You are on page 1of 195
The Complete Internet Security Manual The Complete iPhone Manual The Complete Black & White The Complete Coding The Complete Instagram Manual The Complete iPadOS Manual oe The Complete Builall ou nat r b os The Complete FRITZ!Box Manual The Complete WhatsApp Manual © The Complete Mac Manual The Complete Canon Manual The Complete Google Mantal The Complete Internet Security Manual The Complete Cloud Computing Manual The Complete GoPro Manual The Complete Landscape Photography Man ual The Complete Taitayeateie sya UGLY ishing, Peres Niall e nee tac igital threats with peculiar names expands COTTE NCR CCS oy Au ULC Ey a MR es aU worth more than oil or gold and your personal information is greatly sought after by cybercriminals, scammers and hackers. How prepared CUO Cie CEU Rae Cele Windows 10 computer secure against the continual onslaught of the modern online world? We'll help you secure your computer, network PUR ee eR ee Rar R CEO CO DOPE NUS ER een Ec CM Cue Lil guardians, we also cover looking out for your children when online, eee are god eae UE EC (eR elu) industry experts. You’ll soon be security savvy and prepared for whatever digital threat looms on the horizon. ee ene: ener Contents Types of Security Risk Hackers and You Social Engineering. Ransomware: How it Works The Virus Top Ten Pharming Windows 10 Digital Security FAQ (28 ) See Be Smart Top Ten Antivirus and Security Packages Bitdefender Total Security 2018 Review Up Windows 10 Security Why Updating. Important nat to Keep Updated and How ‘Secure Your Web Browser Secure Your Wireless Network What is Encryption? Encrypting Your Windo Top Ten Encryption Tools for Windows Top Ten VPNs Using a VPN for Added Security and Priva © Pincers 10 H Around the Internet? H Data be intercepted! x H 0 Tips to Protect Yourself Against Interception ure Your Dé How to Secure Yourself on Facebook How to Secure Yourself on Twitter to Secure Yourself on WhatsApp What to Avoid when Creating a Pas Password Generators and Too ‘Shopping Online and How to Remove a e een ts 96 Windows 10 Privacy Setting 98 How to Check which Apps are Sending Information 100 What isa firewall? 102 Improving the Windows 10 Firewall 104 Creating a Security Plan 106 Windows Security Che: 108 What isa Sandbo» 4110 Running Windows 10 as a Sandbox 112 Installing VirtualBox 114 Installing Windows 10 in VirtualBox 1116 Creating VirtualBox Snapshots of Window. 118 Create a Windows 10 Recovery Drive 120 How to Back Up Windows 10 122 How to Create a Windows 10 5 124 Extreme Windows 10 Lockdown 126 Cyber and Windows Quiz 128 What the Experts Sa ®& Cea 422 Children Online: What are the Risks? 134 Social Media & Children, 136 Search Engine Safety 138 Online Grooming 140 How Safe are the Sites Your Child Can Access? 142 Email and Child Safety 144 Top Child Friendly Email Programs and Services 146 Cyberbullying, 148 How to Prevent and Deal with Cyberbullying 150 Helping Your Child Through the Internet 152 Your Child and Online Gaming, isit Safe? 154 Staying Safe when Gaming 156 Monitoring What's Going On. 158 Monitoring Online Activity for Non-Technical Guardians ine Advice for Your Child 160 Tips for Technical Guardians to Monitor a Child's Online Activity Ten Monitoring Tools to Install and Use Using the Windows Hosts File to Block Sit ® 1168 Staying Safe with Facebook for Teens 170 Staying Safe with Twitter for Teens 172 Staying 1174 Staying Safe with WhatsApp for Teens 176 Staying Safe with Snapchat for Teens 178 Creating a Child Account in Windows 10 180 Windows 10 Family Features 4182 Problems with n-app Spending 1184 Tips on How to Stop In-app Overspending 186 Online Child Safety at Schoo! 188 Where to Find Help with Online Child Safety 190 What the Experts Say 192 Glossary of Terms fe with Instagram for Teens tobe technically heavy. In fact, tomakeit easierto digest, and to just show you how virulent and bitterly hostile ‘computer-bore security threats are, here's a collection of statistics to give you the heebie-jeebies;allthe more reason then to keep this manual close to hand. | formation regarding cyber security doesn't aways have z ‘Over the next _ year, hereisa ; aa, 7 Social Media Users ¢ CHANCE +50; 207 you could be (dock) ' Haven't changed Have never changed their passwordinthe | their password last year 7 GP cen apres wine aN ERG Digital SecurityIn Numbers @g~ Amember of Devices hacked in RANSOMWARE the publicis LESSTHAN: ._ ATTACKS on HACKED every: BUSINESS every: FIXING Lost pan |. Malware \_ toCyber. ATTACKS "CRIME ate neat REPORTED INSTANCES OF FRAUD through cybercrime against UK banks last year Modern Day Security Sereuse gent ica ete uN eee eau LUe Var Pe SNe Ree a Uae M Rel eS oe RU ete] eran TORE ECE cy ees sty MemecucM i Semestisuasdise cn csnuncnach ell PTR RUC ate WAC LLelF Sadly, the cold hard light of day reveals that with the growth of this reat eRe tee aete gee RS Lert DSN ae eae ete et Cur ean ea Piece tech Mur cet rurie ti decries hs cunauiaas increasing digital world of threats, viruses and everything else the aaa one This chapter will help you to recognise some of the threats, what they all Ee Cae Nel tie ue nec) oleae ies Os tesest Soa enn ea ae Sencha rae Cr Pree FC enn eso Psa) 18 The Virus Top Ten mm :) Fea) [icra ye ih A fl eres rae Types of Securit Mee oS eT Meco Cau ayer oT Peace er