<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0">

<channel>
	<title>SafeGadget.com </title>
	<atom:link href="https://www.safegadget.com/feed/" rel="self" type="application/rss+xml"/>
	<link>https://www.safegadget.com/</link>
	<description>SafeGadget.com - Prevent Viruses, malware, phishing and online threats</description>
	<lastBuildDate>Sun, 18 Aug 2024 23:46:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<xhtml:meta content="noindex" name="robots" xmlns:xhtml="http://www.w3.org/1999/xhtml"/><item>
		<title>Securing Windows 10 with Secure Boot and TPM – Get Ready for Windows 11</title>
		<link>https://www.safegadget.com/1092/securing-windows-10-with-secure-boot-and-tpm/</link>
					<comments>https://www.safegadget.com/1092/securing-windows-10-with-secure-boot-and-tpm/#respond</comments>
		
		<dc:creator><![CDATA[SafeGadget]]></dc:creator>
		<pubDate>Sun, 01 Aug 2021 23:10:38 +0000</pubDate>
				<category><![CDATA[Computer Hardware]]></category>
		<category><![CDATA[Computer Software]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Secure Boot]]></category>
		<category><![CDATA[TPM]]></category>
		<category><![CDATA[Windows 10]]></category>
		<guid isPermaLink="false">https://www.safegadget.com/?p=1092</guid>

					<description><![CDATA[2021 Update: Windows 11 will require a PC with TPM 2.0 and Secure Boot among other attributes.  You will be all ready for this new Operating System. 8/4/2020 Update: A major security hole was found in Secure Boot. A lot of software needs to be updated. Windows 10 is installed in over 800 million devices &#8230; <a href="https://www.safegadget.com/1092/securing-windows-10-with-secure-boot-and-tpm/" class="more-link">Continue reading<span class="screen-reader-text"> "Securing Windows 10 with Secure Boot and TPM &#8211; Get Ready for Windows 11"</span></a>]]></description>
										<content:encoded><![CDATA[<p>2021 Update: Windows 11 will require a PC with TPM 2.0 and Secure Boot among other attributes.  You will be all ready for this new Operating System.</p>
<p>8/4/2020 Update: <a href="https://www.forbes.com/sites/daveywinder/2020/07/29/boothole-secure-boot-threat-confirmed-in-most-every-linux-distro-windows-8-and-10-microsoft-ubuntu-redhat-suse-debian-citrix-oracle-vmware/#eece0f3666e8" target="_blank" rel="nofollow noopener noreferrer">A major security hole</a> was found in Secure Boot. A lot of software needs to be updated.</p>
<p>Windows 10 is installed in over 800 million devices but a fraction of those are running with increased security offered in this operating system.</p>
<p>In this tutorial we will show you how to enable Secure Boot and TPM to increase the security of Windows 10.</p>
<p><strong>What is Secure Boot?</strong></p>
<p><a href="https://docs.microsoft.com/en-us/windows-hardware/design/device-experiences/oem-secure-boot" target="_blank" rel="nofollow noopener noreferrer">Secure boot</a> is a security standard developed by members of the PC industry to help make sure that a device boots using only software that is trusted by the Original Equipment Manufacturer (OEM).  This prevents it from starting the computer from malware, ransomware, etc.</p>
<p><strong>What is a Trusted Platform Module (TPM) ?</strong></p>
<p>TPM is a hardware chip that is either part of the motherboard or added on later.</p>
<p><span id="more-1092"></span></p>
<p>Trusted Platform Module (TPM) technology is designed to provide hardware-based, security-related functions. A TPM chip is a secure crypto-processor that is designed to carry out cryptographic operations. The chip includes multiple physical security mechanisms to make it tamper resistant, and malicious software is unable to tamper with the security functions of the TPM.</p>
<p><strong>Enabling Secure Boot</strong></p>
<p>Always <strong>backup</strong> your computer before making major modifications. Write down your current settings. Microsoft has some <a href="https://docs.microsoft.com/en-us/windows-hardware/manufacture/desktop/disabling-secure-boot" target="_blank" rel="nofollow noopener noreferrer">tips</a> on enabling Secure Boot.  Each computer is different, so your screen options will vary.</p>
<ol>
<li>Enter your PC&#8217;s BIOS setup by hitting the right key during bootup, such as F1, F2, F12, ESC or Delete.</li>
<li>Make sure your computer Boot Mode is set for UEFI, not Legacy</li>
<li>You may need to set Windows OS Configuration &#8211; Windows 10 WHQL Support to UEFI before you can see Secure Boot &#8211; It is called CSM for some BIOSes<a href="https://www.safegadget.com/wp-content/uploads/2019/08/secureboot.jpg"><br />
<img decoding="async" class="size-medium wp-image-1094 aligncenter" src="https://www.safegadget.com/wp-content/uploads/2019/08/secureboot-300x99.jpg" alt="" width="300" height="99" srcset="https://www.safegadget.com/wp-content/uploads/2019/08/secureboot-300x99.jpg 300w, https://www.safegadget.com/wp-content/uploads/2019/08/secureboot-768x255.jpg 768w, https://www.safegadget.com/wp-content/uploads/2019/08/secureboot-1024x340.jpg 1024w, https://www.safegadget.com/wp-content/uploads/2019/08/secureboot-1200x398.jpg 1200w" sizes="(max-width: 300px) 85vw, 300px" /></a></li>
</ol>
<p>4. Look for an option called Secure Boot &#8211; In MSI motherboards, it is located in Settings\Advanced\Windows OS Configuration Secure Boot</p>
<p>Set <em>Secure Boot Mode</em> &#8211; Custom</p>
<p>Select <em>Key Management</em></p>
<p><a href="https://www.safegadget.com/wp-content/uploads/2019/08/secureboot-provisionkeys.png"><img decoding="async" class="alignnone size-medium wp-image-1096" src="https://www.safegadget.com/wp-content/uploads/2019/08/secureboot-provisionkeys-300x113.png" alt="" width="300" height="113" srcset="https://www.safegadget.com/wp-content/uploads/2019/08/secureboot-provisionkeys-300x113.png 300w, https://www.safegadget.com/wp-content/uploads/2019/08/secureboot-provisionkeys-768x290.png 768w, https://www.safegadget.com/wp-content/uploads/2019/08/secureboot-provisionkeys-1024x386.png 1024w, https://www.safegadget.com/wp-content/uploads/2019/08/secureboot-provisionkeys-1200x453.png 1200w" sizes="(max-width: 300px) 85vw, 300px" /></a></p>
<p>Set<em> Provision Factory Default Keys</em> to Enabled</p>
<p><a href="https://www.safegadget.com/wp-content/uploads/2019/08/GOP-Driver.png"><img decoding="async" class="alignnone size-medium wp-image-1101" src="https://www.safegadget.com/wp-content/uploads/2019/08/GOP-Driver-300x72.png" alt="" width="300" height="72" srcset="https://www.safegadget.com/wp-content/uploads/2019/08/GOP-Driver-300x72.png 300w, https://www.safegadget.com/wp-content/uploads/2019/08/GOP-Driver-768x185.png 768w, https://www.safegadget.com/wp-content/uploads/2019/08/GOP-Driver-1024x246.png 1024w, https://www.safegadget.com/wp-content/uploads/2019/08/GOP-Driver-1200x288.png 1200w" sizes="(max-width: 300px) 85vw, 300px" /></a></p>
<p>The Intel GOP driver was then installed.</p>
<p><a href="https://www.safegadget.com/wp-content/uploads/2019/08/secure-boot-keys.jpg"><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-1095" src="https://www.safegadget.com/wp-content/uploads/2019/08/secure-boot-keys-300x165.jpg" alt="" width="300" height="165" srcset="https://www.safegadget.com/wp-content/uploads/2019/08/secure-boot-keys-300x165.jpg 300w, https://www.safegadget.com/wp-content/uploads/2019/08/secure-boot-keys-768x422.jpg 768w, https://www.safegadget.com/wp-content/uploads/2019/08/secure-boot-keys-1024x562.jpg 1024w, https://www.safegadget.com/wp-content/uploads/2019/08/secure-boot-keys-1200x659.jpg 1200w" sizes="auto, (max-width: 300px) 85vw, 300px" /></a></p>
<p>After it is enabled, the Secure Boot Variable fields will get set and now you can go to the previous screen and actually <strong>Enable Secure Boot</strong>!</p>
<p><strong>Compatibility Issues with Secure Boot</strong></p>
<p>Some drivers will not install correctly when you are running with Secure Boot enabled.  Temporarily turn it off, install the driver, then re-enable.</p>
<p><strong>MAKE SURE the driver is from a trustworthy source!</strong></p>
<p>Make sure you have updated the TPM chip to the latest version to avoid <a href="https://www.bleepingcomputer.com/news/security/researchers-detail-two-new-attacks-on-tpm-chips/" target="_blank" rel="nofollow noopener noreferrer">TPM-FAIL.</a> This primarily affects TPM modules with STMicroelectronics chips and Intel Platform Trust Technology (PTT). Infineon Chips are fine.</p>
<p><strong>Enabling a TPM in Windows 10</strong></p>
<p style="text-align: center;"><a href="https://www.safegadget.com/wp-content/uploads/2019/08/4163672.jpg"><img loading="lazy" decoding="async" class="size-medium wp-image-1100 aligncenter" src="https://www.safegadget.com/wp-content/uploads/2019/08/4163672-300x215.jpg" alt="" width="300" height="215" srcset="https://www.safegadget.com/wp-content/uploads/2019/08/4163672-300x215.jpg 300w, https://www.safegadget.com/wp-content/uploads/2019/08/4163672-768x550.jpg 768w, https://www.safegadget.com/wp-content/uploads/2019/08/4163672-1024x733.jpg 1024w, https://www.safegadget.com/wp-content/uploads/2019/08/4163672.jpg 1142w" sizes="auto, (max-width: 300px) 85vw, 300px" /></a></p>
<p>Some PCs and motherboards come with TPM already installed.  In most cases, you need to figure out if your motherboard has a socket for a TPM. These are specific to hardware, you cannot put a MSI TPM board into a Asus motherboard.  If so buy one, turn off your PC, and install it.  Try to buy the TPM directly from the manufacturer, not from a random seller on Amazon or eBay.  Laughingly, our TPM board was made in China.  It could have been hacked during assembly! (So much for true security)</p>
<ol>
<li>Enter your PC&#8217;s BIOS setup by hitting the right key during bootup, such as F1, F2, F12, ESC or Delete.</li>
</ol>
<p>2. Look for an option called Trusted Computing- In MSI motherboards, it is located in Settings\Security\Trusted Computing</p>
<p><a href="https://www.safegadget.com/wp-content/uploads/2019/08/tpm.png"><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-1097" src="https://www.safegadget.com/wp-content/uploads/2019/08/tpm-300x84.png" alt="" width="300" height="84" srcset="https://www.safegadget.com/wp-content/uploads/2019/08/tpm-300x84.png 300w, https://www.safegadget.com/wp-content/uploads/2019/08/tpm-768x215.png 768w, https://www.safegadget.com/wp-content/uploads/2019/08/tpm-1024x287.png 1024w, https://www.safegadget.com/wp-content/uploads/2019/08/tpm-1200x336.png 1200w" sizes="auto, (max-width: 300px) 85vw, 300px" /></a></p>
<p>Set<em> Security Device Support</em> to Enabled &#8211; Set <em>Device Select</em> to Auto</p>
<p>Save the settings and restart your computer.  Re-Enter your PC&#8217;s BIOS select the same option<a href="https://www.safegadget.com/wp-content/uploads/2019/08/tpm-found.png"><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-1098" src="https://www.safegadget.com/wp-content/uploads/2019/08/tpm-found-300x131.png" alt="" width="300" height="131" srcset="https://www.safegadget.com/wp-content/uploads/2019/08/tpm-found-300x131.png 300w, https://www.safegadget.com/wp-content/uploads/2019/08/tpm-found-768x335.png 768w, https://www.safegadget.com/wp-content/uploads/2019/08/tpm-found-1024x447.png 1024w, https://www.safegadget.com/wp-content/uploads/2019/08/tpm-found-1200x524.png 1200w" sizes="auto, (max-width: 300px) 85vw, 300px" /></a></p>
<p>You should see additional options now that the TPM was found.</p>
<p>Restart the PC and enter Windows.  If the installation was successful, you should see these <a href="https://support.microsoft.com/en-us/help/4096339/windows-10-device-protection-in-windows-defender-security-center" target="_blank" rel="nofollow noopener noreferrer">additional notes</a> in the Windows Security &#8211; Device Security Screen.</p>
<p style="text-align: center;"><a href="https://www.safegadget.com/wp-content/uploads/2019/08/windows-10-device-security.png"><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-1099" src="https://www.safegadget.com/wp-content/uploads/2019/08/windows-10-device-security-300x228.png" alt="" width="300" height="228" srcset="https://www.safegadget.com/wp-content/uploads/2019/08/windows-10-device-security-300x228.png 300w, https://www.safegadget.com/wp-content/uploads/2019/08/windows-10-device-security-768x584.png 768w, https://www.safegadget.com/wp-content/uploads/2019/08/windows-10-device-security-1024x778.png 1024w, https://www.safegadget.com/wp-content/uploads/2019/08/windows-10-device-security-1200x912.png 1200w, https://www.safegadget.com/wp-content/uploads/2019/08/windows-10-device-security.png 1516w" sizes="auto, (max-width: 300px) 85vw, 300px" /></a></p>
<p>Congratulations!</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.safegadget.com/1092/securing-windows-10-with-secure-boot-and-tpm/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Updated Safe Gadget Security News – Security Alerts 2024</title>
		<link>https://www.safegadget.com/116/updated-safe-gadget-security-news-security-alerts-2018/</link>
					<comments>https://www.safegadget.com/116/updated-safe-gadget-security-news-security-alerts-2018/#respond</comments>
		
		<dc:creator><![CDATA[SafeGadget]]></dc:creator>
		<pubDate>Wed, 01 Jul 2020 08:00:02 +0000</pubDate>
				<category><![CDATA[Android]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[Computer Hardware]]></category>
		<category><![CDATA[Computer Software]]></category>
		<category><![CDATA[iPad]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[Online Service]]></category>
		<category><![CDATA[Online Shopping]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Smartphone]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Virus]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Asus Wireless Router]]></category>
		<category><![CDATA[Heartbleed]]></category>
		<category><![CDATA[Linksys Wireless Router]]></category>
		<guid isPermaLink="false">http://www.safegadget.com/?p=116</guid>

