AVENUE VIET Forum Index AVENUE VIET
An Online Community
 
AlbumAlbum   FAQFAQ   SearchSearch   MemberlistMemberlist   UsergroupsUsergroups   RegisterRegister 
 ProfileProfile   Log in to check your private messagesLog in to check your private messages   Log inLog in 
The views expressed herein are the writers' own and do not necessarily reflect those of the webmasters, administrators and moderators of this forum. Refer to the complete disclaimer.
The Internet - Info, Tips and Warnings
Goto page 1, 2, 3  Next
 
Post new topic   Reply to topic    AVENUE VIET Forum Index » L'Avenue
View previous topic :: View next topic  
Author Message
Internaute



Joined: 28 Dec 2007
Posts: 554

PostPosted: Sat Apr 01, 2017 2:06 am    Post subject: The Internet - Info, Tips and Warnings Reply with quote

Let's make this the thread for news and info pertaining to the Internet. Very Happy

Protecting Your Digital Life in 8 Easy Steps

Read more:

https://www.nytimes.com/2016/11/17/technology/personaltech/encryption-privacy.html
_________________
Surfing the Web


Last edited by Internaute on Tue Jan 16, 2018 1:50 am; edited 1 time in total
Back to top
View user's profileSend private message
Internaute



Joined: 28 Dec 2007
Posts: 554

PostPosted: Wed Sep 13, 2017 2:19 am    Post subject: VPN to protect your privacy Reply with quote

[Copied from an ad sponsored by the Daily Beast]

As we have seen recently with Washington's efforts to track our online activities, you can never be too careful with your Internet privacy. Add in leaky software, high-profile hackers, and government spies and there are more threats to your online security than you can count. That's why it is a good idea to employ a reputable VPN like the Private Internet Access VPN, so you can surf the web anonymously and without restrictions. While there are other (often free) VPNs have proven to be after their own questionable agendas, Private Internet Access has earned itself high marks across the web. This high-rated solution (4.5/5 stars, PC Magazine) connects instantly and easily and protects your identity with several layers of privacy. It has a high-level encryption that blocks Internet Service Providers from accessing and selling your browsing history. An additional benefit is that Private Internet Access actually cloaks your IP address so you can access the entire Internet from anywhere without being limited by geographic restrictions. Best of all, it stops traffic with a kill switch if the VPN connection is unexpectedly terminated—so you're never left exposed to the nefarious elements. This VPN comes with a two-year subscription and works on five devices simultaneously. It can also be used on any network, including public Wi-Fi. While Private Internet Access VPN normally costs $166, you can get it for just $59.95, a savings of 63 percent.
_________________
Surfing the Web
Back to top
View user's profileSend private message
Kerowyn
Herald


Joined: 04 Sep 2011
Posts: 1842
Location: Queendom of Valdemar

PostPosted: Wed Sep 13, 2017 2:25 am    Post subject: VPN Reply with quote

I use a VPN service to change my IP when I need to (for example when I'm overseas and want to watch some videos that are blocked outside the US) - I'm not sure this protects me from Internet "spying" or "monitoring", I'll have to investigate.

I do know that when I use µTorrent to download movies from the Net, there are always several ads for VPN services, so that nobody can know what I'm doing on the Net, but I've never explored them. Maybe I should...
_________________
Valdemar's Warrior Women
Back to top
View user's profileSend private message
Internaute



Joined: 28 Dec 2007
Posts: 554

PostPosted: Wed Sep 13, 2017 2:40 am    Post subject: About Internet Identity Theft Reply with quote

The New iPhone X Could Help Identity Thieves Steal Your Face
BY Merritt Baer
By making facial recognition a new industry standard, Apple could be opening the door to a new kind of identity theft—and one only high-end phones will be able to stop.

Apple has announced that it plans to replace previous iPhone login credentials with facial recognition technology to log into the iPhone and to access Apple Pay.

This should prompt some privacy and security concerns, but probably not the ones you’re thinking. It’s not the TSA or the Deep State who are most likely to abuse it.

The depth and portability of current facial recognition authentication may be a new bridge into consumer app insecurity, like online banking apps and devices that hook up to the Internet of Things.

Basically, with a newer facial recognition method about to become an industry standard after Tuesday’s Apple event, identity theft could take on whole a new face. And, down the line, it’ll make identity theft yet another thing only those with disposable income can afford to stop.

