You are on page 1of 97
NEW) EASY TO FOLLOW USER GUIDES ONLINE SECURITY FOR BEGINNERS np BLACK & WHITE ata ONLINE SGU) Centon ul eculsst cuir e ecu Ee coud mastering a new piece of hardware is tough. Even tougher if you have no-one at hand to help. Conversely as the complexity of our consumer technology increases, the size of the requisite Re an ce et eee See ee eee te eta Ue Ce ecu naar RUS acu Lea ea aCe Bee NS eee uk Sem oe an cat De CUS eee ur ea Rare ted new journey or adventure we are alll beginners but fortunately for Se eRe eae sete amas Over this extensive series of titles we will be looking in great depth Peder ea emetic Melee eR red out of the box! We will guide you step-by-step through using all Beet ea Musca ed PCr cient cil Seats] NE em se uu ICR acu huey toa confident and experienced user. Over the page our journey begins. We would wish you luck but ee Ret stents is Contents 10 2 “ 16 rr) 20 2 Py Types of Security Risk Hackers and You Social Engineering. Ransomware: How It Works The Virus Top Ten Phishing, ishing and Smishing Pharming Windows 10 Security Digital Security FAQ ‘Top Ten Antivirus and Security Packages Bitdefender Total Security 2018 Review Kaspersky Total Security 2016 Review ‘Mcafee Total Protection Review Setting Up Windovis 10 Security Why Updating is Important ‘What to Keep Updated and How How to Secure Your Web Browser How to Secure Your Home Network What are Wireless Security Standards? How to Secure Your Wireless Network What is Encryption? Enerypting Your Windows 10 Laptop Top Ten Encryption Tools for Windows 10 What is a VPN? How Can a VPN Improve Windows Security? ‘Top Ten VPNs Using a VPN for Added Security and Privacy Ceca How Does Information Move Around the Intemet? How Can Intemet Data be intercepted? 10 Tips to Protect Yourself Against Interception How to Secure Your Devices How to Secure Yourself on Facebook How to Secure Yourselfon Twitter How to Secure Yourself on WhatsApp What to Avoid when Creating a Password Password Generators and Tools Top Ten Password Managers ‘Shopping Online and Security How to Remove a Virus or Malware rom Windows PC Glossary of Terms ae WAP AG TS fel terol tg fol USA gels ben ote Witireasy to follow tutoria galnst potential threa Amember of Devices hacked in RANSOMWARE the public is LESSTHAN: | ATTACKS on HACKED every: BUSINESS every: eo NEWVIRUS cine Laer a threats . : se EVERYDAY APNG CRE Pa bs 43000000 REPORTED INSTANCES OF FRAUD through cybercrime against UK banks last year eri 5 eek cme abs cae a noire rsp an mations QE my MESSENGER Modern Day Security retention nee aa way we work and interact with each other. It estimated there’s BPP ecco eae ta ene ke eoe cmos with access to the Internet and whilst most of it may be irrelevant, Pt renee ue Cee ets Seer eat Mr ara tr aay Fee oe Ce ge ena Ae Pree Cu Meee ee ares Reco ete pte khan ears tae) Ernss ane neon eee everything else the Internet has to offer. Ber earn SCC henselae uM UTS they all mean and how they work, We can help you to identify and Pens ol ns eee ms -) cue Types of Security Ri Ris = Se eet Mea ee gee ur avs ci Ss aff eee Ue so eur ou eee oe See ae CL WME eae ei Aa ec i eal “Thisisr'tadfinive lt of th posse treats vale for the Windows ate oeeane estan erases cet te See patina Viruses iy BICC a i atichecri wees fant eer eet al O1 Cee ene oe Be ee eee ee ey eee etter ec per ees Te ee eens ree een ns Pe eran eerie re ee es a eTocs ere ces Cee m et 0 2 eee Te ee eed Seen Creu eaten ees oe & Wows Pe tear necinnes! Cee BSNL} i ee rs ee) pn eee ee Serene ne tetra stem are censure AbKofa nightmare forthe aoe Sa eee Sacre curianart Cee et te ny - RO ea as i Nek (age UTE Priston siete eel eoeeringsees coerce enna Sen posi aerecinlebat serie soesanern Geese Py Hacking Cee Prprennanemorcetnc enero iy Pounce neoeenoreenie Percannreniacnety eile eee ener inne Ceo oS Sylar ad Peers | Rees relinerer seas, eee penne mee eery Hrs ao a eptonnrnteotty Peale erence meray Pesos reves sapien salle ee Penis seinspeosien un 7a Peery eh epee ion eee Peon eet Poneto ee a: Lotel ud es ae Oe) Ce ee ety ne eee eta ree ra ind You Pee enna c) COPE ees rt ar ea cee eaten Rea ele onun enema ae enu rs CaN RNase ad CoE eae eae cmc an erate a Being on the end of Perens eee Pv tarts robbed. There's a Co You’ve been hacked! 99 Ceo as thatsomeone Pec) Sate belongings and Beinests El Modern Day Security) Social Engineering With therise of wider formns of communication, through social media and 0 on, comes a new wave of threats called social engineering. There are maniy forms of social engineering, so lets have 2 look at what you're up against, and haw to cambatit. fecal engheeting Is the new nade way of manjpustng peoole 1 ge up ter personel Sone formation. comes nm fans under citeten subscesdngs such 2 Phishing ste, aly al sfemsatacialenpseing cena, the camer wl tae your human ature respons aed en Raat fo helo in, ‘You may thinkyou're elie es 6 not the sort of person entre ype & forthe mestcances'e to befooled bya svalyaeyourpasworsbarkandcredtead deals, ore@ scam butolten the fmaton nace gan aya an Foreign offers are fake Joosoec ee eutnmse te, ea eee 6G eee eee, from someone, usualy based in Ngera who fortuneinthe bl ons able to put the money your hank acount Nee ess ret, hen RS ere tha key tobe Scam, te, Ube, leery es em the thogitepocnseuvilectuytermanisonea | SCM, 2 ‘and nce Ge vo he onesie tesco can he and cinerea new arenttoo mary Nigerian sears th more se: aphonecal on semeane chiro be kom Mice scam cfeet nae 99 FS sem dslaye.a weak of eclessinfarmaton onthe seen whit scammers have Wary sammes want you to eect uch 38 inthe Eoeeraand they rn helsing and hacking sare tle a mater of uy Tne 3 fr some eter we-kaoun company, who ns that they retracing a i hav ra pute They ask hot employed lesan er onnebongas Tecate OKI) | avsond means xa on an er iseorking which to bait you. pnt ‘ther common social engineering tactics nce from a ‘rend, he hae bass hacked wth the scammer rmascucrding asthe. could bean enacting to bx Ir yur bang went equest rtp arson asking for 9 donation se 2 chortale cgensaton, Se wary 2nd a ques "Hs