone and you have taken all the above mentioned steps to protect your device. We’ll see how Apple’s Security features are foolproof in every way. He takes it home and plugs it into his computer . The USB media drive doesn’t show up.

8 Steps you MUST follow to SEO Your Blog Page.

4. Create your own user account

  7 steps to completely secure your home computer © Provided by Future Publishing Ltd. Even if you're the only person who uses your computer, set up a user account to protect it from anyone who should wander past your living room or indeed pick up your laptop on a bus. Assuming your browser logs you into a bunch of sites automatically, a username and a password in Windows or macOS are your last line of defence against unwelcome visitors.

You should also make sure your computer is set to log you out automatically after a certain period of inactivity, for the same reason - on Windows, this is done via Sign-in options under Accounts in Settings; on macOS, head to Security & Privacy from System Preferences and open the General tab (you also need to set a short timeout in both cases).

5. Be careful what you click on

  7 steps to completely secure your home computer © Provided by Future Publishing Ltd. Even with the best security setup in the world, malware can still infect your computer if you give it explicit permission to run, and so you should be careful about the web links, email attachments, and social media messages you click on. Your browser and OS will protect you against the worst threats, but you carry some of the responsibility too.

This $70 robot that mimics a sea-turtle may eventually reach Mars

  This $70 robot that mimics a sea-turtle may eventually reach Mars Researchers at University of Arizona have created a modular robot made of cardboard and a Raspberry Pi Zero (a simple computer) for around $70.  Researchers at University of Arizona have created a modular robot made of cardboard and a Raspberry Pi Zero (a simple computer) for around $70.

Home . 2: Password protect your computer . For most Windows installations this means password protecting two accounts. Make sure you connection to a website asking for any personal or login information is secure .

The following steps describe how to secure your Windows XP Home computer by altering few original configuration. Posted in Computer Security , SecurityTagged secure computer , secure pc, secure windows xp.

Be very wary of anything that comes through social media or over email that's unexpected or arrives without any context (if necessary double-check with the supposed sender). If you follow a link to your web browser, check that it opens the URL you were expecting, and look for the green padlock that's a sign of a secured HTTPS site that you can trust.

6. Protect your accounts

  7 steps to completely secure your home computer © Provided by Future Publishing Ltd. Hackers will often get into your accounts through third-party extensions (all those sites you've logged into via Facebook): open up your Facebook, Twitter and other accounts and disconnect apps and services you're no longer using to keep yourself better protected.

Where available - and it's available just about everywhere these days - you should switch on two-step authentication for your accounts, so your username, password, and a special PIN code is needed to log in. Here are the instructions for Apple and Google, for example.

7. Secure your home network

  7 steps to completely secure your home computer © Provided by Future Publishing Ltd. Not all the threats you face are going to come from the wilds of the web, and it's important to secure your home Wi-Fi too. As well as setting up a passcode to gain access (of course), you should change the default password to log into the router, which is set by your ISP.

It's a good idea to change your regular password (the one you use to connect devices) on a regular basis to boot off unwelcome visitors. Most routers also let you 'hide' your Wi-Fi too, which means people need to know both the Wi-Fi ID and the password to get online.

One mistake people make using public Wi-Fi .
If I've said it once, I've said it a thousand times: Avoid doing anything you would not want anyone in the world to know on public Wi-Fi. You may think you're safe in that busy café or big-name hotel, but public Wi-Fi is a major liability.It doesn’t matter how safe the connection seems to be; your computer is vulnerable to hackers because you have no idea who is really in charge of that router or who has access to it and all the data that passes through it. Knowledge is power. There are lots of ways to protect yourself, of course.

—   Share news in the SOC. Networks

Topical videos:

This is interesting!