Help Support my Blog!

Virgin Mobile USA
Glasses USA
Amazon
Newegg
VPN4ALL
Netflix
Hulu
CafePress

 

Subscribe to Paul’s Tech Talk Affiliate Marketing Blog

Subscribe to Paul’s Tech Talk Science Fiction Blog

Subscribe to Paul’s Tech Talk Scams Blog

  • Acer 11.6
    Acer 11.6" Laptop 2GB 16GB | C710-2856
    Acer

    Currently  in process review this Acer Chrome book and boy is it nice!

Navigation
Sponsors

Entries in Security Breach (8)

Saturday
Jun222013

PRISM and Edward Snowden scandal!

Prism Reflections  1877

Prism Scandal?

Some of you would wonder if the Surveillance scandal of 2013 will be remember in 2050?  I really can’t say for sure in the past few hours the US Government has issued an arrest for Edward Snowden.  It really looks quite suspicious that the government uses this tactic.   It seems almost like they want to blame someone who wanted to let the world and the his fellow US citzen the right to know what they are doing.   This is getting quite scary as some of you would like.   With Obama on his last term as president, we have to wonder what will happen for the next 3 years.   Will he make our privacy just as bad as China?

Tech Giants are the ROOT to this!

Most Tech giants are afraid of the government and what will happen to their reputation if they were to be truthful.   I really doubt the government would do anything but slap them for saying no.  They afford so much of this blame that seems to be going around and around in circles.   One company blames another company and it is an endless blame.   Just like the US government is blaming Snowden for leaking this information, you wonder why all the fuss about leak.   He didn’t leak any personal information such as people and social security numbers.

Tempora program and The British Secret Service!

While we are on the subject of PRISM, we have to at least show that it has been going on in other governments around the world and good old James Bond likes his Tempora Program “Shaken, Not stirred”.  We’ve see that the US isn’t the only one doing the serviceable of their people.   Quite scarey isn’t it?   The Tempora program is a co-operation between the NSA and Britain exchanging information about what people do.

What can I do?

If you wondering about cloud backup, you can try Malwarebytes Secure Backup Pro and that will at least encrypt all your data before it is stored in the cloud.   I won’t say that is the only thing you can do.   You can also use a VPN Service such as VPN4ALL The Best Protection Online AES-256 RSA 2096bit (Military Grade) Encryption for all your internet traffic. Unlimited and Metered VPN Plans starting 9.95 / month which is what I am using now so It will help keep your privacy a little more safe. There are no guarantees that government has keys but at least it is one more step to privacy that shows them that you want to be “Do Not Tracked”.   One last way to help keep your information a little more private is Secured Texted on the Android phones.   Looks nice and it is opened source so you have little worry about who has access to your text messages.   In the last 30 days, this app has been getting popular.  

 

Monday
Feb132012

How to hack without hacking!

Anyone can Hacking!


I must admit this post will be one of those that you really can eat.   I'm not saying that you should hack but lately it has been so easy to discover some website to help enable people to hack.  After watching to Security Now Episode 339: ScriptNo for Chrome, I found out about the "Trend Netcam Problem" where if you have a Netcam on the internet all they would have to do is add "(IP address)/anony/mjpg.cgi" and you can find out some IP's that have Netcams.  The fun part is if you just Google "/anony/mjpg.cgi" you can find a list of IP's that might have netcams on them!


Pastebin can be useful!


I like to occasionally check the trends for Pastebin every so often because they usually have something of interest on them. I have found that Pastebin is an excellent source of hacking information. So many hackers are using this service that you never really know what you find from day to day.   You   can easily search the Pastebin site for stuff that you might want to check out.   I'm always trying to find stuff that I can use to help the community.  Sometimes though you find scripts that people have made for some reason or other but you get to see the script, so you don't run the script but you can see the meat and bones.   If your a programmer, you will know what some of this is all about and what it is doing.

Finding Gems!


I never once said that keeping up to date is something that you should not do but it is something that you could do.   Every So often I see something that strikes my fancy and it should be announced to the world.   If your looking to learn how to hack there are of course places on the internet that will show you just that.  I on the other hand will not show you but tell you when something is going on that you should do for yourself rather letting the hackers have all the fun!