					<description><![CDATA[The following alerts have been updated to reflect new and important security protection schemes: 8/18/2024: iOS Devices can support DNS over HTTPS through this simple provision file addition. 8/1/2020: Netgear has major issues with many of its wireless routers.  Update now. Some will never be updated, if you have one of these obsolete routers, buy a &#8230; <a href="https://www.safegadget.com/116/updated-safe-gadget-security-news-security-alerts-2018/" class="more-link">Continue reading<span class="screen-reader-text"> "Updated Safe Gadget Security News &#8211; Security Alerts 2024"</span></a>]]></description>
										<content:encoded><![CDATA[<p>The following alerts have been updated to reflect new and important security protection schemes:</p>
<p>8/18/2024: iOS Devices can support DNS over HTTPS through this <a href="https://github.com/paulmillr/encrypted-dns" target="_blank" rel="noopener">simple provision file addition.</a></p>
<p>8/1/2020: Netgear has <a href="https://kb.netgear.com/000061982/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Mobile-Routers-Modems-Gateways-and-Extenders" target="_blank" rel="nofollow noopener noreferrer">major issues</a> with many of its wireless routers.  Update now. Some will never be updated, if you have one of these obsolete routers, buy a new one.</p>
<p>7/23/2020: C-Data networking (Cdata, OptiLink, BLIY) equipment has <a href="https://pierrekim.github.io/blog/2020-07-07-cdata-olt-0day-vulnerabilities.html" target="_blank" rel="nofollow noopener noreferrer">multiple back doors.</a> &#8211; The company says these are counterfeit versions.</p>
<p>1/22/2020: SIM Swap compromises using your smartphone to get text messages to authenticate with websites. Avoid using text messages to do rescue logins.  A <a href="https://www.issms2fasecure.com/assets/sim_swaps-01-10-2020.pdf" target="_blank" rel="nofollow noopener noreferrer">new paper</a> from Princeton researchers shows how easy it is to pull off a SIM Swap against AT&amp;T, Verizon, T-Mobile and others.  Send text messages to a VoIP number such as Google Voice  instead. Do not allow Google Voice to forwards Texts/Calls to your main number.</p>
<p>1/20/2020: Virtually all Cablemodems have the <a href="https://cablehaunt.com/" target="_blank" rel="nofollow noopener noreferrer">Cable Haunt</a> critical vulnerability. Call you cable operator an ask them to upate your cablemodem&#8217;s software now. You cannot do it on your own.</p>
<p>12/10/2019: <a href="https://support.google.com/accounts/answer/6103523?co=GENIE.Platform%3DiOS&amp;hl=en" target="_blank" rel="nofollow noopener noreferrer">Google Smart Lock</a> is also a great way to generate second factor authentication but using your iPhone or Android phone and their app.</p>
<p>10/1/2019: iOS 13 has a handy feature to stop unwanted calls.  You can set the phone to send unknown callers straight to voicemail! (Those not in your contacts) &#8211; <strong>Settings &#8211; Phone &#8211; Silence Unknown Callers</strong></p>
<p>5/12/2019: <a href="https://thrangrycat.com/" target="_blank" rel="nofollow noopener noreferrer">Thrangrycat</a> Attacks Cisco Switches, Firewall and routers.  Update and patch now</p>
<p><span id="more-116"></span></p>
<p>3/19/2019: Windows 10 is loading more and more crap.  These <a href="https://github.com/Sycnex/Windows10Debloater" target="_blank" rel="nofollow noopener noreferrer">scripts</a> let you uninstall the junkware and reclaim privacy.</p>
<p>2/1/2019: <a href="https://source.android.com/security/bulletin/2019-02-01.html" target="_blank" rel="noopener noreferrer">Google</a> has patch a major bug in Android where you can get hacked just by looking at a picture in a SMS, Email, or web page!  Update your Android software right away.  If your phone no longer gets updates, please consider buying a new one.</p>
<p>1/2019: Marvell&#8217;s Wi-Fi chip is used in millions of devices.  Unfortunately, it has a <a href="https://embedi.org/blog/remotely-compromise-devices-by-using-bugs-in-marvell-avastar-wi-fi-from-zero-knowledge-to-zero-click-rce/">major security flaw.</a> Look for updates soon.  Devices that have no way to get updated are worrisome.</p>
<p>12/2018: <a href="http://news.marriott.com/2018/11/marriott-announces-starwood-guest-reservation-database-security-incident/" target="_blank" rel="nofollow noopener noreferrer">Marriott &#8211; Starwood Hotels</a> got hacked, leaking a ton of data. Change your credit card if you booked there.</p>
<p>10/4/2018: <a href="https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies?srnd=businessweek-v2" target="_blank" rel="nofollow noopener noreferrer">Bloomberg</a> reports that China has infiltrated major tech companies by compromising servers from their Chinese factories.  Never trust your hardware!</p>
<p>8/24/2018: HP Inkjet printers with Fax capability have a <a href="https://blog.checkpoint.com/2018/08/12/faxploit-hp-printer-fax-exploit/" rel="nofollow">Faxploit</a> exploit where someone could fax you a special page and take over your entire network. Patch now.</p>
<p>6/11/2018: The <a href="https://www.ic3.gov/media/2018/180525.aspx" target="_blank" rel="nofollow noopener noreferrer">FBI</a> has asked users to reboot your wireless router in an effort to prevent infection from the <a href="https://blog.talosintelligence.com/2018/05/VPNFilter.html" target="_blank" rel="nofollow noopener noreferrer">VPNFilter</a> malware.   You should do more than this, write down its settings, reset it to default settings, and updated it to the latest software.</p>
<p>Always update the software for your router to the latest version.  If no update has occurred in the last 6 months, BUY a new one!  Affected devices include: (Expanded List)</p>
<h4>Asus Devices:</h4>
<p><b>RT-AC66U (new)</b><br />
<b>RT-N10 (new)</b><br />
<b>RT-N10E (new)</b><br />
<b>RT-N10U (new)</b><br />
<b>RT-N56U (new)</b><br />
<b>RT-N66U (new)</b></p>
<h4>D-Link Devices:</h4>
<p><b>DES-1210-08P (new)</b><br />
<b>DIR-300 (new)</b><br />
<b>DIR-300A (new)</b><br />
<b>DSR-250N (new)</b><br />
<b>DSR-500N (new)</b><br />
<b>DSR-1000 (new)</b><br />
<b>DSR-1000N (new)</b></p>
<h4>Huawei Devices:</h4>
<p><b>HG8245 (new)</b></p>
<h4>Linksys Devices:</h4>
<p>E1200<br />
E2500<br />
<b>E3000 (new)</b><br />
<b>E3200 (new)</b><br />
<b>E4200 (new)</b><br />
<b>RV082 (new)</b><br />
WRVS4400N</p>
<h4>Mikrotik Devices:</h4>
<p><b>CCR1009 (new)</b><br />
CCR1016<br />
CCR1036<br />
CCR1072<br />
<b>CRS109 (new)</b><br />
<b>CRS112 (new)</b><br />
<b>CRS125 (new)</b><br />
<b>RB411 (new)</b><br />
<b>RB450 (new)</b><br />
<b>RB750 (new)</b><br />
<b>RB911 (new)</b><br />
<b>RB921 (new)</b><br />
<b>RB941 (new)</b><br />
<b>RB951 (new)</b><br />
<b>RB952 (new)</b><br />
<b>RB960 (new)</b><br />
<b>RB962 (new)</b><br />
<b>RB1100 (new)</b><br />
<b>RB1200 (new)</b><br />
<b>RB2011 (new)</b><br />
<b>RB3011 (new)</b><br />
<b>RB Groove (new)</b><br />
<b>RB Omnitik (new)</b><br />
<b>STX5 (new)</b></p>
<h4>Netgear Devices:</h4>
<p><b>DG834 (new)</b><br />
<b>DGN1000 (new)</b><br />
DGN2200<br />
<b>DGN3500 (new)</b><br />
<b>FVS318N (new)</b><br />
<b>MBRN3000 (new)</b><br />
R6400<br />
R7000<br />
R8000<br />
WNR1000<br />
WNR2000<br />
<b>WNR2200 (new)</b><br />
<b>WNR4000 (new)</b><br />
<b>WNDR3700 (new)</b><br />
<b>WNDR4000 (new)</b><br />
<b>WNDR4300 (new)</b><br />
<b>WNDR4300-TN (new)</b><br />
<b>UTM50 (new)</b></p>
<h4>QNAP Devices:</h4>
<p>TS251<br />
TS439 Pro<br />
Other QNAP NAS devices running QTS software</p>
<h4>TP-Link Devices:</h4>
<p>R600VPN<br />
<b>TL-WR741ND (new)</b><br />
<b>TL-WR841N (new)</b></p>
<h4>Ubiquiti Devices:</h4>
<p><b>NSM2 (new)</b><br />
<b>PBE M5 (new)</b></p>
<h4>Upvel Devices:</h4>
<p><b>Unknown Models* (new)</b></p>
<h4>ZTE Devices:</h4>
<p><b>ZXHN H108N (new)</b></p>
<p>4/24/2018: <a href="https://cloudblogs.microsoft.com/microsoftsecure/2018/04/19/introducing-windows-defender-system-guard-runtime-attestation/" target="_blank" rel="nofollow noopener noreferrer">Windows Defender System Guard</a> is now installed by the latest Windows 10 Updates. Make sure you are up to date.</p>
<p>3/21/2018: <a href="https://1.1.1.1/" rel="nofollow">1.1.1.1</a> is a free DNS Domain Name Service that helps hide the sites you goto. Cloudflare runs it and promises no logging.</p>
<p>3/15/2018: ID Thieves are using the <a href="http://www.irs.gov/uac/Identity-Protection" target="_blank" rel="nofollow noopener noreferrer">IRS</a> and filing fake tax returns. Remember that the IRS <strong>never</strong> calls or sends email to you.  They use old fashion US mail. Sign up for an <a href="https://www.irs.gov/identity-theft-fraud-scams/get-an-identity-protection-pin" rel="nofollow">IRS PIN</a> if possible.</p>
<p>2/8/2018: Lenovo PCs with fingerprint readers need to be <a href="https://support.lenovo.com/us/en/product_security/len-15999" target="_blank" rel="nofollow noopener noreferrer">updated</a>. Lenovo laptops with certain Broadcom Wi-Fi chips also need an <a href="https://support.lenovo.com/us/en/solutions/len-17237" target="_blank" rel="nofollow noopener noreferrer">update</a></p>
<p>1/12/2018: Laptops for Business use may have Intel AMT. You need to configure it or else your open to <a href="https://www.helpnetsecurity.com/2018/01/12/intel-amt-security-issue/" target="_blank" rel="nofollow noopener noreferrer">Intel AMT attacks</a>.</p>
<p>1/5/2018: <a href="https://meltdownattack.com/" target="_blank" rel="nofollow noopener noreferrer">Meltdown and Spectre</a> are 2 new processor chip bugs that affect most modern computers, smartphones, and tablets.  They will need software updates to mitigate this bad bug. <a href="https://isc.sans.edu/diary/Meltdown+and+Spectre%3A+clearing+up+the+confusion/23197" target="_blank" rel="nofollow noopener noreferrer">More Details</a> &#8211; Older system without updates are dangerous to continue to use. Time to buy new hardware.</p>
<p>11/21/2017: <a href="https://www.helpnetsecurity.com/2017/11/16/quad9/" target="_blank" rel="nofollow noopener noreferrer">Quad9</a> is a free DNS Domain Name Service that helps prevent users from accessing malicious sites.  Run by IBM Security, Packet Clearing House (PCH) and The Global Cyber Alliance (GCA)</p>
<p>11/1/2017: <a href="https://blogs.technet.microsoft.com/mmpc/2017/10/23/stopping-ransomware-where-it-counts-protecting-your-data-with-controlled-folder-access/" target="_blank" rel="nofollow noopener noreferrer">Windows 10 controlled folder access</a> anti-ransomeware is part of the Fall Creators Update.  It works well and should be used by all Windows 10 users.</p>
<p>10/16/2017: <a href="https://www.krackattacks.com/" target="_blank" rel="nofollow noopener noreferrer">KRACK</a> attack on Wi-Fi. Attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted.  Virtually <strong>ALL</strong> Wi-Fi equipped devices need to be updated.  The attack is particularly bad on Android 6.0 and Linux. If you have a device with no updates (eg Internet of Things), you will be open to attacks. Using a VPN helps.</p>
<p>10/6/2017: <a href="https://www.wsj.com/articles/russian-hackers-stole-nsa-data-on-u-s-cyber-defense-1507222108" target="_blank" rel="nofollow noopener noreferrer">Kaspersky</a> has been implicated in stealing data from the NSA.  <strong>Uninstall</strong> any of their antivirus software right away.  It is now banned in the US government. Best Buy has <strong>stopped</strong> selling it.</p>
<p>9/8/2017: In September 2017, <a href="https://www.nytimes.com/2017/09/07/business/equifax-cyberattack.html" target="_blank" rel="nofollow noopener noreferrer">Equifax got hacked</a> affecting 143 Million customers. (Almost everyone!) Equifax is offering <a href="https://www.equifaxsecurity2017.com/potential-impact/" target="_blank" rel="nofollow noopener noreferrer">complimentary identity theft protection</a>. &#8211; Do more! <a href="https://www.buyvia.com/blog/credit-freeze-protect-your-credit/" target="_blank" rel="noopener noreferrer">Setup a Credit Freeze.</a></p>
<p>9/1/2017: Arris NVG589, NVG599 and possibly other modems, routers, gateways sold for AT&amp;T&#8217;s U-verse service have a <a href="https://threatpost.com/bugs-in-arris-modems-distributed-by-att-vulnerable-to-trivial-attacks/127753/" target="_blank" rel="noopener noreferrer">major security hole.</a> If you have one, you need to update it as soon as possible to software newer than 9.2.2 or apply this <a href="https://www.nomotion.net/blog/sharknatto/" target="_blank" rel="nofollow noopener noreferrer">fix</a>.</p>
<p>5/12/2017: <a href="https://www.us-cert.gov/ncas/current-activity/2017/05/12/Multiple-Ransomware-Infections-Reported" target="_blank" rel="nofollow noopener noreferrer">Wanna Cry ransomware</a> is spreading fast.  It exploits a Microsoft bug that was patched in March 2017.  It is more infectious because it can spread throughout a local network.</p>
<p><a href="https://blog.comae.io/wannacry-decrypting-files-with-wanakiwi-demo-86bafb81112d" target="_blank" rel="nofollow noopener noreferrer">WannaKiwi</a> &#8211; Decrypts files WannaCryp ransomware. Do not reboot after getting infected.</p>
<p><strong>A basic lesson in patching right away and stop running old Operating systems.</strong>  Microsoft took the unusual step to put out a Windows XP, 8 , Windows Server 2003 patch to help stop this. If you use any of these OS&#8217;s, upgrade to Windows 10 now.</p>
<p>4/12/2017: 2 easy ways to increase your security and not have to constantly update are:</p>
<ul>
<li><a href="https://helpx.adobe.com/flash-player/kb/uninstall-flash-player-windows.html" target="_blank" rel="nofollow noopener noreferrer">Uninstall Adobe Flash</a></li>
<li><a href="https://helpx.adobe.com/acrobat/kb/problems-uninstalling-reader.html" target="_blank" rel="nofollow noopener noreferrer">Uninstall Adobe Reader</a></li>
</ul>
<p>4/4/2017: <a href="https://googleprojectzero.blogspot.com/2017/04/over-air-exploiting-broadcoms-wi-fi_4.html" target="_blank" rel="nofollow noopener noreferrer">Google Project Zero</a> has found a major flaw in a WiFi chip that is used on many Android and iPhones. Hackers can run malware on devices. Apple iOS 10.3.1 and newer fixes the bug. Android patches are rolling out soon. Make sure you update your device. Any phone that does not get security updates any more, should be recycled and replaced.</p>
<p>3/16/2017: Matthew Green, a well respected cryptographer and professor at Johns Hopkins has a <a href="https://blog.cryptographyengineering.com/2017/03/05/secure-computing-for-journalists/" target="_blank" rel="nofollow noopener noreferrer">great article discussing Secure Computing</a> &#8211; Desktops vs Smartphones, iOS vs Android and more..</p>
<p>2/16/2017: <a href="https://www.amazon.com/Apricorn-Validated-256-bit-Encrypted-ASK-256-32GB/dp/B00741U31E?ie=UTF8&amp;tag=easyeco0d-20&amp;linkCode=as2&amp;camp=1789&amp;creative=9325&amp;creativeASIN=1604785152" target="_blank" rel="nofollow noopener noreferrer">Apricorn</a> makes a secure USB flash drives that require a pin code to be entered before they function.  <span class="a-list-item">No software or drivers required, so it works with any operating system. </span>Dust and water resistant durable aluminium housing</p>
<p>2/2/2017: <a href="https://isc.sans.edu/diary/Multiple+vulnerabilities+discovered+in+popular+printer+models/22023" target="_blank" rel="nofollow noopener noreferrer">Laser Printers</a> are vulnerable to security issues. Popular printer models manufactured by Dell, Brother, Konica, Samsung, HP, and Lexmark are all affected.</p>
<p>2/1/2017: <a href="http://kb.netgear.com/000036386/CVE-2016-582384" target="_blank" rel="nofollow noopener noreferrer">Netgear</a> has updated firmware for many routers that fixes a major security hole.</p>
<p>1/30/2017: Security minded people use VPNs to secure their communications. <a href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf" target="_blank" rel="nofollow noopener noreferrer">Many Android VPN clients have privacy and security risks.</a>  Be careful which you use.</p>
<p>12/12/2016: <a href="http://news.drweb.com/show/?i=10345&amp;lng=en" target="_blank" rel="nofollow noopener noreferrer">26 different low cost Android devices</a> on the MTK platform have Trojan horses built in.</p>
<p>12/8/2016: Keyless Car Entry: Security minded folks would never buy a car that has this feature. The <a href="http://www.nicbblog.org/2016/12/07/this-mystery-device-can-unlock-and-start-your-vehicle/" target="_blank" rel="nofollow noopener noreferrer">National Insurance Crime Bureau</a> has a post on how a Mystery Device is used to relay your key fob&#8217;s signal to steal cars.  It is best to wrap your key fob in foil or some RF blocking shield when you are away from the vehicle.</p>
<p>11/30/2016: Gooligan Malware has infected over 1million Android phones, most of which downloaded apps outside the official Google Play store.</p>
<p>11/15/2016: Some <a href="http://www.nytimes.com/2016/11/16/us/politics/china-phones-software-security.html?_r=0" target="_blank" rel="nofollow noopener noreferrer">Cheap cell phones made in China</a> have spyware that sends all your texts to China. This includes the $50 BLU R1 HD sold by amazon! Update the firmware of this device NOW.</p>
<p>10/2/2016: D-Link DWR-932B  and Quanta 4G LTE QDH routers have major security holes- Upgrade it to the latest firmware. <a href="http://securityaffairs.co/wordpress/51820/hacking/d-link-dwr-932.html" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>9/22/2016: Do you run a website? If so make sure you test it for security vulnerabilities. <a href="https://www.tinfoilsecurity.com" target="_blank" rel="nofollow noopener noreferrer">Tinfoil Security</a> has a nice free 90 day trial.</p>
<p>9/21/2016: <a href="https://yahoo.tumblr.com/post/150781911849/an-important-message-about-yahoo-user-security" target="_blank" rel="nofollow noopener noreferrer">Yahoo</a> finally admits to a biggest breach ever. It happened back in 2014 of 500 million accounts. Change your passwords, never enter &#8216;real&#8217; information into security questions. Use a <a href="https://help.yahoo.com/kb/SLN25781.html" target="_blank" rel="nofollow noopener noreferrer">Yahoo Account Key</a> instead of a password.</p>
<p>9/18/2016: The Rowhammer memory vulnerability is getting important everyday. See if your hardware is vulnerable using <a href="http://memtest86.com/" target="_blank" rel="nofollow noopener noreferrer">Memtest86</a>.</p>
<p>7/29/2016: <a href="https://www.nomoreransom.org/" target="_blank" rel="nofollow noopener noreferrer">No More Ransom.org</a> (Kaspersky Lab in collaboration with Europol, the Dutch National Police and Intel Security) has a new site to help vicitims.  It has a page with <a href="https://www.nomoreransom.org/decryption-tools.html" target="_blank" rel="nofollow noopener noreferrer">Decryption Tools</a>. Beware of this company though.</p>
<p>7/12/2016: <a href="https://www.amazon.com/Kanguru-FlashTrust-WP-KFT3-Drive-WP-KFT3-8G/dp/B00NW4P9A2?ie=UTF8&amp;tag=easyeco0d-20&amp;linkCode=as2&amp;camp=1789&amp;creative=9325&amp;creativeASIN=1604785152" target="_blank" rel="nofollow noopener noreferrer">Kanguru</a> makes a fast USB 3.0 flash drive with physical write protect switch and a digitally signed secure firmware to protect against Badusb.  One of the first to do this. Get item to put a Linux Live CD like Ubuntu on and keep it from getting modified by malware.</p>
<p>5/20/2016: <a href="https://id-ransomware.malwarehunterteam.com/" target="_blank" rel="nofollow noopener noreferrer">ID Ransomware</a> helps you figure out which ransomware you are effected by, so you can look for remedies other than paying. <a href="https://www.bleepingcomputer.com/virus-removal/threat/ransomware/" target="_blank" rel="nofollow noopener noreferrer">Bleeping Computer</a> has a Support forum for Ransomware</p>
<ul>
<li><a href="http://support.eset.com/kb6051/" target="_blank" rel="nofollow noopener noreferrer">ESET</a> has a decryptor for TeslaCrypt infections</li>
</ul>
<p>2/24/2016: <a href="https://www.mousejack.com/" target="_blank" rel="nofollow noopener noreferrer">MouseJack </a>is a new security vulnerability that allows a malware to be remotely downloaded onto a computer via a hijacked wireless mouse or keyboard connection. A hacker could remotely type in commands or move your mouse. Update the firmware on your wireless mouse/keyboard if possible, otherwise use a wired mouse &#8211; keyboard.</p>
<p><a href="http://forums.logitech.com/t5/Mice-and-Pointing-Devices/Logitech-Response-to-Unifying-Receiver-Research-Findings/m-p/1493878/thread-id/73186" target="_blank" rel="nofollow noopener noreferrer">Logitech Update</a> &#8211; Worked for us, but required several tries.</p>
<p>2/5/2016: Netgear Wireless routers <a href="http://www.sfgate.com/business/article/Netgear-Add-a-password-or-risk-losing-your-data-6811071.php" target="_blank" rel="nofollow noopener noreferrer">do not automatically</a> add passwords to hard drives that are plugged into them, leaving them accessible to anyone on the Internet. Make sure you change the default password. Hackers can use <a href="https://www.shodan.io" target="_blank" rel="nofollow noopener noreferrer">Shodan</a> to find you quickly.</p>
<p>1/19/2016: The Wall Street Journal commissioned a security researcher to test 20 popular internet Wireless Routers. 10 had known security weaknesses. 4 had old firmware that when upgraded could contain undocumented security problems.  Keep your router&#8217;s software update and if it is older than 2 years, you should buy a new one. Most networking companies&#8217; stop updating them after a year or two. <a href="http://www.safegadget.com/28/how-to-setup-a-secure-wireless-network-router/">How to setup a Secure Wireless Router</a> was updated.</p>
<p>11/17/2015: Several tutorials have updated lists of secure instant messaging apps. Forget about using popular ones like Whatsapp, Line, Viber, WeChat, they have all been monitored.</p>
<p>Try ones like:</p>
<ul>
<li>Silent Circle</li>
<li>Redphone</li>
<li>OSTel</li>
<li>Chat Secure</li>
<li>Signal (Formerly Textsecure)</li>
</ul>
<p>7/24/2015: First of its kind. 1.4 Million 2013-2015 model year Chrysler, Dodge, Jeep Vehicles are vulnerable to remote hacking that can cause the vehicle to be controlled remotely. Get the special <a href="http://www.media.chrysler.com/newsrelease.do?&amp;id=16849&amp;mid=" target="_blank" rel="nofollow noopener noreferrer">USB drive</a> and update your car now.</p>
<p>4/28/2014: A new Internet Explorer Vulnerability that has no patch, is being actively exploited by malware. <a href="http://www.us-cert.gov/ncas/current-activity/2014/04/28/Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-Being" target="_blank" rel="nofollow noopener noreferrer">US Computer Emergency Readiness Team</a> suggests people stop using Internet Explorer. Windows XP users <strong>need</strong> to use an alternative browser like Chrome or Firefox.</p>
<p>If you have to run Internet Explorer, you should install the <a href="http://technet.microsoft.com/en-US/security/jj653751" target="_blank" rel="nofollow noopener noreferrer">Enhanced Mitigation Experience Toolkit</a> or unregister the VGX.dll as mention in <a href="https://technet.microsoft.com/en-US/library/security/2963983" target="_blank" rel="nofollow noopener noreferrer">Microsoft&#8217;s Security Bulletin</a></p>
<p>4/10/2014: <a href="http://heartbleed.com/" target="_blank" rel="nofollow noopener noreferrer">Heartbleed</a> Security Hole. Servers that use certain versions of OpenSSL software to create secure connections are vulnerable to a major bug. <a href="https://lastpass.com/heartbleed/" target="_blank" rel="noopener noreferrer">Lastpass</a> has a page that can help you test websites for this bug. <a href="http://filippo.io/Heartbleed/" target="_blank" rel="nofollow noopener noreferrer">Flippie.io</a> has one too.</p>
<p>4/7/2014: Users should change their passwords for the following sites due to the Heartbleed Internet Security Bug: fitbit.com, github.com, rememberthemilk.com, yahoo.com. <a href="http://www.cnet.com/how-to/which-sites-have-patched-the-heartbleed-bug/" target="_blank" rel="nofollow noopener noreferrer">Cnet</a> has a nice list.</p>
<p>2/1/2014: If you own an <a href="http://www.securityfocus.com/archive/1/526942" target="_blank" rel="noopener noreferrer">Asus</a> or <a href="http://kb.linksys.com/Linksys/ukp.aspx?pid=80&amp;app=vw&amp;vw=1&amp;login=1&amp;json=1&amp;docid=56b6de2449fd497bb8d1354860f50b76_How_to_prevent_getting_The_Moon_malware.xml" target="_blank" rel="nofollow noopener noreferrer">Linksys E-series wireless</a> router, make sure it has been updated to prevent the Moon worm. <a href="http://www.safegadget.com/28/how-to-setup-a-secure-wireless-network-router/">How to setup a Secure Wireless Router</a> was updated.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.safegadget.com/116/updated-safe-gadget-security-news-security-alerts-2018/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to: Anonymous Browsing, Internet Privacy</title>
		<link>https://www.safegadget.com/59/how-to-anonymous-browsing-internet-privacy/</link>
					<comments>https://www.safegadget.com/59/how-to-anonymous-browsing-internet-privacy/#comments</comments>
		
		<dc:creator><![CDATA[SafeGadget]]></dc:creator>
		<pubDate>Sat, 01 Feb 2020 08:00:44 +0000</pubDate>
				<category><![CDATA[Android]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[Firefox]]></category>
		<category><![CDATA[Google Chrome]]></category>
		<category><![CDATA[Internet Explorer]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Macintosh]]></category>
		<category><![CDATA[Online Service]]></category>
		<category><![CDATA[Safari]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[anonymous browsing]]></category>
		<category><![CDATA[chrome]]></category>
		<category><![CDATA[ebook]]></category>
		<category><![CDATA[HDTV]]></category>
		<category><![CDATA[internet privacy]]></category>
		<category><![CDATA[IRS IP PIN]]></category>
		<category><![CDATA[IRS Tax Filing]]></category>
		<category><![CDATA[Kindle]]></category>
		<guid isPermaLink="false">http://www.safegadget.com/?p=59</guid>

