Wednesday 20 July 2016

Your Guide to Online Privacy

Should you tape over your webcam? Is it OK to use your computer’s operating system, or do you have to run Tails? And what the hell is Tails? Unless you’re a high-profile target—and you’re probably not—you can take some simple steps to block hackers. Etc. asked one of Bloomberg’s cybersecurity reporters to outline your options below on a scale from “sane” to, with apologies to the former National Security Agency contractor, “Snowden,” who recently and perhaps understandably took tweezers to his phone.

Try Two-Factor Authentication: “Factor” No. 1 is your normal password. No. 2 is a one-time code that’s texted to you. All major internet-based services—e.g.,Google (http://ift.tt/29aVqgH), Twitter (support.twitter.com), and Facebook (facebook.com/help)—offer this feature. It’s the most basic step you can take to protect yourself.

The importance of two-factor authentication got Silicon Valley’s attention when journalist Mat Honan, who didn’t use the technology, was hacked in 2012 and wrote about the experience. Honan’s attackers posted racist and homophobic messages from his Twitter account, took over his Gmail, and commandeered his iCloud account, deleting everything from his Apple devices.

Download an Authentication App: Google Authenticator (support.google.com) bypasses the need for a code to be texted to you. The app syncs with Google’s servers and generates a code that exists only there and on your phone—nothing is sent that can be intercepted. Another app, Duo Security (duo.com), is free for consumers and starts at $1 per month for businesses. Facebook and Twitter have in-app authenticators; Snapchat uses Google’s and Duo’s. For the full article click here 



from hacker samurai http://ift.tt/29NrtiB
via IFTTT

No comments:

Post a Comment