Paul Sylvester




Sunday
Feb122012

One thousand GamerTags have been Hacked on Xbox!



Brought to you by Pastebin

XBOX has been Hacked!


From what I can tell there are 1,009 GamerTags with passwords and email addresses. I am unsure how many of them are real and how many are just fake or if they are all fake. I do know if you have an XBOX account and you want to know if your account is hacked you can go to Pastebin and hit Control-F and either enter your GamerTag or email address.

Change your Password!


If you need to change your password on your XBOX account, all you really need to do is reset your live account.   Somethings to remember when changing your password is to have a difficult password and also something that can have a Dictionary Attack on it.  This has happened in the past with Xbox having accounts being hacked, it actually happened in 2007.  I recommend using something like Lastpass to create a very strong password that is hard to crack.   I know the pain of entering that password into XBOX but that is one way no one will gain access to your account!

Paul Sylvester




Friday
Jan202012

Techniques to remove malware from your domain!

Starfleet Officer Image by Sam Howzit via Flickr

Websites and domains!


I recently had to help my favorite club remove some malware off their website.   My club, Starfleet-command Quadrant One website, was one of those sites that didn't see this coming.   As a website owner, I've seen many of things come and go but experience has taught me that it will always come back.  I will be watching for this again in the near future but hopefully it won't come back!

The back story was something that I have to at least talk about because this is how the site got infected.

One reason that this site got infected was by being hosted with the same hosting server.  They were both using the Goddady shared hosting account to display their webpages or forums on the internet.   Thus Godaddy, with their infinite wisdom tried to explain it away as that.    I don't know if I buy that reason or if there was something else that might of been the culprit but I do know this website had urls redirects and such to malware sites.  I much rather keep with Hostgator, then have Godaddy anyways.

Another Reason is that it was probably some kind of key logger, or something that was sending back the important password information to a Command and control server and thus the website owner was infected or someone in the organization that had access to the account was unintentionally allowing a hacker to gain access to the website.

Removing the Malware off your Site!


Nothing in the world is ever going to be easy, but it is necessary to get into the guts of the website.   Your probably thinking, websites don't have guts.   You'd be wrong, when I thought about having to go through each part of the code and remove the html malware redirects that is what I mean by guts.      Many people will come to understand that as a programming language but I like to think of it as a doctor who does surgery to remove an infectedc limb or something like that.

So I'm going to give you a few areas to look at if your having this problem with Malware being on your site or domain.   It won't always be the same place for the same infection but it will at least help you find it and remove it.

.htaccess -- This is one place where they will first make changes to redirect traffic to the domain that they want your visitor to. If you have had much experience with what it does.   It is a good time to learn what they do and how to use them.

 

index.php or index.html-- This is something that the hackers have learned to use but most often is over looked.   This is something that I haven't seen before until now.   Certain browser will display the virus or malware warnings and others will not even see it or have any problems!   See example for more information, because I couldn't do a better job then them!

 

Check Subdomains and subdirectories --   This is something that is also needs to be looked at.   even if they aren't showing the signs of being being infected it is always a good idea to at least make sure they stay uninfected.   Check them for the .htaccess and index code and remove what you need or change it to where it should be going to in the first place.   I found the .htaccess redirect code all in subdomains and sub directories on the one that I helped to remove the infection from.

 

Change ALL passwords -- This is a MUST, if you've been infected then your passwords are at risk of being the source of the infections.   Change your FTP Password, your log in information password, and anything associated with the site in question and possibility the subdomains passwords.

 

Limit the number of people with the new passwords -- if your like me, you don't want to many people to have the ftp password and thus you should consider only allowing a select number of people having it.   Like the organization I have, they have people left and right who use it to upload files and stuff that is needed.   It also might be required to just have a server that is used for nothing else but to upload files for publications and other things like that.

 

Disclaimer


Nothing in the article is a must do or will get rid of your site being blocked by Google and other such search engines but it will at least give you a place to start looking to find culprit and maybe get your site running again quicker.   I will not make any guarantees that this will fix the problem or that it will solve your problem 100% but this is to be used as a tutorial on where to look and what you should do to prevent re-infections with malware.

