Total Defense

Security & Safety Resource Center

Learn about today's current internet threats and how to stay safe and secure.

Security Tip of the Day

Daily tips to create awareness of cyber threats and empower Total Defense users to be safer and more secure online with our security tips and resources..


October 2018
10.31.18

Weird email – when in doubt, throw it out

Clicking on links in emails is often how cybercriminals get access to personal information. If an email looks weird, even if you know the person who sent it, it’s best to delete or, if appropriate, mark it as “junk email.” You could try to contact the company directly (via phone) to be sure the email is legitimate.

10.30.18

Recognize social engineering schemes in chats and direct messages

Chats and direct messages are essential features of platforms like social networks and online gaming service. Their popularity makes them common conduits for social engineering scams, though. Never click suspicious links or give out sensitive information in these exchanges, especially not to people you’ve just met.

10.29.18

Steer clear of PC video game “cracks”

Many PC video games require activation, via unique product keys that come with official copies. There’s an entire cottage industry of downloadable “cracks” purporting to enable access even if you didn’t purchase a legitimate copy. However, many of these programs are malware. In general, video game piracy is high-risk/low-reward and should be avoided.

10.28.18

Do not send personally identifiable information via standard email

There’s no undoing an email (with limited exceptions if you’re in an Microsoft Exchange environment). Plus, email security is not as strong as you might expect, especially if you aren’t using email encryption. For these reasons, never give out your sensitive data in an email.

10.27.18

Be mindful of the lifespan of hard disk drives

If you use an external HDD for backup, be aware that it won’t last forever. HDD failure rates rise sharply in the fourth year and beyond, so if you’re wary of losing a key backup, make sure to have other drives in the mix and/or use a cloud-based backup solution.

10.26.18

Early Antivirus solutions

In 1987 appearance of Lehigh virus (discovered at its namesake university), boot sector viruses such as Yale from USA, Stoned from New Zealand, Ping Pong from Italy, and appearance of first self-encrypting file virus, Cascade. Lehigh was stopped on campus before it spread to the wild, and has never been found elsewhere as a result. A subsequent infection of Cascade in the offices of IBM Belgium led to IBM responding with its own antivirus product development. Prior to this, antivirus solutions developed at IBM were intended for staff use only.

10.25.18

Use cloud sharing instead of attachments when possible

Email attachments are ubiquitous, but risky – you never know what they might include. It’s usually safer to share content via links to cloud services, since you’re not actually downloading anything onto your system.

10.24.18

Types of Malware: What’s a Worm?

A type of malware that replicates itself over and over within a computer.

Most cybercrime starts with malware. Cybercriminals use it to access your computer or mobile device to steal your personal information like your Social Security number, passwords, credit card information, or bank account information, to commit fraud.

Once cybercriminals have your personal information, they use the data for illegal purposes, such as identity theft, credit card fraud, spamming, and spreading malware to other machines.

10.23.18

Know the dangers of torrenting

BitTorrent is a popular way to download content from the internet. It comes with many risks, though, including bandwidth throttling by your ISP and possible malware infection. Use alternatives or, at the very least, guard your activity with a VPN.

10.22.18

Ignore security “alerts” in pop-up ads

Some websites features aggressive advertising and tracking mechanisms. It’s common to see ads for free antivirus software and system scans, as well as warnings that your device has been compromised and requires immediate action, like calling a certain number. These schemes are invariably scams and should be ignored.

10.21.18

Reboot devices to purge malware

Many malware variants are stored in RAM, meaning that once you reset the device in question, they disappear. This was the case for the VPN Filter malware that affected many routers. Reboot regularly to stay safe.

10.20.18

Lock your devices, like your tablet and smartphone

You lock the front door to your house, and you should do the same with your devices. Use strong passwords to lock your tablet and phone. Securing your devices keeps prying eyes out and can help protect your information in case your devices are lost or stolen.

10.19.18

Set up email filters to keep risky messages at bay

All major consumer email services offer filtering options, with which you can choose what happens to any message that’s from a specific sender and/or contains a particular subject line or words. For example, you can immediately archive any email with “deal” or “unsubscribe” in its body. This can help you weed out risky messages without ever having to engage with them.

10.18.18

Avoiding Internet Auction Fraud

Understand as much as possible about how the auction works, what your obligations are as a buyer, and what the seller’s obligations are before you bid. Learn as much as possible about the seller, especially if the only information you have is an e-mail address. If it is a business, check the Better Business Bureau where the seller/business is located. Purchase items online using your credit card, you can often dispute the charges if something goes wrong.

10.17.18

Never conduct sensitive transactions on a shared device

The computers available at libraries, college campuses and other public locations are convenient resources for low-risk activities like browsing the web or collaborating on documents. They’re less great for conducting activities like online banking or shopping, since you can’t be sure they’re 100 percent secure. Stick to your own devices and networks for these transactions.

10.16.18

Understand the dangers of public USB ports

If you’re in an airport or cafe, you might be tempted to plug your device into an open USB port to charge it. This can be risky, since you don’t know if the port is compromised. Charge via a wall outlet or bring your own battery pack instead.