eee sa eer rer oki in ust a few years, and with it comes a legion of security related issues, PLD ely + eS Se ee es eT Ce eet te Sei ry ial “ ° i * (tay Beri eee en ter cre Se ee ery De ie ee asquradesesegimateaplestionbutin actu Poe eee ad eee a ere ee htt te Ce See creas eee =| ee ea i ce eee ener ar | | ft | i ETRE} Tw Cea ea Earth year the UKs ippedin the catches Seem enacts eee Er ed and ui spread throughoutthe NHS and other Cera Du et eerste we ry HN Dos eee Worms SET i ee eee eed eee eee ee ed ey : ee ee ae et een ea eta asian ahem a eee arene peeieinesinenyceerinesanersn eee eet as cowed —— i Non iwd oi Adware Ce eae ce Se ene en Tes Se es ee ears) eas ce eeu cat -4 ee es Pee era ren tes Sasa rere Psreanticienreanlieiiaaiiey ete eee | Soler] eat asta eae ae et eer ete ee ene ny Pe yey ca eet Pape ier Peas eteerere ceteeerelegeerey east Presper esienssbeanener sient a Poereerrreh yin eae Genniochan) emeeoste pansies tisbicaaatrat Root See eer ee ee ed een es es teers Se ees peat res dem Day Securit nd You ire oT Clot oR mL UE Birra Clee Ra tN ee RaW Niece CRC) Cee oe Ona CRS ee maRU SO ences Ee eae La rs ema Lot ea ee a My ma 1 i 1 c BRE : — Piece " : eet} nie ' retard zz a Eg robbed. Theresa Co TAT been hacked! yp) on sce est) your personal belongings and Ree es = ana = oa a 7 Social Engineering With the rise of wider forms of communication, through social media and so on, comes a new wave of threats called social engineering, There are many forms of social engineering, so le’s have a look at what you're up against, and how to combatit. cil engncesng is the new madam way of maiplting people to pve up ther personal and corti lermation.R comes Hany Buses and under erent su heoings, sich a Phstng anda tits een alarm engeang Essent, the scammer lake your human nue ac responses and tun t against you forthe own gin You may think you're Theinétnomatantescmmersaterdoesencependng __notthe sortof person con he pe of cam bang sed but frre mos pat teye | to befooled bya sual ateryourpaeoords ankandcredtcardeaisore6 seam butoften the imate fori gannysor onal dan ae rorcien hers oretake Youre probaly mare anlar wih sda engecng that ereee eteteeney yoususpec een yove evtoteten eal Be eas eee eee fonsoneare vay bsedinNgsa.vhotasconeinoa | OD mori es tho fan eb frune ne lors andl sone nepal reson ons the tn a om or to pt the money n your bank accout Needless oy, the Scam, re moan tnenint trey was nee eine ist place ad should you go eee io ‘trough the proces you wil exntaly be persuaded tohand scam, are ee ae ‘over somne banking information which the scammer can then pas usetto steal from you. and “There are too many Ngutan scams these days may ou more roptoreallfon someone comet beter Maat ‘or some other well-known company, who insists that they scam dre vaknge ins oraherhoml nawarethatscureny | —— ae feng om your compte Tey sku 0 Wa wept teddoulonsa pea eh thal aon em ena ae access 0 your compute. When they na 9 sgt at doping oweathofweessinfrmatononthesaees whist scammershave inte bclgoundthe in tng anthacagsaare erapoved cable ‘eobsinjeroninebingem= Treycanevensseoy SHIN SADNE cut wats ago ard ray (clagtoyeutankuhlecomecedtoralesueereyting | WaySend meat pret aan ero ered suing which tbat you ears Many scammers wart you to reac pity a 2 mater of unger. Take 2 memento gure ‘ther commen social engneerng tacts Include emais from a fend, who has been hacked, with the scammer ‘masquerading them. could be an emai claiming to be from yourbark, anurgentrequester hep or someone asking fer a donation to chartabe organisation. Be wary, and ‘queston eventing. vrenbimpiteatoncon Social Engi \ Modern Day Security ) Ransomware: How itWorks = The first instance of an extortion attack is credited to Joseph Popp back in 1989, Since then the frequency, delivery and scale of ransomware attacks has increased significantly; so what is ransomwareand how does itwork? ansomware isa particulary nasty form of malware and dgtal threat Theres usualy some kind of ransomware headininginthe news around thewerld anc those wha are the victims areofen a oss as to what toca net Essentially ransomware ilinfct an individual computer and one ‘ftw things can happen: st, i locks the compute stopping al access tit rom the keyboard, thn stant search for date and Cenenypt the contents ofthe hard chive. Lastly i infects the boot sector ofthe computer and displays 2 message detaing the type ‘of ransomrare and how the indica wl pay forthe release of the data the message can even have fake F warnings included lth ft alternatively, anc the second thing that may happen ance _agjstem sinfected,theransomware wil layin watunti asetime nd date, then do all ofthe above and lock the computer. Waiting fora set time wil ensure that qumerous machines are infected before ary fx canbe discovered loi al the infectes machines se activated at the same time then theres more aa chance of he attacker geting tei ransom pad ‘You normally have as timein which to pay the ransom, usually Tahours the vitim doesnt pay in time, the attacker can introduce a second phase into the ransomuare cade that will ‘ther increase the amount demanced or completely cestoy the flesthat are being held at ansom, Ransomware can be spread in a number of ways. The more popular choice of delivery iia an infected web page, some frm ‘of Fash script that