 Paul Sylvester


SUPERAntiSpyware, with over 20 million users worldwide, is the most thorough scanner on the market. SUPERAntiSpyware

 

 

 

 

 

Enhanced by Zemanta
Thursday
Dec292011

My Top Five Favorite Posts for 2011

English: Posts in the sand Presumably these po... Image via Wikipedia

It's that time again!


I know this blog has been up and down this year and thus I want to discuss some of my more popular and ones that I am really proud of.   We all know that is isn't going to be easy for me but I thought we could at least talk about some of more favorite posts and let people who just found my blog see some of my other posts!

We've all seen those post each year on different blogs and I am sure I am not the only one who does this but it is something that I like to do.   It after all is about community and sharing with my friends.  I know I consider my readers like close family because I am always thinking what I can do to better my life and yours.   This is my biggest reason for blogging, to make life better for everyone and make it much more enjoyable for me also.   You don't know how nice it is just to sit down and write to my family(readers) and not have to feel like there is pressure to post.   This is my goal every time I write a post to share and hope it makes people think about how to work smarter and not hard.

Top Five Favorite Posts!


I will start off with my Five favorite posts and discuss them in length.   You can always feel free to look around and click any article on my site without worries.

  1. How to Get a Free VPN for Ubuntu/Kubuntu! --This is was one of those that I did because it was essential for me to find a free VPN for when I go to hotspots and not have to pay.   When you are on a limited income and trying to get to your next paycheck, then you know why I couldn't afford to pay for a VPN service.  Also I use Kubuntu and thus couldn't use the Windows only free VPNS that were available.

  2. Three ways on how to NOT waste your Money! --  This one is a supposedly a recruiting job from (crmglobalresources.com) but after doing my research it looks to be like my other post "Why do I need to pay for recruitment?" So I was really proud of this one to tell people about it! So don't always think there will be easy money.4

  3. Apple Needs to Worry about Security and Virus! --  This one was of my favorite post also because I am always tell people that there will always be Apple viruses and that their advertisements in the past will always haunt them because Apple can and will be targeted now and in the future for virus attacks because they are getting a larger share in the Marketplace.

  4. My Reasons why Amazon will make an Android Tablet!  --  This is another one of my favorites because it was one of those that came true.   Just look at the the Kindle Fire to verify it, that is after all an Android tablet.   I think they have more to come in the future but only time will tell!

  5. Android Malware, Ridiculous! --   Let's face it, most people think that Androids can't get virus or have malware.   I discuss this in length and tell you that even Linux can have viruses and you should count your eggs before they are hatched.  I am not going to say that they will or will not but I discuss why hackers and virus writers would love to do it.   Once the market gets saturated enough with Android devices they will start to develop viruses and malware for them, I am sure it.


As you can see that there were some really good posts in 2011 and I hope to get even more post done in 2012. I am going to be resolute to doing a better job of posting but that could be a futile effort.

Paul Sylvester


Need Glasses? Try GlassesUSA!





Tuesday
Jun282011

Amazon really is Confusing some times!

Your Amazon.com password has been changed!

Dear [First] [Last],

This is an important message from Amazon.com

As a precaution, we've reset your Amazon.com password because you may have been subject to a "phishing" scam.

Here's how phishing works:

A scam artist sends an e-mail, which is designed to look like it came from a reputable company such as a bank, financial institution, or retailer like Amazon.com, but is in fact a forgery. These e-mails direct you to a website that looks remarkably similar to the reputable company's website, where you are asked to provide account information such as your e-mail address and password. Since that web site is actually controlled by the phisher, they get the information you entered.

Go to amazon.com/phish to read more about ways to protect yourself from phishing.

To regain access to your Amazon customer account:

1. Go to Amazon.com and click the "Your Account" link at the top of our website.

2. Click the link that says "Forgot your password?"

3. Follow the instructions to set a new password for your account.

Please choose a new password and do not use the same password you used with us previously.

Thank you for your interest in Amazon.com

Sincerely,

Amazon.com

Please note: this e-mail was sent from an address that cannot accept incoming e-mail. To contact us about an unrelated issue, please visit the Help section of our website.