Feature-Based Replacing Image-Based Facial Recognition

There are two general technologies that perform facial recognition: feature-based and image-based. Image-based is old school, but it’s everywhere, like the facial image recognition tech you see at a mall or bank.

At least as far back as 2001, and seemingly accelerated by concerns about terrorism post-9/11, the use of image-based facial recognition to identify individuals became popular, ostensibly to weed out terrorists and criminals. Today, approximately half of Americans are in an image-based police face recognition database.

Read more:
http://www.thedailybeast.com/apples-new-iphone-x-could-help-identity-thieves-steal-your-face?via=newsletter&source=DDMorning
_________________
Surfing the Web
Back to top
View user's profileSend private message
Internaute



Joined: 28 Dec 2007
Posts: 554

PostPosted: Thu Sep 14, 2017 12:08 am    Post subject: Cops May Be Able to Force Open Your iPhone X Reply with quote

Cops May Be Able to Force Open Your iPhone X Using FaceID
BY Ben Collins
Civil-rights group warns that cops will likely be able to force you to unlock your $999 phone and expose all of your secrets unless you switch off FaceID.

The only way to be certain cops won’t receive instant access to everything on your new iPhone X is to turn off its flashiest new feature, according to the ACLU.

Apple introduced its new FaceID feature, which allows its new $999 phone to be unlocked just by the sight of your face.

It could well be used to the benefit of police in possession of a locked iPhone, since court cases over the past several years have ruled that cops can force citizens to use their thumbprints to unlock their iPhones—but not compel them to hand over their iPhone passwords.

"Under the current doctrine, it’s most likely not going to be a Fifth Amendment problem for police to [use your face to unlock your iPhone],” said Brett Kaufman, a staff attorney for the American Civil Liberties Union who works on national-security issues.

“I would hesitate to say it’s legal, but it wouldn’t violate your self-incrimination right under the current doctrine.”

Kaufman said the “real issue is a Fifth Amendment one,” since citizens can’t be compelled to be a witness against themselves. Courts have ruled in cases dating back to 2014 that thumbprints, which are likely considered to be in the same biometric data category as faces, are more of an act of identification than an act of testimony.

“Most of the cases so far have said when the government is forcing you to use a thumbprint, that is not testimonial,” said Kaufman. “They’ve largely ruled that your thumbprint doesn’t communicate any testimony to the government.”

Read more:
http://www.thedailybeast.com/cops-are-likely-to-be-able-to-force-open-your-iphone-x-using-faceid?via=newsletter&source=DDMorning
_________________
Surfing the Web
Back to top
View user's profileSend private message
murat



Joined: 13 Dec 2005
Posts: 1385
Location: New York

PostPosted: Sun Oct 08, 2017 9:12 pm    Post subject: How the CIA made Google – INSURGE intelligence – Medium Reply with quote

How the CIA made Google – INSURGE intelligence – Medium

Do not be misled: in particular yahoo, hotmail, etc. are also working and sharing data/communications with the USA spy agencies.... MM

https://medium.com/insurge-intelligence/how-the-cia-made-google-e836451a959e

https://medium.com/insurge-intelligence/why-google-made-the-nsa-2a80584c9c1

YouTube "Tweaks" Its Search Algos After Las Vegas Conspiracy Theories Go Viral
http://www.zerohedge.com/news/2017-10-06/youtube-tweaks-its-search-algos-after-las-vegas-conspiracy-theories-go-viral
_________________
Roule, tambour d'Arcole!!
Back to top
View user's profileSend private message
X



Joined: 03 Mar 2005
Posts: 856
Location: Lala Land

PostPosted: Mon Dec 11, 2017 11:35 pm    Post subject: NYC terror suspect rode subway Reply with quote

A man accused of detonating an explosive in the New York City subway system this morning had the bomb strapped to him while he rode in from Brooklyn to Manhattan before the attack, a law enforcement source said.

