Posts Tagged Online Security

How To Stay Anonymous Online

Internet has become an integral part of daily life because everything possible is seemingly available online. This is the reason, why there is a constant risk of your privacy being hacked by cyber criminals. Not only can they track your online presence but also snoop away on everything you do.

This constant tracking imposes the need of staying anonymous online. Following are some ways through which you can achieve the desired anonymity:

  • Hide Your IP: The best way to stay unidentified online is to hide your IP with an anonymous VPN service. This way a virtual IP replaces your real IP address and prevents cyber criminals in gaining a sneak peek of your online activities.
  • Keep Your Web Searches Private: Conducting searches on search engines like Google, Yahoo, Bing etc. collects a lot of information such as your IP address, searches made, device used to make the search, location, etc. This is the reason why users are now opting for alternate search engines which do not track the search history and retain their privacy.
  • Block Third Party Cookies: Advertizers often use third party cookies to keep a track of your browsing habits. However, it is possible to hide them by blocking third party cookies within the browser settings. If you want to delete the cookies and other browsed information, you may use programs like CCleaner./li>
  • Use HTTPS: In order to prevent sensitive information from being intercepted Transport Layer Security (TLS) is extremely important. However, every website does not support a TLS connection and in that case HTTPS can help. It helps in keeping the internet traffic secure & private by enforcing TLS connections on the websites you visit.
  • Opt For Anonymous Email Communication: There are two ways to ensure email anonymity in a situation where you want to send somebody an email without letting them know your email address. You can use an alias which is essentially a forwarding address and allows the recipient to see your forwarding address only. The other way is to use a disposable email account which can be done by creating a new email account which you can use when you need. Another alternative to is to create a temporary forwarding address. This address gets deleted after a specific time, so it is best to use it while signing up on untrusted websites.
  • Encrypt Your Emails: Encrypting your emails can help you prevent unauthorized access by a middleman. There will be a limiting control as only you will have a private key for it.
  • Enable Privacy Settings: Your social media profile speaks volumes about you and hackers usually resort to a victim’s social media accounts to garner their private information. So make sure that you enable your privacy settings and hide personal information from public view.

For more information about IT Security, call Centex Technologies at (254) 213-4740.

, ,

No Comments

Cyber Security Trends To Watch Out For In 2018

 

 

PDF VERSION: Cyber Security Trends To Watch Out For In 2018

 

,

No Comments

Safeguard Your Business From Cyber Attacks

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

PDF VERSION: Safeguard Your Business From Cyber Attacks

, ,

No Comments

Steps To Secure Your WiFi

View Full Image

, ,

No Comments

What Are Man-In-The-Browser Attacks?

28th March, 2017

Man-in-the-Browser (MitB) attack is one of the most harmful forms of online threats prevalent in the recent times. It involves the use of a Trojan horse to gain access to the target user’s online banking credentials, financial details, account numbers and other sensitive information. The hacker uses a phishing approach to trick the user to click on a link that directs him to a website with manipulated form fields. A Man-in-the-Browser attack is quite difficult to detect as it does not hamper the normal functioning of the web browser.

Man-in-the-Browser attack can be specifically risky because of the following reasons:

  • It does not require complex hacking or phishing techniques to gain access to the user’s web browser.
  • It cannot be detected by anti-virus software.
  • Since the attack operates between the browser and the user’s input, it can easily circumvent the standard security measure, such as two factor authentication.

How Does A Man-In-The-Browser Attack Work?

Just like other online attacks, a Man-in-the-Browser attack also begins by infecting the user’s computer with a malware. This may be done by compelling the user to download a malicious attachment, visit a fake website or click on a malware injected URL. Once the system has been infected, the malware remains in stealth mode until the user performs the desired action, such as access an online banking account or visit a shopping website.

At this stage, the malware gets activated and creates a code to add extra input fields in the web page. When the user enters the information in these fields, it gets transmitted to the hacker. The Man-in-the-Browser attack can even involve secretly manipulating data on the website, such as account number or amount to be transferred to initiate illegitimate transactions without the knowledge of the user.

How To Prevent Against Man-In-The-Browser Attack?

  • Keep your web browser, operating system and other software updated as well as properly patched.
  • Install anti-malware software on your computer system and update it frequently.
  • Be careful while filling form fields on online banking and shopping websites. If you are asked to fill in additional form fields, provide more
  • information than is normally required or re-enter your password, you should close the browser and start a new session.
  • Keep a check on browser extensions. Make sure you use only reputed extensions and disable the ones that are no longer required.

We, at Centex Technologies, provide complete information security solutions to business firms in Central Texas. For more information, feel free to call us at (855) 375 – 9654.

,

No Comments