This Happened a Few Days ago, and I thought I would talk about the security implications of this email. Some users and people are thinking this is fake. Obviously, I was concerned like everyone else so I contacted Amazon to find out about this. I talked on the Phone, and talked to a Representative that didn't really know why my password was changed. So they told me the she'd give my email address to a specialist and that was it.

Account Alert: Please Read

Greetings from Amazon.com.

Please take the time to read this message - it contains important information about your Amazon.com account.

After careful review of your account, we believe it may have been accessed and used by a third-party to attempt to make purchases without your permission. It seems that someone obtained your personal account and/or financial information elsewhere, and used it on Amazon.com to access your account. Please note that no unauthorized charges were completed as we were able to cancel the order(s).

We have taken immediate steps to secure your account. We’ve assigned a new, temporary password to prevent further access by the unauthorized third-party, and removed any credit cards or other payment methods from your account. Additionally, if any information was added to your account by someone other than you, it has been removed. Your account access has been restored and is available to use at your convenience.

You’ll need to reset your password when you return to our site. Just click “Your Account” at the top of our Home page and select “Forgot your Password?” in the Settings section.” Enter your email address as prompted, and once completed, we'll send you an e-mail containing a personalized link. Click the link from the e-mail and follow the directions provided. Your new password will be effective immediately. Please note that you will need to re-enter your complete credit or debit card number during the checkout process.

It is important to know that Amazon.com accounts can only be accessed by those who know personal, specific information about you and your account, including your email address and Amazon.com password. As mentioned above, it appears someone obtained this personal account information elsewhere and used it on Amazon.com to access your account.

While it is not clear how this happened in your case, we do know that personal account information is often obtained by scam artists who send unsolicited email to unsuspecting users asking them to "update" their account information. The email usually contains a link to a website that is controlled by the thief asking the user to submit personal information including email address, password, credit card number, and other relevant information. Once the information is obtained, the scam artist can then gain access to numerous online accounts since many internet users frequently use the same user name, email address, password, and financial information at multiple web sites.

Please know that Amazon.com employees will *never* ask for your password, nor will we ever send an email asking you to verify personal information.

Although it appears someone did access your Amazon.com account, they would not have been able to view your full credit card numbers as they are never displayed on our site. However, it is possible your credit card numbers may have been compromised at the time your other personal information was obtained. Therefore, we suggest you carefully review recent credit card statements to check for any unusual activity or unauthorized charges.

In the future, you can protect your Amazon.com password and account by following some of these safety tips:

-----------------------------------------------------------------------

1. Choose a good password: Use at least 8 characters and a combination of letters and numbers. Do not use single dictionary words, your name or other personal info that can be easily obtained, or a password that contains part of your email address.

2. Password protection: Avoid using the same password at multiple sites or for your email account. Do not share your password with others.

3. Account protection: Be cautious of unsolicited emails that appear to come from reputable online shops or services that ask you to submit personal information such as your credit card number, email address, and password. Often these emails will look as though they come from the company you're familiar with, and the email will ask you to click on a link and "sign in". You should never provide this kind of personal information in an unsolicited email.

I don't know if this isn't just an automated message because anyone who know me, knows I do listen to Security Now and other such security podcasts. So I know about phishing attacks and other such ways of how someone can get your password. I've recommended Lastpass in the past and still recommend it. I don't get what happened but it looks like they were concerned with my account and decided it need to be restricted until I changed my password. I even like the fact that Lastpass now uses Yubikey as a second factor of authentication, which I am quite glad they have implemented this. Great Going Laspass guys.

Don't Click Links in Emails!

I've talked about in the past but I thought it was something that we should at least remind people. If you get an email with a link to your account and you're not expecting it then don't click it. You can click links if your resetting your password but those are expected. I always tell people if your not expecting it, talk to the person who sent it to you because they might have a virus or some link that will compromise your account or get your passwords. Remember, surf safe and think about your security.

Security is #1

Paul Sylvester

Thursday
May262011

Apple Needs to Worry about Security and Virus!



Let's Face It, Mac isn't Virus Free no more!


