Did you miss a few of our articles in July? Catch up now with our monthly roundup of the latest Kaspersky news and tips!
Gmail is a vastly popular free email service used by millions of users for both personal and business accounts. And although it does offer some strong security measures, since it monitors each email passing through its system (for adverting purposes) your data is on record. Now, thanks to the company Streak, you can use SecureGmail, a new open-source Chrome-extension, to encrypt your messages. This means Gmail won’t be able to read your exchanges, guaranteeing you privacy.
It’s easy for us to sometimes forget that our mobile phones and tablets are just like our desktop devices; they are computers. At this point in time we’re all pretty aware of the necessity of securing our computers, but we need to be taking the time to secure our pocket devices as well. If you’re using proper protection for all of your mobile devices and utilizing the features already made available to you within your settings, like Apple’s Activation Lock feature, you’re one step closer to security. Just remember to be careful about the information you choose to share on these devices and always be sure to remain vigilant when it comes to your children and their pocket device usage.
Are you using your iPhone as a wireless hotspot? You may want to think twice about doing so, as a group of German researchers recently determined a way to crack Apple’s hotspot passwords through brute-force attacks. Apple’s iOS currently generates weak passwords, creating word-based combinations of just 4-6 characters. So what should you do to prevent an attack? When setting up a wireless hotspot, simply create your own unique, complex password that will be much harder for attackers to decipher than the simple passwords Apple offers.
If you look at the car models from 10 years ago as compared to those we’re driving today, you can see how far the automotive industry has come in the way of high tech features. Yet with these advancements comes a serious risk: is car hacking now a possibility? A handful of researchers have asked the same question and determined that it is possible to attack and override certain components found in some car models. However, in order to do so, it’s necessary to have direct access to the vehicle being hacked. So for now it seems like we can all rest somewhat easily, but who knows what the future has in store.
Are you someone who likes to share your latest life updates by posting photos and checking-in to locations on Twitter, Facebook and Instagram? If you or your children do this, you should really think twice about about what information you’re divulging. Each time you check-in to a spot or share your geographical location when uploading a picture, you’re telling people, including potential strangers with ill intentions, where you are. Your best bet for safety is to be cautious when utilizing these social apps by limiting your sharing to only your closest friends and family members.
With the ever-expanding landscape of digital devices we now have access to comes a new wave of threats we must consider when trying to keep ourselves protected. Each device you own has its own vulnerabilities, whether it is the new Morcut Trojan infecting your Mac desktop computer or a phishing scam attacking your Android. Don’t get caught up in an attack; keep yourself safe with a protection solution that covers all your devices.