We are approaching a moment in history where technology is becoming the driving force for convenience in our lives. In a way, this is both a wonderful thing and a prelude to a complex series of nightmares. The way you proceed when browsing the internet weighs heavily on whether your experience will be pleasant or disastrous. The typical Internet user may understand what social engineering is, but probably doesn’t know how to apply that knowledge to constructing a proper defense plan against attempts to compromise their data.

To help you make your own personal security policy, instead of focusing so much on specific problems, we’re going to tackle the entire issue of security with a couple of broader pieces of advice.

Assume Hostility

Whenever crossing unknown territory, assume the worst. Do not misinterpret this as scare-mongering, though. All we’re saying is that if someone sends you a link — even if it’s someone you know — always assume that the link could be malicious. Yes, people you know and love can send you scammy links. This isn’t because they suddenly decided to be mischievous. Rather, it’s more likely that the person who sent you the link isn’t even aware that he/she did it. Anyone (even computer experts!) could be infected with a piece of malware that automatically logs onto their Facebook account (for example) and starts dishing out sketchy links to everyone on their friends list.

Signs to look out for:

  • Atypical behavior (e.g. a normally calm person suddenly appearing excited in messages just before posting a link).
  • Excessive use of URL shorteners (bit.ly, etc.).
  • Repetition (sending the same link, or a similar link, periodically without regard to your replies).
  • References to an event you haven’t participated in (e.g. “Dude, you were so wild at that party!”).

If you see enough signs that people may be infected with malware, kindly send them a message telling them that their system may be compromised.

If It Seems Too Good to Be True, It Probably Is

Many people have heard of the Nigerian Prince scams. Those who don’t know about it, or don’t fully understand it, should definitely read this! The Nigerian Prince scam involves a person who sends an email saying that they have some large sum of money in store for you. There’s a problem, though. For you to receive your inheritance/escrow fund/whatever, you have to pay a transfer fee. If you pay this fee, you’ll never hear from this person again. The Prince runs with your money and showers himself with your riches.

internetsec-scam

This is known as a Nigerian Prince scam because, as the name suggests, the entire practice of scamming people via email was popularized in Nigeria by wannabe social engineers who do this for a living. The scam doesn’t necessarily have to involve a prince. I’ve received emails regarding a deceased long-lost relative (from a country that my family came from, no less!) whose estate was to be inherited by me.

Signs to look out for:

  • Claims of extraordinary sums of money (in the six-figure and above range).
  • The need for a transfer fee (which, in real life, could be paid for with a part of the money, if it even existed) or some other payment in order for the transaction to take place.
  • Horrible command of the language they are speaking to you with.
  • The offer was completely unexpected (out of the blue).

Your Door Needs More Locks

For decades, service providers on the web have used password authentication to protect user accounts. This has become such a norm, that most of us accept it unquestioningly. The username and password have become the ubiquitous go-to way to log in to anything. However, security isn’t just about how strong your password is; it’s also about how many layers of security you add on top of that password.

internetsec-otp

Enter the world of two-factor authentication. Google, Yahoo!, Facebook, and Apple have been doing it for a while now. Two-factor (sometimes referred to as “two-step”) authentication puts an extra lock on your account. Instead of being protected by just a password, you get to add something else to it. It could be a one-time password delivered via SMS to your phone number or something more complex like a token device. You may find this to be quite a hassle, but it is very easy to use when you get used to it. Wherever it’s available, you should enable two-factor authentication!

Happy National Cyber Security Month!

Let’s make October a month in which we take the time to make ourselves safer! Share this article, spread the word, ask questions (no matter how dumb you think they are), and comment if you’ve got something to add!

Security advice provided with the aid of SingleHop, hosting IT infrastructure and cloud computing provider.

Show Notification Counts on Pinned Tabs in Chrome

Do you use pinned tabs in Chrome as a way to keep up with your email and/or social networking sites – like Facebook, Twitter, and LinkedIn? Wouldn’t it be great if you could display notification counts for messages and unread items on your pinned tabs? Here’s how you can do so.

How To Sign Documents From Gmail

What do you do when you receive a document that need to be signed? You will have to print it out, sign it and rescan it before you can send it back. HelloSign allows you to sign a document sent to your Gmail address and sign it from there.

Internet Speeds Inconsistent With Your Plan? Read This!

Have you ever wondered why your Internet speed is always not as fast as your service provider said it would be? It never hurts to examine the most common causes of slower-than-advertised Internet speeds and determine whether one of these is happening to you so that you can determine how to remedy the situation.

4 Popular Bitcoin Alternatives and How They Compare to Bitcoin

The cryptocurrencies is here to stay. Bitcoin may be receiving the most attention at the moment, but it is definitely not the only one around. There are tons of Bitcoin alternatives. Here we will take a look at the 4 popular Bitcoin alternatives and see how they compare to Bitcoin.

How to Fix Foreign Characters Not Showing Up issue In WordPress

If you enter foreign character in WordPress, but only see question marks (???) showing up, here is the fix for this issue without losing any data.

How to Copy All Links on a Web Page in Firefox

Have you ever wanted to copy all links on a web page while browsing? This Firefox add-on lets you copy all links on a web page in a matter of seconds.

Identify the Fonts on Any Web Page [Chrome]

WhatFont is a Chrome extension that will identify the fonts used on any web page, just by hovering your mouse over them. No more web font guessing!

Stop Gmail from Showing You Targeted Ads

Google has been scanning your emails so as to serve you targeted ads. Here is how you can opt out of the system and stop Gmail from showing you targeted ads.

Rid Your Site of Any Profanity Content with WebPurify

To get rid of profanity and offensive content on your site, you can either moderate every single post manually, or automate it with an external tool. WebPurity is one useful tool built for this purpose.

Import Email From Other Services to Outlook.com Using IMAP

With Outlook.com, it seems that Microsoft has hit the jackpot with an email service that competes with Gmail. Read on to find how to import IMAP messages.

How to Copy Multiple Texts in Firefox

For those who like copying text from multiple web pages, Text MultiCopy for Firefox allows you to copy multiple texts and paste them all at the same time.

How to Add Emails to Google Tasks Within Gmail

If you use Gmail in Google Chrome, here’s a handy extension that allows you to see your Google Tasks along with your Gmail inbox.