					<description><![CDATA[Last Updated: 2/20/2022 Check out our Facebook Settings How To Privacy Page Why should I be concerned about Internet privacy? Do you like online ads following you around from site to site? Can you discuss your health problems online without fear of losing insurance? Do you worry about publishing private information that could lead to &#8230; <a href="https://www.safegadget.com/59/how-to-anonymous-browsing-internet-privacy/" class="more-link">Continue reading<span class="screen-reader-text"> "How to: Anonymous Browsing, Internet Privacy"</span></a>]]></description>
										<content:encoded><![CDATA[<p>Last Updated: 2/20/2022</p>
<p><img loading="lazy" decoding="async" src="http://www.safegadget.com/i/locks/Gold-Baldwin-Door-Lock.jpg" alt="Gold Baldwin Door Lock" width="200" height="300" /></p>
<p>Check out our <a href="https://www.safegadget.com/444/facebook-privacy-setting/">Facebook Settings How To Privacy Page</a></p>
<p>Why should I be concerned about Internet privacy?</p>
<ul>
<li>Do you like online ads following you around from site to site?</li>
<li>Can you discuss your health problems online without fear of losing insurance?</li>
<li>Do you worry about publishing private information that could lead to stalking, surveillance, or identity theft?</li>
<li>Does your work place monitor your Facebook or Twitter? Could you be fired over a post?</li>
<li>Do you live in a country where you could be arrested or tortured based on what you post online?</li>
<li>Did you know that third-parties collect information the government is not allowed to collect? The government has purchased this information too.</li>
<li>Companies such as <a href="https://finfisher.com/FinFisher/index.html" target="_blank" rel="nofollow noopener noreferrer">FinFisher</a> are selling hacking software to countries and corporations to break into people&#8217;s computers and monitor them.</li>
<li>Visit the <a href="https://panopticlick.eff.org/" target="_blank" rel="nofollow noopener noreferrer">EFF&#8217;s Panopticlick</a> site to see what you are telling the world right now, before using the tools below.</li>
<li><a href="https://www.tacticaltech.org/" target="_blank" rel="nofollow noopener noreferrer">Tactical Technology Collective</a> has tips for journalists and activists on how to increase their privacy.</li>
</ul>
<p>60% of people polled by the WSJ.com were tremendously worried about the loss of online privacy.</p>
<p>The Internet appears to facilitate privacy and anonymity, but in recent years has been a battleground that pits advertisers on one side and users on the other. It has become increasingly difficult to maintain privacy on the Internet because money has gotten into the game. As online advertising has grown, companies have sprouted up, attempting to optimize Internet advertising performance by combining advertising with profiling. While individual users may not be known by name, they have become ghost profiles that are increasingly matched up with appropriate advertising. If you have found Internet ads following you from site to site, you have been profiled and are seeing the results. In this article, we will examine many methods to enhance our Internet privacy and perform operations anonymously.</p>
<p>One of the main goals of Internet privacy is to make that people have the ability to make informed decisions about how they act online. Users should be told ahead of time how their personal information is used and shared.</p>
<p><strong>The Real Cost of Free Content</strong></p>
<p>While many users assume that most content sites are free, there is a hidden price being paid, the users private information. Most online advertising companies are tracking web browsing activity across many websites in order to build profiles of users. They cross-reference and trade information to generate revenue and better target online advertising and promotions.</p>
<p><strong>Hide your phone number</strong></p>
<p>Once a cybercriminal gets your phone number, they can wreak all sorts of havoc including SIM Swap your phone and take over many accounts.  Hide your number or at least used a VoIP number such as Google Voice. Do not allow Google Voice to forwards Texts/Calls to your main number.</p>
<ul>
<li><strong>Google</strong>
<ul>
<li>Remove your phone number from myaccount.google.com &#8211; Personal information</li>
</ul>
</li>
<li><strong>Microsoft</strong>
<ul>
<li>Remove your phone number from account.live.com</li>
</ul>
</li>
<li><strong>Facebook</strong>
<ul>
<li>Select Settings under the drop-down arrow at the top right. First, click on Mobile in the right-side menu, and remove your phone number</li>
</ul>
</li>
<li><strong>Twitter</strong>
<ul>
<li>Click your avatar, go to Settings and Privacy, and navigate to Mobile on the right hand menu. Remove your number and use an authenticator app</li>
</ul>
</li>
</ul>
<p><strong>Android</strong></p>
<p>Turn off your advertising ID.  This is attached to all you apps, search history, purchases, recent locations and much more.</p>
<ul>
<li>Settings &gt; Privacy &gt; Ads &gt; Delete Advertising ID</li>
</ul>
<p>Older Android versions may have Opt Out of Ads Personalization</p>
<p><strong>Chrome</strong></p>
<p>Turn off 3rd party cookie tracking on both Chrome for computers and Chrome App</p>
<p>Settings &gt; Security &amp; Privacy &gt; Block third-party cookies</p>
<p><strong>Privacy Oriented Browser</strong></p>
<p><a href="https://brave.com/" target="_blank" rel="nofollow noopener noreferrer">brave</a> is a browser from a mozilla co-founder, which is focused on privacy.</p>
<p><strong>Internet Browser Cookies</strong></p>
<p><span id="more-59"></span></p>
<p>In the past, users have been able to delete their Internet browsers&#8217; cookies and thereby foiling efforts to track the user. Here are instructions for clearing the browser cache in <a href="https://www.google.com/support/chrome/bin/answer.py?answer=95582" target="_blank" rel="nofollow noopener noreferrer">Google Chrome</a>, <a href="http://support.microsoft.com/kb/260897" target="_blank" rel="nofollow noopener noreferrer">Microsoft Internet Explorer 9</a>, and <a href="https://support.mozilla.com/en-US/kb/How%20to%20clear%20the%20cache" target="_blank" rel="nofollow noopener noreferrer">Mozilla Firefox</a>.</p>
<p>Below is how to set browsers to not accept third-party cookies. These cookies are typically generated by tracking and advertising companies when you visit a website. Occasionally this technique will cause a website to malfunction, particularly if it uses a third-party to handle tasks like commenting.</p>
<p><img loading="lazy" decoding="async" src="http://www.safegadget.com/i/software/Firefox-Privacy-Settings-Browser-Cookies.jpg" alt="Firefox Privacy Settings Browser Cookies" width="517" height="485" /></p>
<p>To optimize third-party cookie privacy settings in <strong>Firefox</strong> do the following:</p>
<ul>
<li>Select <strong>Options&#8230;</strong> from the <strong>Tools</strong> menu</li>
<li>Select <strong>Privacy</strong> tab</li>
<li>Select <strong>Use custom settings for history</strong></li>
<li>Uncheck <strong>Accept third-party cookies</strong></li>
<li>Optionally select Keep until: <strong>I close Firefox</strong> &#8211; This will delete cookies after every browser session, which you may not want to happen.</li>
</ul>
<p><img loading="lazy" decoding="async" src="http://www.safegadget.com/i/software/Internet-Explorer-Privacy-Settings-Browser-Cookies.jpg" alt="Internet Explorer Privacy Settings Browser Cookies" width="423" height="854" /></p>
<p>To optimize third-party cookie privacy settings in <strong>Internet Explorer 9</strong> do the following:</p>
<ul>
<li>Select <strong>Internet Options</strong> from the <strong>Tools</strong> menu</li>
<li>Select <strong>Privacy</strong> tab</li>
<li>Check <strong>Never allow websites to request your physical location</strong> under <strong>Location</strong></li>
<li>Select <strong>Advanced</strong></li>
<li>Check<strong> Override automatic cookie handling<br />
</strong></li>
<li>Check <strong>Block</strong> under Third-party Cookies</li>
<li>Press OK</li>
</ul>
<p><a href="http://www.piriform.com/ccleaner" target="_blank" rel="nofollow noopener noreferrer">CCleaner</a> is useful Windows utility to clear out unnecessary files including temporary files, and cookie files.</p>
<p><a href="http://www.identityfinder.com/us/Home/IdentityFinder/Free" target="_blank" rel="noopener noreferrer">Identity Finder</a> helps you remove personally identifiable information from your computer&#8217;s files. They have a free Windows and Mac version.</p>
<p>While this technique is still somewhat helpful, the advertisers have gotten smarter and utilize other tracking techniques. Consult our guides to <a title="Secure Google Chrome Browsing" href="http://www.safegadget.com/45/secure-google-chrome-browsing/" rel="nofollow">Google Chrome</a>, <a title="Secure Internet Explorer 9 Browsing" href="http://www.safegadget.com/41/secure-internet-explorer-9-browsing/" rel="nofollow">Microsoft Internet Explorer 9</a>, and <a title="Secure Firefox Browsing" href="http://www.safegadget.com/44/secure-firefox-browsing/" rel="nofollow">Mozilla Firefox</a> for information.</p>
<p><strong>IRS Tax Filing IP PIN</strong></p>
<p>An <a href="https://www.irs.gov/identity-theft-fraud-scams/get-an-identity-protection-pin" target="_blank" rel="noopener noreferrer">IRS IP PIN</a> is a six-digit number assigned to eligible taxpayers that helps prevent the misuse of their Social Security number on fraudulent federal income tax returns.</p>
<p>In 2019, they expanded the states that support this protection.</p>
<p><strong>HTML5</strong> <strong>and Privacy</strong></p>
<p>HTML5 represents the latest standard for web design that significantly increases the flexibility and interactiveness of websites. Along with these impressive new features, comes a major privacy issue. HTML5 local storage allows data to be stored in your browser. It can potentially be used to track your movements and regenerate any cookies that you delete. New methods of blocking need to be created to block this intrusive technology.</p>
<p>Google Chrome and Firefox clear HTML5 local storage whenever you clear your cookies. Safari clears this when you select: Preferences -&gt; Privacy tab -&gt; Cookies and other website data -&gt; Remove All Website Data</p>
<p>You can set Firefox to warn you whenever a website is attempting to use HTML5 local storage by selecting: Options -&gt; Advanced -&gt; Network -&gt; Tell me when a website attempts to store data for offline use.</p>
<p><strong>Flash Cookies</strong></p>
<p>Adobe Flash also generates cookies that have been used for tracking and are difficult to remove. Adobe has a <a href="http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager07.html" target="_blank" rel="nofollow noopener noreferrer">special page</a> that requires Flash, in which you can delete your Flash cookies. Also visit this <a href="http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager03.html" target="_blank" rel="nofollow noopener noreferrer">Flash configuration page</a> to prevent 3rd parties from storing Flash content on your PC. You can install a Flash blocker to prevent these cookies from being installed on your system. <a href="http://machacks.tv/2009/01/27/flushapp-flash-cookie-removal-tool-for-os-x/" target="_blank" rel="nofollow noopener noreferrer">Flush for the Mac</a>, removes Flash cookies.</p>
<p><strong>Adjusting</strong><strong> Google Privacy Settings</strong></p>
<p>In 2018 Google Created this <a href="https://myaccount.google.com/activitycontrols?pli=1" target="_blank" rel="nofollow noopener noreferrer">Activity Tracking page</a> to enhance privacy.</p>
<p>To clear Google&#8217;s &#8220;web history&#8221; which includes a log of all your searches, follow the instructions on <a href="https://www.google.com/support/accounts/bin/answer.py?answer=54067" target="_blank" rel="nofollow noopener noreferrer">this page</a>.</p>
<p>To see and revoke access to your Google account by third-party sites, follow the instructions on <a href="https://www.google.com/support/accounts/bin/answer.py?hl=en&amp;answer=43437" target="_blank" rel="nofollow noopener noreferrer">this page</a>. Also turn on Do Not Track.</p>
<p>To get a copy of everything Google has stored about you, visit <a href="https://www.google.com/takeout" target="_blank" rel="nofollow noopener noreferrer">Google Takeout</a>. Additional Google services not covered by Takeout are located at <a href="http://www.dataliberation.org/" target="_blank" rel="nofollow noopener noreferrer">Data Liberation.org</a>. To delete the information, you must visit each Google service and delete your data manually.</p>
<p><strong>Privacy App</strong></p>
<p><a href="https://apps.apple.com/us/app/jumbo-privacy/id1454039975?ls=1" target="_blank" rel="nofollow noopener noreferrer">Jumbo Privacy</a> iOS App helps set Google, Facebook, Ad settings that we have mentioned</p>
<p><strong>Adjusting Facebook Privacy Settings</strong></p>
<p>Our article on Facebook security covers how to adjust <a title="How to Safely use Facebook" href="https://www.safegadget.com/444/facebook-privacy-setting/">Facebook&#8217;s privacy settings</a>. Keep in mind that privacy settings only prevent others from seeing your profile. Advertisers and Facebook still have access to your private profile.</p>
<p><a href="http://www.avg.com/us-en/privacyfix" target="_blank" rel="nofollow noopener noreferrer">AVG Privacyfix.com</a> helps you manage your Facebook privacy settings by showing you which ones need to be fixed.</p>
<p><strong>Logging Off for Privacy</strong></p>
<p>Intentionally logging off a site helps preserve your online privacy. If you were on Amazon, Facebook, or Google, we recommend you log off the site and not click away to a different site. This will help prevent ads from following you.</p>
<p>Fact: When a someone has more information about us, we are more likely to trust them. If your personal details leaked in a company&#8217;s data breach, criminals could use that information to craft emails that look more credible.</p>
<p><strong>Minimize</strong> your personal information on Facebook, Twitter, Instagram, etc. Also <strong>cleanse</strong> or set to Private your <a href="https://www.amazon.com/gp/help/customer/display.html?nodeId=501094" target="_blank" rel="nofollow noopener noreferrer">Amazon wishlists</a> and <strong>eBay</strong> bidding history.</p>
<p><strong> Anonymous Browsing</strong></p>
<p>Most modern Internet browsers have options to perform anonymous browsing. You can utilize this function to help hide your identity. Here are instructions for anonymous browsing in <a href="https://support.google.com/chrome/answer/95464?hl=en" target="_blank" rel="nofollow noopener noreferrer">Google Chrome</a>, <a href="http://windows.microsoft.com/en-US/internet-explorer/products/ie-9/features/in-private" target="_blank" rel="nofollow noopener noreferrer">Microsoft Internet Explorer 9</a>, and <a href="https://support.mozilla.com/en-US/kb/Private%20Browsing" target="_blank" rel="nofollow noopener noreferrer">Mozilla Firefox</a>.</p>
<p>Optional third party browser plug-ins are also available to help enhance Internet privacy.</p>
