Showing posts with label data. Show all posts

Look In to | Helping Hackers Steal Your Data



Editor’s note: This article is contributed by Lenin VJ Nair. Lenin used to work with the DSL Internet department of AT&T for two years, and now runs an online technology magazine called Blue Bugle targeted at latest smartphones, tablets, desktops, and web technologies. You can find him onTwitter and Facebook.

We know hackers are all around us, and that’s why we are extra paranoid about our online accounts and passwords. In fact, in the current web environment, hacking is not a direct job targeting yourGmail or your Facebook account. It is a controlled chain reaction involving all your linked accounts. From one service the hacker gets important security information about another; then he ‘hacks’ that account, and so on.

We however think that big companies and tech geeks are immune to hacking, don’t we? But is it really the case?



No One Is Safe

Wired writer, Mat Honan’s account was hacked last year, and the hackers (identified as Clan Vv3 and Phobia) took control over his Gmail account and terminated it.

From there, they took over his Twitter and Amazon accounts and then his Apple account, and eventually deleted everything from his Apple iCloud service. The painful truth is that Mat Honan had helped pave the way to this elaborate scam. As an example, since tech blog Gizmodo’s Twitter account was linked to Mat Honan’s, the hackers got access and took liberties with the Twitter account too.


     (Image source: Dailydot.com)

In another story, Labnol’s Amit Agarwal was also subjected to a Facebook account hack, which was not successful as the author immediately took action and locked the account.

No one is immune to hacking. It can happen to anybody, and when it does, there is no point regretting it. You really have to know what sort of security you have on all your web services, and how you can better manage them.

How You Are Helping Hackers

Here, we will see some obvious things you can do to make yourself immune to hacking.

1. Facebook Profiles


As the largest social network, Facebook profile is the first thing you need to secure. Go, check it out from the outside. Log out of your Facebook then look your account up, from an outsider’s point of view.

If your Facebook profile shows too much information, you will likely victimize yourself. Check out this particular user’s public Facebook profile, specifically doctored for this article (that means it’s not real. I have only masked the email address, as we need an actual email address to do this. ).



This particular profile lists apparently innocuous information, like the IM screen names on Google Talk, AOL (AIM), Yahoo, etc. What you probably forgot, but a hacker knows and takes very seriously, is that a screen name is actually your email address. For instance, highlyinsecure@gmail.com is an email address owned by this particular user. It is wide in the open for everybody to see.

It is good to share your email address with the people you know. Otherwise, it is better not to share it at all.

2. Account Recovery Hack On Facebook


Let’s do an experiment. Pretend you forgot your password, then go into Facebook. Facebook may ask you for your email address, your user name or your mobile number. You can provide that information, and it will send you an email with instructions to reset your password.

Previously, there was a method employed by Facebook to reset the password, and that method had your trusted friends involved for the purpose. It sounds foolproof unless you accept a lot of friend requests on Facebook. Picture this: You get a friend request from a few people that you don’t know. If you are the friendly type, you’d probably accept those four requests.

One thing you don’t know is that those accounts may be operated by one or more hackers. What they will do is simply raise a password reset request on your account, and select three of those four accounts as your "trusted friends". Facebook emails security codes to those trusted accounts, and boom, the hacker takes over your Facebook account. If you have problems with that, then you should take a look at this post of mine to figure out what to do.

Fortunately, Facebook no longer uses this particular method. It also doesn’t rely on security questions any more. Right now, in order to gather access to a Facebook account, the only way is by securing access to the original email address.

Hence, a hacker needs access to your email account to get into your Facebook account.

2. Email Security

Which email service are you using? Depending on that, the security differs. If it is Gmail, I would extremely recommend that you start using the two-factor authentication.

Here are the steps:

1. Go to your Google Account settings (not Gmail settings) and go to the Security option.



2. You will see 2-Step verification option. Turn the status ON.



3. Add your phone number. Select to receive the codes by text messages or voice call.



4. Enter the code received to verify your account. Make sure you update the records if you change your phone number.



Another important thing on Gmail is notifications about suspicious login attempts. You can opt for email as well as phone notifications if any suspicious login is detected on your Gmail account.

The Truth About Security Questions


Google has a security question that you need to set. Make sure it is set properly. While I was working with email security for AT&T, I have encountered elderly customers answering security questions very truthfully. Even though I took time in explaining to them what a security question is and why they needn’t submit the true answer all the time, most of them did not quite understand it.

Most people don’t realize the fact that a security question answer works exactly like a password, only less secure depending on how you through your information about. Talking about your pet Rover on Facebook a lot then setting it it as your Security question maybe risking it a little. Anybody can access your account, whether or not they know the password, just by making educated guess about your preferences, which would work if you are truthful with your security questions.


3. Website Owners, Beware!

If you get into the Whois database of my website, you will get to see an email address that I own. It is right there, publicly available in the open. It is an email address I still use. However, it is completely detached from my website or any other important service that I use. And there is a good reason why.

In effect, even if you know it, you will not be able to access my website, my Facebook page, or my Twitter account because none of them uses that particular email address.



You, as a website owner, should secure the information you share with the world. You can easily do this if you spend a little more money with your hosting provider to mask the website’s registration information. All hosting providers make it available to their customers at a small fee, but I didn’t do it simply because I cannot afford it.

Whois database gives a hacker not only an email address, but also a physical address, details of the hosting provider, name of the organization, a phone number, etc. An expert hacker looking through this database can easily get valuable info about your hosting account. If you have low security on the email address and website, you will easily subject yourself to attacks.


