Tag Archive for: Yourself

How to Protect Yourself against XcodeGhost like iOS Malware Attacks

Recently, Chinese iOS developers have discovered a new OS X and iOS malware dubbed XcodeGhost that has appeared in malicious versions of Xcode, Apple’s official toolkit for developing iOS and OS X apps. The hack of Apple’s Xcode involves infecting the …
mac hacker – read more

Phone and laptop encryption guide: Protect your stuff and yourself

The worst thing about having a phone or laptop stolen isn’t necessarily the loss of the physical object itself, though there’s no question that that part sucks. It’s the amount of damage control you have to do afterward. Calling your phone company to get SIMs deactivated, changing all of your account passwords, and maybe even canceling credit cards are all good ideas, and they’re just the tip of the iceberg.

Using strong PINs or passwords and various Find My Phone features is a good place to start if you’d like to limit the amount of cleanup you need to do, but in this day and age it’s a good idea to encrypt your device’s local storage if at all possible. Full-disk or full-device encryption (that is, encrypting everything on your drive, rather than a specific folder or user profile) isn’t yet a default feature across the board, but most of the major desktop and mobile OSes support it in some fashion. In case you’ve never considered it before, here’s what you need to know.

Why encrypt?

Even if you normally protect your user account with a decent password, that doesn’t truly protect your data if someone decides to swipe your device. For many computers, the drive can simply be removed and plugged into another system, or the computer can be booted from an external drive and the data can be copied to that drive. Android phones and tablets can be booted into recovery mode and many of the files on the user partition can be accessed with freely available debug tools. And even if you totally wipe your drive, disk recovery software may still be able to read old files.

Read 29 remaining paragraphs | Comments


Ars Technica » Technology Lab

How to protect yourself against Verizon’s mobile tracking

The Electronic Frontier Foundation has published a list of tools that can block online advertising companies from collecting web browsing data in ways that privacy advocates contend are deceptive.

Computer scientist Jonathan Mayer of Stanford University and ProPublica revealed on Wednesday that an online advertising company, Turn, can re-create the history of a person’s Web browsing traffic using Verizon’s tracking system.

Verizon tracks its mobile subscribers’ web surfing by tagging their traffic at the carrier level with a number called a UIDH (Unique Identifier Header). Verizon uses the system for two of its targeted advertising programs.

To read this article in full or to leave a comment, please click here

Network World Security

Protect yourself online with The White Hat Hacker Bundle and VPN Unlimited [Deals]

For a limited time, you can get The White Hat Hacker Bundle at 92% off, that’s just $ 49, at Cult of Mac Deals. Internet security is pretty serious business. Nobody is immune from the threat, not even large corporations. It’s time to arm yourself to the …
mac hacker – read more