Modern Day Security ) Ransomware: © How itWorks & The frst instance of an extortion attack is crecited to Joseph Popp back in 1989. Since then the frequency, delivery and scale of ransomware attacks has increased significantly; so what is ransomware and how does itwark? cme 9 pon ay oom falar ed Re: estas val vend freee fang hase endtiansrous Essential, ransomasre villinfe: on indsidual computerand one ftv things con hap fst, teks stopping al esst9 tor theeyboae thenitstarstosaarch fo dat aed sneryp the contents of re has cre Lastly intact te boo of ransom the datas the message can seh te Atemately, andthe computer ane dsplays a message cetaling te ype inva al pay forthe fn a fate Fl varinge ne ced ond hing that may hapa once 2 ystemis nected the ansomiarevil ayn wait untae time 2, then eo lo! the abous ai ace the emptor Win for a set netous machines are infected before ary fx can wr ransom pad You nermaly have a sectime in 2 the ransom, usualy us. the vim dows't pay in time, the atacker can inuoduce a second phase into the anconware either increase the amount demanded fies thatarebeing held at ansor. Ransomwore can be spread in a 0 popular cece of delivery cd web page, some ‘rm Fash serpt that hasbeen hiecked and na contains 2 Ink erwhere tia bronzer will un tenaly door 926 the ransernare code. More recently there ar instances of Di stacks, where ersamware coi locates ary USAstcks aust ray have in thir sytem and tanse isn the knowlege that the til lbe inserted io works computer miber of way ofthe most presenta ecant yar if artrsatec tat mere than 0 campuses acraes rendering the kes of big compan ator Co and Telefonica SA under siege am is dems, The Raina Health Series in the UK woe ME 29, re dlzorée forthe sta anc patents alive in in weeks of chaes ond How do you avoid getting your computer and what happens if you're unlucky 66 What todo 99 ‘enough to be the targotof such an tack? Here somehin tips for you, fy 70a Rios % ig ae ions oe ila Virus ice ircia) ng thankstalmorelingenious ne pier ine Ree eases geen) Ser em ene cere ewes ror ea ee ka) a oa eo Miteret tec) acon Sear) 66 Digital pai yp) eee renee destructive viruses unleashed thelast decade into the The Virus Top Ten storm Worm 63) 2conficker Modern Day Security Its tempting to al for these three modern day thre: calengneerng the act of gettinginfoaton roma peson based toreact helo be entrapped intosome on offalse promise, ien'tasmecem asthename suggests. Although tetem social enginering'isin fact latively nem, the proces of obtaining sensive inlrmationtrom aves hasbeen around fora ery longtime. inereaeed the rtacie and ha they'edeivered. No lange ict mbeguledby post, now bombed by fo wabat cna getetterde dlsgused mediums moder method haw a emmst wlatengttocltlnyour pes be eecaec You can Cate 3 Kaspenly Rescue Di which youre abe to boo rm naud oma ge gowwong,alwingyoutascan and leap comer without needing to aezess Windows. The ls goes 0 coves proty much eveything: nan alleream Kaspersky Total Security 2019 Review CH ‘eras ‘aired 7 = ing ir 0 42924 Setting Up Windows 10 Security CH fyou click the Vnus& ThreatProtecion Setngs option. mnfutherept ts improve he system prolecion Makes tallthesub-optons re setts On and sco down ode st Notiiatons, the ogra 8 Yiu teat protectin stings page youcen mnthe trp tothe etothe sre; 0 de the Qu ck Scan but, Withn nscan (ala reteaklo frames) oranOMine scan, : vanced scars [ectnetoass es SEED 23). cickon ne Fewalle netvakProtecton fom he een tintotheot Aga you teretingadedlie, the! pry _scustysute rake suretasthePrteand Pubic renal se setton hus protecting youre kor avant it i Frewall & network protection Why Updating is Important Continual updates, rebooting after an update has been installed, then the inevitable second reboot, straight after the first to apply the update: it’s little wonder people stray from the regular update checks. Whilst it can be a pain though, keeping things up to date is a top priority. Update, reboot, update, reboot Updates may ellbe the banefthe modem comouter user but they are therefor areson.Itsnotthe bit era anymore, wereed these updates to hep protect our secuty Here ar 10 reasons they remportan. Xena rp Windows adele la EST cattrceserievsatensions ththanestemete dest scuny pate bu sncthercods . ye a re up 9th teas vis deetions This samen thothandlethe athe UPDATE : Ti “Q@ @ & & MF ? oo - . — SS raat: en Your device is being protected scone indovs ‘soneclthe it byersofsnany on ur system. ith acces te your computer ram anther soureismenteres 2erdoven ace toppg poten reas 4 Frewell & network ustthe Wadowsearetilsthatraquie ar updates, youre MersoR Oe shat bea pate the overall tindows 1Oupcate schedule. There re ites OFfcetoo, tch whe expat can aliw mal thesytan Tekin Glverse upstate \edows Uoaes vanced Options. coe corpus bot © Advanced options Dinan ene enema meses ETRSSTER cetac0tic coef provides Svestormoctotthehe These rversaresignd ard seid esol any ne ice oF Fardnare installed wil rk an ibe sale according the cv potetion engine ( Why Updating is Important CH RE Norsgenuine copes af Windows have been Nt sharingon he inert gine popula someting illegal rampant. Windows 1 updates eure thatyoure using eine cay of heO5 ach ulinaty sacar yeu PC aga teats trom pwrated a genuine Microsoft® software FUTURE UPDATING Ji bethelat fallesson ofthe OS ast ine ows 10; mopamed ti ‘The meors tl boa con update ycew th acing or emening lates. Ure thelatestvsions soft has big plans forte ur of eaten mentioned tht hi wl gM Windows10 EGER auto) Uadaesretely ath any wera, theyean ako feeupsysio reseurcesby coving the coe and streamlining the vate sou ifyeur cemputeris petoring etter henitcan easly hale aground vis rc threat cans thou afectng what yo. ing What to Keep Updated and How Discussing updates is one thing but how do you go about making sure that you have the latest updates and that all the necessary components are being updated correctly? Thanks to the improved update process of Windows 10, thisis surprisingly easy. Keeping Up To Date htt to update vows 0, ae lens that canbe mista, Wee ale melon thattsneton Wows