has been hijacked and now contains a link 0 a remote server where the browser wil unvatingy download the ransomware code. More recently there are instances of Drive-by attacks, ere the ancomivare code locates any USB sticks a user ‘may have in tei system and transertselfn the knowledge that the sik il be inserted into wok’ computer The wanna ransomware attackeatlrintheyearwasty lar one ‘ofthe most prevalentin recent years, Is estimate that more than 250,000 computes across 200 counties were infected, endering the lies of big companies such as Fed, Nisan Motor Co and Telefonica SA under siege rom its demands, The National Health Service in the UK was hit too, resulting in weeks of chaos and sorderforthe staf and patients alle How do you avoid getting ransomware on your computer and what happens ifyou're unlucky Co What todo 99 enough to be the target of such an ick? Here are some hints and tips for you. dem Day Securit Nec Pee see) esr cad eng nee Pee aes ce sae pee 99 Peco canned Cease Tet eee AstormWorm 2.conficker Its tempting to think we've made up the words Phishing, Vishingand Smishing butin actualfactthey/re all forms of social engineering scams. Whilst weve covered social engineeringalready, its worth lookingat these three modern day threatsincividually cial engineering the act, ‘of gtinginformation from aperson based on thee umaninstinet toreacthelporbeentapped into some orm false promise, isn’tas modernas the name suggests. Although the term soci ‘engineering isin attain, ‘the process of obtalningsenstve information fom avietmhas been oundfor avery longtime. Theciga age, they're delivered Nolongerisa victim begutedby post, now theyre bombarded by fase ebsites, emails and astingofoter cleverly dsgused mediums Le’sbreskconm thethreeman, rae methods otha a=camm ptt cbtainyourpersoral information Phishing, Vehingand misting, Social engineering fraud comes in many guises, with daly sounding, methods. In the 66 Gone Phishing lend, the scammers are after your data, butwhat do these three in particular mean? & | Phishingis tr tem to obtain trough ema mesaging cial media and auton sites. They can come ntheformofanemi, or ‘money arable you or presen tobe rom yourbanker creditcard company sdaphshing includesinadouasbefending you,orpetendngtobe somone younaykoo, then asking or infomation Simi 2 hshing sttackeancomein te form ofa cebook erring Wendy et, suchas namethetepfvethings| bout youralfan tagten ends ‘he uniting vet apy tral their dat oft, here they vse bo pets ames, names ry dren ands. The taker i ter al that ‘thet advantage irtrestngy there are alsotnee erent phishing pes Sper, 9 v hing, Cone and iting Spearphishing isdesignedtospoctcaly target an india gathering inrmation such athe above Facebook "ame whereby thes personalize ther attackon thevictn. Cone pisingisan attack ypethat uses previous delivered, gitimate emailcontainingan attachment but withthe deta changed andthe attachment svappedfora user logge Tothe vii the ems looks since’ cloned ram areal emai and when the attachments opened itinfets the computer \whalinglswhen a phishing tack targets senorenecutvesct company oahigh pote indvidal orbusiness. Te tack isa frely fredemallorweb address thats created to lok businssike and containing information spectictathe pany rindi Phishing, Vishing and Smishing CH in ath Vishing — Smishing Vishingisvice phishing, usnga tlehone alta commtsame formf socal engneeing te Thevicim il asneveerplained previously eceve acallfoma legtimatesoundingcal entre wth tnepeson on thelne aiming tobe company, Usalythecalerllbe ledtobelevetratthees avituson cofsecurtyvulneabily hasbeen detected. The ici wil thenbe uided to awebsie wher thecal ‘anmale remateconnecton 2 ter computer Once on the victim's compute the caller wl then un ‘crpthatileplayeameat data onthescraen esignato confuseandbae thevcim inthe meantime they reset running eyloggerin he background Insomeccumstancesthey can then dim tohave bed the scale butaskyos tolegint your bank rodovblecheck lise Weha eyloggerin place, they can then se yourusernameandpasswodd on terscreen; ater hic they login and steal from youraccount. ‘erative an automatedcalcan askyou tw eneryour creditcard ‘number int the phone’ eypad, as itsbeen reported 35 beingused ‘seuhere Ofcouseithas out as soon a5 you eter the cetalsthaye recorded andyourcardcan bused bythescammers “Smishing'=2n SS fom of phishing inthasecassyeureccive att rm searing leitmatesoure, usally yourbankorcredtear company butalzointheform af acompetion vinnerorsometing fe, aking youto contour deta. Theres ‘en a inkoryouto folio, ich ds toa false website that gs your vetoes and reoresyour data, Some ishing attacks wil askyou rosendaretum SSta approve nation suchas adeveryof seme gods The tum mesa s designed to cost signtcaey more than the usual SHS ate, viththe money ging sight thescammes ‘One way anther cach ofthese sate designedtobait the tim hencethe phishing element, ahomephoneoltheward ting Thebest defence steno, delete ‘orhangupen anyhingthatseven remotely suspicious Micosot doesn'tknewifyau havea is, and wilitelephane you, Your writ emalyau for your accou etal nddontbe tempted fllinanyFacebook games with rsenaintrmatin, shot, be savy about batingtechniqus and remainviglont. S mi Modern Day Security ) \Whilst on the subject of homophones, another recently added