<ul>
<li>Adblock Plus is a plug in to block ads. <a href="https://adblockplus.org/en/firefox" target="_blank" rel="nofollow noopener noreferrer">Firefox</a> &#8211; <a href="https://adblockplus.org/en/chrome" target="_blank" rel="nofollow noopener noreferrer">Chrome</a></li>
<li>ChromeBlock is a plugin to help increase privacy. <a href="http://abine.com/downloads.php" target="_blank" rel="nofollow noopener noreferrer">Chrome</a></li>
<li><a href="https://addons.mozilla.org/en-US/firefox/addon/cookiemaster/" target="_blank" rel="nofollow noopener noreferrer">Cookie Master</a> is a Firefox plug-in to manage cookies</li>
<li>Disconnect.me is a plugin to help increase privacy. <a href="http://disconnect.me/" target="_blank" rel="nofollow noopener noreferrer">Firefox </a>&#8211; <a href="http://disconnect.me/" target="_blank" rel="nofollow noopener noreferrer">Chrome</a> &#8211; <a href="http://disconnect.me/" target="_blank" rel="nofollow noopener noreferrer">Safari</a></li>
<li><a href="http://abine.com/products.php" target="_blank" rel="nofollow noopener noreferrer">Do Not Track Plus</a> is a Firefox plugin to help increase privacy.</li>
<li><a href="http://www.ghostery.com/" target="_blank" rel="nofollow noopener noreferrer">Ghostery</a> is a free plug-in to view and block what trackers and advertisers a website uses. Available for most web browsers</li>
<li>NoScript is an extension for both <a href="https://addons.mozilla.org/en-US/firefox/addon/noscript/">Firefox</a> and <a href="https://chrome.google.com/webstore/detail/noscript/doojmbjmlfjjnbmnoijecmcbfeoakpjm?hl=en">Chrome</a> which prevents scripting from automatically running</li>
<li>PrivacySuite is a plugin to help increase privacy. <a href="http://abine.com/downloads.php" target="_blank" rel="nofollow noopener noreferrer">Firefox</a> &#8211; Internet Explorer (Soon)</li>
<li><a href="https://addons.mozilla.org/en-US/firefox/addon/trackmenot/" target="_blank" rel="nofollow noopener noreferrer">Trackmenot</a> is a Firefox plug in to prevent tracking. <a href="https://chrome.google.com/webstore/detail/cgllkjmdafllcidaehjejjhpfkmanmka" target="_blank" rel="nofollow noopener noreferrer">Chrome version</a></li>
</ul>
<p><strong>Opting Out of Online Ad Personalization &#8211; Do Not Track<br />
</strong></p>
<p>Advertising companies that are members of the <a href="http://www.networkadvertising.org/managing/principles.asp" rel="nofollow">Network Advertising Initiative</a> (NAI) and other <a href="http://www.aboutads.info/" rel="nofollow">self-regulatory efforts</a> allow users to opt out of personalizing ads that are shown. Here are instructions for opting out of online ad personalization in <a href="https://support.google.com/chrome/answer/95464?hl=en" target="_blank" rel="nofollow noopener noreferrer">Google Chrome</a>, <a href="https://support.microsoft.com/en-us/help/17288/windows-internet-explorer-11-use-do-not-track" target="_blank" rel="nofollow noopener noreferrer">Microsoft Internet Explorer</a>, and <a href="https://www.mozilla.org/en-US/privacy/" target="_blank" rel="nofollow noopener noreferrer">Mozilla Firefox</a>.</p>
<p>The Network Advertising Initiative also has a <a href="http://www.networkadvertising.org/managing/opt_out.asp" target="_blank" rel="nofollow noopener noreferrer">page</a> that allows you to opt out of online ad personalization from a variety of member advertising companies.</p>
<p>Other Opt-out pages:</p>
<ul>
<li><a href="http://privacy.aol.com/" target="_blank" rel="nofollow noopener noreferrer">AOL</a></li>
<li><a href="https://support.apple.com/kb/HT4228?viewlocale=en_US&amp;locale=en_US" target="_blank" rel="nofollow noopener noreferrer">Apple iAds</a></li>
<li><a href="http://www.mastercard.us/privacy/" target="_blank" rel="nofollow noopener noreferrer">Mastercard</a></li>
<li><a href="http://selectout.org" target="_blank" rel="nofollow noopener noreferrer">SelectOut</a> &#8211; Optout of almost 200 trackers</li>
<li><a href="http://www.aboutads.info/choices/" target="_blank" rel="nofollow noopener noreferrer">Self-Regulatory Program for Online Behavioral Advertising</a></li>
<li><a href="http://info.yahoo.com/privacy/us/yahoo/opt_out/targeting/details.html" target="_blank" rel="nofollow noopener noreferrer">Yahoo</a></li>
</ul>
<p><strong>Using Linux for Internet Privacy</strong></p>
<p>Linux can be utilized to enhance our Internet privacy. We can set up a bootable Linux USB key or CD, which allows us to start up our computer into a totally clean operating system, devoid of cookies and the like. Use one that has a write lock physical switch. Consult our article<a title="How to use Linux for more Secure Computing" href="http://www.safegadget.com/35/how-to-use-linux-for-more-secure-computing/"> Creating a Bootable Linux USB Key or CD</a> for more information.</p>
<p><strong>Using a VPN for Internet Privacy</strong></p>
<p>A VPN or Virtual Private Network allows you to tunnel your Internet traffic through a third party provider, making your traffic appear to come from a different location. While this option is more complex to implement, when combined with the suggestions listed above, a VPN connection forms a very powerful tool to protect your privacy. Consult our article How to Use Wireless Networks or WiFi Safely in Public for more information. Make sure you select one that is located outside the USA and which does not logging.</p>
<p><strong>Email Snooping</strong></p>
<p><a href="http://arstechnica.com/tech-policy/2016/10/report-fbi-andor-nsa-ordered-yahoo-to-build-secret-e-mail-search-tool/" target="_blank" rel="nofollow noopener noreferrer">Yahoo</a> was exposed in 2016 to having scan all its customer&#8217;s emails looking at incoming email streams for a digital signature associated with a known terror organization.</p>
<p>The ultimate way to prevent email snopping is by running your <a href="https://www.popsci.com/set-up-private-email-server/" target="_blank" rel="nofollow noopener noreferrer">own email server</a>.  This has a cost and can result in your emails not going through.</p>
<p><strong>Credit Card Privacy</strong></p>
<p><a href="https://privacy.com" target="_blank" rel="nofollow noopener noreferrer">Privacy.com</a> creates secure virtual credit card numbers, hiding your real card.</p>
<p><strong>Secure Instant Messaging</strong></p>
<p>Privacy relates to how easy it is to ease drop into a messaging client.  Can the government listen in?  Is it encrypted?</p>
<p>The EFF has a great <a href="https://www.eff.org/secure-messaging-scorecard" target="_blank" rel="nofollow noopener noreferrer">Secure Messaging Scorecard</a> page.<br />
Forget about using popular ones like Whatsapp, Line, Viber, WeChat, they have all been monitored.</p>
<p>Try ones like:</p>
<p>Silent Circle<br />
Redphone<br />
OSTel<br />
Chat Secure<br />
Signal (Formerly Textsecure)</p>
<p><strong>Anonymous Registration</strong></p>
<p>It is annoying registering for forums and many content sites where your real information is not necessary. When asked for personal information, we suggest you enter bogus information if you wish to remain anonymous. Create an email address that is tied to this information and save this information as a profile within password management utilities.</p>
<p><a href="https://mysudo.com/" rel="nofollow">MySudo</a> helps you create temporary emails address and phone numbers. Free Trial.  You can also this by create multiple gmail and google voice accounts.</p>
<p><strong>Removing Yourself from Online Databases</strong></p>
<p>There are several large databases that contain personal information that is culled from telephone books, court records, and other third parties. You can opt out of their data by visiting the following links.</p>
<ul>
<li><a href="http://www.beenverified.com/faq" target="_blank" rel="nofollow noopener noreferrer">BeenVerified</a></li>
<li><a href="http://www.familytreenow.com/optout" target="_blank" rel="nofollow noopener noreferrer">Family Tree Now</a></li>
<li><a href="https://www.intelius.com/optout.php" target="_blank" rel="nofollow noopener noreferrer">Intelius</a></li>
<li><a href="http://www.peekyou.com/about/contact/optout/" target="_blank" rel="nofollow noopener noreferrer">PeekYou</a></li>
<li><a href="http://www.peoplesmart.com/optout?" target="_blank" rel="nofollow noopener noreferrer">PeopleSmart</a></li>
<li><a href="http://pipl.com/directory/remove/" target="_blank" rel="nofollow noopener noreferrer">Pipl</a></li>
<li><a href="http://www.spokeo.com/privacy" target="_blank" rel="nofollow noopener noreferrer">Spokeo</a></li>
<li><a href="https://support.whitepages.com/hc/en-us/requests/new" target="_blank" rel="nofollow noopener noreferrer">Whitepages</a></li>
<li><a href="http://www.zabasearch.com/block_records/block_by_mail.php" target="_blank" rel="nofollow noopener noreferrer">ZabaSearch</a></li>
</ul>
<p>A paid service <a href="https://www.abine.com" target="_blank" rel="nofollow noopener noreferrer">DeleteMe</a> helps automate this for $129/year</p>
<p><strong>Identity Theft Protection</strong></p>
<p>If you are a Comcast subscriber, you are eligible for free <a href="https://www.xfinity.com/support/articles/identity-guard-discontinued" target="_blank" rel="nofollow noopener noreferrer">Identity Guard</a> (discontinued). Consult your ISP to see if they have any free identity theft programs.</p>
<p><strong>Social Security Account Setup</strong></p>
<p>While we are on the subject of protecting you from identity theft.  If you have not already setup your <a href="http://www.ssa.gov" target="_blank" rel="noopener noreferrer">Social Security</a> Account, you should set one up before a thieve makes one before you.</p>
<p>Or better yet, <a href="https://secure.ssa.gov/acu/IPS_INTR/blockaccess" target="_blank" rel="nofollow noopener noreferrer">block Electronic access</a> to your Social Security Record.</p>
<p><strong>TV Privacy</strong></p>
<p>If you have a Smart TV, it may be watching or listening to you.  In March 2017 a Wikileaks CIA leak indicated that they are listening in on those with Samsung TVs.</p>
<ul>
<li>Turn off any Smart TV Functions on your TV</li>
<li>Use an external Roku or AppleTV box instead</li>
<li>Use a power strip and turn off the TV&#8217;s power that way</li>
</ul>
<p><strong>Opting out of TV data</strong></p>
<p>Many TV content suppliers log your viewing habits and sell them to other companies.  Opt-Out of this madness! Cable and satellite television networks have their own opt-out for anonymous-viewer information.</p>
<ul>
<li><a href="http://www.directv.com/DTVAPP/content/legal/privacy_policy" target="_blank" rel="nofollow noopener noreferrer">DirectTV </a>&#8211; Contact the company by phone, email, or mail to opt-out.</li>
<li><a href="https://support.tivo.com/articles/Features_Use/Managing-Opt-in-Opt-out-settings-PTCMs-Emails-and-Privacy" target="_blank" rel="nofollow noopener noreferrer">TiVo</a></li>
<li>Optimum.net &#8211; They removed their opt-out page.</li>
<li><a href="http://xfinity.comcast.net/privacy/2009-10/#partners" target="_blank" rel="nofollow noopener noreferrer">Comcast</a></li>
<li><a href="http://www.att.com/gen/privacy-policy?pid=2506" target="_blank" rel="nofollow noopener noreferrer">AT&amp;T</a></li>
<li>Vizio &#8211; Vizio TVs spied on what people were viewing, causing the <a href="https://www.ftc.gov/system/files/documents/cases/170206_vizio_2017.02.06_complaint.pdf" target="_blank" rel="nofollow noopener noreferrer">FTC to sue them</a>.  The company provided consumers’ IP addresses to data aggregators, who then matched the address with an individual consumer or household. Vizio’s contracts with third parties prohibited the re-identification of consumers and households by name, but allowed a host of other personal details – for example, sex, age, income, marital status, household size, education, and home ownership.</li>
</ul>
<p><strong>Turn off iPhone Diagnostic Log Sending</strong></p>
<p>To turn off sending of diagnostics data to Apple do the following:</p>
<ul>
<li>Open <strong>Settings<br />
</strong></li>
<li>Select <strong>General</strong></li>
<li>Select <strong>About</strong></li>
<li>Select <strong>Diagnostics &amp; Usage</strong></li>
<li>Click on <strong>Don&#8217;t Send</strong></li>
</ul>
<p><strong>Color Laser Printer &amp; Color Copier Privacy Issues</strong></p>
<p>The Electronic Frontier Foundation (EFF) discovered that most color copiers and color laser printers have been adding invisible tracking codes to every single printed page they produce. The government asked printer makers to do this in an effort to prevent counterfeiting. The dots help track what type of printer and its serial number as well as when the document was printed.</p>
<p>This relativity little known tactic can undermine anonymity for political, religious, or any other reason. Users need to understand this and tell printer manufacturers that they do not like this hidden invasion of privacy. For more information, take a look at this <a href="https://www.eff.org/issues/printers" target="_blank" rel="nofollow noopener noreferrer">webpage</a> and support their efforts.</p>
<p>If you are purchasing a <a href="https://www.eff.org/pages/list-printers-which-do-or-do-not-display-tracking-dots" target="_blank" rel="nofollow noopener noreferrer">new color laser printer</a>, try to purchase one that does not print these invisible codes.</p>
<p><strong>Kindle eBook Privacy issues</strong></p>
<p>Reading in the new age via eReaders such as the Kindle expose users to additional privacy issues. Previously, with physical books, it was difficult for bookstores and publishers to know whether you had really finished a book, highlighted specific passages in the book, or what book you purchased next.</p>
<p>With eReaders such as the Kindle your privacy has gone out the door. Kindle users have to agree to allow Amazon to store information on the device and Amazon&#8217;s servers including where you left off in the book, notes, highlights, bookmarks, and more. With all of this information, the Electronic Frontier Foundation (EFF) is pushing for legislation to prevent eBook sellers from reveling people&#8217;s reading habits without a court&#8217;s approval.</p>
<p>If you are concerned about your privacy, you may want to steer clear of eReaders or utilize an eReader that does not any have Internet connectivity. Find one that allows eBooks to be downloaded to a computer and manually added to your eReader.<strong><br />
</strong></p>
<p><strong>More Resources</strong></p>
<p><a href="https://www.privacytools.io/" target="_blank" rel="nofollow noopener noreferrer">privacy tools.io</a> &#8211; Lists many resources that can help you reclaim your privacy</p>
<p>With some leg work, we can significantly improve the privacy of our online activities.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.safegadget.com/59/how-to-anonymous-browsing-internet-privacy/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Hacked Internet of Things Database – Gadgets, Cameras, Wireless Routers</title>
		<link>https://www.safegadget.com/139/hacked-internet-things-database/</link>
					<comments>https://www.safegadget.com/139/hacked-internet-things-database/#comments</comments>
		