tht needs updating but alosctmaranddiers racy check the update urton, - sone te What to Keep Updated and How CH ED crccercoeren = sty sogansanppctons 0 ae xt abvaysthe atest versions. Therein isa ple Launch the program inquesion taken checisforthe atest version If 5 ult hardaorea rot leak erlines such ash or sia, usvalyin te el, sme hardware and Windows 1hasnt ceingtiedir this ro 1s thele) thenyouinet to hurtone down Stab lcsngthe devices product rart2ncrumberandenteitrta ear fees see llaspfomance vedates For eamale you onan Sigil ninthetsk BB Open NVIDIA Contre Pane eater Update notifications > BB nwoaa control Panet Bait sieangth Siatouttonanderoosig anageFromthe menu Inthe Device Morage wir cl seseseeeene soos antag rake le IO Steere The Hoisia Experion you toimpreve in-game we * cx optics the oe =: ual he temalealy,andyousre ntact any arable dives Home toctedkmannyclleken the iverstab flowed fe READY 4 How to Secure Your Web Browser The web browser is possibly the weakest link in the entire security chain. It's the software product that’s on the frontline, the one that will inevitably bear the brunt of any Internet attacks and as such, attackers focus a lot of effort on making the browser a portal into your system. Safer Surfing Seouring your web browser snttoo dict. There are plenty of options avaiable nciudingsomethi-party ac-onsyoucanusetoimprve sec. For thistutorial we using Chrome lable ptr rom the at ch0006 Sti (_ How to Secure Your Web Browser CH es the Derma econ, an where tosave cach lt ontent Settings lous a peter eyes ci control over lac Fash Pop yourcampters mstphone and sen the webcam tsar edenive et 0 wecantginoallteoptonsstn| thst spoxe For maunam: ic theboxAsk dwniosng Againthisean be osckgourd downloads contol andthe ality te stop the user however style ovaScrigt anda and frominfecingyoursjter ging your aiduebeamare protected to Downloads Totelet te Groves gover se stersions, Settings ard About dickthe Eero ‘Beensons page open sll done theattom are click se Done burton when yout fished Content Seng eurnyou tothe Chrome Setnge age. Within Privacy ware thelist option, Senda "Da Not Tack request tiled Th willetonanytacengelement rma ‘zacites a ie veh coa Store launched athe tension nk Pus. vatinthe tells, cckon the Add omonfetoption forse us hil intallan aden home, se 12 es preiton sevctalnd ages moea'h becker rgy0u om any tess rom ene adverts Do te same orl fanant racking a on and HTTPS Every PERI sc uaderse previous ep ticket al ‘nckthe te Pasancs an Forms bowes that Aatoll and Saveur Passwords Whistis apna constant ercer passwort tga ck home aa gaining youruserares dpa How to Secure Your Home Network We've mentioned previously that an attack doesn't always come from the other side of the globe but can indeed be a little too close to home at times. Home network hackingis possible with the simplest of tools available on the internet, often even just tapping into a cable. Network Protection ‘whthoutbeing oo paranoid, ’sremarkably easyto get into aneighbourshome nework ifyou Iveinabockotflts or you use powertineadagtes, you may ‘eed to consider these ten steps for bette networkprotection, RUC UR Themescereenerrypiettogpinacces: canbe 398 werk iathe cuter The outer ardopingtorsatc addresses. very dice that nsf ensyption bic dk annecs te 04CP exter eetie an Pacers Ey eimmathgthstyouge to range alatle sretoel postbut ts wat consdeng, uty sb ingOHCP onyx ee ommend jcomewith afc auenteation ales BAC ei Aces Code res, alts anes cansaies i re According» Tusbrave a ED os rnonck youre Consul your acktesiescfyour devs, scaly they can be ‘outer documenta formar deta thampleaapertnty 0 hor simple (How to Secure Your Home Network CH 2 es or one: teaser rset connecting ie ewok aling lengths able ound share Howe ose proximity toate. Once ahacier has gained accesst our dkpsndngor the adapt, poss bletouse anther acspteto gan acessto newark going to ary shared eiersyou havea bea dod, Inexree Ws Never homecare commenvuheveyo'e ble ta pickup another netwok, cases dosha anything but gona ihten password con ovse eenenponbutenith AWA AN . / . tenes eae FEDER Sei esrerrincrerciscteut intima ntinsnicinctoysstarmncioaresttsen thon thatofwielss bueiFyovelkingin share accomodation or fitch ons Blog a nevi haa hemenaeaeais ‘mavesurethat ny urseen cabllangthscentbe ace me gospel compe or double cheng Dieeteconmnecrondons afpntgrann ent ainoans ferennaas ing seater mapping a cea Cae ichas Oper A toga abate tury, model De and conf ancora ae areshare hy are sear, publce any itor maybe “That oa,should anythg on a9peat youl snes et smetirg, Behind decks and general any ablesneaky pig aptop What are Wireless Security Standards? Wireless security has adhered to a number of standards since 1999, each improving over the last due to the ability for a then-modern computer to hack the security levels behind them. Tighter controls are needed as computers and the way they connect have become increasingly more complex. WEP, WPA, WPA, IEEE... ‘nid the cong acronyms logical progression of vires neryion and secuy pretacls Whi tfsthey sere ute imerestngto lam ofthe ston. chnd de 1 wiskess nears hae evoked cnet lest These standacs ate alvays moving forward and lle most element uplec decades and sofas the ways and meansin whch secure Ral. sot tecnclogy incusty they come witha bewikde pues you reed Enenten ane shat cata and connacton ea wires newer ereypted othe ications stare in 3868and hat are Wirele nny, “a a fon thee dae ost, mage lst ng vnd-numbing WEP Access Point pots, thi How to Secure Your Wireless Network Itmay seem little far-fetched but it's not unfeasible for a hacker to sit outside your house with a tablet or laptop and gain access to your home network via the router’s Wi-Fi signal, Understandably it's quite rare but it’s worth considering beefing up your protection. Wii, Lock and Key Alotoftesanderdtpsonprotcingyeur iF mage withthse of rotctgyour wieder Rs commensal andeepnganeyeon whats gingonnyourown nebo ssp| stheramecttie petolecateard onnact a Moet route ll model malengteasertera cess, its ecommerd te fofnethe stomatenthey nse ain