pixel
What would you do if your phone was stolen and the thief sold it?

What would you do if your phone was stolen and the thief sold it?

Buy another phone and get on with my life.

Oh. Wait. I have an iPhone.

It has hardware encryption, so neither the thief nor the buyer can access my information.

It is automatically backed up, so all my apps and data will repopulate a new iPhone.

If this were the worst thing to happen to me today, I would be living a blessed life.

Why won’t Mac computers get some types of viruses?

Why won’t Mac computers get some types of viruses?

Viruses are just computer programs, or sometimes Scripts. All computer programs and scripts are written to work with specific hardware configurations. And just like you can’t put Microsoft word for windows on a Mac and have it run, you can’t put windows viruses on a Mac and have it run. By the way, the same is true in reverse. Viruses that are written for macOS will not run on windows.

That said, there are ways to write computer code so that the application is cross platform. There are only a few of these type of malware found out in the wild.

Is it unusual that I have never used virus protection on my computers and have had no problems?

What are the symptoms of computer viruses?

If I may, a better phrased question is “what are the symptoms of a poorly designed virus“. The reason for the change is that a well crafted virus will not have any symptoms showing on your computer. There have been many examples of malware that have been in place and operating for years with nobody discovering them. This is because there are no symptoms to place anyone on alert.

Poorly designed malware will create almost any sort of symptom. This includes slowing performance, unusual behavior, and has been recently demonstrated causing hardware damage.

This of course does not include malware with the intention of causing problems. These include things like cryptolocker. However, the overwhelming majority of malware is not designed to cause problems but actually to harvest information.

Is it unusual that I have never used virus protection on my computers and have had no problems?

Can the government force you to unlock your gadget?

I am not an attorney, and am not providing legal advice – just the advice of someone working in cyber security.

To my understanding, you can be compelled to provide your password. The issue of fingerprint is being argued – but it is terribly simple to obtain your fingerprint from any surface you have touched and use it to unlock your device. Although the issue of facial recognition hasn’t yet hit the courts, it most surely will. But as with fingerprints, is simply too easy to bypass.

I recommend not using prints or face to unlock your device. Instead, use a strong password (minimum 15 characters). For mobile devices, you can use as few as 6 characters if it is configured to erase after 10 failed password attempts.

What would you do if your phone was stolen and the thief sold it?

Is it illegal to change a public Wi-Fi name if you are not the admin? (The router allows anyone to access the “admin” simply by typing the router IP.)

It could well be. In the US, doing something that interferes with someone accessing their data can be charged as a felony, with jurisdiction under the Department of Homeland Security.

If you change a public Wi-Fi name (SSID), you may well be interfering with someone accessing their data in the cloud, or on one of their servers. This could be viewed as terrorist activity.

Just speaking personally, I’d rather face a few hungry lions than the DHS.

How do you encrypt calls from one iPhone to another?

How do you encrypt calls from one iPhone to another?

Every call you make on any cell phone to any other cell phone is already encrypted. Problem is, it is very easy to break that encryption (criminals, police, and governments do it continuously).

I’m guessing your actual question is “how do you securely, end-to-end encrypt calls from one cell phone to another”.

For this, you will need to use an app on both phones, instead of using the built-in voice service.

The two leaders in this market are Signal and Wire. My personal preference is for Wire, due to cost (free for personal use), and multi-platform support. Signal is an excellent product as well.

It should be noted here that the situation is even worse with Voice Over IP (VOIP) phones, and simply dismal for landline calls. NEVER use either of these to discuss anything sensitive.

Can someone know what I’m browsing when we use the same Wi-Fi?

Can someone know what I’m browsing when we use the same Wi-Fi?

Depending on the Wi-Fi basestation or router in use, yes.

If the Wi-Fi is not encrypted, they all of your traffic is easily seen.

Even if the Wi-Fi is encrypted, if this is a higher-end router, it will be logging your traffic. This allows the administrator to view your browsing.

However, if it is a low-end unit, without logging, and is encrypted, it would be exceptionally difficult for someone to know your browsing history.

I recommend that we use Virtual Private Network (VPN) at all times. This helps to prevent evesdropping, and keeps our security and privacy intact. There are thousands of VPN providers – and the one you choose makes a huge difference in security level. But that is a discussion for another day (or buy one of my books – where I give my choice, and show how to make a wise decision for yourself!)

Why won’t Mac computers get some types of viruses?

Which US mobile carrier can I trust with my data end privacy?

None. There is no evidence that any US mobile carrier places more value in protecting the security and privacy of your data than their profits. They will not sign HIPAA BAA agreements, they do not follow US-CERT or NIST security protocols, and have repeatedly been found to market your information.

Allow NOTHING of value to be seen by them. Use VPN to transmit data. Use encrypted communications for your voice and text messages.

Be responsible for your information, because they won’t be.

How do you encrypt calls from one iPhone to another?

Why do so many government officials/employees who come in contact with classified information use Blackberry smartphones? Are they really so much more secure than a new iPhone or another comparable model?

I would argue your foundation is incorrect – that there aren’t “so many” using Blackberry. But let’s just say that is true…

There isn’t much within the US (or any) government acquisition rules that have to do with being of the best quality or security. It is almost always about the ability to meet minimum standards at the lowest cost (Challenger is just the most notable example). When it comes to technology, you have the added burden of inertia (Blackberry was among the first smartphones with a moderate level of security – not that they are even in the running in today’s world), and that many of the government people making decisions either don’t have a clue what they are doing, or were trained a decade or more back, and haven’t upgraded their skillsets since.

What would you do if your phone was stolen and the thief sold it?