		<dc:creator><![CDATA[SafeGadget]]></dc:creator>
		<pubDate>Wed, 01 Jan 2020 08:00:54 +0000</pubDate>
				<category><![CDATA[Computer Hardware]]></category>
		<category><![CDATA[Internet of Thigs]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Virus]]></category>
		<category><![CDATA[Wireless Networking]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Pacemakers]]></category>
		<category><![CDATA[Wireless Router]]></category>
		<guid isPermaLink="false">http://www.safegadget.com/?p=139</guid>

					<description><![CDATA[Last Update: August 5, 2020 Internet of Things Scanner Run this online scanner to see if any of your IOT devices are visible and need to be secured. October 2017 Wi-Fi KRACK attack Warning KRACK attack on Wi-Fi. Attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted.  &#8230; <a href="https://www.safegadget.com/139/hacked-internet-things-database/" class="more-link">Continue reading<span class="screen-reader-text"> "Hacked Internet of Things Database &#8211; Gadgets, Cameras, Wireless Routers"</span></a>]]></description>
										<content:encoded><![CDATA[<p>Last Update: August 5, 2020</p>
<p><strong>Internet of Things Scanner</strong></p>
<p>Run this <a href="http://iotscanner.bullguard.com/" target="_blank" rel="nofollow noopener noreferrer">online scanner</a> to see if any of your IOT devices are visible and need to be secured.</p>
<p><strong>October 2017 Wi-Fi KRACK attack Warning</strong></p>
<p><a href="https://www.krackattacks.com/" target="_blank" rel="nofollow noopener noreferrer">KRACK</a> attack on Wi-Fi. Attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted.  Virtually <strong>ALL</strong> Wi-Fi equipped devices need to be updated.  The attack is particularly bad on Android 6.0 and Linux. If you have a device with no updates (eg Internet of Things), <strong>you will be open to attacks.</strong></p>
<p>You should not be using any non-802.11ac devices any more, if at all possible; and you should make absolutely certain you&#8217;ve updated the firmware on all routers to the latest available version.</p>
<p>If that newest available firmware version is older than November 2017, it is without a doubt vulnerable to KRACK, and you&#8217;re going to need to discard and replace that device. If it&#8217;s older than, say, July 2018 it might or might not include KRACK mitigations, and you should go through all of that device&#8217;s firmware release notes since November 2017 to make certain.</p>
<p><strong>Securing Internet of Things, Smart Home Devices</strong></p>
<p>More and more gadgets for the home are connected to the Internet for additional functionality. Refrigerators to Thermostats to Door Locks, the list is never ending. <strong>Do not</strong> forget about security. You may have created an open door for hackers, become part of an evil Botnet, or illegal activity without your knoawledge.</p>
<p>A vulnerable webcam can give <strong>ANYONE</strong> on the Internet a view of your home. Secure these home gadgets as strongly as possible. Many can NEVER be updated, which means that you should discontinue their usage.</p>
<p><strong>Wi-Fi Network Connection</strong></p>
<p><span id="more-139"></span></p>
<p>Here are some general tips to secure your new IOT or smart home devices:</p>
<ol>
<li>Change the default password or credentials of the Device</li>
<li>Update the device to the latest firmware available. If the company does not have a firmware update page on their website, we would return it. Do this again every couple months.</li>
<li>Connect your IOT device such as a Dropcam or Nest Smoke Detector to your <strong>Guest</strong> Wi-Fi network whenever possible.  This network should be walled off from the normal network, preventing access to all your Computers.  Malicious devices could snoop on your network and quietly send information without your knowledge.</li>
<li>If the Wireless routers guest network is not secure, it is even better to have 3 routers in a Y configuration. You can purchase an inexpensive router that hooks up to your Cable/DSL modem, then have 2 separate wireless routers connected to this device. Put all Internet of Things devices on one of the Y routers. Connect your computers, smartphones, tablets to the other router.</li>
<li>Have the Guest network that IOT devices are on, use a different dns server</li>
<li><strong>Turn off uPNP on your router</strong> to prevent ports from being opened up to access IOT devices.</li>
<li>Never poke a hole through your firewall for a device. It could then be accessed by anyone on the Internet! Use <a href="https://www.grc.com/x/ne.dll?bh0bkyd2" target="_blank" rel="nofollow noopener noreferrer">Shields Up!</a> to look for open ports.</li>
<li>Peer to Peer capabilities are hard to secure. Avoid devices with this.</li>
<li>Cheaper IOT devices especially no name ones sold on Amazon or eBay should be avoided. Most of these are rarely built with security in mind and are never updated.  Stick to brand name, IE Netgear, Google, Ring, etc..</li>
</ol>
<p>Even the <a href="http://www.recode.net/2016/6/11/11906856/nsa-spying-hacker-internet-of-things" target="_blank" rel="nofollow noopener noreferrer">NSA is loving the rise of all these IOT devices</a> to let them hack more easily. <a href="https://blog.sucuri.net/2016/06/large-cctv-botnet-leveraged-ddos-attacks.html" target="_blank" rel="nofollow noopener noreferrer">CCTV cameras</a> were involved in a DDoS attacks, taking down small businesses who did not pay ransom.</p>
<p><strong>Hacked Internet of Things Insecure Device List</strong></p>
<p><strong><em>Baby Monitors</em></strong></p>
<p>Gynoii &#8211; <a href="https://www.rapid7.com/docs/Hacking-IoT-A-Case-Study-on-Baby-Monitor-Exposures-and-Vulnerabilities.pdf" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>iBaby M3S, iBaby M6 &#8211; <a href="https://www.rapid7.com/docs/Hacking-IoT-A-Case-Study-on-Baby-Monitor-Exposures-and-Vulnerabilities.pdf" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Lens Peek-a-View &#8211; <a href="https://www.rapid7.com/docs/Hacking-IoT-A-Case-Study-on-Baby-Monitor-Exposures-and-Vulnerabilities.pdf" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Philips In.Sight B120/37 &#8211; <a href="https://www.rapid7.com/docs/Hacking-IoT-A-Case-Study-on-Baby-Monitor-Exposures-and-Vulnerabilities.pdf" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Summer Baby Zoom Wifi Monitor &amp; Internet Viewing System &#8211; <a href="https://www.rapid7.com/docs/Hacking-IoT-A-Case-Study-on-Baby-Monitor-Exposures-and-Vulnerabilities.pdf" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>TRENDnet WiFi Baby Cam TV-IP743SIC &#8211; <a href="https://www.rapid7.com/docs/Hacking-IoT-A-Case-Study-on-Baby-Monitor-Exposures-and-Vulnerabilities.pdf" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p><em><strong>Home</strong></em></p>
<p>AuYou Wi-Fi Smart Outlet Switch &#8211; <a href="https://www.amazon.com/review/R2JVRCO8T1ON0R" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Ceomate Bluetooth Smart Doorlock &#8211; <a href="https://www.tomsguide.com/us/bluetooth-lock-hacks-defcon2016,news-23129.html" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Elecycle EL797 &amp; EL797G Smart Padlock &#8211; <a href="https://www.theverge.com/circuitbreaker/2016/8/9/12414014/smart-lock-security-flaws-internet-of-things" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>iBluock Padlock &#8211; <a href="https://www.theverge.com/circuitbreaker/2016/8/9/12414014/smart-lock-security-flaws-internet-of-things" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Garage doors with no rolling codes &#8211; <a href="http://securityaffairs.co/wordpress/37650/hacking/opensesame-opens-garage-doors.html" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Kwikset &#8211; Smartkey locks &#8211; <a href="https://www.youtube.com/watch?v=sR-h64WwfW8" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Lagute Sciener Smart Doorlock v3.3.0 &#8211; <a href="https://web.archive.org/web/20180813122946/https://media.defcon.org/DEF%20CON%2024/DEF%20CON%2024%20presentations/DEFCON-24-Rose-Ramsey-Picking-Bluetooth-Low-Energy-Locks.pdf" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p><a href="http://www.lifx.com/pages/updates#new" target="_blank" rel="nofollow noopener noreferrer">LIFX Smart LED Light Bulb</a> &#8211; <a href="http://securityaffairs.co/wordpress/26475/hacking/hacking-lifx-smart-led-light-bulbs-steal-wifi-passwords.html" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Mesh Motion Bitlock Padlock v1.4.9 &#8211; <a href="https://www.theverge.com/circuitbreaker/2016/8/9/12414014/smart-lock-security-flaws-internet-of-things" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Okidokey Smart Doorlock v2.4 &#8211; <a href="https://web.archive.org/web/20180813122946/https://media.defcon.org/DEF%20CON%2024/DEF%20CON%2024%20presentations/DEFCON-24-Rose-Ramsey-Picking-Bluetooth-Low-Energy-Locks.pdf" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Plantraco Phantomlock v1.6 &#8211; <a href="https://web.archive.org/web/20180813122946/https://media.defcon.org/DEF%20CON%2024/DEF%20CON%2024%20presentations/DEFCON-24-Rose-Ramsey-Picking-Bluetooth-Low-Energy-Locks.pdf" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Poly Control Danalock Doorlock &#8211; <a href="https://houstonagentmagazine.com/2016/08/19/clients-interested-smart-locks-help-prevent-hacks/" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Quicklock Doorlock &amp; Padlock &#8211; <a href="https://www.theverge.com/circuitbreaker/2016/8/9/12414014/smart-lock-security-flaws-internet-of-things" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Samsung Smart TVs 2015 &#8211; <a href="http://www.theregister.co.uk/2015/02/17/samsung_smart_tv_privacy_rewind/" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>TRANE Comfortlink XL850 &#8211; <a href="https://www.trustwave.com/Resources/SpiderLabs-Blog/Turning-Up-The-Heat-on-IoT--TRANE-Comfortlink-XL850/?page=1&amp;year=0&amp;month=0" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Vians Bluetooth Smart Doorlock &#8211; <a href="https://www.theverge.com/circuitbreaker/2016/8/9/12414014/smart-lock-security-flaws-internet-of-things" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p><em>Kitchen Appliances</em></p>
<p>Smarter Wi-Fi iKettle &#8211; <a href="https://www.pentestpartners.com/blog/hacking-a-wi-fi-coffee-machine-part-1/" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p><em><strong>Pacemakers</strong></em></p>
<p>St. Jude Medical Cardiac Pacemakers &#8211; <a href="https://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm573669.htm" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p><em><strong>Pets</strong></em></p>
<p>Dog Training System &#8211; Details</p>
<p><em><strong>Security</strong></em></p>
<p>Yale Zigbee Doorlock &#8211; <a href="https://www.blackhat.com/docs/us-15/materials/us-15-Zillner-ZigBee-Exploited-The-Good-The-Bad-And-The-Ugly-wp.pdf" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p><em><strong>Toys</strong></em></p>
<p>Boosted, Revo, Yuneec Electric Skateboards &#8211; <a href="https://www.wired.com/2015/08/hackers-can-seize-control-of-electric-skateboards-and-toss-riders-boosted-revo/" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Cayla Doll &#8211; <a href="https://www.pentestpartners.com/blog/making-childrens-toys-swear/" target="_blank" rel="nofollow noopener noreferrer">Details</a> &#8211; <a href="https://www.wsj.com/articles/germany-issues-kill-order-for-a-domestic-spycayla-the-toy-doll-1492098755" target="_blank" rel="nofollow noopener noreferrer">Banned in Germany</a> ($26,000 fine!)</p>
<p>Cloud Pets &#8211; <a href="https://www.troyhunt.com/data-from-connected-cloudpets-teddy-bears-leaked-and-ransomed-exposing-kids-voice-messages/" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Fredi Baby Monitor &#8211; <a href="https://www.sec-consult.com/en/blog/2018/06/true-story-the-case-of-a-hacked-baby-monitor-gwelltimes-p2p-cloud/" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Hello Barbie &#8211; <a href="https://www.theguardian.com/technology/2015/nov/26/hackers-can-hijack-wi-fi-hello-barbie-to-spy-on-your-children" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>iSPY Camera Tank &#8211; <a href="https://www.pentestpartners.com/blog/how-to-hack-an-app-enabled-device-to-make-it-truly-internet-enabled/" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Vtech Learning Lodge &#8211; <a href="https://www.theguardian.com/technology/2015/nov/30/vtech-toys-hack-private-data-parents-children" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p><em><strong>Webcams &#8211; IP Cameras &#8211; DVR</strong></em></p>
<p>This category is a minefield.  Look how many people have their cameras made public on <a href="http://www.insecam.org/" target="_blank" rel="nofollow noopener noreferrer">Insecam.com</a> &#8211; Stick to a Dropcam or Ring Doorbell camera.</p>
<p>In September 2016 a massive number of IP Cameras and DVRs were hacked and used to DDOS or take off the Internet due to high traffic, websites. Each has a hard coded telnet username and password of root &#8211; xc3511 &#8211; <a href="https://www.flashpoint-intel.com/blog/cybercrime/when-vulnerabilities-travel-downstream/" target="_blank" rel="nofollow noopener noreferrer">XiongMai Technologies of <em>Hangzhou, China, </em>created many of these devices</a> that are rebranded by others and sold. If you have one, updated it and change its password immediately.</p>
<p>We would never buy a no-name IP camera from amazon, you are just asking for it.</p>
<p>ACTi IP Camera &#8211; <a href="https://ipvm.com/reports/ip-cameras-default-passwords-directory" target="_blank" rel="nofollow noopener noreferrer">default login</a></p>
<p>ANKO Products DVR &#8211; <a href="http://www.cctvforum.com/viewtopic.php?f=3&amp;t=44250" target="_blank" rel="nofollow noopener noreferrer">default login</a></p>
<p>AVTECH IP Ccameras, NVR, DVR &#8211; <a href="https://www.tenable.com/plugins/nessus/104102" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Axis IP Camera &#8211; <a href="http://www.cleancss.com/router-default/Axis/0543-001" target="_blank" rel="nofollow noopener noreferrer">default login</a> &#8211; Watch <a href="http://www.insecam.org/en/bytype/axis/" target="_blank" rel="noopener noreferrer">video</a> with no Passwords! &#8211; <a href="https://www.axis.com/global/en/support/firmware" target="_blank" rel="nofollow noopener noreferrer">Update</a> your camera</p>
<p>CCTV-DVR &#8211; Over <strong>70</strong> different Vendors &#8211; <a href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>D-Link DCS930L, DCS932L &#8211; <a href="https://www.vectra.ai/media-coverage/30-webcam-spun-into-persistent-network-backdoor" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Dahua Security Cameras &#8211; <a href="http://www.cam-it.org/index.php?topic=5192.0" target="_blank" rel="nofollow noopener noreferrer">default login</a>&#8211; Must change default password and <a href="http://us.dahuasecurity.com/support/" target="_blank" rel="nofollow noopener noreferrer">update firmware right away</a> &#8211; Some have hardcoded backdoor ONVIF password of admin/admin. &#8211; <a href="https://krebsonsecurity.com/2017/03/dahua-hikvision-iot-devices-under-siege/" target="_blank" rel="nofollow noopener noreferrer">Details</a> &#8211; Includes:</p>
<p>DH-IPC-HDW23A0RN-ZS<br />
DH-IPC-HDBW23A0RN-ZS<br />
DH-IPC-HDBW13A0SN<br />
DH-IPC-HDW13A0SN<br />
DH-IPC-HFW13A0SN-W<br />
DH-IPC-HDBW13A0SN<br />
DH-IPC-HDW13A0SN<br />
DH-IPC-HFW13A0SN-W<br />
DHI-HCVR51A04HE-S3<br />
DHI-HCVR51A08HE-S3<br />
DHI-HCVR58A32S-S2</p>
<p>Dahua IP Camera &#8211; <a href="http://www.cam-it.org/index.php?topic=9396.0" target="_blank" rel="nofollow noopener noreferrer">default login</a></p>
<p>Dahua IP Camera HDW4300C &#8211; <a href="http://www.cleancss.com/router-default/Dahua/DH-IPC-HDW4300C" target="_blank" rel="nofollow noopener noreferrer">default login</a></p>
<p>Dahua DVR &#8211; <a href="http://www.cam-it.org/index.php?topic=5035.0" rel="nofollow">default login</a></p>
<p>Defeway &#8211; Watch <a href="http://www.insecam.org/en/bytype/defeway/" target="_blank" rel="noopener noreferrer">video</a> with no Passwords</p>
<p>Dreambox TV receiver- <a href="https://www.satellites.co.uk/forums/threads/reset-root-password-plugin.101146/" target="_blank" rel="nofollow noopener noreferrer">default login</a></p>
<p>Eminent EM6220 &#8211; <a href="https://jumpespjump.blogspot.com/2015/09/how-i-hacked-my-ip-camera-and-found.html" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>EV ZLX Two-way Speaker</p>
<p>Foscam &#8211; different brand names in Europe &#8211; Authenticate you with &#8216;admin&#8217; without requiring password &#8211; Foscam C1 IP &#8211; <a href="https://www.helpnetsecurity.com/2017/11/14/foscam-c1-vulnerabilities/" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Guangzhou Juan Optical &#8211; <a href="https://news.ycombinator.com/item?id=11114012" target="_blank" rel="nofollow noopener noreferrer">default login</a></p>
<div dir="ltr">
<div>Hanwha Techwin SNH-V6410PN/PNW Smart Cam, Samsung SNH-V6410 and other cameras using same software &#8211; <a href="https://securelist.com/somebodys-watching-when-cameras-are-more-than-just-smart/84309/" target="_blank" rel="nofollow noopener noreferrer">Details</a></div>
<div></div>
<div>Hootoo HT-IP211HP</div>
<div></div>
<div>H.264 &#8211; Chinese DVR &#8211; <a href="http://www.cctvforum.com/viewtopic.php?f=56&amp;t=34930&amp;start=15" target="_blank" rel="nofollow noopener noreferrer">Details</a></div>
<div></div>
<div>Hikvision Cameras and DVRs &#8211; default password (12345), <a href="https://ipvm.com/reports/hik-default-hack" target="_blank" rel="nofollow noopener noreferrer">Details</a></div>
</div>
<div></div>
<div>HiSilicon IP Camera &#8211; <a href="https://acassis.wordpress.com/2014/08/10/i-got-a-new-hi3518-ip-camera-modules/" target="_blank" rel="nofollow noopener noreferrer">Details</a> &#8211; <a href="https://gist.github.com/gabonator/74cdd6ab4f733ff047356198c781f27d" target="_blank" rel="nofollow noopener noreferrer">Details2</a> &#8211; <a href="https://securityaffairs.co/wordpress/81567/malware/fbot-malware-hisilicon.html" target="_blank" rel="nofollow noopener noreferrer">Details3</a></div>
<div> Also known as bigfish, hi3520d, godarm, godnet, hi3535</div>
<div></div>
<div>IPX-DDK Network Camera &#8211; <a href="http://www.ipxinc.com/products/cameras-and-video-servers/network-cameras/" target="_blank" rel="nofollow noopener noreferrer">Details</a></div>
<div></div>
<div>IQinVision Cameras &#8211; <a href="https://ipvm.com/reports/ip-cameras-default-passwords-directory" target="_blank" rel="nofollow noopener noreferrer">Details</a></div>
<div></div>
<div>IZON &#8211; <a href="https://www.youtube.com/watch?v=h_80VguaAI8" target="_blank" rel="nofollow noopener noreferrer">Details</a></div>
<div></div>
<div>Jaws &#8211; <a href="https://www.pentestpartners.com/security-blog/pwning-cctv-cameras/" target="_blank" rel="nofollow noopener noreferrer">Details</a></div>
<div></div>
<div>KT&amp;C  &#8211; <a href="https://ipvm.com/reports/hik-default-hack" target="_blank" rel="nofollow noopener noreferrer">rebrands Hikvision TVL series</a></div>
<div></div>
<div>Lilin DVR DHD516A, DHD508A, DHD504A, DHD316A, DHD308A, DVD304A &#8211; <a href="https://blog.netlab.360.com/multiple-botnets-are-spreading-using-lilin-dvr-0-day-en/" rel="nofollow">Details</a></div>
<div></div>
<div>Lilin IP Camera DHD 204, DHD204A, DHD208, DHD208A, DHD216, DHD216A</div>
<div></div>
<div>Linksys &#8211; Watch <a href="http://www.insecam.org/en/bytype/linksys/" target="_blank" rel="noopener noreferrer">video</a> with no Passwords!</div>
<div dir="ltr"></div>
<div dir="ltr">
<div>Loftek CXS 2200, DSSv-2200 &#8211; <a href="https://www.youtube.com/watch?v=hpHd7CgH-iw" target="_blank" rel="nofollow noopener noreferrer">Details</a></div>
<div></div>
<div>Mobotix Network Camera &#8211; <a href="http://www.forum.use-ip.co.uk/threads/mobotix-default-password.76/" target="_blank" rel="nofollow noopener noreferrer">Details</a></div>
</div>
<div></div>
<div dir="ltr">
<div>Packet8 VOIP Phone &#8211; <a href="https://community.freepbx.org/t/packet8-atas-phones/4119/11" target="_blank" rel="nofollow noopener noreferrer">Details</a></div>
<div></div>
<div>Panasonic &#8211; Watch <a href="http://www.insecam.org/en/bytype/panasonic/" target="_blank" rel="noopener noreferrer">video</a> with no Passwords!</div>
</div>
<div></div>
<div></div>
<div>Q-See QC-818</div>
<div dir="ltr">
<div></div>
<div>Supra Maginon IPC-20 &#8211; <a href="https://www.pentestpartners.com/blog/hacking-the-ip-camera-part-1/" target="_blank" rel="nofollow noopener noreferrer">Details</a></div>
<div></div>
<div>Swann security camera &#8211; <a href="https://www.helpnetsecurity.com/2018/07/26/swann-security-cameras-spying/" target="_blank" rel="nofollow noopener noreferrer">Details</a></div>
<div></div>
</div>
<p>Netgear Arlo &#8211; <a href="https://www.grc.com/sn/sn-565.txt" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>RaySharp DVRs &#8211; <a href="https://www.pentestpartners.com/blog/pwning-cctv-cameras-update/" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Samsung IP Camera &#8211; <a href="https://ipvm.com/reports/ip-cameras-default-passwords-directory" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Shenzhen Anran Security Cameras &#8211; <a href="https://boingboing.net/2018/10/12/white-label-deniability.html" target="_blank" rel="noopener noreferrer">Details</a></p>
<p>Shenzhen Neo iDoorbell or NIP-22 &#8211; <a href="https://drive.google.com/file/d/0BytbxOde47O6VGxjMFh0VWIybWs/view" rel="nofollow">Details</a></p>
<p>Sony &#8211; IPELA Engine IP Cameras &#8211; <a href="https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20161206-0_Sony_IPELA_Engine_IP_Cameras_Backdoors_v10.txt" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p><em>SNC-CX600, SNC-CX600W, SNC-EB600, SNC-EB600B, SNC EB602R, SNC-EB630, SNC-EB630B, SNC-EB632R, SNC-EM600, SNC-EM601, SNC-EM602R, SNC-EM602RC, SNC-EM630, SNC-EM631, SNC-EM632R, SNC-EM632RC, SNC-VB600, SNC-VB600B, SNC-VB600B5, SNC-VB630, SNC-VB6305, SNC-VB6307, SNC-VB632D, SNC-VB635, SNC-VM600, SNC-VM600B, SNC-VM600B5, SNC-VM601, SNC-VM601B, SNC-VM602R, SNC-VM630, SNC-VM6305, SNC-VM6307, SNC-VM631, SNC-VM632R, SNC-WR600, SNC-WR602, SNC-WR602C, SNC-WR630, SNC-WR632, SNC-WR632C, SNC-XM631, SNC-XM632, SNC-XM636, SNC-XM637, SNC-VB600L, SNC-VM600L, SNC-XM631L, SNC-WR602CL, SNC-CH115, SNC-CH120, SNC-CH160, SNC-CH220, SNC-CH260, SNC-DH120, SNC-DH120T, SNC-DH160, SNC-DH220, SNC-DH220T, SNC-DH260, SNC-EB520, SNC-EM520, SNC-EM521, SNC-ZB550, SNC-ZM550, SNC-ZM551, SNC-EP550, SNC-EP580, SNC-ER550, SNC-ER550C, SNC-ER580, SNC-ER585, SNC-ER585H, SNC-ZP550, SNC-ZR550, SNC-EP520, SNC-EP521, SNC-ER520, SNC-ER521, and SNC-ER521C.</em></p>
<p>Toshiba Network Camera &#8211; <a href="http://faq.surveillixdvrsupport.com/index.php?action=artikel&amp;cat=4&amp;id=8&amp;artlang=en" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>VideoIQ &#8211; <a href="https://ipvm.com/reports/ip-cameras-default-passwords-directory" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Vivotek IP Camera &#8211; <a href="https://ipvm.com/reports/ip-cameras-default-passwords-directory" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p><em><strong>Security Researchers have found Security Holes</strong></em></p>
<p>SmartThings &#8211; <a href="https://blog.talosintelligence.com/2018/07/samsung-smartthings-vulns.html?m=1" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Sony &#8211; Watch <a href="http://www.insecam.org/en/bytype/sony/" target="_blank" rel="noopener noreferrer">video</a> with no Passwords!</p>
<p>TPLink- Watch <a href="http://www.insecam.org/en/bytype/tplink/" target="_blank" rel="noopener noreferrer">video</a> with no Passwords!</p>
<p>Universal Plug and Play UPnP &#8211; Always turn it off in your router! &#8211; <a href="http://blog.vectranetworks.com/blog/turning-a-webcam-into-a-backdoor" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Vacron &#8211; <a href="https://blogs.securiteam.com/index.php/archives/3445" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Wireless IP Camera (P2) Wificam &#8211; <a href="https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html" target="_blank" rel="nofollow noopener noreferrer">Details </a>also known as:</p>
<pre>Foscam C2 also known as: Chacon, Thomson, 7links, Netis, Turbox, Novodio, Ambientcam, Nexxt, Technaxx, Qcam, Ivue, Ebode, Sab, and Opticam.

