Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
security:start [2021/03/19 16:12] – created niklas | security:start [2024/02/14 12:20] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 2: | Line 2: | ||
These are relatively simple security measures but they will have a major impact on the ease at which political enemies and criminal elements can disrupt our activities. | These are relatively simple security measures but they will have a major impact on the ease at which political enemies and criminal elements can disrupt our activities. | ||
- | It is necessary to secure any computer or phone that is being used to log in: | + | ==== Securing a computer or phone ==== |
+ | |||
+ | Firstly, it is necessary to secure any computer or phone that is being used to log in: | ||
* That is, there must be anti-virus software installed. | * That is, there must be anti-virus software installed. | ||
* Security updates to Windows/ | * Security updates to Windows/ | ||
- | * Care must also be taken not to install dodgy software. That could be apps on your phone or browser plugins.The Android store in particular contains thousands of dodgy apps and care should be taken when installing new apps. | + | * Care must also be taken not to install dodgy software. That could be apps on your phone or browser plugins. The Android store in particular contains thousands of dodgy apps and care should be taken when installing new apps. |
+ | |||
+ | ==== Web browsers ==== | ||
+ | |||
+ | Secondly, most browsers (including Firefox and Chrome) are notoriously ridden with security holes, many of which are not yet publicly known. Determined attackers could use these to steal your information simply by tricking you to visit a specially crafted website. They can easily produce very legitimate looking emails masquerading as coming from your bank, internet provider, phone company, Facebook, Amazon etc., but where links will send you to such a malicious site. | ||
+ | |||
+ | * If you receive something from e.g. Facebook that needs your attention, manually open a new browser window and manually type the URL for the website and login there. | ||
+ | * All Yahoo users’ address books were compromised a couple of years ago, so be extra careful when clicking on links that come from Yahoo addresses, including people you know. | ||
+ | * Also, never click on any links in spam email, or links randomly sent to you by strangers. | ||
+ | |||
+ | ==== Secure passwords ==== | ||
+ | |||
+ | Thirdly, use strong passwords: [[security: | ||
+ | |||
+ | ==== Social engineering ==== | ||
+ | |||
+ | According to Wikipedia, " | ||
- | Most browsers (including Firefox and Chrome) | + | Here are some basic techniques |
- | * If you receive something from e.g. Facebook that needs your attention, manually open a new browser window and manually type the URL for the website | + | |
- | * All Yahoo users’ address books were compromised | + | * Never reply to requests for personal information or passwords. No one will ever legitimately ask you for your password, not even for verification of your identity. |
- | * Also, never click on any links in spam email, or links randomly | + | * Reject requests for help or offers of help. An attacker might pose as technical support |
+ | * "Break the loop". Most attacks try to force you into a sense of urgency. But what is the rush? Slow down, and always //take the time to think//. If someone is rushing | ||
+ | * Ask for verification of identity. Research it, and don't trust it blindly. | ||
+ | * All offers and prizes | ||
+ | Pay attention to how you react to something. More often than not these attacks will try to elicit an emotional response and then exploit your impulses. |