krepenty change thei, opion to hide your SS fom sep ber ghar, neoee whos casual leokng rund or yeurrouercoaumentatentofied SP ssoplesdroser tnd a hether oom sco teemamesind seewre than thatefthe cto teyarestllobtanstietomibemore dubious does adel le more dul «quero thelnne Apetenihacke-leosipbeabletogetheldolseot network te access ou'ineed con sewhaepable changthe SP del userame ac password How to Secure Your Wireless Network & ter located Se. silat omens ee oes the masterp comeroutersdefsongto a 1 Thismeansthatntoniy wl he rutr broadcast hough the au rea, scart hay stand Saobroadcastng oer much of the steein ron. Consider placingthe pesto ener routerina ere cen rc yout hase, Thislers peat coverage, he WPS buttoncnaroutr ae eice lal ee . [ERE RSME Petrova marcomessuthindows 1's exnypannge cedtoent'the the real om tid arya tonpassvord This catalan phystalactessto your ate willbe abletop on mavesurethatte ale ond CH TumingoF Wisin the outers ere sn ore ethan a SABL * —rerweksecty 8 erng ose devices that ate alowed to comnecttoy | DISABLE GUEST ™ a ne ey reabityio route ancheeprganeyeor whats connecting youre bleto cone you ve eter ec fa es o NAG a ii ale rome = © ME = Protecting Yourself Whatis Encryption? We've mentioned encryption and its impact on your privacy and security, but what exactly isit? The definition of encryption is the process of converting information or data into a code, to prevent unauthorised access’ Kryptos Communications Totter understndencryponits orthtaking moment toleam abouts orgs howits bee developedovertheyarsand hou apps tour modem communications he wor encypton comes Fam the ancient Gre word Kos which meens be shared with eveyone ands usualy generated by sft ex proeded hiddenorsacet nterectngy.teusecthicngmessigestiomotescanbetoced designated authory Theprhaeeyis something that usualy only known by he och te saigupnen seaesue heen nonstancartnemayehsithin otter instal yer ceenng} bath ype atleyecanbe mooie vereoneuserhas CGonmunieions nc to ide the mesage Fen Histon the Spatans vel stp of kahit me ps ware fad they were meaningless ut hen decprentle ros Acoding 93 picky and arora phate hey whe bined totam ashared gave hen the ercrypion evel ed atcurd en ofa ante hours eden forms cf enyation area a emared fe same to be able to sere 3 mes ‘ee blade to dekpher Homer moder ec simpy send codec hy Hy were abe sofas oe lon key eee tcl 3 0 nheria rereionof I" yeasinode ocak 5t-0¢ ney 53665. Not oly conde neor a levl of utero, 0 eon ons, hire 005 recur ener the caer av those noo cen ersurec has ben tered ine ean ery hing em gas thet xe generay fa toomind be eco use 25 tenet then yo. ging be protec er at no tien times iglocomorhend Sue bur 2 ey ial age re oy toprtectthecemmuncation on tebe tthe ne. These algercre grew in comple a tchnoly acarend an wasnt ong before the mltanybasedfems oe cial modes f communicator, Within a fe ha cat baka ona rent wand om mode begin ling these new protcos to peotcser sei rowmatr -sofeerption wre the exert at re beng usee 9 dy use ey eng and sing dies tet bose may ae 256111485 lors eypton standard that sega sr neatly wget to beak without spending bilo 0 fet hacnare and stare. n lin Erlh the modern Cope ntaky owe pabdte dooce at Encryption is the act of oe nese ray es caps protecting your data from Syme fy cbs se the sane fey to both ena prying eyes and deen date. Tre most popular smmmetie coer AES Uhokarces enanyotin Stance), cba382 oy ovement pitt cormmunicalensarcidala Tiss aftr deoyetion that eqies the send to exchange the hy expt theca he synmetie hey cigars ee als brown 35 pubiskey ens and Use me matematcally inked ys pub and pia The publ kay co Whats Encryption? “Forms of encryption can be Al oo ae 298 = — traced as far back as ancient 3] A 25 2 i © Egypt, using non-standard z Big ; » S ? i ae hieroglyphs. HEISE k abe “Making data impossible to read isjust one step, you also need the key to decrypt that data.” “The universe is 14 billion years old, but it would take seven times that time to crack 256-bit encryption.” Encrypting Your Windows 10 Laptop Windows 10 Pro comes with Microsoft's BitLocker program to encrypt the file system; however, Windows 10 Home versions do not have this feature. Thankfully there are many encryption programs available for download, we're using DiskCryptorin this tutorial. Windows 10, Under Lock and Key ‘Wier goingtoencrysts 268 USB fashinthisexampe, purely for ease of use and to demonsrathow you can encypt your enti laptop hard drive) bac hemerwto thera et clckonthe Dolo Thsiilopen a con Disko ralionboxleke (_ Encrypting Your Windows 10 Laptop CH Tae pe esokdn eye Dok You're nowofered aseection of eal algortrs to hace en Clckthe do em fa nel ut crfmnaton With the DskCrypio st. window oper, clekihe Nex bu recommendstayingwhthe default te sigrtam fr thetime being Leave srdaconttielenseagcementon tree ngpage Frthererainderof the lie Made boxas Nave ae when the opton choose ede, ekg ow hen doe ictal ready ct Nex buon, RD sie: rct00t, clckthe indo Stat button and cae newly instaled Disk pror program ual reed oleh Arete teadmineat reat insalled hard section, choose auriquesasswordforacesngthe skeen strona paconard = enter ag inthe Confim box Clckthe OX boxtoste opaniyoucan eet etc Youcancleveachin turn nd ‘ets inbrmaton2thebetom atthe DkCrptervinca z electing ha ds you war to eneypt nau empl a BEET o:>2ncingenttesze of heave, ardhow mich datatheo oned bel, wee ping testis auton a Ssh nthe encryption process coultake some tne Wh otoona evreconra ththe camrpliteyeu'e nated an the selectec crew ety wth he roees, rectcrveselecedethercicktheEnengtbuttontothenghtorrgiccick _bergtoarcess anc decyottusngthe pasword you setupin he previous sretchosse Enerypfrom the menu, ouopevees ee Top Ten Encryption Tools for Windows 10 There's no shortage of programs that can encrypt files, folders and entire drives for Windows 10. Whilst some are very good indeed, others tend to fall by the wayside by not offering as good asolution, Encryption Galore Here are ten diferent encryption tools fr youto conser that work wl with Windows 10, and some previous version oo, Some