<code>3G+IPCam Other
3SVISION Other
3com CASA
3com Other
3xLogic Other
3xLogic Radio
4UCAM Other
4XEM Other
555 Other
7Links 3677
7Links 3677-675
7Links 3720-675
7Links 3720-919
7Links IP-Cam-in
7Links IP-Wi-Fi
7Links IPC-760HD
7Links IPC-770HD
7Links Incam
7Links Other
7Links PX-3615-675
7Links PX-3671-675
7Links PX-3720-675
7Links PX3309
7Links PX3615
7Links ipc-720
7Links px-3675
7Links px-3719-675
7Links px-3720-675
A4Tech Other
ABS Other
ADT RC8021W
AGUILERA AQUILERA
AJT AJT-019129-BBCEF
ALinking ALC
ALinking Other
ALinking dax
AMC Other
ANRAN ip180
APKLINK Other
AQUILA AV-IPE03
AQUILA AV-IPE04
AVACOM 5060
AVACOM 5980
AVACOM H5060W
AVACOM NEW
AVACOM Other
AVACOM h5060w
AVACOM h5080w
Acromedia IN-010
Acromedia Other
Advance Other
Advanced+home lc-1140
Aeoss J6358
Aetos 400w
Agasio A500W
Agasio A502W
Agasio A512
Agasio A533W
Agasio A602W
Agasio A603W
Agasio Other
AirLink Other
Airmobi HSC321
Airsight Other
Airsight X10
Airsight X34A
Airsight X36A
Airsight XC39A
Airsight XX34A
Airsight XX36A
Airsight XX40A
Airsight XX60A
Airsight x10
Airsight x10Airsight
Airsight xc36a
Airsight xc49a
Airsight xx39A
Airsight xx40a
Airsight xx49a
Airsight xx51A
Airsight xx51a
Airsight xx52a
Airsight xx59a
Airsight xx60a
Akai AK7400
Akai SP-T03WP
Alecto 150
Alecto Atheros
Alecto DVC-125IP
Alecto DVC-150-IP
Alecto DVC-1601
Alecto DVC-215IP
Alecto DVC-255-IP
Alecto dv150
Alecto dvc-150ip
Alfa 0002HD
Alfa Other
Allnet 2213
Allnet ALL2212
Allnet ALL2213
Amovision Other
Android+IP+cam IPwebcam
Anjiel ip-sd-sh13d
Apexis AH9063CW
Apexis APM-H803-WS
Apexis APM-H804-WS
Apexis APM-J011
Apexis APM-J011-Richard
Apexis APM-J011-WS
Apexis APM-J012
Apexis APM-J012-WS
Apexis APM-J0233
Apexis APM-J8015-WS
Apexis GENERIC
Apexis H
Apexis HD
Apexis J
Apexis Other
Apexis PIPCAM8
Apexis Pyle
Apexis XF-IP49
Apexis apexis
Apexis apm-
Apexis dealextreme
Aquila+Vizion Other
Area51 Other
ArmorView Other
Asagio A622W
Asagio Other
Asgari 720U
Asgari Other
Asgari PTG2
Asgari UIR-G2
Atheros ar9285
AvantGarde SUMPPLE
B-Qtech Other
B-Series B-1
BRAUN HD-560
BRAUN HD505
Beaulieu Other
Bionics Other
Bionics ROBOCAM
Bionics Robocam
Bionics T6892WP
Bionics t6892wp
Black+Label B2601
Bravolink Other
Breno Other
CDR+king APM-J011-WS
CDR+king Other
CDR+king SEC-015-C
CDR+king SEC-016-NE
CDR+king SEC-028-NE
CDR+king SEC-029-NE
CDR+king SEC-039-NE
CDR+king sec-016-ne
CDXX Other
CDXXcamera Any
CP+PLUS CP-EPK-HC10L1
CPTCAM Other
Camscam JWEV-372869-BCBAB
Casa Other
Cengiz Other
Chinavasion Gunnie
Chinavasion H30
Chinavasion IP611W
Chinavasion Other
Chinavasion ip609aw
Chinavasion ip611w
Cloud MV1
Cloud Other
CnM IP103
CnM Other
CnM sec-ip-cam
Compro NC150/420/500
Comtac CS2
Comtac CS9267
Conceptronic CIPCAM720PTIWL
Conceptronic cipcamptiwl
Cybernova Other
Cybernova WIP604
Cybernova WIP604MW
D-Link DCS-910
D-Link DCS-930L
D-Link L-series
D-Link Other
DB+Power 003arfu
DB+Power DBPOWER
DB+Power ERIK
DB+Power HC-WV06
DB+Power HD011P
DB+Power HD012P
DB+Power HD015P
DB+Power L-615W
DB+Power LA040
DB+Power Other
DB+Power Other2
DB+Power VA-033K
DB+Power VA0038K
DB+Power VA003K+
DB+Power VA0044_M
DB+Power VA033K
DB+Power VA033K+
DB+Power VA035K
DB+Power VA036K
DB+Power VA038
DB+Power VA038k
DB+Power VA039K
DB+Power VA039K-Test
DB+Power VA040
DB+Power VA390k
DB+Power b
DB+Power b-series
DB+Power extcams
DB+Power eye
DB+Power kiskFirstCam
DB+Power va033k
DB+Power va039k
DB+Power wifi
DBB IP607W
DEVICECLIENTQ CNB
DKSEG Other
DNT CamDoo
DVR DVR
DVS-IP-CAM Other
DVS-IP-CAM Outdoor/IR
Dagro DAGRO-003368-JLWYX
Dagro Other
Dericam H216W
Dericam H502W
Dericam M01W
Dericam M2/6/8
Dericam M502W
Dericam M601W
Dericam M801W
Dericam Other
Digix Other
Digoo BB-M2
Digoo MM==BB-M2
Digoo bb-m2
Dinon 8673
Dinon 8675
Dinon SEGEV-105
Dinon segev-103
Dome Other
Drilling+machines Other
E-Lock 1000
ENSIDIO IP102W
EOpen Open730
EST ES-IP602IW
EST IP743W
EST Other
EZCam EPK-EP10L1
EZCam EZCam
EZCam Other
EZCam PAN/TILT
EZCam Pan/Tilt
EasyCam EC-101HD
EasyCam EC-101HDSD
EasyCam EC-101SD
EasyCam EC-102
EasyCam Other
EasyN 187
EasyN 1BF
EasyN 720P
EasyN F
EasyN F-136
EasyN F-M136
EasyN F-M166
EasyN F-M181
EasyN F-M1b1
EasyN F-SERIES
EasyN F133
EasyN F2-611B
EasyN F3
EasyN F3-166
EasyN F3-176M
EasyN F3-M166
EasyN F3-SERIES
EasyN F3-Series
EasyN F3-m187
EasyN F3M187
EasyN FS-613A-M136
EasyN FS-613B
EasyN FS-613B-M166
EasyN FS-613B-MJPEG
EasyN FS613
EasyN F_M10R
EasyN H3-V10R
EasyN H6-M137h
EasyN M091
EasyN Other
EasyN est-007660-611b
EasyN est-007660333
EasyN f
EasyN f-Series
EasyN f138
EasyN f_series
EasyN fseries
EasyN kitch
EasyN s
EasySE F/B/N/I
EasySE H3
EasySE H3e
EasySE Other
Ebode IPV38W
Ebode IPV58
Ebode Other
Ego Other
Elro 901
Elro 903
Elro 903IP
Elro C7031P
Elro C703IP2
Elro C704-IP
Elro C704IP
Elro C704IP.2
Elro C704ip
Elro C803IP
Elro C903IP
Elro C903IP.2
Elro C904IP
Elro C904IP.2
Elro IP901
Elro Other
Eminent 6564
Eminent EM6220
Eminent EM6564
Eminent em6220
Esky C5900
Esky L
Esky Live
Esky c5900
Eura-Tech IC-03C3
EyeCam ICAM-608
EyeCam IP65IW
EyeCam Other
EyeCam STORAGEOPTIONS
EyeIPCam IP901W
EyeSight ES-IP607W
EyeSight ES-IP811W
EyeSight ES-IP909IW
EyeSight ES-IP935FW
EyeSight ES-IP935IW
EyeSight IP910IW
EyeSight IP915IW
EyeSight Other
EyeSight ip609IW
EyeSight ip909iw
EyeSight ip915iw
EyeSight mjpeg
EyeSpy247 Other
F-Series FSERIES
F-Series Ip
F-Series Other
F-Series ip
First+Concept Other
Focuscam F19821W
Foscam FI18904w
Foscam FI18905E
Foscam FI18905W
Foscam FI18906w
Foscam FI1890W
Foscam FI18910E
Foscam FI18910W
Foscam FI18910w
Foscam FI18916W
Foscam FI18918W
Foscam FI18919W
Foscam FI19810W
Foscam FI8094W
Foscam FI81904W
Foscam FI8601W
Foscam FI8602W
Foscam FI8606W
Foscam FI8610w
Foscam FI8903W
Foscam FI8903W_Elita
Foscam FI8904
Foscam FI8904W
Foscam FI8905E
Foscam FI8905W
Foscam FI8905w
Foscam FI8906w
Foscam FI8907W
Foscam FI8908W
Foscam FI8909W
Foscam FI890W
Foscam FI8910
Foscam FI8910E
Foscam FI8910W
Foscam FI8910W_DW
Foscam FI8910w
Foscam FI8916W
Foscam FI8918
Foscam FI89180w
Foscam FI8918E
Foscam FI8918W
Foscam FI8918w
Foscam FI8919W
Foscam FI9804W
Foscam FI9805E
Foscam FI9810
Foscam FI9810W
Foscam FI9818
Foscam FI9820w
Foscam FI9821W
Foscam FI9821w
Foscam FL8910
Foscam FS18908W
Foscam FS8910
Foscam Fi8910
Foscam Other
Foscam fI8989w
Foscam fi1890w
Foscam fl8910w
FoxCam PTZ2084-L
GIGA gb
GT+ROAD HS-006344-SPSLM
General Other
Generic All-in-one
Generic Billy
Generic DomeA-Outdoor
Generic IP
Generic Other
Gi-star+srl IP6031W
Gigaeye GB
GoAhead EC-101SD
GoAhead GoAheadWebs
GoAhead IPCAM1
GoAhead IPCAM2
GoAhead Other
GoAhead thedon
GoCam Other
Goclever EYE
Goclever EYE2
Gotake GTK-TH01B
H+264+network+DVR 720p
H+264+network+DVR Other
H.264 Other
H6837WI Other
HD+IPC Other
HD+IPC SV3C
HDIPCAM Other
Heden CAMH04IPWE
Heden CAMHED02IPW
Heden CAMHED04IP
Heden CAMHED04IPWN
Heden CAMHEDIPWP
Heden Other
Heden VisionCam
Heden visionCam
HiSilicon Other
Hikvision DS-2CD2132
Histream RTSP
HooToo F-SERIES
HooToo HOOTOO
HooToo HT-IP006
HooToo HT-IP006N
HooToo HT-IP009HDP
HooToo HT-IP206
HooToo HT-IP207F
HooToo HT-IP210HDP
HooToo HT-IP210P
HooToo HT-IP212
HooToo IP009HDP
HooToo Other
HooToo apm-h803-mpc
Hsmartlink Other
Hungtek WIFI
ICAMView Other
ICam I908W
ICam IP-1
ICam Other
ICam Other2
ICam dome
INISOFT-CAM Stan
INVID Other
IO+Data Other
IP66 Other
IPC IPC02
IPC Other
IPC S5030-TF
IPC S5030-m
IPC SRICAM
IPCC 3XPTZ
IPCC 7210W
IPCC IPCC-7210W
IPCC x01
IPTeles Other
IPUX ip-100
ISIT Other
IZOtech Other
IZTOUCH 0009
IZTOUCH A001
IZTOUCH IZ-009
IZTOUCH LTH-A8645-c15
IZTOUCH Other
IZTOUCH Other1
IZTOUCH ap001
IeGeek Other
IeGeek ukn
Inkovideo V-104
Iprobot3 Other
JRECam JM3866W
JWcam JWEV
JWcam Other
Jaycar 3834
Jaycar 720P
Jaycar Other
Jaycar QC-3831
Jaycar QC-3832
Jaycar QC-3834
Jaycar QC-3836
Jaycar QC-3839
Jaytech IP6021W
JhempCAM Back
JhempCAM Other
KaiKong 1601
KaiKong 1602w
KaiKong Other
KaiKong SIP
KaiKong SIP1602
KaiKong SIP1602W
KaiKong sip
KaiKong sip1602w
Kenton gjc02
Kinson C720PWIP
Klok Other
Knewmart KW01B
Knewmart KW02B
Kogan KAIPC01BLKA
Kogan KAIPCO1BLKA
Kogan Other
Kogan encoder
Kogan kaipc01blkb
Kompernass IUK
Koolertron Other
Koolertron PnP
Koolertron SP-SHEX21-SL
LC+security Other
LW lw-h264tf
LYD H1385H
Lager Other
Leadtek C351
LevelOne 1010/2010
Libor Other
LifeTech MyLifeTech
LifeTech Other
LifeTech dd
Lilly Other
Linq Other
Lloyds 1107
Loftek CXS
Loftek Nexus
Loftek Other
Loftek SPECTOR
Loftek Sendinel
Loftek Sentinel
LogiLink WC0030A
LogiLink wc0044
Logitech C920
MCL 610
MJPEG Other
Maginon 100
Maginon 10AC
Maginon 20C
Maginon IP-20c
Maginon IPC
Maginon IPC-1
Maginon IPC-10
Maginon IPC-100
Maginon IPC-100AC
Maginon IPC-10AC
Maginon IPC-2
Maginon IPC-20
Maginon IPC20C
Maginon IPC_1A
Maginon Other
Maginon SUPRA
Maginon Supra
Maginon ipc
Maginon ipc-1a
Maginon ipc100a
Maginon ipx
Maginon w2
Marmitek GM-8126
Maygion IP
Maygion OTHER2
Maygion Other
Maygion V3
Maygion black
Mediatech mt4050
Medisana SmartBabyMonitor
Merlin IP
Merlin Other
Merlin vstc
Messoa Other
Mingyoushi S6203Y-WR
Momentum 2002
Momentum MO-CAM
NEXCOM S-CAM
NIP NIP-004500-KMTLU
NIP NIP-075007-UPHTF
NIP NIP-11BGPW
NIP NIP-14
NTSE Other
Neewer Other
Neewer V-100
Neo+CoolCam NIP
Neo+CoolCam NIP-02(OAM)
Neo+CoolCam NIP-06
Neo+CoolCam NIP-066777-BWESL
Neo+CoolCam NIP-102428-DFBEF
Neo+CoolCam NIP-H20(OZX)
Neo+CoolCam OBJ-007260-LYLDU
Neo+CoolCam Other
Neo+CoolCam neo
Neo+CoolCam nip-11
Neo+CoolCam nip-20
Ness Other
NetView Other
Netcam Dual-HD
Netcam HSL-232245-CWXES
Netcam OUVIS
Netcam Other
Netware Other
Nexxt+Solution Xpy
Nixzen Other
NorthQ NQ-9006
Office+One CM-I11123BK
Office+One IP-900
Office+One IP-99
Office+One Other
Office+One SC-10IP
Office+One ip-900
Office+One ip900
Opexia OPCS
Optica+Video FI-8903W
Optica+Video FI-8918W
Optica+Video Other
Otto 4eye
Overmax CamSpot
Overmax Camspot
OwlCam CP-6M201W
P2p wificam
PCS Other
Panasonic BL-C131A
PeopleFu IPC-674
PeopleFu IPCAM1
PeopleFu IPCAM2
PeopleFu IPCAM3
PeopleFu IPCAM5
Pixpo 1Z074A2A0301627785
Pixpo PIX006428BFYZY
Pixpo PIX009491MLJYM
Pixpo PIX009495HURFE
Pixpo PIX010584DFACE
Plaisio IP
Planex Other
Planex PLANEX
Polariod P351S
Polaroid IP-100
Polaroid IP-101W
Polaroid IP-200B
Polaroid IP-201B
Polaroid IP-350
Polaroid IP-351S
Polaroid IP-360S
Polaroid IP-810W
Polaroid IP-810WZ
Polaroid Other
Polaroid POLIP101W
Polaroid POLIP201B
Polaroid POLIP201W
Polaroid POLIP351S
Polaroid POLIP35i5
PowerLead Caue
PowerLead PC012
ProveCam IP2521
Provision 717
Provision F-717
Provision F-737
Provision PT-737
Provision WP-711
Provision WP-717P
Pyle HD
Pyle HD22
Pyle HD46
Pyle Mine
Pyle PIPCAM15
Pyle Pipcam12
Pyle cam5
Pyle pipcam25
Pyle pipcam5
Q-nest QN-100S
Q-nest qn-100s
Queback 720p
ROCAM NC-400
ROCAM NC-500
ROCAM NC300
ROCAM NC300-1
ROHS IP
ROHS none
RTX 06R
RTX DVS
RTX IP-06R
RTX IP-26H
RTX Other
Rollei safetycam-10hd
SES Other
SKJM Other
SST SST-CNS-BUI18
SVB+International SIP-018262-RYERR
SafeHome 278042
SafeHome 616-W
SafeHome IP601W-hd
SafeHome Other
SafeHome VGA
SafeHome iprobot
Samsung Other
Santec-Video Other
Sarotech IPCAM-1000
Sarotech ip300
Scricam 004
Scricam 192.168.1.7
Scricam AP-004
Scricam AP-009
Scricam AP0006
Scricam AP006
Secam+CCTV IPCAM
Secam+CCTV Other
Seculink 10709
Seculink Other
Secur+Eye xxc5330
Seisa JK-H616WS
Senao PTZ-01H
Sequrecam Other
Sequrecam PNP-125
Sercomm Other
Shenwhen+Neo+Electronic+Co NC-541
Shenwhen+Neo+Electronic+Co Other
Shenwhen+Neo+Electronic+Co X-5000B
Shenzhen 720P
Shixin+China IP-129HW
Siepem IPC
Siepem S5001Y-BW
Siepem S6203y
Siepem S6211Y-WR
Simi+IP+Camera+Viewer Other
Sineoji Other
Sineoji PT-315V
Sineoji PT-3215P
Sineoji PT-325IP
Sinocam Other
Sky+Genious Genious
Skytronic IP
Skytronic IP99
Skytronic Other
Skytronic WiFi
Skytronic dome
SmartEye Other
SmartWares C723IP
SmartWares c724ip
SmartWares c923ip
SmartWares c924ip
Solwise SEC-1002W-IR
Spy+Cameras WF-100PCX
Spy+Cameras WF-110V
Sricam 0001
Sricam 004
Sricam A0009
Sricam A001
Sricam AP-001
Sricam AP-003
Sricam AP-004
Sricam AP-005
Sricam AP-006
Sricam AP-009
Sricam AP-012
Sricam AP-CAM
Sricam AP0009
Sricam AP002
Sricam AP995
Sricam Cam1
Sricam Front
Sricam Home
Sricam Other
Sricam SP005
Sricam SP012
Sricam SP013
Sricam SP015
Sricam SRICAM
Sricam SRICAM1
Sricam aj-c2wa-c118
Sricam ap
Sricam ap006
Sricam ap1
Sricam h.264
Sricam sp013
Sricctv A-0006
Sricctv A-009
Sricctv AJ-006
Sricctv AP-0001
Sricctv AP-0005
Sricctv AP-0009
Sricctv AP-001
Sricctv AP-002
Sricctv AP-003
Sricctv AP-004
Sricctv AP-004AF
Sricctv AP-005
Sricctv AP-006
Sricctv AP-007
Sricctv AP-008
Sricctv AP-009
Sricctv AP-011
Sricctv AP-014
Sricctv H-264
Sricctv Other
Sricctv P2P-BLACK
Sricctv P2P-Black
Sricctv SP-007
Sricctv SR-001
Sricctv SR-004
Star+Vedia 6836
Star+Vedia 7837-WIP
Star+Vedia C-7835WIP
Star+Vedia Other
Star+Vedia T-6836WTP
Star+Vedia T-7833WIP
Star+Vedia T-7837WIP
Star+Vedia T-7838WIP
StarCam C33-X4
StarCam EY4
StarCam F6836W
StarCam Other
StarCam c7837wip
Stipelectronics Other
Storage+Options HOMEGUARD
Storage+Options Other
Storage+Options SON-IPC1
Sumpple 610
Sumpple 610S
Sumpple 631
Sumpple 960P
Sumpple S601
Sumpple S610
Sumpple S631
Sumpple S651
Sumpple qd300
Sumpple s631
SunVision+US Other
Sunbio Other
Suneyes Other
Suneyes SP-T01EWP
Suneyes SP-T01WP
Suneyes SP-TM01EWP
Suneyes SP-TM01WP
Suneyes SP-tm05wp
Sunluxy H-264
Sunluxy HZCam
Sunluxy Other
Sunluxy PTZ
Sunluxy SL-701
Supra+Space IPC
Supra+Space IPC-1
Supra+Space IPC-100AC
Supra+Space IPC-10AC
Supra+Space Other11
Supra+Space ipc-20c
Sure-Eye Other
Surecom LN-400
Swann 005FTCD
Swann 440
Swann 440-IPC
Swann ADS-440
Swann ADS-440-PTZ
Swann ADS-CAMAX1
Swann Other
Swann SWADS-440-IPC
Swann SWADS-440IPC-AU
Sygonix 43176A
Sygonix 43558A
Szneo CAM0X
Szneo CoolCam
Szneo NIP
Szneo NIP-0
Szneo NIP-02
Szneo NIP-031
Szneo NIP-031H
Szneo NIP-06
Szneo NIP-12
Szneo NIP-2
Szneo NIP-20
Szneo NIP-210485-ABABC
Szneo NIP-26
Szneo NIP-X
Szneo NP-254095
Szneo Other
Szneo TFD
TAS-Tech Other
Technaxx tx-23
Techview GM8126
Techview QC-3638
Techview qc3839
Temvis Other
Tenda C50S
Tenda c30
Tenda c5+
Tenvis 0012
Tenvis 3815
Tenvis 3815-W
Tenvis 3815W
Tenvis 3815W.
Tenvis 3815W2013
Tenvis IP-319W
Tenvis IP-319w
Tenvis IP-391W
Tenvis IP-391WHD
Tenvis IP-602W
Tenvis IP602W
Tenvis IPROBOT
Tenvis JP-3815W
Tenvis JPT-3814WP2P
Tenvis JPT-3815
Tenvis JPT-3815-P2P
Tenvis JPT-3815W
Tenvis JPT-3815W+
Tenvis JPT-3815WP2P
Tenvis JPT-3815w
Tenvis JPT-3818
Tenvis MINI-319W
Tenvis Mini-319
Tenvis Other
Tenvis PT-7131W
Tenvis TH-661
Tenvis TR-3818
Tenvis TR-3828
Tenvis TR3815W
Tenvis TZ100
Tenvis TZ100/IPROBOT3
Tenvus JPG3815W
Threeboy IP-660
Topcam SL-30IPC01Z
Topcam SL-720IPC02Z
Topcam SL-910IW30
Topica+CCTV Other
Trivision NC-335PW-HD-10
Trust NW-7500
Turbo+X Endurance
Turbo+X IIPC-20
Uokoo 720P
VCatch Other
VCatch VC-MIC720HK
Valtronics IP
Valtronics Other
Vandesc IP900
Vantech Other
Vantech PTZ
Videosec+Security IPC-103
Videosec+Security IPP-105
Vimicro Other
Vitek+CCTV Other
Vstarcam 7823
Vstarcam C-7824WIP
Vstarcam C-7833WIP-X4
Vstarcam C-7833wip
Vstarcam C-7837WIP
Vstarcam C-7838WIP
Vstarcam C50S
Vstarcam C7816W
Vstarcam C7824WIP
Vstarcam C782WIP
Vstarcam C7842WIP
Vstarcam C93
Vstarcam C=7824WIP
Vstarcam Cam360
Vstarcam F-6836W
Vstarcam H-6837WI
Vstarcam H-6837WIP
Vstarcam H-6850
Vstarcam H-6850WIP
Vstarcam H-6850wip
Vstarcam ICAM-608
Vstarcam Other
Vstarcam T-6835WIP
Vstarcam T-6836WTP
Vstarcam T-6892wp
Vstarcam T-7815WIP
Vstarcam T-7833WIP
Vstarcam T-7833wip
Vstarcam T-7837WIP
Vstarcam T-7838WIP
Vstarcam T-7892WIP
Vstarcam T6836WTP
Vstarcam T7837WIP
Vstarcam c7815wip
Vstarcam c7833wip
Vstarcam c7850wip
Wanscam 00D6FB01980F
Wanscam 106B
Wanscam 118
Wanscam 541-W
Wanscam 543-W
Wanscam 790
Wanscam AJ-C0WA-198
Wanscam AJ-C0WA-B106
Wanscam AJ-C0WA-B116
Wanscam AJ-C0WA-B168
Wanscam AJ-C0WA-B1D8
Wanscam AJ-C0WA-C0D8
Wanscam AJ-C0WA-C116
Wanscam AJ-C0WA-C126
Wanscam AJ-C2WA-B118
Wanscam AJ-C2WA-C116
Wanscam AJ-C2WA-C118
Wanscam AJ-C2WA-C198
Wanscam AJ-COWA-B1D8
Wanscam AJ-COWA-C116
Wanscam AJ-COWA-C126
Wanscam AJ-COWA-C128
Wanscam AW00004J
Wanscam B1D8-1
Wanscam C-118
Wanscam C-126
Wanscam Colour
Wanscam FI-18904w
Wanscam FR-4020A2
Wanscam FR4020A2
Wanscam HD-100W
Wanscam HW-0021
Wanscam HW-0022
Wanscam HW-0022HD
Wanscam HW-0023
Wanscam HW-0024
Wanscam HW-0025
Wanscam HW-0026
Wanscam HW-0028
Wanscam HW-0033
Wanscam HW-0036
Wanscam HW-0038
Wanscam HW-0039
Wanscam HW-22
Wanscam HW0030
Wanscam IP
Wanscam JW-0001
Wanscam JW-0003
Wanscam JW-0004
Wanscam JW-0004m
Wanscam JW-0005
Wanscam JW-0006
Wanscam JW-0008
Wanscam JW-0009
Wanscam JW-0010
Wanscam JW-0011
Wanscam JW-0011l
Wanscam JW-0012
Wanscam JW-0018
Wanscam JW-004
Wanscam JW-009
Wanscam JW-CD
Wanscam JW000008
Wanscam JW0009
Wanscam JW001
Wanscam JW0012
Wanscam JW008
Wanscam JWEV
Wanscam JWEV-011777-NSRVV
Wanscam JWEV-011921-RXSXT
Wanscam JWEV-360171-BBEAC
Wanscam JWEV-380096-CECDB
Wanscam JWEV-PEPLOW
Wanscam NBC-543W
Wanscam NC-530
Wanscam NC-541
Wanscam NC-541/W
Wanscam NC-541W
Wanscam NC-541w
Wanscam NC-543W
Wanscam NCB-534W
Wanscam NCB-540W
Wanscam NCB-541W
Wanscam NCB-541WB
Wanscam NCB-543W
Wanscam NCBL-618W
Wanscam NCH-532MW
Wanscam NCL-610W
Wanscam NCL-612W
Wanscam NCL-616W
Wanscam NCL-S616W
Wanscam Other
Wanscam TG-002
Wanscam WJ-0004
Wanscam WX-617
Wanscam Works
Wanscam XHA-120903181