word to the longlistofsecuritythreatsis harming. Pharming falls within the online fraud layerofsecurity and althoughin reality it’s been around for as long as web ppageshave, the methods of deception are continually evolving, Pharminghas become quite sophisticated in recent years, ‘and with the rise of connected devices that offerinternet © what exactly is pharming? tn shot, this te the criminal act of producing 2 fae vwebste and redirecting the victims to it onurontestepggsonste cna wel Harvesting : Con eee ieee ea eee Time ’ . that the web site is fae, asthe front end apes ‘thereathng, even downto the smal pinta the bottom ofthe page illogin with their details [Aer the user has logged in several options are snolable to te ‘pharmer, They can collet the Usemame and login details and simply eave cum wih a blank web page; this usually 3 rmethed used by an amateur pharmer o those laho want a quick uemame and passa grab before disappearing into the darkened comers ofthe intemet. Otherwise, they can redirect the ‘cto the rel ste where they need to enter thar login details gan. The late is amore comincng rmethed of phaming as thevitim rarely questions ‘why the bank has ahed fr thelr login cradentale twice; they olen put ths down toa mistaken entry contherpar eet accessit’s quickly become Wagg 07601 the more popular criminal cyber activities, Either way, the phamer now has a considerable list of vad usermames and passwords forthe bank for online shop they fake, which they can then ‘salvia the Dark Web or ute themselves. How do they, the phamers, get away wth beng able todo this? Itrestngly, thee are several ways in which ‘someone can fake alegtimatewebste x httov/ DNS 28 <> x intoi/ FakeNaming =! <> x hitp:/ Hosts thecrminalatacirgthelntemet naming ‘about the person in general ThereS often a nkati comoxter The Hossies cated in str which esponsiblefor cresting bottom that though spl core! =r 2 atvesiethasts0n gg eadablenamestorwebstes suchas, [isin acl fot ahyperinkto a pharming website Windows computes, friatefec hess on BED ebe:comardsoon,ratherthana sire, t and etcfhastsonLnuxcomputers, Ee cofrumbersinthe fo ts function stoman hel adres, Aer. Forexampe, the ema could ay rarestolP such an 14232 128 5 simi Boccia negro ares eating eect wees ThelrtemetnamingsystemreiesonONS Ma) bankcomtotranserkinsThewnnwsankcom ME tolPaddesseson local network However | al sre to proie the comesonbetveen partiscorect,buthehypeinkand the resulting ican asobe vied to caren the tee FPadirezsandredsblowebsteranes, il weostemaybetangyoutmenbnakeom nich i locket alginate web t,t TheatuleranmauntanataciontreONs gl athoufaitymispet sdtendfcatorass Ml youtoatteone snatch thee Cathe dusctargngtevayinwhicvatc sl whenyovteccetaingenthewestaconien. id Hecate are astsosptenflefat trove entered = a ert theuserseqestiogntommeds con, i re er writenvnscandothe tick thee theta hata foe este " into Than. ese kd otc tore enlarge DNSeaCe ‘Srnec many en Cee ~ 2 wath x ft Secure | https:// What To Do? hom canwebe pepaed or pharmingatacks and ombatthem so ste?) hickthatthe nae nt FERED 2sarsikesxrethatyouhavea, ante progam installed and that its ptsby Hoste posible, make abackup of your Hossfleand tifyouwantta. ED oa neactual address ofthe ste HTTPSisthe secure ssonof HTTP. thus po entiation ofthe matches thera web stonamecfthe forexample, eruine webs nfact, ita gor HTTPSfoceverysteyou is Modern Day Security Windows 10 Security Microsofts often accused of developing insecure and ‘broken’ operating, systems, However, what the Redmond company deliversis an easy to use system that’s as secure asit can be without compromising its use. It’s difficult balance to maintain and security can suffer in the long run. ‘Security leaks, hoes and flaws in evelopment code appearallthe time, for every operating yster. Windows 10 as the bad luck of 66 Windows 10 Security Improvements beingat the top of thesecurity fa news pile. However, her reasons why it’s actually a secure OStouse. Your device is being Virtualisation-based Security VBS is an improvement t the core Windows security, it sfonds for Virtualisation based Security and uses a mitre lof hardware and software enforced developments o create {an elated, hypenvsor ested subsystem for securing the (core cata. Nothing ursigned by Mcrosoisalowedto be injctedinto the kemelor exceed Secure Booting Secire Booting utes the new UEF UnedExtenble Fare nea), th replacement for the older and more ulneble BOS, slong wth Windows Trusted oot code Inter and ELAM ry Launch At-Malware copies, topreect he compute scons youponer up ‘ee Windows Hello Windows Hello may seem tke 2 glamorous feotre rather than a secuniy feature but is realy quite an impressive layer of protection Hello supports passwordless biometric authentication methods such asi, facial and fingerprint, together with a PIN code to help protect acess t0 ‘Windows 0. Microsoft Passport Windows 10 uses the Microsoft Passport sage sgn on a a el KW) = = s == “Components suchas Prvecy “Terealott le about Kaspersky’s Protection are welcomeand ogshipproduct I's quick, sy touse remarkably useful othe end user” condlcks athe right bes Your Protection is tive now Te controlcente interface ie uneltred ‘andeasy to follow ‘wun plenty eFoptions vale” BB Protecting Yourself ) / McAfee Total Protection Review ‘The name McAfee has been