RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2
2019/08/02 13:51:38

Internet security

Content

Social media security

Cyberbullying (cyberbullying, cyberstalking)

Child safety on the Internet

Web Application Security

Mobile Network Security Threats

2023: New internet routing standard developed that cannot be hacked

On April 4, 2023, the Standardization Forum Netherlands announced the introduction of a new Internet routing mechanism that is almost impossible to hack. We are talking about RPKI technology, or Resource Public Key Infrastructure (resource certification). More. here

2019: Roskachestvo: Russians need to glue cameras and microphones on laptops

In early August 2019, Roskachestvo made a recommendation to glue the camera and microphone on laptop computers while they are not in use. With this measure, sensitive data can be prevented from leaking.

Experts from the Center for Digital Expertise of the Autonomous Non-Profit Organization "Russian Quality System " in their report advised to seal the camera so that attackers could not obtain any information with its help.

Russians were advised to glue cameras and microphones on gadgets

Any opaque tape or tape is suitable for this. You can also use special curtains that are attached to the laptop camera. According to experts, the problem of possible surveillance cannot be solved only by banning applications from using the camera and microphone or disabling them in the settings.

File:Aquote1.png
Roskachestvo again recommends that you be careful about the requested access to mobile applications: restrict access to the microphone, camera, photo gallery, geolocation, etc., if this does not affect the performance of the necessary application functions , the experts noted.
File:Aquote2.png

The head of the system solutions department Group-IB Anton Fishman confirmed that malware can not only copy documents, intercept button presses and read messages, but also activate a microphone or camera on a laptop.

At the same time, the expert stressed that only by sealing the camera cannot solve the problem of cybercrime - it is necessary to comply with other requirements of "digital hygiene," for example, not to download software from inaccurate sources.

Roskachestvo noted that smartphones "constantly spy" on their owners. They collect metadata to specifically advertise products.

File:Aquote1.png
There is no hiding from this and you need to take it for granted, but it is still better to turn off your smartphone during a private conversation, the organization[1]
File:Aquote2.png

2017: How to encrypt your life - legally and for free

1. Use two-step authorization for your mail

Mail is the key to all the locks to your life. If an attacker breaks it, then he will be able to change your passwords for almost everything, including social media accounts and even a bank account. The easiest way to significantly increase the level of protection of your data is to connect two-step authorization. Usually, such authorization assumes that when trying to log into your account, you will need to enter a special code that will come in a message to your phone. Two-step authorization significantly reduces the chances that your mail can hack[2] to encrypt your[3].

2. Encrypt Hard Drive Data

3. Use Your Phone Unlock With Your Password

Of course, fingerprint identification is better than nothing, but it is still not enough. If attackers can get their hands on a fingerprint, you won't be able to change it. Usually, attackers have ten attempts to enter a password, after which the phone is completely blocked. If you have a very simple four-digit password (like 1234, 9999, 1122), then you better change it.

Tip: If you only use fingerprint identification and have been arrested, disconnect your phone immediately. When the authorities turn it on, they will not be able to access his data without entering a password.

4. Use different passwords

Passwords are not reliable. Mark Zuckerberg used the dadada password for his LinkedIn account. In 2016, hackers published 117 million email logins and passwords, including Zuckerberg's data. But the attackers were unable to log on to Zuckerberg's Twitter and Pinterest accounts under them.

So it's better not to use the same password for multiple accounts. In order not to remember a huge amount of data, use password managers.

5. Remember that incognito mode doesn't give you complete privacy

When you use incognito mode in Chrome or Firefox, your Internet activity can be tracked:

  • ISP.
  • System administrator at your job and in general any place from which you went online.
  • Google or any other developer of your browser. Internet Explorer (browser), Safari, Opera and other browsers also do not provide privacy.

If you want relative privacy on the Internet (no system can guarantee you 100% privacy), use the Tor browser.

6. Use Tor

The name Tor stands for The Onion Router and is a reference to the so-called onion routing, which is used to hide Internet activity. It's a free browser that's pretty easy to use. After installation, go to the check.torproject.org and confirm that everything is working. Congratulations - now you can safely roam the Internet, and your activity will be difficult to track.

7. Use Private Search

If you are uncomfortable using Tor, you can use DuckDuckGo, a search engine that does not track your queries. With DuckDuckGo, you can encrypt searches on Google by adding the word! google at the beginning of the request.

2016: A service for "cleaning traces" appeared on the Internet

On the World Wide Web, the problem of "removing a person" from the Internet space is acute. Communication of users in social networks, the use of search, registration in various online services have recently led to a sharp increase in spam. In addition, social networks are increasingly becoming an arena for the propaganda of extremism, recruitment into various terrorist groups. A kind of panacea for this can be a service with which you can easily find and clear all the information associated with your Gmail account.