Wanscam XHA-4020a2
Wanscam __PTZ
Wanscam chiOthernese
Wanscam ip
Wanscam jw0005
Wanscam jw0010
Wansview 541
Wansview 625W
Wansview MCM-627
Wansview N540w
Wansview NCB-534W
Wansview NCB-541W
Wansview NCB-541w
Wansview NCB-543W
Wansview NCB541W
Wansview NCB545W
Wansview NCL-610W
Wansview NCL610D04
Wansview NCL614W
Wansview Other
Wansview dcs543w
Wansview nc543w
Wardmay+CCTV WDM-6702AL
Watch+bot+Camera resup
WebcamXP Other
WinBook Other
WinBook T-6835
WinBook T-6835WIP
WinBook T-7838
Winic NVT-530004
Wise+Group Other
X-Price Other
X10 39A
X10 AIRSIGHT
X10 AirSight
X10 Airsight
X10 Jake
X10 Other
X10 XC-38A
X10 XX-36A
X10 XX-39A
X10 XX-56A
X10 XX-59A
X10 XX-60
X10 XX-69A
X10 XX41Ahome
XVision Other
XXCamera 53100
XXCamera 5330-E
XXCamera Other
XXCamera XXC-000723-NJFJD
XXCamera XXC-092411-DCAFC
XXCamera XXC-50100-H
XXCamera XXC-50100-T
XXCamera XXC-5030-E
XXCamera XXC-53100-T
XXCamera XXC52130
Xin+Ling Other
Yawcam Other
Zilink Other
Zmodo CMI-11123BK
Zmodo IP-900
Zmodo Other
Zodiac+Security 909
Zodiac+Security Other
Zoneway NC638MW-P
ZyXEL Other
alexim Other
alexim cam22822
alias Other
all+in+one+ Other
all+in+one+ b1
all-in-one Other
allecto DVC-150IP
apc Other
asw-006 Other
boh l
bravo Other
bush+plus BU-300WF
ccam p2p
china 8904W
china HDIPCAM
china IPCAM
china Other
china PTZCAM
china np-02
ciana+exports antani
cina Other
coolead L
coolead L610WS
dax Other
denver IPC-320
denver IPO-320
e-landing 720p
eScam QF100
ebw Other
epexis PIPCAMHD82
epexis pipcam5
esecure nvp
geeya C602
geeya P2P
geeya c801
hdcam Other
homeguard 720P
homeguard Other
homeguard Wireless
homeguard wifi
iView ID002A
iView Other
insteon 75790
insteon 75790wh
insteon High
insteon Other
insteon Wireless
iuk 5A1
ivision hdwificam
iwitness bullet
jwt Other
jyacam JYA8010
kadymay KDM-6800
kadymay KDM6702
kadymay KMD-6800
kadymay Other
kang+xun xxc5030-t
kines Other
kiocong 1601
kiocong 1602
kiocong 1609
kiocong Other
kodak 201pl
koicong 1601
l+series CAM0758
l+series CAM0760
l+series Other
l+series V100
logan n8504hh
meyetech 095475-caeca
meyetech 188091-EFBAE
meyetech Other
meyetech WirelessCam
micasaverde VistaCamSD
pipcam HD17
pni 941w
pni IP451W
pni IP541W
pni IP941W
pni IP951W
pni Other
pnp IP
pnp Other
semac Other
skylink WC-300PS
storex D-10H</code></pre>
<p><strong>Printers</strong></p>
<p>Brother printers including DCP-9020CDW, MFC-9340CDW, MFC-L2700DW, or MFC-J2510 &#8211; <a href="https://www.bleepingcomputer.com/news/security/hundreds-of-printers-expose-backend-panels-and-password-reset-functions-online/" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>HP All in One Printers with Fax capability &#8211; <a href="https://blog.checkpoint.com/2018/08/12/faxploit-hp-printer-fax-exploit/" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>HP PageWide, HP OfficeJet Pro printers &#8211; <a href="https://support.hp.com/lt-en/document/c05462914" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Panasonic Printer &#8211; <a href="https://www.experts-exchange.com/questions/26194395/Default-User-Password-for-Panasonic-DP-C405-Web-Interface.html" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p><strong>Storage</strong></p>
<p>Medion LifeCloud Nas  &#8211; <a href="https://securityaffairs.co/wordpress/77259/hacking/vulnerabilities-nas.html" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Netgear ReadyNAS &#8211; <a href="https://blogs.securiteam.com/index.php/archives/3409" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Netgear Stora  &#8211; <a href="https://securityaffairs.co/wordpress/77259/hacking/vulnerabilities-nas.html" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Seagate Home  &#8211; <a href="https://securityaffairs.co/wordpress/77259/hacking/vulnerabilities-nas.html" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Western Digital My Cloud NAS devices &#8211; <a href="https://www.helpnetsecurity.com/2017/03/08/western-digital-mycloud-nas-vulnerable/" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Western Digital My Book &#8211; <a href="https://securityaffairs.co/wordpress/77259/hacking/vulnerabilities-nas.html" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p><strong>Wireless Routers</strong></p>
<p>Misfortune Cookie Vulnerability, 12 million router &#8211; Long list of routers from Asus to ZTE &#8211; <a href="http://mis.fortunecook.ie/misfortune-cookie-suspected-vulnerable.pdf" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Arris NVG589, NVG599 and possibly other modems, routers, gateways sold for AT&amp;T&#8217;s U-verse service have a <a href="https://threatpost.com/bugs-in-arris-modems-distributed-by-att-vulnerable-to-trivial-attacks/127753/" target="_blank" rel="noopener noreferrer">major security hole.</a> If you have one, you need to update it as soon as possible to software newer than 9.2.2 or apply this <a href="https://www.nomotion.net/blog/sharknatto/" target="_blank" rel="nofollow noopener noreferrer">fix</a>.</p>
<p>CData networking equipment (Cdata, OptiLink, BLIY)- Major backdoors and other issues &#8211; <a href="https://pierrekim.github.io/blog/2020-07-07-cdata-olt-0day-vulnerabilities.html" target="_blank" rel="nofollow noopener noreferrer">Details</a> &#8211; The company says these are counterfeit versions.</p>
<p>Cisco RV110W, RV130W, RV215W &#8211; <a href="https://www.helpnetsecurity.com/2019/02/28/cve-2019-1663/" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Davolink dv2 200 router &#8211; <a href="https://securityaffairs.co/wordpress/74735/hacking/korean-davolink-routers-hack.html" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>D-Link DWR-116, DIR-140L, DIR-640L, DWR-512, DWR-712, DWR-912, DWR-921, DWR-111 and other using similar firmware &#8211; <a href="https://seclists.org/fulldisclosure/2018/Oct/36" target="_blank" rel="noopener noreferrer">Details</a></p>
<p>D-Link DIR-600l -905l &#8211; <a href="https://www.cvedetails.com/cve/cve-2014-8361" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>D-Link DIR-600, DIR-300 &#8211; <a href="http://www.s3cur1ty.de/m1adv2013-003" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Dlink DWR-932B &#8211; <a href="https://pierrekim.github.io/blog/2017-02-02-update-dlink-dwr-932b-lte-routers-vulnerabilities.html" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Dlink 850L &#8211; <a href="https://blogs.securiteam.com/index.php/archives/3364" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>D-Link DSL-2740R, DSL-2640B, DSL-2780B, DSL-2730B, and DSL-526B &#8211; <a href="https://arstechnica.com/information-technology/2018/08/in-the-wild-router-exploit-sends-unwitting-users-to-fake-banking-site/" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Huawei HG532e &#8211; <a href="https://research.checkpoint.com/good-zero-day-skiddie/" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Linksys Wireless Routers Jan 2017 &#8211; <a href="https://www.helpnetsecurity.com/2017/04/20/linksys-smart-wi-fi-routers-vulnerabilities/" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Linksys E1500/E2500 &#8211; <a href="http://www.s3cur1ty.de/m1adv2013-004" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Linksys E Series Routers 2018 &#8211; <a href="https://blog.talosintelligence.com/2018/10/vulnerability-spotlight-linksys-eseries.html" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>MikroTik Routers &#8211; <a href="https://www.bleepingcomputer.com/news/security/massive-coinhive-cryptojacking-campaign-touches-over-200-000-mikrotik-routers/" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Netgear DGN Series- <a href="http://seclists.org/bugtraq/2013/Jun/8" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Netgear Routers &#8211; <a href="https://www.trustwave.com/Resources/SpiderLabs-Blog/Multiple-Vulnerabilities-in-NETGEAR-Routers/" target="_blank" rel="nofollow noopener noreferrer"> 2018 Details</a> &#8211; <a href="https://kb.netgear.com/000061982/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Mobile-Routers-Modems-Gateways-and-Extenders" target="_blank" rel="nofollow noopener noreferrer"> 2020 Details</a></p>
<p>OpenWRT Firmware &#8211; <a href="https://blog.forallsecure.com/uncovering-openwrt-remote-code-execution-cve-2020-7982" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Pulse Secure VPN &#8211; <a href="https://www.us-cert.gov/ncas/alerts/aa20-010a" target="_blank" rel="nofollow noopener noreferrer">Details</a> &#8211; <a href="https://www.zdnet.com/article/hacker-leaks-passwords-for-900-enterprise-vpn-servers/" rel="noopener noreferrer" target="_blank">Passwords Leaked</a></p>
<p>Ruckus &#8211; <a href="https://www.ruckuswireless.com/security" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Sierra LS300, GX400, GX/ES440, GX/ES450, and<br />
RV50 &#8211; Must change default password &#8211; <a href="https://ics-cert.us-cert.gov/alerts/ICS-ALERT-16-286-01" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Tomato Alternative firmware &#8211; <a href="https://unit42.paloaltonetworks.com/muhstik-botnet-attacks-tomato-routers-to-harvest-new-iot-devices/" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>TP Link &#8211; TL-WR841N &#8211; <a href="https://www.tenable.com/security/research/tra-2018-27" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Trendnet TEW-731BR router &#8211; <a href="https://www.rapid7.com/db/modules/exploit/linux/http/realtek_miniigd_upnp_exec_noauth" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Ubiquiti &#8211; <a href="https://www.itworld.com/article/3181832/unpatched-vulnerability-puts-ubiquiti-networking-products-at-risk.html" target="_blank" rel="nofollow noopener noreferrer">Details</a> &#8211; <a href="https://blog.rapid7.com/2019/02/01/ubiquiti-discovery-service-exposures/" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>Zyxel NAS542, NAS540, NAS520, NAS326, NSA325 v2, NSA325, NSA320S, NSA320, NSA310S, NSA310, NSA221, NSA220+, NSA220, and NSA210. &#8211; <a href="https://www.zyxel.com/support/remote-code-execution-vulnerability-of-NAS-products.shtml" target="_blank" rel="nofollow noopener noreferrer">Details</a> &#8211; Older models will not be patched, must keep NAS behind firewall.  Some Zyxel firewalls also have vulnerability. Stop using ones that are not patched. &#8211; <a href="https://krebsonsecurity.com/2020/02/zyxel-0day-affects-its-firewall-products-too/" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p>These routers have uPNP on by default and should not:</p>
<pre><code>ADB Broadband S.p.A,    HomeStation ADSL Router  
ADB Broadband,    ADB ADSL Router  
ADBB,    ADB ADSL Router  
ALSiTEC,    Broadcom ADSL Router  
ASB,    ADSL Router  
ASB,    ChinaNet EPON Router  
ASB,    ChinaTelecom E8C(EPON) Gateway  
Actiontec,    Actiontec GT784WN  
Actiontec,    Verizon ADSL Router  
BEC Technologies Inc.,    Broadcom ADSL Router  
Best IT World India Pvt. Ltd.,    150M Wireless-N ADSL2+ Router  
Best IT World India Pvt. Ltd.,    iB-WRA300N  
Billion Electric Co., Ltd.,    ADSL2+ Firewall Router  
Billion Electric Co., Ltd.,    BiPAC 7800NXL  
Billion,    BiPAC 7700N  
Billion,    BiPAC 7700N R2  
Binatone Telecommunication,    Broadcom LAN Router  
Broadcom,    ADSL Router  
Broadcom,    ADSL2+ 11n WiFi CPE  
Broadcom,    Broadcom  Router  
Broadcom,    Broadcom ADSL Router  
Broadcom,    D-Link DSL-2640B  
Broadcom,    D-link ADSL Router  
Broadcom,    DLink ADSL Router  
ClearAccess,    Broadcom ADSL Router  
Comtrend,    AR-5383n  
Comtrend,    Broadcom ADSL Router  
Comtrend,    Comtrend single-chip ADSL router  
D-Link Corporation.,    D-Link DSL-2640B  
D-Link Corporation.,    D-Link DSL-2641B  
D-Link Corporation.,    D-Link DSL-2740B  
D-Link Corporation.,    D-Link DSL-2750B  
D-Link Corporation.,    D-LinkDSL-2640B  
D-Link Corporation.,    D-LinkDSL-2641B  
D-Link Corporation.,    D-LinkDSL-2741B  
D-Link Corporation.,    DSL-2640B  
D-Link,    ADSL 4*FE 11n Router  
D-Link,    D-Link ADSL Router  
D-Link,    D-Link DSL-2640U  
D-Link,    D-Link DSL-2730B  
D-Link,    D-Link DSL-2730U  
D-Link,    D-Link DSL-2750B  
D-Link,    D-Link DSL-2750U  
D-Link,    D-Link DSL-6751  
D-Link,    D-Link DSL2750U  
D-Link,    D-Link Router  
D-Link,    D-link ADSL Router  
D-Link,    DVA-G3672B-LTT Networks ADSL Router  
DARE,    Dare router  
DLink,    D-Link DSL-2730B  
DLink,    D-Link VDSL Router  
DLink,    DLink ADSL Router  
DQ Technology, Inc.,    ADSL2+ 11n WiFi CPE  
DQ Technology, Inc.,    Broadcom ADSL Router  
DSL,    ADSL Router  
DareGlobal,    D-Link ADSL Router  
Digicom S.p.A.,    ADSL Wireless Modem/Router  
Digicom S.p.A.,    RAW300C-T03  
Dlink,    D-Link DSL-225  
Eltex,    Broadcom ADSL Router  
FiberHome,    Broadcom ADSL Router  
GWD,    ChinaTelecom E8C(EPON) Gateway  
Genew,    Broadcom ADSL Router  
INTEX,    W150D  
INTEX,    W300D  
INTEX,    Wireless N 150 ADSL2+ Modem Router  
INTEX,    Wireless N 300 ADSL2+ Modem Router  
ITI Ltd.,    ITI Ltd.ADSL2Plus Modem/Router  
Inteno,    Broadcom ADSL Router  
Intercross,    Broadcom ADSL Router  
IskraTEL,    Broadcom ADSL Router  
Kasda,    Broadcom ADSL Router  
Link-One,    Modem Roteador Wireless N ADSL2+ 150 Mbps  
Linksys,    Cisco X1000  
Linksys,    Cisco X3500  
NB,    DSL-2740B  
NetComm Wireless Limited,    NetComm ADSL2+ Wireless Router  
NetComm,    NetComm ADSL2+ Wireless Router  
NetComm,    NetComm WiFi Data and VoIP Gateway  
OPTICOM,    DSLink 279  
Opticom,    DSLink 485  
Orcon,    Genius  
QTECH,    QTECH  
Raisecom,    Broadcom ADSL Router  
Ramptel,    300Mbps ADSL Wireless-N Router  
Router,    ADSL2+ Router  
SCTY,    TYKH PON Router  
Star-Net,    Broadcom ADSL Router  
Starbridge Networks,    Broadcom ADSL Router  
TP-LINK Technologies Co., Ltd,    300Mbps Wireless N ADSL2+ Modem Router  
TP-LINK Technologies Co., Ltd,    300Mbps Wireless N USB ADSL2+ Modem Router  
TP-LINK,    TP-LINK Wireless ADSL2+ Modem Router  
TP-LINK,    TP-LINK Wireless ADSL2+ Router  
Technicolor,    CenturyLink TR-064 v4.0  
Tenda,    Tenda ADSL2+ WIFI MODEM  
Tenda,    Tenda ADSL2+ WIFI Router  
Tenda,    Tenda Gateway  
Tenda/Imex,    ADSL2+ WIFI-MODEM WITH 3G/4G USB PORT  
Tenda/Imex,    ADSL2+ WIFI-MODEM WITH EVO SUPPORT  
UTStarcom Inc.,    UTStarcom ADSL2+ Modem Router  
UTStarcom Inc.,    UTStarcom ADSL2+ Modem/Wireless Router  
UniqueNet Solutions,    WLAN N300 ADSL2+ Modem Router  
ZTE,    Broadcom ADSL Router  
ZTE,    ONU Router  
ZYXEL,    ZyXEL VDSL Router  
Zhone,    Broadcom ADSL Router  
Zhone,    Zhone Wireless Gateway  
Zoom,    Zoom Adsl Modem/Router  
ZyXEL,    CenturyLink UPnP v1.0  
ZyXEL,    P-660HN-51  
ZyXEL,    ZyXEL xDSL Router  
huaqin,    HGU210 v3 Router  
iBall Baton,    iBall Baton 150M Wireless-N ADSL2+ Router  
iiNet Limited,    BudiiLite  
iiNet,    BoB2  
iiNet,    BoBLite  </code></pre>
<p><strong>Chips used in many products</strong></p>
<p>Realtek rtl81xx SDK with the miniigd daemon &#8211; <a href="https://www.rapid7.com/db/modules/exploit/linux/http/realtek_miniigd_upnp_exec_noauth" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p><strong>Motherboards</strong></p>
<p>SuperMicro BMC &#8211; <a href="https://www.tripwire.com/state-of-security/latest-security-news/vert-alert-supermicro-ipmibmc-plaintext-password-disclosure/" target="_blank" rel="nofollow noopener noreferrer">Details</a></p>
<p><strong>General Internet of Things Security Tips</strong></p>
<p>&nbsp;</p>
<p><b>Securing Wearable Technology Fitness Devices</b></p>
<p>Fitness trackers like the Fitbit, Vivosmart, Jawbone Up, Apple Watch, etc connect via Bluetooth.  Some devices use a fixed Bluetooth MAC address, allow criminals or law enforcement to identify you, wherever you go.</p>
<p>More secure fitness trackers like the Apple Watch protect users against tracking by switching the devices address every 10 minutes.</p>
<p>Look for updates from your fitness device&#8217;s website to address this issue. Garmin has issued updates to fix this issue.</p>
<p><strong>Federal Trade Commission Makes Asus Improve Router Security</strong></p>
<p>In February 2016, the <a href="https://www.ftc.gov/news-events/press-releases/2016/02/asus-settles-ftc-charges-insecure-home-routers-cloud-services-put" target="_blank" rel="nofollow noopener noreferrer">Federal Trade Commission settled charges with Asus</a>, over critical security flaws in its routers that put the home networks of hundreds of thousands of consumers at risk.</p>
<p><strong>Finally!</strong>, the government is forcing these manufacturers to fix wireless routers that can be come huge security holes. This precedent should cause Internet of Things makers to also fix issues, or be subject to lawsuits.</p>
<p><strong>Conclusion</strong></p>
<p>IOT devices are great, but introduce a new level of complexity and security holes for hackers to break in.</p>
<p>Do you worry about getting hacked through your gadgets?</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.safegadget.com/139/hacked-internet-things-database/feed/</wfw:commentRss>
			<slash:comments>8</slash:comments>
		