synonymous with antivirus and security since the late ‘80s andis. considered as the granddaddy of the computer security world. its latest complete protection package, Total Protection, has alot to offer the end user, as you'll soon see. McAfee For Consumers eAfesnowapartofirtel Securtyand as suchits backed the latest generation of hardvarelevel security aswelasitsavard winingsoftware scanningengine. TenameNeAeehasseen some interesting pres overheat decade, notjust fromthe security sofware self butasowithregardsto the company founder, John Meffee. Te founders colouilliestye ase, Mose Total Protections asinglarlympresve ste oftols. The cosisaitehigherthanthe previous tenes, priced a £8999 for ayear suberption though, onal and special fers wil eluce that amount considerably), However onehighlighted feature isthe Vius Protection Pledge, hereby your maneysrelunded should Melee rate abietoremavea viusthats already on your compute, Its woth mentoring thatthe annual suscrpion includes installation on ‘an unlimited number of devices whichis ceainly woth considering you're ‘ne ofthe many modem households that owns countless temet connected vices, computersand eventhngir-between tS uthout doubt an exelent choieforthe home user. Both instalation andthe inti full stem scan wore slower than that of Btdeender and Kaspasiy butonly by about ne minutes. youre constantly in arush you may want to consider te ther utes, hone, mast users wil besatisfed with he esl rom Meee at any ate ives you time to make acupotteawhieyou'ewaitingforthescantofrish ‘swith the other products we've looked a, the interface is simple to Understand and navigate, ith the core and most used funcons within egy each ofthe mouse pointer, hile the mae advanced option are realy tucked anay fr those who are alitle more lnwedgeable about such things. In shor, works wel and keeps the wealth of anvalable optons 2 bay ul the user request them. Needless tosay thesetingsareexensive allowing the advanced user 2 higher degree of contol oer the vay thesuite of tools works The Password Management feature i an intresting ation to the MeNee suite oftoos In realy isintes Tue Key Security component that, although notte tooth league password management program, does boastaruit- factor authentication process. in addon, you can se ndidual Tue Key passwordsforallmembersoflamly-up tofve users. Among the multitude of features, youl nd Fle Lock an intresting addon. Tiss an impressive encryption mechanism thal lock your fles behind an impenetrable, mitary grade encryption wal Ws not activated by defaut, ‘which s understandable as enerypion does sil cary wth it a higher kvl of user bnowledge and is nat something the average use wil immediately consder adopting when sting up theircomputer security ‘Astor prformance, we've alteady mentoned that McA issomewatslover than that of Bdefende or Kasper, butas withthe other entries, you wont notice ay percevable london inthe computes operation wth tinted, eee Tota Protection doesan exellent keepinayourfles and pesonal infomation safe when online ang wit is added features t's ceainy worth lookinginto at gesterdepth U McAfee within thesstemon hich it rst peerareay Beye] Neale theese approach to gstem protection is Protecon nwa q ‘warty of mentenng Fs he scanning tcelogy does portotine sei Protection a thorough, fe toathed comb inspection ofthe Hes on the system, Heurstc analysis then takes cv, monitoring, bohariour of fies, functions and even code inspection, to check fr posshle unknown vse based on the way they work Last, anything that even remotely suspious Is ‘automaticaly upleadedtothe MeAfeeGlobaThreatinteligence Lab oranahsis Should the code proveto bea new form of vis, the team behind the impresve sounding lab wil create a fix and sh tout othe other wo hundred milion plus Meee user not ice getting a compute vrs but at least wth MAfee you canbe assured that yourmistotune'shelpngothers ‘scertainiy worth considering forthe Ihomeuser™ McAfee Total Protection Review eo a3 ae rhe scanning isntasquckas theotherproducts weve looked otbutits certainlyas elective escent Call us your cyber bodyguard 155 @ reict mor dee BB Protecting Yourself) Setting Up Windows 10 Security Before we dig deeper into the many levels of Windows 10 security features, it’s worth taking a moment to check that the initial security features are in indeed up and running, and doing what they’re supposed to. Are You Secure? Remarkably despitehaving an antes cientinstalled, some users arent even aware ofthe defauit Windows 10 secur features Heres quicken step processto check everything sworkingasitshould ESSER sty cicingonthewindows start Button orpeesingthe Should ay ofthe optons ply No, then youl ned to check dows ey an youd Ene secu into the search bat setng eating tothat parculr este For example, fyour ancclickthefis option that appearsin theres Securtyand Maintenance. UserAccount Cnt [AC ssetto Of clekthe Charge Stings inkunderthe option. The othe atures can be found via search rom the Wines BD.e Fite: 52" Best match / ‘Security and Maintenance Control panel Settings check security status @ Change security settings EETISER) 1 wilonen the security and usineenance section ofthe EPID cil wamyouotanyattempeto acess system etal fe Canta ane. Thee ae we main scons wit this page eck ‘any mahre wants toate ale, then you'e asked ifyouwart to ly you don, sou cn ay no and investigate the sue Thee tings choose om but the sacond step down tomthetopis rend ‘on the Seu section to expand. all te options tint aud be dsplayingOn, th the exception of rere Sou idisplayOX ‘Close down the Secuty and Maintenance window then cick the Wino Stat ttn an earch er Defender lithe esting Windows lender Security Cenve option. 