are free, thers cost but they teal ned thrown ight. yo aes eran e Gl AxCrypt www.aXxcrypt.net VeraCrypt older king 25eiteneypsion snd ows versions ota cet butyou' reed CREED ser tscroe ee = it Resiee auc, ait nett fray files lero AE 256 benencton ancan es EcaD ™:; uplesdinto our ani store arcloud pcsce.s Py. &CertainSafe Top Ten Encryption Tools for Window Caan iaene san enous treats an enteral peri prog, Iescesgnedferfeandemax erenpten, offargincreible lve of secnty Wdors? awa and Misa Ot sade Fanaa gl so useprogtam shi are updates; and dekart MAKE IT SECURE repregamthatcan achieve high Pereaenp leslsofencnpion wit yous What is a VPN? Your system may be secure to any online threats butit doesn’t always mean your privacy is assured. This is where a VPN comes in, as it offers the user a heightened level of anonymity when online and even another level of security and protection. Virtual Private Network Using aN canelp hie your online presence Whilst this may sem bk an ideal wy togettoiegalconten eb atualy designed tohlp Fighter your basic right tointemet and cea evacy hereiono sent 0 rectly reuato ‘ke locaton hat youean toveme-bour! Pac mito eporton ats gingon'n theron county other ten home cours thats wth bo Using a VPN will protect your access online and filter all your Internet traffic through its secure service, PH tir andconrertiondets MRM aaa Ue Cais cha) Online Protection and Disaster Recovery While you can successfully protect yourself and your own eon eee eu Ceeeatonrenct si ee theet sm gti eneXe Muen caar Cree eerdenr ete usu eee ig od eure eRe Ure ee Ue ces ns ccs ul ee Le Over the coming pages you'll discover how best to protect Petes me nicole Tuc Ree REC eaten use neg your Windows 10 laptop and other devices. How Does Information Move Around the Internet? Before we get into online protection and disaster recovery, it's worth taking a moment to lookat how information moves around the Internet, in particular your information. Just how is data sent from your PC across the Internet, to potentially fall into the hands of someone else? Information Superhighway ‘heteretis ahuge, omplexnetworkor computers andis widely credited as humanity greatest achievement. i'sestimated thatthe Intemethouses smethingin the region o 10" byes ainformation,whichisqute alot. and-enten i hat snd ey aphne ce io af pose os ae tark ans pcr The Internet is regarded as the greatest human achievement, and it’s not difficult to see why 70 Jow Does Information Move Around the Internet? “Data is split into packets, with headers and footers telling servers what to do with itand where its going. ” Ny: SES Ts Ns) es “Along with protocols, packet information can take any possible route to its destination and it happens in a matter of milliseconds.” “DNS servers translate IP addresses to readable locations, the packets then know where exactly to head to deliver the data.” How Can Internet Data be Intercepted? eee d the Internet in packets and with the help of Ree eee cas) Meters eo its sour ror eeu asd eeagecce antares: tel Doh fe VETS ne ee ee te Dea) Creare es or ag ing heenathpebetre post packets are esi tected en (a4 fl nga HTPS ka, they taxevry t Cn ELIE oe Shoulder Surfing Pa vay of be using an unsecure tied a Perens cee Paes eed ts 2rea ond oecibtn Fake Sites Online Protection and Disaster Recovery 10 Tips to Protect Yourself Against Interception While it may seem like fearmongering, detailing the ways in which data can be intercepted, it’s sadly areal world fact. Public Wi-Fi, hotspots and free access points are the bane of the security industry. Thankfully, there are ways in which you can protect yourself. Public Safety Desptethe ferent andar ay sackercan gn access toyourinboundandoutbound data. here remessinhchyoucan defendyourset eve arelontipstohedp you protect yer data om bgp. theisrcnct one thatsbengspooked. cid WiFinames ike Fee WiFiHere lent sin good wor ors 10 Tips to Protect Yourself Against Interception & be insreted bt avith heh phest oi code fcukioramacierto dec VPN chet enc than pombe use aad on aca verte or your bone lel makingitvitaly io Wi https:// meee oust catSdetaisin anATM, Cover yout heyboare as much neta dataith anyone whos als conned to the same neta posable ad moke apoictolookng around make sure noone mchinayoucwor your have onyou. Thre nsances hana deve ‘walla otextsenirth suniquecedete dane fcrottalystashtoanyonlabe ens sesobeactlerati. _yougraretathe mene - ‘smart network sich H ar wteth FON wB) Online Protection and Disaster Recovery) How to Secure Your Devices Mobile device hacking is on the rise. Most people now carry a phone or tablet around with them all the time, containing their emails, browser data, photos and enough personal information for someone to be interested. Ten Tips for Safer Mobiles ‘earpersoninoratons wrt ate abit the ght puna people. nots Wins o secur youneedto ep inmindyouneed conser _yurmabite security too, seupdazenonypton on BRUISED on yourdevenieancctshe moet soi secu tips be ceves Ether use anumber ices code patter lack olockyour device hen Title more eto ther ; 2 yourdeceis ingen sec a2 abacap, hen someiornafremotewos shold ARO eemersin lace yourdotaslosttoo nected computertosene adele gral tothe ost seethe shore again btat este pasanal ata win Peo eur Backup and restore Back up my data bidnsaling sncpary apes. NEESER 22 ance cfsccalensnesing pronescems vehing ur personal iia ene For security reasons, your device i RE ee ey Pe ees ent Seer felony Cr eed Seirus . ; etwor vate rm he man dering connecting a public WF point 00000 ORT cg Quick connect od up 68 romsour device, a spc sal buimare en than ter up Recovery How to Secure Yourself on Facebook Facebook has become one of the best sources for cyber criminals to gain personal information on the Intemet. Without realising it, a user is giving out reams of data and in most circumstances they're makingit public. Tips for Better Facebook Profiles. ‘he dangers of social media arent jstfor young people, many adults havebeen duped intoberending someone they don'thnow and exposingthelr persenal information 2 any updates Privacy Settings a © seourty andiogin (B Privacy ™ IF) Timetine anc tagging © Blocking i Language @ Nottcations atta iirg epron at Mobile Settings How to Secure Yourself o Ei ‘ptngas it maybe. ty to avoid postgyourlocation Whether youre Ei ‘Nokall apps youinstallon your phonecrtablet are good. Take a sham sn ron Yeonha ay sho. that ination be mace moment to eadunat an app tnytoacces hen ts tale. len op setnge BE onto een ecccccccere = an Ei: d avoid shaving raniom thoughts of the day, spirational ques, ‘kenersor other suchitens that ppearon your ents stances re crested orm or second aes voces back neal ‘efom athe & x tener Loe 8 ‘oon 105, a mw Pune poss Po rato i ce Ell: 1 inthe Settings» Privacy section, consider exiting thedlelaut on forthe Wa ea look me up eles. Tose wl prevent tne publ oreven ends offends, om being cle tofnd you on Feeeo0k ‘which nun ad ah ghee Loving someone eee theperson out and necessary message temta indo ho hoa they know you. ther comments so ethinglve wer’ ih then nore the request 3s they could be Ei sue tha the Doyounant search engines ouside Facxtook veurprotiesston ssettoNe. Tish yout sarrecnhohas eee yournam nto Gang t hope thatthe might tablet nd yourFaccok account Bw Online Protection and Disaster Recovery) How to Secure Yourself on Twitter Twitter's success has boomed in recent years. Where once it was simply one of the more popular social media platforms, thanks to presidential candidates and scores of celebrities, it’s fast become the moder media phenomenon. Securing the Twitterverse Sad. deo popdarty, Titers aft feces panes hackers ardsocalenghers scouting othe nes petal ctor monetany tai rsp brn abusi Hee are tenpsto hlpscie you Ter aco Security Leonveneaten ert unn eats ste most ators, hshingsears eas on it Bewaryol anyone sending you Tt caimingtobesorca compromised, ely ishing seperti ance Twitter a ter accounts, Dcoverabity rect Message notiicatons the ably hide sensve Tweets ortimeine,Thereareoken hvees youd eto aragerenseeingin aritheremoel Blocked acsouts Ksverth going trough te tourer wngthem gan ile solaont help esp yeuracsunt ecuteyour account flan ana eam agave pec ae ~ Edit muted word Mute trom oa rect messagingin Twitter s beth si same, nisegerorcommunestng ety wth ancthar a fee any 3008 jcouredbycthtoluren vctmeorserclinistomaliccuewebstee|’s youve ve via the Twitar account and you canaleo one whatnot pest toigore rest messages unless youknowato they Fon op hastoyour Ter account ‘Applications Co Coon) Se = you Tite account login into ahi ecount Wnlstcanvsnient, some sppscan = hjecke econo eve scene Seti : oO book, be careful ofwhat you post. sce ting others hn ce fon bya the Bahamas sews weeks at here cu bea rogue acount bas nowinfrmed ef aneptyhouse; nd you wae feos enough tomenton your aces nprvous Tres rey kre How to Secure Yourself on WhatsApp With over a billion users worldwide, WhatsApp is proving to be a force to be reckoned with in the social media marketplace. This messaging app was released over eight years ago and developed by the Facebook team; since then it's become the most popular messaging app. WhatsApp Security Tips vith ispoulrtycomes scares to mesg Acoursofteorsstsng Wats sleng ith hackers scammers andallmnnerof ners individuals and groupsare ever the popular media. app reat Yourmesages anda stuns Stow secur nications (. How to Secure Yourself on WhatsApp CH neal you'eotableto ad vers to your! dot ant Wratstpp canta te see WreyoL ve been jou esther in youre it Homevey, lever hing sm ned to diablo ae Seeneptionvnthin he Priacystrgs: Tisai faconaccrocanthermesagethemvenalhaisipg; _prventother wer Fon seen yourmeverents Should 2 alous contac Palos, vo waryof phishing tacks beaded, ey wll Last seen @ Everyone © Mycontacts O Nobody fandelckon " CANCEL 2 waryof scars where you te contacestrcugh other seca madla axcourtsinformingyouthat mised Theater eet sh ince av, er ® Dav 8 Ntatons chat Watpaper 2 sboctas can blockall mages rom appearing ony photostream withnWhatsApe. 105 canlookt heir Seting the Photos nd deseiect list fallowee rags test terse hat youve les betwee sour compute ander any conversa Online Pr ction and Disaster Recovery What to Avoid when Creating a Password Creatinga strong password sounds easy on paper but when you're presented with the password box it’s easy to become stumped. Should you get past that part, there are also security rules to follow to further protect that password. PASSWORD1234 “Tohepyou create the perfect password, and secureifurthes her are ten tips for happier password management There's aways passnordptflsbutstck tothese geval tips and youshould be aay 91010110110: Street p11010101010101010101010111" Street crea steetrCortstcstees ceeet sett aha iretoeet rey TSC rMmmpeCL SEL IT EET) e11 mete st ttl e1191¢101¢ iS Serereseet yen (eet i 4 m0 2 tmedz's § Fa) 2% wm drago wt a 456 woishaseball’ = a Passwor a a ey SOUL Wists, 0 5 gecsnpa ‘Sar re wae oe 5 gag 8 What to Avoid resco aya ps os ELD oes cemplexitiloe shoud anyone tyto cacti Along pasoordthat also Utes upper and loner ase, numbersandsyrblscat ee Ue vied Change Password Curent Passwort ==] , vcrtenitona ee recent ~ question. Sey most ofthese questions are itletoo eat ett scotia tomhecownace nha _— ute) co) Fy ‘security Questions. 