Admin's question: X, what is this doing in the Internet Security thread???? confused
_________________
Oh man!
Back to top
View user's profileSend private messageMSN Messenger
Internaute



Joined: 28 Dec 2007
Posts: 554

PostPosted: Sun Jan 07, 2018 1:52 am    Post subject: Security on the Internet Reply with quote

Our Fearless Leader fell victim to an Internet virus scam the other day. There are warnings all over the Net, often from governments, against the most common scams. WF sent me a list of such warnings, which I shall post presently. Meanwhile, I found this article in Bloomberg News:

Apple: All Macs, iPhones Exposed to Chip Security Flaws

Apple Inc. on Thursday announced that all Mac systems, iPhones, and iPads are affected by chip security flaws that could allow hackers to steal data. Researchers had sounded the alarm over the vulnerabilities a day earlier, warning that nearly all computing devices are affected. The company has stressed that the two flaws—dubbed Meltdown and Spectre—have not yet resulted in any known breaches. The Spectre bug affects nearly all computer chips made in the last decade, while Meltdown is limited to Intel Corp. chips. Apple said recent software updates should mitigate the vulnerabilities caused by Meltdown, and a fix to be rolled out for the Safari web browser in the coming days should protect against the Spectre flaw. Experts say the fixes are likely to slow down a computer’s performance, however.

https://www.bloomberg.com/news/articles/2018-01-05/apple-says-all-macs-iphones-ipads-exposed-to-chip-flaw?via=newsletter&source=CSAMedition
_________________
Surfing the Web
Back to top
View user's profileSend private message
Internaute



Joined: 28 Dec 2007
Posts: 554

PostPosted: Sun Jan 07, 2018 3:52 am    Post subject: Beware of Google Docs phishing scam Reply with quote

This is one of the scam warnings that Inkling7 sent to Wildflower who forwarded them to me. I'll go on posting such warnings in the coming days. For tonight I'm afraid I don't have the time. So, More to Come! Meanwhile, be careful and stay safe!

Beware of Google Docs phishing scam: Alert Priority High

Users are warned to be aware of a reported phishing scam involving a fake invitation to share a Google Docs document.

The scam sees a user receive a legitimate-looking email that may appear to be from a trusted contact inviting them to share a document on Google Docs.

Users who click on the link are directed to screens that request permission for a malicious service to access their email account, contacts and other sensitive information. If a user grants permission, the malicious service can impersonate the user when sending messages on to other Google email users.

Users may also face the risk of having information and messages from their email accounts compromised.

The scam reportedly targets Google personal and corporate email accounts.

A statement released on the Google Docs Twitter account said ‘we have taken action to protect users against an email impersonating Google Docs, and have disabled offending accounts.

We’ve removed the fake pages, pushed updates through Safe Browsing, and our abuse team is working to prevent this kind of spoofing from happening again.

We encourage users to report phishing emails in Gmail.

If you think you clicked on a fraudulent email, visit g.co/SecurityCheckup and remove apps you don’t recognise.’

Google Docs has also tweeted that they are ‘working to prevent this kind of spoofing from happening again.’

Spoofing occurs when emails are altered to appear to have come from a different source and is a method attackers commonly use to gain users’ trust and increase the likelihood of a successful attack.

Staying safe
If you are unsure of the legitimacy of any message you receive, you should avoid clicking on any links or opening any attachments. You should check with the purported sender using contact details sourced from legitimate sources (not from the suspect message itself).

If you have clicked on the link or inadvertently granted permission to the malicious service, you should immediately revoke that permission using the steps recommended by Google Docs.

You should also check your account details to confirm that nothing has been changed and as an extra precaution, change your Google passwords immediately.
_________________
Surfing the Web
Back to top
View user's profileSend private message
Internaute



Joined: 28 Dec 2007
Posts: 554

PostPosted: Tue Jan 16, 2018 2:00 am    Post subject: Update released for Chrome browser Reply with quote

This is another warning Inkling transmitted to Wildflower. I'll go on posting them in the coming days and weeks.

Update released for Chrome browser: Alert Priority High

Google has released a security update to address a vulnerability in its Chrome browser. You are advised to update to Google Chrome version 58.0.3029.96 for Windows, Mac, and Linux.

You are advised to review security bulletins and advisories from any vendor you use and apply their updates as soon as possible. Many vendors allow you to automate the process of updating their software.

Security updates address vulnerabilities in computer systems that attackers can otherwise use to gain access to systems or information.

A vulnerability is a weakness that can leave a computer and its systems open to attack. Attacks can be carried out a number of ways, including through malicious software (malware) such as viruses and spyware that can monitor a user’s activity on a computer and stop systems operating properly.
_________________
Surfing the Web
Back to top
View user's profileSend private message
Display posts from previous:   
Post new topic   Reply to topic    AVENUE VIET Forum Index » L'Avenue All times are GMT - 5 Hours
Goto page 1, 2, 3  Next
Page 1 of 3

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum


Powered by phpBB © phpBB Group