5 DBD ¢@ Fiters Search suggestions 2 defender - See web results ‘fyou'renot using third-party security and AV suite, then you reed to make sre that Windos Defenders activated and working Ther arerumereus options avaabeinthenewleck Crests Eaton Windows update of Delonte: Each canbe selected withamouseclckand viewed separately '® Your device is being protected. SB ~ BG lickthe Virus & Theat Protection option. Thisillopen anew ‘indo allowingyoutapeorm Quicker Ful canaithe ‘gstomthat deta the number of teats found andthe rumbar ef flsscanned, (© virus &shrest protection : seme © 0 42924 (Setting Up Windows 10 Security CH Hfyoucck the Vs Theat Protection Stings option you can furheroptto improve thesystem protection. Makesure ‘hatallthe sub options aeseto.On and sro downto define the programs default Nateatons 5 Vis ea protection ating Retumingo the main Vius & Threat Protection page youcan Clickteshildicn rom the sip tothele ofthe szreenten clckon th Advanced Scan in eat undrthe Quck Scan button hin te options torena Full sjtem-can a Custom scan (fa netweklocaton or ‘example oranOfine scan. Pa Lastly click onthe Firewall & Network Protection from the icon stip the et Again, fyourenctusinga dedicate, hire pay secur suite, make sure thatthe Pate and Publi Frewal are set ton thus protectingyoursjtem from unvantdinsuson, 10 Firewall & network protection © cnsapeme tin 1 rote ove ce leet BB Protecting Yourself Why Updating is Important Continual updates, rebooting after an update has been installed, then the inevitable second reboot straight after the first to apply the update: it’ little wonder people stray from the regular update checks. Whilst it can be a pain though, keeping things up to date is a top priority. Update, reboot, update, reboot Updtes ay welbethe banecfthe modem computerusebutthey are thre fora reson isnot the tea arymore we eed thse udatestohap protect oursecuy Hee are reasons hye report sespatchecogied — ER vind en. progam tomakeitan ERED ter ormeritseury forse cccunty thats thathandles ttathandle UPDATE 7 SE rsp ol [anes aeration shaded earch daytokee pith eet anathercode finan Tiss arch needed aspect 0 hen being protected fom isequalyimportan Your device is being protected. G 8 ® FB * Why Updating is Important CH Tocxpandthelastreason,theWindows Froval sre ofthe fist jes ofsecurtyon yoursjstem, wth accesstayourcompter fom another surcels morstored _arcevenbocked stoping potential threat before they eventtthevius defencelayer Updates make sure thatthe Frewallis upto scratchferthejob. 11 Firewall & network protection Iesnotjustthe Windows corefiesthat equi aa HI regular updates, fyou use Niceso Ofice that ‘canbe. partafthe overall Windows 10 ups schadle Thre ae ‘wulerbitesin OFeto, which when exploted can allow malicious cde in thesjstem.Tckthe Give me updates for other Micescf products bo in Windows Updates. Advanced Options. {@ Advanced options Geshe ie erties HL ourvcimtrctrieet eamrentem ies Diep nanan gay ren Aswellas Ofc, Miceso provides base level ctiversfor mostothehardvareavalabe today. ‘Thesedversaresgnedardvetfed assaf, co anynew iececf adware installed wil workard lle safeacrrdngtothe drver protection engine Homan #9 cil Mme eX ‘Non-genuinecopesef Windows have been _athomin erosot side sinc laa fle Sharing on the Internet gained popuiaity.Thesedaystheact of dounloadng semsthingllegl rampant Windom 10 updates ensue that you're ung 2 ‘eruine copy ofthe 05, which il imately ecureyou PC aginst heats fom pated copies. genuine WM ireiKekxeh ite software rocfthasbgplansforthe future of Windows 10 i]fen mentioned that his wil bethelastfull sion ofthe OSastheywilbe running Windows Dasa service _asopposed todiferentvesions overtime Thismeansitwllbe aconstant Uupdateycewithaddngor removing cf etures Updates mare youre ranting ‘helatesvesions, gm Windows 10 MM as a Service Mcrs Updates nt ony patch ay wlheabily, theycan also reeupsyste resources by improving code and streamlining the avalable resources nshor, your computes pefomng beter, then ican easly hale bacgyoundvitas and ‘treatscansthoutaectingwhatyourecong What to Keep Updated and How Discussing updates is one thing but how do you go about making sure that you have the latest updates and that al the necessary components are being updated correctly? Thanks to the improved update process of Windows 10, thisis surprisingly easy. Keeping Up To Date hic i'seanto update Windows 1, thre areelaments that canbe missed. Weve sendy mentioned tht nto Windowsthat needs updating but alcosofwareandcrvers Hyouclickenthe vanced Options inkunderthe Update ings section, you can thenticka bo that enables indows cor updates or other Miro products such 2 Fic to make suethe baci, erbettersecury ESSER th fst port ofcal i undoubtedly Windows Update Clkon the Windows Sta buton allowed by Stings thecog cn st, hve the pomericon on thestrip tothe side. This wl open the Windows roautomatcally inten, oat ast ety. Update &Secry and