10.15.18

Create a password reset key on Microsoft Windows

If you forget the password to your local account on your PC, all might seem lost, since there’s no one to email for a reset link. However, you can hedge against this possibility by creating a password reset disk beforehand. “Disk” is a misnomer; all you’ll need is a USB stick or SD Card. Simply search for “password reset” in Windows and follow the instructions.

10.14.18

Avoid unofficial app sources on Android

Android devices provide considerable flexibility in how you download software. In addition to official stores run by Google and OEMs like Samsung, there are third-party storefronts offering many apps that never underwent any security screening. Stick to the main options to avoid installing compromised apps.

10.13.18

Beware cyber risks you may face when using social media

Don’t’ over share personal information on social media. Sensitive information includes anything that can help a person steal your identity or find you, such as your full name, Social Security number, address, birthdate, phone number, or where you were born.

10.12.18

On this day in history – backdoor trojan Bitfrost infects Windows

October 12, 2004: Bifrost is a backdoor trojan horse family of more than 10 variants which can infect Windows 95 through Windows 10 (although on modern Windows systems, after Windows XP, its functionality is limited). Bifrost uses the typical server, server builder, and client backdoor program configuration to allow a remote attacker, who uses the client, to execute arbitrary code on the compromised machine (which runs the server whose behavior can be controlled by the server editor).

10.11.18

Update your router’s firmware

Outdated internet router firmware is a major security risk. Unfortunately, many people aren’t aware of this issue because they don’t do much with their routers unless they have issues with their internet connections. Take a look at your router to find its IP address, which you can enter into your web browser. From there, you can check if there are any firmware updates available.

10.10.18

Backup regularly to reduce the risk of ransomware

Ransomware is one of the most dangerous cybersecurity threats because its damage is so hard to roll back; you end up having to choose between paying a ransom that won’t even guarantee safe return of your data, or possibly losing that information forever. Local or cloud-based backup can help by giving you full, restorable copies to fall back on.

10.09.18

Consider partitioning your computer into separate user accounts for child safety

Most operating systems give you the option of creating a different user account for each user. If you’re worried that your child may accidentally access, modify, and/or delete your files, you can give them a separate account and decrease the amount of access and number of privileges they have. If you don’t have separate accounts, you need to be especially careful about your security settings. In addition to limiting functionality within your, avoid letting your browser remember passwords and other personal information. Also, it is always important to keep your virus definitions up to date.

10.08.18

Protect your accounts with two-factor authentication

The hit video game “Fortnite” recently began providing rewards to players who set up two-factor authentication on their accounts. You should take this step on any service that provides it. That way, you’ll be safe even if someone gains access to your password and username.

10.07.18

Be careful with “free” VPN services

A virtual private network is a great way to protect your online activity by encrypting your connection. However, in many instances you get what you pay for. Free VPNs might still log your actions and keep those records or sell them to third-parties; the Facebook-owned Onavo VPN, recently removed from the iOS App Store, showed the reality of such risks. Consider paying for real protection.

10.06.18

Get savvy about WiFi hotspots

Public wireless networks and hotspots are not secure, which means that anyone could potentially see what you are doing on your mobile device while you are connected. Limit what you do on public WiFi and avoid logging in to key accounts like email and financial services on these networks. Consider using a virtual private network (VPN) or a personal/mobile hotspot if you need a more secure connection on the go.

10.05.18

Don’t rush to click links

Hyperlinks are tricky. When they’re included in text, you can’t immediately see where they lead, meaning a simple click could take you somewhere you don’t want to go, like an adware-infested page. Consider hovering over them with a mouse, or copying them with a press and hold contextual menu on a touchscreen and pasting them into a separate document, before following them.

10.04.18

Let your common sense guide your decisions about what to post online

As a general practice, before you publish something on the Internet, determine what value it provides and consider the implications of having the information available to the public. Identity theft is an increasing problem, and the more information an attacker can gather about you, the easier it is to pretend to be you. Behave online the way you would behave in your daily life, especially when it involves taking precautions to protect yourself.

10.03.18

Rotate your passwords

Many services will allow you to keep the same password for years. That’s dangerous, since data breaches along the way might expose credentials that you use across multiple sites. Create strong passwords using a generator, and update them periodically, every six months or so, to ensure you’re not using anything that’s already been exposed in a breach.

10.02.18

What are web site certificates?

If a company wants to have a secure web site that uses encryption, it needs to obtain a site, or host, certificate. There are two elements that indicate that a site uses: 1. a closed padlock, which, depending on your browser, may be located in the status bar at the bottom of your browser window or at the top of the browser window between the address and search fields; 2. a URL that begins with “https:” rather than “http:”. By making sure a web site encrypts your information and has a valid certificate, you can help protect yourself against attackers who create malicious sites to gather your information. You want to make sure you know where your information is going before you submit.

10.01.18

Watch out for man-in-the-middle attacks

A man-in-the-middle attack involves someone interfering with your attempted communications with another party, typically a website or application. It might entail monitoring your traffic via a non-secure public Wi-Fi connection or sending you to a compromised website. To stay safe, make sure your URL bar always displays HTTPS when conducting sensitive transactions, and use a VPN to encrypt your traffic.