When you change your IP or Internet address, do the senders get notified of your new address or do you do it?

No. If that were the case, you and I would be bombarded with notifications all day long – and there is no need for someone to know your public or private IP address. What would they do with this information? It is used for automatic routing of data packets, not for human use.

Your IP address changes if you move your computer to a different network (such as from home to office). It will also change randomly during the day or week, depending on how your router is configured. As to your public IP address, that may also change daily depending on how your internet provider has configured their routers.

Is it unusual that I have never used virus protection on my computers and have had no problems?

Is privacy important to retain? Is it ultimately only important for those who have a negative potential to conceal?

So let me answer this way…

Please let me have your email and bank account usernames and passwords. Social security number would be nice. And how about if I record ALL of your phone calls, texts, and face to face conversations.

And for good measure, I get to video your bedroom, bathroom, and everywhere else you go.

Starting to get an idea as to the issue with privacy?

Can someone know what I’m browsing when we use the same Wi-Fi?

Q: Does it matter what VPN I use?

Q: DOES IT MATTER WHAT VPN I USE?

A: It is a critical decision which you use.

The reason one uses a VPN is the privacy of one’s internet communications and activities. Choosing the wrong one could expose all of this to the VPN provider, and then to others who will pay for the info.

In addition, some are much faster than others.

Choose wisely grasshopper.

Currently, my personal preference is perfect-privacy.com. Located in Switzerland (government-supported extreme security), they don’t keep logs, allows all of your devices to be on VPN, and they use the latest VPN protocol IKEv2.

Why won’t Mac computers get some types of viruses?

Q: Someone is trying to hack into my account. I’m getting Google notifications all day long. What can I do?

Q: SOMEONE IS TRYING TO HACK INTO MY ACCOUNT. I’M GETTING GOOGLE NOTIFICATIONS ALL DAY LONG. WHAT CAN I DO?

A: First, any password can be broken, garnered, or stolen. It’s just a matter how determined the criminal is and what resources are available to them.

US-CERT (one of the primary groups designated to figure this stuff out for the government) recommends a minimum 15 character password for administrative accounts, and a minimum of 8 for non-admin accounts.

Functionally, isn’t your data every bit as important to you as an admins is to them? This is why I recommend the minimum of 15 for everyone.

Next, implement Google two-factor authentication. This will block the criminal even if they gain your password.

At that point, let them try all they want, it’s not gonna happen.

Can someone know what I’m browsing when we use the same Wi-Fi?

Q: Is there any possibility of tracking Tor Browser?

Q: IS THERE ANY POSSIBILITY OF TRACKING TOR BROWSER?

A: Absolutely, and it is done by our own, and most likely other governments. There have been several high-level arrests made for both drug sales and child porn by tracking and identifying individuals through the tor network.

Can an individual do the same? Yes, if they have the resources to set up a large network of tor nodes.

Why won’t Mac computers get some types of viruses?

Q: How do you make your Facebook profile hack-proof?

Q: HOW DO YOU MAKE YOUR FACEBOOK PROFILE HACK-PROOF?

A: It’s really quite simple – and Facebook provides all of the tools to do so in under 30 minutes. Just log in to Facebook, and head on over to Log into Facebook | Facebook.

The most important issues are:

  • Strong password. US-CERT (one of the two Federal groups who is tasked with IT best practices) recommends a minimum of 15 characters. There really isn’t a need for complexity, such as using upper, lower, numbers, and special characters (although that does help). Length is the important factor.
  • Enable Two-Factor Authentication. In the event someone does find your password, this makes it impossible for them to log in without the code sent to your phone

The rest of the security settings are primarily about limiting what others can discover about you.

https://www.quora.com/How-do-you-make-your-Facebook-profile-hack-proof/answer/Marc-Mintz-4

Can someone know what I’m browsing when we use the same Wi-Fi?

Q: Why do some VPN providers request that you disable the firewall to use VPN?

Q: WHY DO SOME VPN PROVIDERS REQUEST THAT YOU DISABLE THE FIREWALL TO USE VPN? HOW SAFE IS IT TO DISABLE THE FIREWALL WHILE ON VPN?

A: To be blunt, because they have either improperly developed their software, or there is some shady business going on.

Your Firewall is a first-line defense for cybersecurity. Do not turn it off. I’ve never worked with a quality VPN provider that required this. Currently, my personal favorite is perfect-privacy.com. This is because they allow all of your devices to be on VPN (not just a few), provide excellent step-by-step setup instructions, and they are among the few VPN providers that are using the most current standard – IKEv2. I find this to be superior to any of the other VPN protocols available.

Why won’t Mac computers get some types of viruses?

Q: What are the possible security risks when implementing file synchronization?

Q: WHAT ARE THE POSSIBLE SECURITY RISKS WHEN IMPLEMENTING FILE SYNCHRONIZATION?

A: In addition to all of the security risks present for any mobile device, computer, and server, there are a few other issues to be watchful of:

  • All data must be encrypted during transfer.

  • All data must be encrypted at rest (in storage).

  • Devices at both points need to be secure from physical access.

  • Any computers and Mobile devices involved in the synchronization must have full disk encryption, quality antivirus which is kept up-to-date, users logging in with non-admin accounts, and application whitelisting to prevent malicious apps.

If you are looking at file synchronization with a cloud service, I’m fond of Google G-Suite for Business. They meet and exceed any security requirements, even for HIPAA and SEC, with a price-point that is highly competitive.

https://www.quora.com/What-are-possible-security-risks-when-implementing-file-synchronization/answer/Marc-Mintz-4