I know I've been saying this for a few years, but In all truthfulness it is more of a fact than a few years ago.   Apple needs to change their policy on how they do commercials.   I don't say that light hearted because I actually think the commercials are really funny sometimes but that is besides the point.  They have not in the past changed their tactics because of the new malware that is going about.   Some experts are saying this malware doesn't require you to enter a password or even have you allow or deny the installation.  Although, I have no Apple computer to test this observation, it seems quite possible depending on how people have their system setup.   Thought most Mac users are not thinking about security or even the possibility of a virus because of the advertisements that Apple has put up in the past.   More and more their seems to be a growing number of viruses and malware for the Macintosh.

Security Through Obscurity is No More with Apple!


I say that know that in the past most Apple users always thought since the Operating system of the Apple was not well known that they could get away with installing unknown software or programs that Windows users would think twice on.   I honestly don't see how people would download bit torrent files thinking that they were safe on the Mac because "Apple Could never get a Virus" advertising has stuck in their minds.   Yet Apple has in the past fought this through new changes to their advertising but the fact remains anytime you think of a Macintosh, you first thought would be about it being Virus.   I know some of you probably though the first thought would be the speed and ease of the Operating, and although that is true that isn't my thought when I think of a Apple Operating System.

Don't Presume anything!


I might not be a Mac User but I don't presume anything when it comes to running a Windows or even a Linux Operating System.   That Being said when Apple finally realizes that they are no longer able to hide from the bad guys, then we will see them start fighting back.   Until then though, most Mac Users will make the mistakes they have always done because of Apple stance and the ignorance of the problem.  I have said how hackers will start targeting Apple Users and this seems to be the case even now.   If you have a Mac Machine, I suggest looking for a good Antivirus and sticking with them.   You are not longer safe not having an Antivirus software installed on your system.

Stay Safe!


Paul Sylvester




Saturday
Apr162011

Security and Privacy go hand in hand! Or does it?



Brigid's Well (5 Stones to Pray the Rosary by) (7) Image by sfpanda_pix via Flickr


Privacy Really?


I've been commenting on Gail Garners Blog about how Google mail is putting ads in the emails.  Now I have done at least one post about Privacy and you not having it.  If you haven't read my  post then I will give a outline of that post.

It basically boils down to some main points that I will discuss on this post:


  • No-one is Immune on the Net -- Anyone and everyone has some information floating out on the internet and even celebrity information that they don't want you find can be found if you look hard enough.

  • Know the Information before anyone else -- Seriously if you want to keep track of what is being put out on the net about you.   Have Google email you when either name or some other information that you are looking for gets put out on the net.

  • Be Ready for Anything -- There isn't much you can do to actually be ready for Anything but it is more of a statement to yourself that "Nothing will surprise you.".   Sometimes just taking a long hard look at your life and remembering some of this can be quite concerning, so you should be ready for someone to find out and have an answer for them.

  • Our life are infinitesimal compared to the scheme of things --  Everyday, I am constantly thinking what can I do to make someone's else happy.   I find blogging makes me happy but I always want to make others just as happy as I am sometimes.   I sometimes like to wake up in the morning and just thank God for each day I can bring something new to my readers!


How Security is involved in Privacy


If you read the title and was a little curious why security is crucial to privacy.   It does not take a rocket scholar to figure this out.  If your are one to worry about your privacy then you should be also worrying about what information is leaking out on the internet from sources that you have no control over.   This means you have to figure out just how far you willing to go.

  • Friends --  Sometimes your privacy is left to who you decide who your friends are.   They might accidentally mention your name or some other random tidbit about you.   It all depends on who your really trust and tell them not to share your information.

  • Family -- Almost the exact same people as friends but since they are your family, there may or may not be trust so you will have to deal with them in your own way.   This is why I grouped them separately!

  • Services -- If your ever signed up for Facebook or other social websites than you have not truely read the Terms of Service.   Most of them, if not all, require to the user to have personal information on there server.   In turn, someone could get on there server illegally and copy all those names and information.


As with my previous post about epsilon having been hacked.   If you have a computer or the internet then your information is slowly being leaked and there is nothing you can do about it.   You can minimize it but that is about all.

I want to hear from you.   Do you think you can still be invisible on the internet?  Leave a comment or ask a question.   I'd love to hear what you have to say!

Paul Sylvester