clickit andsoan.i recommend and protection BPI vivinthesdranced options pagectckthelinkforchoose haw updates ere dvere. This page deta ty ERED Pr cetoutwindons road ad istalpdat cancheckfrany on thespot by cl updates canbe pushes to athe computes on ou canscewhat ateadyboen vpdotedby clekingthe Updatehitoryirkurder rere Whist ta gand ee, thee ae cones theupdate button, acoso te communty syourchoice b ss rare usually automatically wpdated by indows Updte buts signed by Microsc the res themselves arertalwaysthelatest versions. Therein isa preblen:even though sed, the divers won tule the harwarearwellasthecrive developed he hardare manufacture, Insucheassits fen bestto we the hardware manures ve, athisismore unto date an vwellas performance dates. For example fyeuonm an arcnhlckte iia on inthetasac and selec afore Experience BB open NVIDIA Control Panel ‘Check for updates iia gaphics nvidia Update notifications > BB NVIDIA Control Panel Bat The tila GeForce Experience allows youto improve in-game iyephics and checklorthelatestvers, Usual thisisdone utomatealy and you ae natfedof any aalable dives Howeve you want ‘onthe rivers ab foley Check for Updates Boi (_ What to Keep Update FRE ice pary orograms and applications alzoequite regular updtechece. gain tise eualy done automaticly when rogram inqueston ton checks forthe latest version. sckfor Updates or sia, wualyin the Help ‘lemenusof your avout pp, look ortink such Aboutor even under the Fi FETED youve atached som haute arindows LOhaetbeen abetoloada dverfor, and therein any documentation detaing there thin happens vith Marae purchased rom ey a i) then youl need tohunt ane conn, tary eating the vce’ product name ard number ang ene tintoasearch engine. EEEED Yoeconoten fore Windows 10tlocatea dive king the Windows Stet baton an anager the menu, Inthe Deve Manager wind, se war updating ight ck it and select Update Dis tight thehardwareyou wontdmpubicatorscom EF How to Secure Your Web Browser ‘The web browsers possibly the weakest link in the entire security chain. It’s the software product that's on the front line, the one that will inevitably bear the brunt of any Internet attacks and as such, attackers focus a lot of effort on making the browser a portal into your system. Safer Surfing Secaing yur rowan iat Tarr plan of opons aici srt par at onaycanusets iro sey. For ‘stud we esi Crome Saty epmningclromeandclingon hee vera dtsin Vite anced Sy Setingtoxopen leche cpson kr tetepigitotte bse window Tsitelek tote Enenpal sac weh your ons ps ere axalable options rom the stchoose Stings secure pasptvaseyoucanrememberin the bots provide anh wl mrss emhancethesecunty ofall data synced between Chrome and the nee. Its generally recommended that yousign ito Chemne using Locktothet link for Google acount, asthiscan geal improve the overall ecurtyot Show Advances Setirgs. The stew sectento appear ueder thebrowsecFoexampl, when you signin, undetheSignnsectionnSergs, _theAdvanced setings Privacy, Startby cron the Content Settings buon, clickonthe advanced re Stings button thefistopion avalable OS 6 po ee Cette | One owsng dt jow to Secure Your Web Browser CH ene stinger ego Cokes, ‘nScp ash Pops purcanpsacephne ad Under the Downloads section sanideatotckthe box Ask where to save each fle before ownlcading Again ths can bea ‘even the webcam Itsaneitrsvelisowecan’- point altheoptiors within btofapainfortheuser however stops malicious background coloads theslimited space Fer maximum security able JavaScript and Flashand ‘rom nfecingyour stem, ging you more contol andthe ability stop rmahesurethe mic and webcam are protected 00 ‘he process. = = Downloade own ets Users “oge: 1 Adres each betel Totheleafthe Chrome Stings pageyoucn elins or Eensions, Settings and About ck the teres ink Wtnthe tensions page open scl down tothe bostom are clcktheGet More Estero ink ClcktheDone button when youre rished with Content ‘Setngs,to retunyoutoheChrome Settings page. Within Privacy ene the ast option Sere 3“Do Not Track request etched. This wltop any tacking elements tom montoregyeurbrowsingactves. oe Privacy tet sng ong en \eage Came may eb acer tego your towing perce Yum ‘With he Come Web Storelaunched a the tensions, eae mes eeayreaneeeieet search forAdbock Pus. Within theresuts conte Add to 1 Ueepedctonsencets lp conpetesmcterandUle pein tease Chromebuiton on ist optonforAdblack Pus This will an adverts, fu Gh speared essere blockerwithia Chrome, ecungyou em any treats rom interne aderting Dothesametor lur(anatrackingade-on] and HTTPSEveryahere toma pet pe cy certs a Ggle = Pr yo snd yout vento angus ts oer ea we sence ohare spt ers iain aerate send ge ttc a ett oe 1 senda Done request th ye towing ac ijt _hust underthe previous steptckbos tals recommended to ick thet Pasnords and Frms boxes that oferto enable 2 pecttndsaertocon muitonreome 4 i passwords hiswil top ay hijack Chrome attacks rom gaining your usemames ad pasts Ofer sneer eb pots Mange cr BB Protecting Yourself How to Secure Your Home Network We've mentioned previously that an attack doesn’t always come from the other side of the globe but can indeed be alittle too close to home at times. Home network hacking is possible with the simplest of tools available on the Internet, often even just tapping into a cable. Network Protection Without being oo paranoid ts remarkably easy