Each Internet user over time leaves behind a lot of "traces" on the Web. For example, a variety of registrations lead to a sharp increase in the amount of spam. The second side of the issue - social networks are increasingly becoming a place of illegal actions: agitation, recruitment, extremist propaganda. And the authorities are pursuing the owners of such accounts. Therefore, the problem of "removing a person" from the Internet is only gaining weight. Programmers from Sweden have offered a service that allows you to remember and "clean up" all accounts linked to Gmail in just minutes. It is easy to predict that such programs will increase capabilities and be in demand.

Swedish developers Wili Dolbo and Linus Yunnebak have created a Deseat.me app that allows you to delete all user accounts that have a Google account, both on social networks and on other Internet services. The system makes a selection of all web resources where there are "traces" of the user, and generates a list of links with references to sites. The user only has to view it and remove unnecessary registration or subscription.

2009: Prominent opponents and supporters of online anonymity

Opponents of anonymity

Evgeny Kaspersky was one of the first to express his opinion on the need to identify users on the Internet

Evgeny Kaspersky, founder of Kaspersky Lab: "In order to go to the Internet, there must be some kind of certificate, a card. You insert a card, type a PIN code - confirm that it is you, and after that you can work on the Web. "

Boris Miroshnikov, Head of the Bureau of Special Technical Measures (BSTM), MINISTRY OF INTERNAL AFFAIRS Russia Colonel General, advocates reducing the degree of anonymity when registering Internet users and increasing responsibility for disseminating information from the network. According to Miroshnikov, "anonymity is an invitation to crime, this is the very dark lane in which atrocities are taking place. Give it light and there will be fewer crimes. " He added that attackers actively use the opportunity to hide under a pseudonym or hide in the territory of a foreign one states and called the defenders of the concept of the Internet free from regulation, operating with the terms "publicity" and "freedom of speech" demagogues who indulge criminals. According to the head of BSTM, the unit is constantly working to improve registration discipline together with other law enforcement agencies, and Ministry of Digital Development, Communications and Mass Media the business community.

Scott Charney, vice president and head of security at Microsoft: "Anonymity and the lack of any control on the Web should remain in the past. Due to the fact that the actions of users are not monitored on the Internet and they have the opportunity to remain unrecognized, cyberspace is increasingly flooded with criminals. Today, too many users do not even know what software is used on their computer. In such conditions, it is not too difficult for attackers to infect their systems. Often, users do not know with whom they communicate on the Web, whether email from this addressee can contain malicious files. Although a person visits a website, they are not sure they can trust that resource. " He also argues that the Internet should become more secure, with a view to its further development.

Craig Mundy, the head of research and strategy Microsoft also spoke about this in 2008 during his speech at the conference. RSA Microsoft employees have repeatedly noted that their company, as a leading software provider, is systematically subjected to various kinds of attacks.

Doug Leland, head of Microsoft's Identity and Security Business Group, claims that active work is underway to involve other companies and law enforcement agencies in finding solutions to this problem. This is evidenced by Microsoft's appeal in September 2008 to the Internet Safety Technical Task Force, whose activities are aimed at creating a so-called safe Internet for children.

It should be added that in order to solve the problem of network anonymity, the software corporation is actively cooperating with the governments of countries such as Singapore, France, Belgium and Britain. Technical specialists and government officials spoke unequivocally about the ideas of restricting the freedoms of the Russian Internet space.

Sebastian Schreiber, the famous "ethical hacker" and international security expert, suggests introducing ID passports to Internet users: "The best and perhaps the only solution to the Internet security problem could be to assign a permanent identifier to each Network user. Freedom on the Internet is important, but security is no less important. "

Rashid Nurgaliev, head of the Ministry of Internal Affairs of the Russian Federation, insists on the need to exclude the anonymity of Internet users when registering. He stated this at a meeting of the Ministers of Internal Affairs of the CIS member states in early June 2009: "Attackers must stop using the openness of the borders of the Commonwealth, hiding in territories where the jurisdiction of law enforcement agencies of the state that pursues it in accordance with its national legislation does not operate. The Ministry of Internal Affairs of Russia, taking into account the accumulated experience in the field of countering cybercrime, is ready to provide colleagues from the CIS states with all the necessary advisory assistance in organizing special events. "

Supporters of anonymity

Sergey Brin, founder of Google: "I don't think you should be allowed on a passport... I think some sites may be less anonymous. Perhaps it makes sense - it happens, it is important to know which particular person wrote it. But some other things are helpful to do anonymously. You need to have all the possibilities. "[4]/

Vinton Cerf, vice president of Google, one of the creators of the Internet: "I would not reject the principle of anonymity. There are many situations where it is perfectly legal. I believe that identification on the Internet should not be forced, but voluntary. In general, I am very wary of such requirements, as well as blocking any information on the Internet. Sometimes, instead of blocking, for example, child pornography, access to political speech is closed. "

Notes