{"id":2415,"date":"2013-08-02T10:05:30","date_gmt":"2013-08-02T14:05:30","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=2415"},"modified":"2020-02-26T10:41:53","modified_gmt":"2020-02-26T15:41:53","slug":"best-july-blog-posts","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/best-july-blog-posts\/2415\/","title":{"rendered":"A Monthly Roundup: Best July Blog Posts"},"content":{"rendered":"<p>Did you miss a few of our articles in July? Catch up now with our monthly roundup of the latest Kaspersky news and tips!<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/08\/06050129\/monthly_title_EN.jpg\"><img decoding=\"async\" class=\"size-full wp-image-2416 aligncenter\" alt=\"monthly_title_EN\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/08\/06050129\/monthly_title_EN.jpg\" width=\"640\" height=\"420\"><\/a><\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/send-gmails-that-not-even-google-can-read\/\" target=\"_blank\" rel=\"noopener nofollow\">Send Gmails That Not Even Google Can Read<\/a><\/p>\n<p>Gmail is a vastly popular free email service used by millions of users for both personal and business accounts. And although it does offer some strong security measures, since it monitors each email passing through its system (for adverting purposes) your data is on record. Now, thanks to the company Streak, you can use SecureGmail, a new open-source Chrome-extension, to encrypt your messages. This means Gmail won\u2019t be able to read your exchanges, guaranteeing you privacy.<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/the-perils-of-mobile-security\/\" target=\"_blank\" rel=\"noopener nofollow\">The Perils of Securing the Computer in Your Pocket<\/a><\/p>\n<p>It\u2019s easy for us to sometimes forget that our mobile phones and tablets are just like our desktop devices; they are computers. At this point in time we\u2019re all pretty aware of the necessity of securing our computers, but we need to be taking the time to secure our pocket devices as well. If you\u2019re using <a href=\"https:\/\/usa.kaspersky.com\/products-services\/home-computer-security\/one\" target=\"_blank\" rel=\"noopener\">proper protection<\/a> for all of your mobile devices and utilizing the features already made available to you within your settings, like Apple\u2019s Activation Lock feature, you\u2019re one step closer to security. Just remember to be careful about the information you choose to share on these devices and always be sure to remain vigilant when it comes to your children and their pocket device usage.<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/ios-hotspot-password\/\" target=\"_blank\" rel=\"noopener nofollow\">These German Guys Can Crack Your iOS Hotspot Password in a Minute<\/a><\/p>\n<p>Are you using your iPhone as a wireless hotspot? You may want to think twice about doing so, as a group of German researchers recently determined a way to crack Apple\u2019s hotspot passwords through brute-force attacks. Apple\u2019s iOS currently generates weak passwords, creating word-based combinations of just 4-6 characters. So what should you do to prevent an attack? When setting up a wireless hotspot, simply create your own unique, complex password that will be much harder for attackers to decipher than the simple passwords Apple offers.<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/is-it-possible-to-hack-my-car\/\" target=\"_blank\" rel=\"noopener nofollow\">Is It Possible to Hack My Car?<\/a><\/p>\n<p>If you look at the car models from 10 years ago as compared to those we\u2019re driving today, you can see how far the automotive industry has come in the way of high tech features. Yet with these advancements comes a serious risk: is car hacking now a possibility? A handful of researchers have asked the same question and determined that it is possible to attack and override certain components found in some car models. However, in order to do so, it\u2019s necessary to have direct access to the vehicle being hacked. So for now it seems like we can all rest somewhat easily, but who knows what the future has in store.<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/mobile-check-in\/\" target=\"_blank\" rel=\"noopener nofollow\">I Know Where you Checked in Last Summer<\/a><\/p>\n<p>Are you someone who likes to share your latest life updates by posting photos and checking-in to locations on Twitter, Facebook and Instagram? If you or your children do this, you should really think twice about about what information you\u2019re divulging. Each time you check-in to a spot or share your geographical location when uploading a picture, you\u2019re telling people, including potential strangers with ill intentions, where you are. Your best bet for safety is to be cautious when utilizing these social apps by limiting your sharing to only your closest friends and family members.<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/versatile-threats\/\" target=\"_blank\" rel=\"noopener nofollow\">Versatile Threats: Dangers Posed to any Device<\/a><\/p>\n<p>With the ever-expanding landscape of digital devices we now have access to comes a new wave of threats we must consider when trying to keep ourselves protected. Each device you own has its own vulnerabilities, whether it is the new Morcut Trojan infecting your Mac desktop computer or a phishing scam attacking your Android. Don\u2019t get caught up in an attack; keep yourself safe with a protection solution that covers all your devices.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Did you miss a few of our articles in July? Catch up now with our monthly roundup of the latest Kaspersky news and tips! Send Gmails That Not Even Google<\/p>\n","protected":false},"author":189,"featured_media":2417,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[282,192,131],"class_list":{"0":"post-2415","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-cybersecurity","9":"tag-protection","10":"tag-tips"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/best-july-blog-posts\/2415\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/best-july-blog-posts\/2340\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/best-july-blog-posts\/1352\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/best-july-blog-posts\/2415\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/best-july-blog-posts\/2415\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/tips\/","name":"tips"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2415","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/189"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=2415"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2415\/revisions"}],"predecessor-version":[{"id":32856,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2415\/revisions\/32856"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/2417"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=2415"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=2415"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=2415"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}