Search
    Google
    Tip of the Day Blog
    The Web

Entries in Security (29)

Wednesday
May262010

Lookout Backs Up & Protects Your [Android/Windows Mobile/BlackBerry] Smartphone's Data

Lookout Remotely Backs Up, Protects, and Manages Your Smartphone's Data

Lookout Remotely Backs Up, Protects, and 
Manages Your Smartphone's Data

 

Android/Windows Mobile/BlackBerry: Nowadays, a lot of us store our whole lives on our smartphones. If your phone gets lost or stolen, free web service Lookout can back it up, locate it, and wipe it all from a web interface.

If you keep valuable or sensitive information on your phone, it's nice to have a plan in case it gets lost or stolen, and Lookout can help you manage your data if that ever happens. Even if you don't have sensitive information on your phone, though, Lookout can still be useful—just like on your PC, anti-virus and backups are always important in case anything happens.

You'll need to download a quick app to your phone, which gives Lookout access to it (as well as displays the status of your backup and anti-virus on the go). Most of your work with Lookout will be done on your computer, though, from Lookout's web interface. From any browser you have access to all of Lookout's features: you can back up your phone, find it if it's lost, wipe your data, and run virus scans remotely. It's super easy, requires very little setup, and is an invaluable safety net if and when your phone falls into the wrong hands.

Currently, Lookout works with Android, Windows Mobile, and BlackBerry devices, although an iPhone version is also planned for the future.

Lookout

Lookout Remotely Backs Up, Protects, and Manages Your Smartphone's Data

Wednesday
May122010

Face Recognition Software To Login (Windows 7)

Impressive it was to see in movies how some high-tech system will recognize a user’s face and present a personalized interface. Thanks to the advancements in technology, we see face recognition systems in some high-profile offices as well. But how about having a similar system on your laptop or PC, which would just scan your face and log you in?

Blink from Luxand is a software that does exactly that, and that too for free. The software uses your webcam to read a face, match it against a pre-stored collection of users and log in the right account. Slick and neat.

image

Once the software is installed, you need to to configure it, which involves having Blink learn your face and remember it. Setting everything up is simple and easy and does not take more than a couple of minutes. Once this is complete, the software simply goes down to the system tray where it will continue to run. You may also access settings from the tray icon.

Next time you’re logging into Windows, Blink with automatically enable your webcam and get ready for login. Just sit normally in front of the camera and you’re logged in, no passwords needed.

Blink’s recognition algorithm also compensates for changed hairstyles, glasses or contact lenses. It also keeps tabs on who logged in when, and stores a complete Login history with captured images to catch potential identity thieves, and to keep a record of activity. These are accessible through Settings.

Blink 2

Blink works with Windows Vista and 7 only, 32-bit versions. Its memory signature weighs in at approximately 30 MB. Although obvious, it also needs a PC-cam or webcam to work.

Download Blink

Read more: http://www.addictivetips.com/windows-tips/face-recognition-software-to-login-windows-7/#ixzz0nihw2sSg

Face Recognition Software To Login [Windows 7]

Tuesday
Mar162010

Safety Mode on YouTube

YouTube Blog: Safety Mode: Giving You More Control on YouTube

Excerpt: It's easy to opt in to Safety Mode: Just click on the link at the bottom of any video page. You can even lock your choice on that browser with your YouTube password. To learn more, check out the video below.

Thursday
Mar042010

STRANGER DANGER – Don’t Insert Unknown USB Flash Drive in your Computer

 

This is a Flash Drive: image   Sometimes it’s called a Thumb Drive: image .  If you don’t know where that Thumb Drive has been, don’t stick it in your USB port: image

Why would someone (maybe you) who would never drink from an open bottle you found in a parking lot, take an abandoned/discarded/lost thumbdrive they stumble upon in a parking lot or the street and insert it in their computer?  Well, that’s exactly what someone at CENTCOM did (click on the link to see why Centcom is so important).

From the NPR Show “Fresh Aire” (topic: Assessing The Threat of Cyberterrorism) Feb 10, 2010:

Terry Gross interviewed James Lewis. Who “directs the Technology and Public Policy Program at the Center for Strategic and International Studies. He was the project director for the Commission on Cybersecurity for the 44th Presidency, a project started in 2007 to make recommendations to the next president about cybersecurity.”  The entire interview transcript is here.

GROSS: What are other favorite ways of attacking companies or individuals?

Mr. LEWIS: The high-end attacks will be more sophisticated and some of it involves what we call social engineering, right? So social engineering is, I get your e-mail address, I get some data about you, or maybe I find out your wife's name or your birthday or something and I send an e-mail - I get your contact list and I send an e-mail to all your friends. It looks like its from you and the header is: My birthday is coming up or something and it has the date. Inside that e-mail there might be embedded or contained some malicious package. The friend sees the e-mail, thinks it's from you, they click on they click on it and open it, hey presto, I've got him, right?

Works great and that's been used - that's, you know, it's a more labor intensive effort but it's used against high-value targets. The other one people know about now, I'm sort of upset it because it was so - it was such a wonderful technique that I'm upset it's become public now and people stopped doing it: Put some bad software on a thumb drive, you know, in three or four thumb drives, drive to the parking lot of the place youre targeting - DOD, some company, a bank - and scatter the thumb drives in the parking lot, right? Now, a good citizen picks up the thumb drive and...

GROSS: These are like little portable...

Mr. LEWIS: Yeah, the memory sticks.

GROSS: Portable memory sticks that you just plug into your computer.

Mr. LEWIS: Yeah.

GROSS: Right.

Mr. LEWIS: Throw - how much - it's not going to cost you that much. Throw four or five of them in the parking lot, someone will pick it up and plug it into their computer. And at that second, if they haven't taken certain precautions, and most people haven't, at that second you will implant your malicious software that will allow you to either take control or to exfiltrate data. So that's a good one too. People are learning about that one. That's how DOD got hacked last year. That's how CentCom classified networks got hacked so...

GROSS: That's how CentCom got hacked - that somebody picked up something from the parking lot and plugged it into their computer?

Mr. LEWIS: The other one I heard about is, of course...

GROSS: Wait, wait, is that true? That's how CentCom got hacked?

Mr. LEWIS: Yeah. It was a memory stick. It was funny for me because I gave a talk once to one of these defense contractor groups about cyber security and at the end they gave me a present for talking. It was a memory stick.

(Soundbite of laughter)

Mr. LEWIS: Made in China. I said you clearly haven't been listening.

(Soundbite of laughter)

Mr. LEWIS: I've heard the same things happened at Justice where somebody scattered them in the men's rooms and Justice was smart enough to figure out that - whoever found it was smart enough to figure out not to fall for the trap. But, you know, look, you've got intelligence agencies with 10,000 employees and multi, hundreds, million dollar budgets who spend every day trying to figure out some way around your defenses. You’re going to come up with something.

Monday
Feb222010

Free Norton Security Suite for Comcast Internet Subscribers

PC Mag Review of Norton 360: http://tinyurl.com/yd59aql

Comcast High Speed internet customers can now get the award-winning Norton™ Suite powered by Norton 360™. It protects your PC, files, and identity without slowing you down.*

This $160 value is included with your service at no additional cost!

Comcast.net Security - Norton" Security Suite