4. Customer Service

If you are using the customer service option to reset your password for your email, the customer service executive may ask you your security question. Within AT&T, we used to use security questions to verify customers, questions like "Who is your favorite hero?", and answers like "Batman".

Not only that, we were authorized to provide the first letter of the answer if the customer gets it wrong the first time. A hacker can easily fake it since the random operator cannot identify the voice of the caller, and is supposed to divulge a password if the caller gives the correct answer.

In other companies also, the customer service executives can easily give a hacker your password or other important information from your account (such as your birth date) based on a trivial verification process. The information obtained from this call, may be used to verify an account in another service, and the chain goes on. It is very important to know what services you are using and how you can successfully verify yourself with the customer care department of those services.


Conclusion

Today, we are using not a few but a huge number of online services to get things done. Social media and email may be somewhat unimportant to some of you but what about online banking? It goes without saying how important it is to secure your banking account. I know there are elderly people who have no idea what Phishing is or how to create a good password.

A painful truth is that the security experts working in the companies you trust with your information actually expect you to know a little more about security. A security expert barely stresses the importance of these things. They cannot explain how to make a good password to each and every customer while trying to come up with better and more powerful ways to keep your online accounts safe. It is hence the responsibility of each and every one of us to know more about security in today’s world and act intelligently.

Handle Your IPhone Data Contact With CopyTrans



Well, not when you use CopyTrans Contacts, a Windows program that allows you to manage your iPhone contacts, calendar and text messages all from the same app.



Well, not when you use CopyTrans Contacts, a Windows program that allows you to manage your iPhone contacts, calendar and text messages all from the same app.



Managing Contacts

To start, download and install CopyTrans Contacts. After installing, connect your iPhone to your computer via USB. Now, run CopyTrans and choose CopyTrans Contacts.


Then, click on the ‘Contact’ icon on the left sidebar to access the Contacts page.


You can add a new contact by clicking the ‘+ New contact’ icon.


It will open a new page where you input the details of your new contact. After you’re done click ‘Apply changes’ and it will save to your phone.


You can also back up your contacts using CopyTrans. To do this, just click on ‘Export contacts’.


It will open a new window which will show different types of backup options you can choose from. You can save your contacts to your computer or transfer your contacts to other devices.


After choosing ‘Save your address book’, all of your contacts are now saved in your computer.




Managing Calendar

To manage your calendar with CopyTrans, first, connect your iPhone via USB to your computer, run CopyTrans and wait for it to finish syncing.

Now, click on the ‘Calendar’ icon on the left sidebar.


You’ll notice that all of your calendar events are displayed. To edit your calendar, just click on the selected event and you can drag it and drop it to the time slot you want.


You also can adjust the starting time and the endtime for the event by dragging the bottom line of any hour and extending it to the hour you want.


To change dates of events, navigate your calendar to ‘week view’ or ‘month view’ and simply drag the event to a different date.




Managing SMS

Apart from managing your SMS, CopyTrans also can be used to manage your MMS and iMessage.

Connect your iPhone to your computer via USB. Click on the ‘speech bubble’ icon and your messages will load.


On the text messages list, there’s a small box on the left where you can tick which message history you want to back up. Tick the ones you wish to back up and click on ‘Export selected’


After exporting it, the backed up files will be in HTML format.


Double-click on the backed up files and it will open on your default browser where you can read your messages.




Limitations

The free version of CopyTrans only allows you to do 50 actions, so, when you’re out of actions you can’t edit anything anymore on CopyTrans. However, you can gain more ‘actions’ by helping to spread the word about CopyTrans on Twitter or Facebook.


Quicktip Recover Deleted IPhone Data Easily With MobiSaver



The advice to always backup, backup, backup maybe lost on some poor souls who prefer to learn it the hard way. But even then, backups can only work if you do it regularly. Ironically, it’s not something one can fall back on during an emergency, e.g. when you deleted an important message, a vacation photo or a contact profile with no way to retrieve that information.

Well, here is a solution for you.


 
Mobisaver is a free Windows desktop tool to help you recover deleted data from your iPhone, iPad and iPod Touch. It works from iOS 4 onwards and can recover among others, contacts, messages, notes, videos, etc. Let’s take a look at how it works using the iPhone as an example.



Recover Deleted Data With MobiSaver

Click here to download MobiSaver. MobiSaver is free to use for personal usage and is activated with a key. Upon installation you will be directed to a website to obtain your activation key.

The app can recover the following forms of deleted data:

  • Supporting Camera Roll (photos & videos)
  • Message Attachments (photos, videos, contacts)
  • Contacts
  • Messages
  • Call History
  • Calendar
  • Notes & Reminders
  • Safari Bookmarks



 
Once the device is connected to the computer, MobiSaver will automatically start scanning your device for deleted data, either from the device itself or from previous iTunes backups. With the iTunes backup, you can pick a point of backup to recover data from.

To help you narrow down your search for the deleted info you want, the items carry the date and time of when the deletion occurred. You can use this information to reduce the amount of data you need to sift through. There is also the option to display only deleted info.


 

From the displayed items, just tick the item you want recovered, and the destination you want to recover it to, and click OK to confirm.



Limitations

Note that MobiSaver can only help you recover deleted data back to your computer. It cannot recover the deleted data straight back into the iPhone. To restore them back into your iPhone, you can use iTunes or programs such as CopyTrans.

We also found (during the testing period) that photo recovery was a little buggy. When we tried to recover deleted photos, it only displays the existing photos in our iPhone and not the ones that we have deleted (do let us know if this happens when you tried it as well). Aside from that, the app serves its purpose as a great tool to easily recover deleted data.
Related Posts Plugin for WordPress, Blogger...

- Copyright © 2013 All Ping