1 my Quenion [Wha ws th nae your pat? 7 We shniaeStenhtel ake phacker around shurérednavcore crocs bus tharaly fee the tongue Find ahapay mecurand male your Recovery Password Generators and Tools We've looked at some tips on what not to include when coming up with a strong password. However, it's not always as straight forward as that. Whilst some can come up with an elaborate and incredibly strong password, others struggle. Thankfully, there's help on offer. Top Ten Password Generators Weliveinanage where you don'thavetositwith a dlesonary and cryptic decocerta come up with an excellent password, There aremany generators freely ‘nalabl to help you out Here's out ten Reena nena es aud cer purehaten sn estan ene Found: has astpasscomgeneatepassword.ohp = Eu rer sefty srongassrordbatedentheopionsyouchonse Youcan chose eelertolwilhobpyou Genie aso gard wrtalyanbveeltle password thelenth punctsten and avo archeractrs autale epiey a insect fomake teaser te remembet Tyitcut or = =0 Generate a Password create muligleunign paswet operand over case,numberard symoleasvellasaheherthe ed es ell beprteuncabicor compet dor: St hiaslimsdsrvies com. apatindox pho pane rw =H Ms Ta ay SSD Sores neuyimcossbletocec Youcan OP nconsswo hisses powered the Passed pm Primed wtichofles arangedt > Thete meant ofeptions ta choose from adyou can sve ae ead your sofered sng a iteslnkoasswdntil 0c ot soe ent, amb case, nba vat tp ffruttlltenetfpwrdgen) ances ny worth consdering bookearking Forkisat schoo o resource that iliac stongoa ‘cicces besos 28 passuord eperdegon uber its going tobeusedand thoes moaningso each help toinmainonass com, Online Protection and Disaster Recovery Top Ten Password Managers Creating uncrackable passwordsis one thing, remembering them for each of the services that require one is something else entirely, The reason why most people opt fora single password forall their accounts is simply due to not being able to remember them all. Thisis where password managers help. Manage Those Passwords se nvhethy of how 1k and what opt ona as they provide. Thereor ican be tickyto find one thats the il. re tentocorsie [STICKY PASSWORD J feonal taj: thers costa monthly or annual ee LastPass-«--« StickyPassword ores Bone dashlane Top Ten Password Managers @ keeper PASSWORD BOSS SRE True Key &pLogme O Password Security with Convenience Shopping Online vand Setug #5 10 is continually improvir ates have broughta morecustomisable depres ‘over the operating system's privacy configuration; something n and Disaster Recovery nd as at Microsoft has always been criticised frin the pl The length of breadth of online shoppingis fartoo vast to cover every conceivable angle here. So rather than 6G 10 Online Shopping Security Tips —7 35 = 99 focus on particular elements, here are ten online shopping security tips to apply across the board, a ae yt oe &"s tate Fahestesareremaraty Hay g biteieeraees! sry sacle eet nar Whale one shops rei a look espe cys eS Seco sone mes bbe phn bokout raha nies te suppres cevacinarmatonfertheste's something key CD Jsea song and unique vbo) HTTP. This wgand unique 5 racked and the database cf users is Biseiipsse"acd-on suc ‘enough itwill stand up taany (Niele aU: ine Blea rae jercepted and potentially aaa “ y Emeeeesaay = cessible aFapal id inone iene ‘oraCredit Card as may iyi foendion eich Cctcrs se en Te ee SS aise SI ei gaya Thy can seo ceca ‘eye tebuyingom to gal standingthan hat ofa deca yal enses many tection elenentseathnits aczouristo0 —_ rowed Paterna i oer aE eer nts hens ater youve conducted ole sopping “THis falpyau getsnesen fata goingonand should sore Sudcenlyropupthat cok suscious, ‘henyoeabistonirn yourbank eforetoomchdarrogec dove, a 1 Recovery How to Remove a Virus or Malware from a Windows PC So far we've looked at ways to prevent getting scammed or indeed getting malware on your system but what if you're unlucky enough to already have some form of digital infection? Thankfully, there's away to remove malware and viruses from your computer. Malware Busters Forthistutoria ets se preconguedrescue dskirom Bitdefender You need to vansfr orbur, the dskeontentstoaCD or 8 USBStick nd boot into the safeervronmenttinough one o those mediums heicslender Rese Dk ring athe ik nformaton) an can wi teense cess aes Opening bldelendersescue cise 7) = ee Shakey neem which i i Fale 667) rome tps//dunoaaideendercom © open with | Browse etuoek Bont fre AD 790 Hard Drive 5. "Netuork Bec fre OAD aPC 2 ater Setup net ule click there Btceencer ican on he _ Ee sary of Terms Glossary of Terms The bewildering world of technological terms is often difficult even for experts to navigate without becoming slightly confused and we could easily dedicate an entire book just to the glossary. However, here are some of the more important terms from the world of digital security and safety. Digital Security A-Z Digital security and salty terms are often asclea med, Use this lossay whenever you come acrossatenmytou dont understard A ‘Access Control: A term used 10 ‘ensure that resources are only ranted to users whe are entitled fothem. Active Content: code that's ‘embedded in aweb site, hen the ie accessed the cade ie automaticaly downloaded and executed, Advanced Encryption Standard TAGS): en ereuton sensu Wipro speci on nls publicly cose symmetne trenton agers Asymmetric Cryptography: Pubic Tey cveangapty ote igen wa Pae ce ate ond tne pate, tounge he content protected by teeny ‘Authentication: scab systemst0 emi teeny of se B Backdoor: & tool used by hackers or system security experts to access a computer system or network, bypassing the systems usval security mechanisms, Bandwidth: The limited amount of ‘communications data that any channel is capable of sending or receiving ina specific time, Biometrics: & socurity measure that uses physical characteristics to Suthentieatea user's accesso a system, Boot Sector Virus: a vius that can affect a computer set boots, before the operating system has even loaded Botnet: large number internet MED secttcmticicson connected, infected computers that fare used to flood a network or send Spam message to the rest of the Internet Brute Force: A hacking technique that Uses all possible password combinations ane ata time in order to gain access {o a user account ersystem, C Cipher: a cryptographic algorithm used inthe encryption and seeryption process, Cookie: file used to store information About a website that can beread Should the user ever visit the site again Cyber Attack: An attackona system Using malware to compromise ts Security. Usually in order to gain Access to steal information oF Gemand a ransom. cyber Bullying: when an indivicual, lor groupet individuals, threaten of post negative and derogatory fmessages or doctored images of someene online D Data Encryption Standard {DES}: A popular method of data tencryption using > private (secret) key. There are 72,000,000,000,000,000 (72 quadrilion} or more possible feneryption keys chat ean Be used Decryption: the process of transforming an encrypted message into its orginal text form, Demilitarised Zone (DMZ) emiltarsed zone (DMZ) or perimeter network isa network area (G subnetwork) that sits between an ‘organisation's internal network and fan extemal network, usually the internet. DMZ’s help to enable the layered security model in that they provide subnetwork segmentation based on security requirements or policy. DNZ's provide either a transit mechanism from a secure source to fn insecure destination or from an insecure source to 3 more secure destination. Denial of Service (DoS): Prevention ‘of authorised access toa system fr network. Disaster Recovery Plan (DRP): 4 plan of action used to restore Systemsin the event ofa disaster. uted Denial of Service (DDoS): Atype of Dos attack using Trultiple attacking systems to amallfy the amount af network traf, thereby looding and swamping the target systems or networis Domain Name System (DNS): The ‘domain name system (DNS) is the \way that internet domain names are Tocated and translated into Internet Protocol addresses. A domain name isa meaningful and easy to remember handle’ for an Internet address, E Encryption: the process of securing data by transforming into something unreadable using cryptographic means. Ethernet: Communication architecture Tor wired local area netw ovis, F Fingerprinting: Used by hackers ond security experts fo send packets to a Distt system in order to see how it responds, usually to determine the ‘operating system and security mensures, rewall: A hardware or software layer designed to prevent unauthorised feces fo orfrom a computer or network to another computer or network, Flooding: malware attack that causes “an eventual failure ata system by bombarding it with 2 continuous stream of data G Gateway: & network poine that acts a5 ‘the door into another natok H Hacker: Someone who violates or circumvents a computer security ‘measure. Can be used for malicious purposes or legitimately to test 3 systems wilnerabltes, HTTP: Hypertext Transfer Protocol, the protocol used bythe WorldWide Web linternet) that defines how messages are sent, received and read by browsers and other connected sofovare layers, HTTPS: thypertext Transfer Protocol Secure, an encrypted and far more secure version of HTTP. Internet Protocol Address (IP): a ‘standard used by servers and machines to connect ta each ‘other and form an individual identity for each connected device, Internet Service Provider (ISP): 4 ‘company that provides Internet fecess to businesses and residential addresses IP Spoofing: a form of atack where a Gevie provces 3 false P address 10 K Key Logger: A type of malware that can record key presses as a text file land send that fileto a remote source. Once obtained, re hacker an then see what keys you've pressed, L Local Area Network (LAN) ‘Communications network inking multiple devices in a defined, limited location, such asa home or offi Logic Bomb: Atype of malware that’s dormant until a predefined time when it expledes and runs or injects Imalicious cod int a system, M ious Code: Sofware tha’s designed to circumvent security measures and gain unauthericed access to a system, Malware: A generic term to describe different types of malicious code. N Network: A group of linked computers Dr devices thot can share resources Sand communicate with each other P Password: Asecret security measure used to access a protected resource nd authenticate access, Phishing: Amethod used by eyber ‘iminals te obtain information from 8 user by bating ther with fake temalisor messages. Personal identification Number, Used as form of authentication access to a system, resource or ser account R Ransomware: 4 type of malware that locks, or encrypts al files on a system until ransom is pad and the unlock code is entered. Rootkit: sat of tools used by a hacker ta mask their intrusion and obtain ‘dministrator access to a system, S Sandbox: A system architecture designed! to test code in a secure tnd safe environment without it atfecting the host system, Glossary of Terms ‘Spoofing: An attempt to gain unauthorised access ‘Spyware: & type of malware that spies fon a users activities or system and reports back to a remate system, T Trojan Horse: & type of malware designed as a useful program butin reality hides some malicious code Two-Factor Authentication: ‘Authorisation of access toa system lrresource through a usermame/ password combination as well as nother form of authorisation, such 5 aPIN code. Vv Virus: type of malware designed for multiple purposes to spread and infect as many computer systems as possible. Usually destructive but can be used to gind s system to a halt by using up all ofits avalable resources. VPN: Virtual Private Networs, a secure tunnel between two systems using ‘advanced encryption methods to protect the communications Dbetwoen systems. Ww Fiz A wireless network standard betwen connected systems. Worm: A type of malware that can replicate itself and spread through ‘other systems consuming resources ‘and contents destructively. Z Zero Day: Described asthe day anew security vulnerability is discovered, fone that has no fix or patch yet to stopit Zombie(s): A computer that's infected with malware and connected to 3 network or the intemet and used to Spread its infection to other Computers, Used also to describe an atta on other systems by hoards of zombie computers, makiaticioncs CE Now you've got the basics you canimprove and learn more essential skills in ournext guide... ONLINE SECURITY Mt CY Tiey Coming soon! acl OWN PC OUTDOOR OMe Nang Sa Black Dog Media Master Your Tech To continue learning more about your tech visit us at: www.bdmpublications.com aero Teese Ac) reese eae Se los ee) x! Gadebook eS . Special Deals and Bonus Content Sign up to our monthly newsletter Nae Re SEU Rete) and get the latest updates, offers Mele ec nmi and news from BDM. We are here ve to help you Master Your Tech! Print & digital editions Featuring the very latest updates Step-by-step tutorials and guides Created by BDM experts Check out our latest titles today!

You might also like