to gtinto aneighbourshomenetwork fyouliven ablockof fats or you use pawetine adapters younay need to consider these ten steps for better network protection, POM TCCUER themosteomman entry point gain access toyournetworkisvathe route Thrower FromyourtsPmay wel be ofeing the test forms of encryption buit eae take onus total he ess eputabl sections ofthe teeta obtain ait of passwords. Therefore, change the deautuserame and passwoe to acest Mostroutersthese days come with aformot authentcaton called MAC (Media Acrass Cove _acessfitesing Every networkable device, computers tablets, gomesconsces comewith aunique UAC aderess, Thefitering allo yutoentrthe MAC accesses four devi, sol they canbe used on yourreute. Consult yout router documertaton or more deta M er Soria Iteanbe apaintuttyesabling DACP on) and optngfor sate acdeses Ere device that ‘connects toa DHCP routervilecee an ades By inating hat you get spel theadcres range vaiate ’snatlooproofbut ts wath eonsceng — - coe == om FM recording to Tuswaves 2013 Global Secu Repo, ‘mary home network hacks are conducted when he hausealds away or asleep Thiseaves the hacker wh ample oppomtuiyto| steal bandh ardvew es younayhave ona NAS dive, Theshort. imple Salton sto power of heer tig and ye go ou forthe dey im UD) Po vetine apts areancxalent reenuceforconnecg red network eves thou alinglengts of cable around thehome Hower, dependingontheadapartspossibleto use another adapter to gan acess 10 you's Newer homesareccrman whereyoureabeto pickup anther network, ‘Ouse theenaypton button ifthe adapter has one ara Cablingabomewith Ethenetisntadctt project, this es faster connection spetds than thatoFeless but youre ning in shared accomodation or afatbock, ‘make suethat any unseen able ngs caitbe acess by aneghbou ts easy encugh tosplceinto an heme cable andsteal bandwith Consider using network mapping progam, sich asOperAudT ogaina beter undestarcing of what devices ar atached to yournetwoc. Become tari ‘withthe addresses manutacure, models and soon ofever/comneted| ‘objet. Tata, shoul ating new appar youl naw ts natzomething youslloned, Garr (amenninaan How to Secure Your Home Network CH ‘Sharing resources andfles rom ane computerto _anotheris pefect/finebut consider sharngless you lvelnclose proximity oothers Once ahackerhas pained acess your network, getting oan shared folders youhave wil beaded, n extreme ‘cases dn’ shae anything but general tighten password conto RTT CR SGD rete adinisraton on bath thereuerand computer cerainiheb youovawhen yout not at ‘helayboard Pehaps yeu conret yout home natok amor? Whatever ‘hereesons, t doesleavea potential gap nyoushome neterksecuny Consider osingit completely or dovble-checkngtheavhenteatonstap nach |) caamemsrtnrate on Cogerteraettie omnes TSS SD s0uv0asmal ofcemakesurethat all yourvall ors are cated in aeas where they are secu ‘Behind desks and generally aay rom here the pubic ay vetorsmay be ablesneaily pluga ptopin wentinpiticton.on CEE What are Wireless Security Standards? Wireless security has adhered to a number of standards since 1999, each improving over the last due to the ability fora then-modern computer to hack the security levels behind them. Tighter controls are needed as computers and the way they connect have become increasingly more complex. WEP, WPA, WPA2, IEEE... Ami the conksing acronyms ies logical progression af wireless encryption and security protocol. Wis fit they seem beveldeing, is quite interesting eam oftherhistry. The technology behind deverng a witless network has evolved ove the fet These standards ae abaye meouing Somard and ke mast elements ofthe couple of deca anésohasthewaysandmemsnwhichtoseewe tali’snetechneogyindusty they come wth a bevseing cock ef acer an fonsinga password that noone is ly to gues, you need meanings Enerypton ad al things secur canisng toi ven fr and connection toa witless network is erento the ud be fiir or, : 5s nevosingand the highest poss dts communications ocumentaon bit wha rear? 802.1x i the IEE sandad for xo authentication and conoling user trafic acre Wie aed wired heme eed nati. 2 wees etvars a requires er ite procesing er rom the ashentcator the acta i ces pit. Theater the stand wb 2 ands the speed of corn eae dev (_ What are Wireless Security Standards? CH Wee the upgoded stander echelogyof NPA NS. lesigned to fete user an presse 296- tb neni ly hich tal reachable eles yout 3 secre ech ab wth afew Dili dolarstospareon quaumcamping ae deat arcare doeyping proceson, There ae ao een substandards thin WP9O, with AES Behance Ercneon Standard and TAP (Terral key tery Prctoct bath of which ae encaypen method, long wih the ser used CCMP (Counter ede wth Cipher Blk Caring Mesage ‘asertiaton Code Poo WEP This the orignal wireless encryption secu standard, Wired qunalet racy. Whit the preocl verte forthe ate nets wires networ its soon oveshadowed by he ever ncreasng rer ofthe average compute WEP ues 9 40-3¢ ‘Senda eneryption ey, which aly consing of either 10or2sheadecmal dis Tatscunds thea lott possible esto rackbutameoden poner computer would be able to bresk 0-bit ‘encypenin oud 30 seconds compare thsto montsfora computer inthe late. vt Access Point Taling about access pits, this ie the hardware that acts ae 2 racer cr tansmiter for the witless signal and network can physealy be 2 pumber of

You might also like