		
			</item>
		<item>
		<title>How to: Safe Online Banking and Online Trading</title>
		<link>https://www.safegadget.com/48/how-to-safe-online-banking-and-online-trading/</link>
					<comments>https://www.safegadget.com/48/how-to-safe-online-banking-and-online-trading/#comments</comments>
		
		<dc:creator><![CDATA[SafeGadget]]></dc:creator>
		<pubDate>Wed, 01 Jan 2020 08:00:44 +0000</pubDate>
				<category><![CDATA[Browser]]></category>
		<category><![CDATA[Computer Software]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Online Service]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[online banking]]></category>
		<category><![CDATA[Online trading]]></category>
		<category><![CDATA[two factor authentication]]></category>
		<guid isPermaLink="false">http://www.safegadget.com/?p=48</guid>

					<description><![CDATA[Last Update: 1/23/2020 Online banking and online trading have been gaining market share every year. Security breaches make headlines almost daily. With more and more people going online, consumers are worried more than ever about keeping their online banking and online trading safe and secure. In this article, we will help you bank and trade &#8230; <a href="https://www.safegadget.com/48/how-to-safe-online-banking-and-online-trading/" class="more-link">Continue reading<span class="screen-reader-text"> "How to: Safe Online Banking and Online Trading"</span></a>]]></description>
										<content:encoded><![CDATA[<p>Last Update: 1/23/2020</p>
<p><img loading="lazy" decoding="async" src="http://www.safegadget.com/i/computers/PC-Desktop-Computer.jpg" alt="PC, desktop computer" width="400" height="267" /></p>
<p>Online banking and online trading have been gaining market share every year. Security breaches make headlines almost daily. With more and more people going online, consumers are worried more than ever about keeping their online banking and online trading safe and secure. In this article, we will help you bank and trade more securely.</p>
<p><strong>Secure your computer, web browser, Internet connection<br />
</strong></p>
<p>Follow our guides to <a title="How to: Internet Security and Windows Security Made Easy" href="http://www.safegadget.com/16/how-to-internet-security-and-windows-security-made-easy/">secure your Windows PC</a> or <a title="Free Security How to: Computer Security, Computer Protection on Macintosh" href="http://www.safegadget.com/30/free-security-how-to-computer-security-computer-protection-on-macintosh/">secure your Macintosh</a> by installing the right software, firewall, antivirus software, etc. Secure your mobile devices: <a title="iPhone Security, How to securely use your iPhone" href="http://www.safegadget.com/51/iphone-security-how-to-securely-use-your-iphone/">iPhone</a>, <a title="Android Smartphone Security, How to securely use your Android Smartphone or Tablet" href="http://www.safegadget.com/54/android-smartphone-security-how-to-securely-use-your-android-smartphone/">Android smartphone or tablet</a>, <a title="iPad Security, How to securely use your iPad" href="http://www.safegadget.com/53/ipad-security-how-to-securely-use-your-ipad/">iPad</a>. Configure the settings and add plug-ins to you web browser so that it is more secure. Consult our tutorials for: <a title="Secure Internet Explorer 9 Browsing" href="http://www.safegadget.com/41/secure-internet-explorer-9-browsing/">Internet Explorer 9</a>, <a title="Secure Google Chrome Browsing" href="http://www.safegadget.com/45/secure-google-chrome-browsing/">Google Chrome</a>, and <a title="Secure Firefox Browsing" href="http://www.safegadget.com/44/secure-firefox-browsing/">Mozilla Firefox</a>. Secure your Internet Connection: <a title="How to Setup a Secure Wireless Network Router" href="http://www.safegadget.com/28/how-to-setup-a-secure-wireless-network-router/">Wireless Network</a>, Public Wi-Fi.</p>
<p>1. Configure your wireless router for optimal security. Consult our article <a href="http://www.safegadget.com/28/how-to-setup-a-secure-wireless-network-router/">How to set up a secure wireless router</a> for details. For maximum security, do your online banking and online trading when connected by a hardwired connection such as Ethernet.</p>
<p>2. Ensure that your operating system is set up securely. Consult our <a title="How to: Internet Security and Windows Security Made Easy" href="http://www.safegadget.com/16/how-to-internet-security-and-windows-security-made-easy/">computer security guides for Windows</a> and <a title="Free Security How to: Computer Security, Computer Protection on Macintosh" href="http://www.safegadget.com/30/free-security-how-to-computer-security-computer-protection-on-macintosh/">Macintosh</a>. For maximum security, you could <a href="http://www.safegadget.com/35/how-to-use-linux-for-more-secure-computing/">start off a Linux boot CD or USB key</a>.</p>
<p>Burning Linux Live CD to a write only media such as a CD/DVD or a <a href="https://www.amazon.com/Kanguru-FlashTrust-WP-KFT3-Drive-WP-KFT3-8G/dp/B00NW4P9A2/" target="_blank" rel="nofollow noopener noreferrer">USB drive with Write protect switch</a>, helps prevent any changes to a virgin Linux distribution. Keep in mind that no bookmarks, password managers, etc would be accessible.</p>
<p>The CD versions do take many minutes to boot up and ask you if you want to try Linux, so the USB route is definitely preferred.</p>
<p><span id="more-48"></span></p>
<p>3. Secure your Internet browser. Consult our <a title="Secure Internet Explorer 9 Browsing" href="http://www.safegadget.com/41/secure-internet-explorer-9-browsing/">security guides to Internet Explorer</a>, <a title="Secure Google Chrome Browsing" href="http://www.safegadget.com/44/secure-Google Chrome-browsing/">Google Chrome</a>, and <a title="Secure Google Chrome Browsing" href="http://www.safegadget.com/45/secure-google-chrome-browsing/">Google Chrome</a>.</p>
<p>4. Make sure you are accessing the online banking or trading website is using a secure connection, look for <strong>https://</strong> in the browser&#8217;s address bar and a padlock icon <img loading="lazy" decoding="async" title="https secure browsing, padlock icon" src="http://www.safegadget.com/favicon.ico" alt="" width="16" height="16" /> in the browser. A broken key, broken padlock, or any open lock indicates it is not secure. If you want to ensure security, see if the bank or brokerage takes transactions over the phone.</p>
<p>5. When creating an account at the online bank or brokerage, we recommend you use a <strong>unique</strong> password as it is far safer in case the website gets hacked. You would not want hackers to get a password that worked on other websites. Consult our <a href="http://www.safegadget.com/34/how-to-create-store-and-use-secure-passwords/">How to create, store and use secure passwords</a> article for suggestions.</p>
<p>6. Sign up for alerts from your bank or brokerage by email or text message. This will allow you to respond to any fraud rapidly. Also carefully check each month&#8217;s statement for erroneous or fraudulent transactions. Consider checking your outstanding transactions every couple of weeks via the company&#8217;s website.</p>
<p>7. <em>Two factor authentication</em> is available from many banks and brokerage houses. Bank of America, Citi, Schwab, Fidelity Investments, and several other companies have this available, so check with your representative. This technique forces the use of both a password and a number generated by the hardware security token in your position, both are needed in order to log in. Clearly if criminals got a hold of your password, they would not be able to login.</p>
<p><a href="https://arstechnica.com/security/2017/05/thieves-drain-2fa-protected-bank-accounts-by-abusing-ss7-routing-protocol/" target="_blank" rel="nofollow noopener noreferrer">Two factor authentication systems using SMS text messages are not secure</a>, due to hijacking of mobile phone accounts and the weak SS7 routing system. Even <a href="https://www.cnbc.com/2018/08/01/reddit-hack-shows-even-strong-security-measures-can-be-bypassed.html" target="_blank" rel="nofollow noopener noreferrer">Reddit</a> got hacked this way. We suggest <strong>only</strong> using two factor when you can use a physical token or a time based <a href="https://www.safegadget.com/139/hacked-internet-things-database/" target="_blank" rel="nofollow noopener noreferrer">authenticator like Google&#8217;s</a>. Send text messages to a VoIP number such as Google Voice  instead. Do not allow Google Voice to forwards Texts/Calls to your main number.</p>
<ul>
<li>A <a href="https://www.issms2fasecure.com/assets/sim_swaps-01-10-2020.pdf" target="_blank" rel="nofollow noopener noreferrer">new paper</a> in 2020 from Princeton researchers shows how easy it is to pull off a SIM Swap against AT&amp;T, Verizon, T-Mobile and others.</li>
</ul>
<p>8. To avoid falling victim to e-mail phishing, <strong>never</strong> click a link or open an attachment from an e-mail. This is especially true for online banks and online brokerages. Manually type the URL into your browser.</p>
<p><strong>Opening Attachments Safely with Gmail</strong></p>
<p>Forward the email with attachment to a Gmail account.  From there, you can use Google Docs to open Word Processing, Spreadsheets, etc.  No need to endanger your own computer.</p>
<p>9.<a href="https://www.microsoft.com/download/en/details.aspx?id=11575#overview" target="_blank" rel="nofollow noopener noreferrer">Internet Explorer Virtual Machine</a> &#8211; Designed for web developers to test compatibility with different versions of Internet Explorer, these Virtual Machines for Microsoft&#8217;s Virtual PC allow you to run a Virtual computer on your desktop with Internet Explorer pre-installed. If you mess up the Virtual computer, you can just delete it and start fresh from a new image. You can perform your online banking and trading within the virtual machine to increase security.</p>
<p>10. When banking or trading on a smartphone or tablet, using the built in 3G/4G connection is a lot safer than connecting via a local wireless internet hotspot. This warning applies to both apps and mobile internet browsers.</p>
<p>11. Explicitly logout after you are finished.  Do not just close the browser.  This helps terminate your session officially.</p>
<p><strong>Things Not To Do</strong></p>
<p>1. Do not bank or trade when using public wifi hot spots or when using a shared computer in a cyber cafe. Many of these locations provide little to no security and are prone to snooping or malware. This warning also includes smartphones and tablets connected to public wireless internet.</p>
<p>Do these safeguards make sense?</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.safegadget.com/48/how-to-safe-online-banking-and-online-trading/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Facebook Privacy Settings to Limit Sharing</title>
		<link>https://www.safegadget.com/444/facebook-privacy-setting/</link>
					<comments>https://www.safegadget.com/444/facebook-privacy-setting/#comments</comments>
		
		<dc:creator><![CDATA[SafeGadget]]></dc:creator>
		<pubDate>Wed, 02 Jan 2019 17:30:31 +0000</pubDate>
				<category><![CDATA[Browser]]></category>
		<category><![CDATA[Firefox]]></category>
		<category><![CDATA[Google Chrome]]></category>
		<category><![CDATA[Internet Explorer]]></category>
		<category><![CDATA[Online Service]]></category>
		<category><![CDATA[Safari]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Facebook App]]></category>
		<category><![CDATA[Messenger]]></category>
		<category><![CDATA[Opt out]]></category>
		<category><![CDATA[privacy]]></category>
		<guid isPermaLink="false">https://www.safegadget.com/?p=444</guid>

					<description><![CDATA[Last Updated: 10/18/2018 Note: Facebook has committed to making these settings easier to find, so there may be some variance in what we depict below. A September 2018 security hole in Facebook allowed 50 Million accounts to be accessed by hackers.  Check to see if you were affected. Facebook reached a new low in March &#8230; <a href="https://www.safegadget.com/444/facebook-privacy-setting/" class="more-link">Continue reading<span class="screen-reader-text"> "Facebook Privacy Settings to Limit Sharing"</span></a>]]></description>
										<content:encoded><![CDATA[<p>Last Updated: 10/18/2018</p>
<p><em><strong>Note:</strong></em> Facebook has committed to making these settings easier to find, so there may be some variance in what we depict below.</p>
<p><a href="https://www.safegadget.com/wp-content/uploads/2018/03/facebook-logo.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-446" src="https://www.safegadget.com/wp-content/uploads/2018/03/facebook-logo.png" alt="" width="250" height="250" srcset="https://www.safegadget.com/wp-content/uploads/2018/03/facebook-logo.png 250w, https://www.safegadget.com/wp-content/uploads/2018/03/facebook-logo-150x150.png 150w" sizes="auto, (max-width: 250px) 85vw, 250px" /></a></p>
<p>A <a href="https://www.facebook.com/help/securitynotice?ref=sec" target="_blank" rel="nofollow noopener noreferrer">September 2018 security hole</a> in Facebook allowed 50 Million accounts to be accessed by hackers.  Check to see if you were affected.</p>
<p>Facebook reached a new low in March 2018. A <a href="https://www.theatlantic.com/technology/archive/2018/03/data-misuse-bigger-than-facebook/556310/" target="_blank" rel="nofollow noopener noreferrer">massive data compromise</a> was exposed that allowed Cambridge Analytica to obtain extensive psychographic information about 50 million Facebook users in 2014. This data was probably used to manipulate the 2016 Presidential elections.</p>
<p>Let&#8217;s be honest, in exchange for using this <strong>FREE</strong> service, you upload text, pictures, videos for Facebook <em>to learn more about you</em>. They then use this <em><strong>personal</strong> </em>information to sell ads and more.  <em>There is no free lunch</em>. Facebook is a money making machine, <strong>not your friend</strong>.</p>
<p>Short of deleting Facebook and Facebook messenger, This is how you can adjust your Facebook Privacy Settings to protect yourself.</p>
<p><b>Two Factor Authentication</b></p>
<p>In September 2018 it became know that Facebook uses your second factor authentication for advertising purposes!  Do not use your phone number or another email address, instead use the option of employing Google Authenticator.</p>
<p><span id="more-444"></span></p>
<p><strong>Important: You need to make change at both Facebook.com AND inside the Facebook App</strong></p>
<p><strong>Adjust Facebook.com Website Settings</strong></p>
<p>Remove any friends you do not really know.  They can send you scams or other information with out being filtered.</p>
<p>Login to Facebook, Open the  <a href="https://www.facebook.com/settings?tab=applications" target="_blank" rel="nofollow noopener noreferrer">App Settings Page</a></p>
<p><a href="https://www.safegadget.com/wp-content/uploads/2018/03/Facebook-App-Settings.png"><img loading="lazy" decoding="async" class="aligncenter wp-image-447 size-full" src="https://www.safegadget.com/wp-content/uploads/2018/03/Facebook-App-Settings.png" alt="" width="627" height="556" srcset="https://www.safegadget.com/wp-content/uploads/2018/03/Facebook-App-Settings.png 627w, https://www.safegadget.com/wp-content/uploads/2018/03/Facebook-App-Settings-300x266.png 300w" sizes="auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px" /></a></p>
<p>Click <strong>Edit</strong> in the<em> Apps, Websites and Plugins</em> box.</p>
<p>Also set <strong>Old Versions of Facebook for Mobile</strong> to <strong>Only me</strong></p>
<p><a href="https://www.safegadget.com/wp-content/uploads/2018/03/facebook-disable-platform.png"><img loading="lazy" decoding="async" class="aligncenter wp-image-448 size-full" src="https://www.safegadget.com/wp-content/uploads/2018/03/facebook-disable-platform.png" alt="" width="452" height="503" srcset="https://www.safegadget.com/wp-content/uploads/2018/03/facebook-disable-platform.png 452w, https://www.safegadget.com/wp-content/uploads/2018/03/facebook-disable-platform-270x300.png 270w" sizes="auto, (max-width: 452px) 85vw, 452px" /></a></p>
<p>Click <strong>Disable Platform</strong></p>
<p>This will prevent Facebook from sharing your data with other apps and websites. You also cannot use your Facebook login to login to other sites any more.</p>
<p>If you want to still allow using Platform but want to lock down what is shared, instead of Disable Platform, select <strong>Edit</strong> under <em>Apps Other Use</em>.</p>
<p><a href="https://www.safegadget.com/wp-content/uploads/2018/03/Facebook-Limit-Privacy-Apps-Other-Use.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-449" src="https://www.safegadget.com/wp-content/uploads/2018/03/Facebook-Limit-Privacy-Apps-Other-Use.png" alt="" width="455" height="458" srcset="https://www.safegadget.com/wp-content/uploads/2018/03/Facebook-Limit-Privacy-Apps-Other-Use.png 455w, https://www.safegadget.com/wp-content/uploads/2018/03/Facebook-Limit-Privacy-Apps-Other-Use-150x150.png 150w, https://www.safegadget.com/wp-content/uploads/2018/03/Facebook-Limit-Privacy-Apps-Other-Use-298x300.png 298w" sizes="auto, (max-width: 455px) 85vw, 455px" /></a></p>
<p>We recommend Unchecking EVERY box and hitting <strong>Save</strong></p>
<p><strong>Adjust Facebook Ad Settings</strong></p>
<p><a href="https://www.safegadget.com/wp-content/uploads/2018/03/facebook-privacy-edit-Ad-settings.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-454" src="https://www.safegadget.com/wp-content/uploads/2018/03/facebook-privacy-edit-Ad-settings.png" alt="" width="1003" height="394" srcset="https://www.safegadget.com/wp-content/uploads/2018/03/facebook-privacy-edit-Ad-settings.png 1003w, https://www.safegadget.com/wp-content/uploads/2018/03/facebook-privacy-edit-Ad-settings-300x118.png 300w, https://www.safegadget.com/wp-content/uploads/2018/03/facebook-privacy-edit-Ad-settings-768x302.png 768w" sizes="auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px" /></a></p>
<p>Click on <strong>Ads</strong> in the lower left area of the <a href="https://www.facebook.com/settings" target="_blank" rel="nofollow noopener noreferrer">Facebook Settings Page</a></p>
<p><a href="https://www.safegadget.com/wp-content/uploads/2018/03/Adjust-Facebook-ad-settings-for-privacy.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-450" src="https://www.safegadget.com/wp-content/uploads/2018/03/Adjust-Facebook-ad-settings-for-privacy.png" alt="" width="397" height="548" srcset="https://www.safegadget.com/wp-content/uploads/2018/03/Adjust-Facebook-ad-settings-for-privacy.png 397w, https://www.safegadget.com/wp-content/uploads/2018/03/Adjust-Facebook-ad-settings-for-privacy-217x300.png 217w" sizes="auto, (max-width: 397px) 85vw, 397px" /></a></p>
<p>For <strong>Advertisers you&#8217;ve interacted with</strong> &#8211; Click the triangle in the right side, to show the settings. Click on every company to disable this.</p>
<p><a href="https://www.safegadget.com/wp-content/uploads/2018/03/facebook-privacy-limit-your-interests.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-451" src="https://www.safegadget.com/wp-content/uploads/2018/03/facebook-privacy-limit-your-interests.png" alt="" width="1003" height="621" srcset="https://www.safegadget.com/wp-content/uploads/2018/03/facebook-privacy-limit-your-interests.png 1003w, https://www.safegadget.com/wp-content/uploads/2018/03/facebook-privacy-limit-your-interests-300x186.png 300w, https://www.safegadget.com/wp-content/uploads/2018/03/facebook-privacy-limit-your-interests-768x476.png 768w" sizes="auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px" /></a></p>
<p>For <strong>Your Information</strong> &#8211; Click the triangle in the right side, to show the settings. Turn off everything. Also click the <strong>Your categories</strong> tab and turn off EVERYTHING. Pretty scary?</p>
<p><a href="https://www.safegadget.com/wp-content/uploads/2018/03/Facebook-privacy-limit-sharing-Your-Information.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-453" src="https://www.safegadget.com/wp-content/uploads/2018/03/Facebook-privacy-limit-sharing-Your-Information.png" alt="" width="992" height="521" srcset="https://www.safegadget.com/wp-content/uploads/2018/03/Facebook-privacy-limit-sharing-Your-Information.png 992w, https://www.safegadget.com/wp-content/uploads/2018/03/Facebook-privacy-limit-sharing-Your-Information-300x158.png 300w, https://www.safegadget.com/wp-content/uploads/2018/03/Facebook-privacy-limit-sharing-Your-Information-768x403.png 768w" sizes="auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px" /></a></p>
<p>For <strong>Your Ad Settings</strong> &#8211; Click the triangle in the right side, to show the settings. Turn off everything.</p>
<p><a href="https://www.safegadget.com/wp-content/uploads/2018/03/facebook-privacy-edit-Ad-settings-1.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-455" src="https://www.safegadget.com/wp-content/uploads/2018/03/facebook-privacy-edit-Ad-settings-1.png" alt="" width="1003" height="394" srcset="https://www.safegadget.com/wp-content/uploads/2018/03/facebook-privacy-edit-Ad-settings-1.png 1003w, https://www.safegadget.com/wp-content/uploads/2018/03/facebook-privacy-edit-Ad-settings-1-300x118.png 300w, https://www.safegadget.com/wp-content/uploads/2018/03/facebook-privacy-edit-Ad-settings-1-768x302.png 768w" sizes="auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px" /></a></p>
<p>For <strong>Hide Ad topics</strong> &#8211; Click the triangle in the right side, to show the settings. Set all of them to <strong>Permanently</strong></p>
<p><a href="https://www.safegadget.com/wp-content/uploads/2018/03/Facebook-privacy-Hide-Ad-topics.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-456" src="https://www.safegadget.com/wp-content/uploads/2018/03/Facebook-privacy-Hide-Ad-topics.png" alt="" width="992" height="334" srcset="https://www.safegadget.com/wp-content/uploads/2018/03/Facebook-privacy-Hide-Ad-topics.png 992w, https://www.safegadget.com/wp-content/uploads/2018/03/Facebook-privacy-Hide-Ad-topics-300x101.png 300w, https://www.safegadget.com/wp-content/uploads/2018/03/Facebook-privacy-Hide-Ad-topics-768x259.png 768w" sizes="auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px" /></a>.</p>
<p><strong>Facebook Privacy Settings and Tools</strong></p>
<p>Visit the <a href="https://www.facebook.com/settings?tab=privacy&amp;view" target="_blank" rel="noopener noreferrer">Facebook Privacy Page</a> to lock down its settings.</p>
<p><a href="https://www.safegadget.com/wp-content/uploads/2018/03/facebook-privacy-settings-and-tools-lockdown.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-457" src="https://www.safegadget.com/wp-content/uploads/2018/03/facebook-privacy-settings-and-tools-lockdown.png" alt="" width="993" height="524" srcset="https://www.safegadget.com/wp-content/uploads/2018/03/facebook-privacy-settings-and-tools-lockdown.png 993w, https://www.safegadget.com/wp-content/uploads/2018/03/facebook-privacy-settings-and-tools-lockdown-300x158.png 300w, https://www.safegadget.com/wp-content/uploads/2018/03/facebook-privacy-settings-and-tools-lockdown-768x405.png 768w" sizes="auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px" /></a></p>
<p>Adjust the settings so it looks like our screen. This was the best we could do. Make sure you have a bogus phone number in Facebook. <strong>Do not</strong> allow search engines outside of Facebook to link to your profile.</p>
<p><strong>Change your birthday so it is a day earlier</strong></p>
<p>Click the <strong>Use Activity Log</strong> link and <strong>remove</strong> yourself from any posts you have been tagged in.</p>
<p><strong>Turn off Face Recognition</strong></p>
<p>Visit the <a href="https://www.facebook.com/settings?tab=facerec&amp;view" target="_blank" rel="nofollow noopener noreferrer">Face Recognition Settings</a> and turn it to <strong>No</strong></p>
<p><strong>Adjust Timeline and Tagging Settings</strong></p>
<p>Visit the <a href="https://www.facebook.com/settings?tab=timeline" target="_blank" rel="nofollow noopener noreferrer">Timeline and Tagging Settings</a> and adjust it to the following:</p>
<p><a href="https://www.safegadget.com/wp-content/uploads/2018/03/facebook-limit-privacy-settings-timeline-and-tagging.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-458" src="https://www.safegadget.com/wp-content/uploads/2018/03/facebook-limit-privacy-settings-timeline-and-tagging.png" alt="" width="991" height="432" srcset="https://www.safegadget.com/wp-content/uploads/2018/03/facebook-limit-privacy-settings-timeline-and-tagging.png 991w, https://www.safegadget.com/wp-content/uploads/2018/03/facebook-limit-privacy-settings-timeline-and-tagging-300x131.png 300w, https://www.safegadget.com/wp-content/uploads/2018/03/facebook-limit-privacy-settings-timeline-and-tagging-768x335.png 768w" sizes="auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px" /></a></p>
<p><strong>Remove Facebook Likes</strong></p>
<p>Click <strong>Timeline</strong> on your personal Facebook Page</p>
<p>Click <strong>More</strong> in the middle area and select <strong>Likes</strong></p>
<p><a href="https://www.safegadget.com/wp-content/uploads/2018/03/facebook-remove-likes.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-459" src="https://www.safegadget.com/wp-content/uploads/2018/03/facebook-remove-likes.png" alt="" width="874" height="456" srcset="https://www.safegadget.com/wp-content/uploads/2018/03/facebook-remove-likes.png 874w, https://www.safegadget.com/wp-content/uploads/2018/03/facebook-remove-likes-300x157.png 300w, https://www.safegadget.com/wp-content/uploads/2018/03/facebook-remove-likes-768x401.png 768w" sizes="auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px" /></a></p>
<p>Remove the Likes for as many items as possible! Delete TV Shows, Books, Events, Questions, Reviews and Movies from the list</p>
<p><strong>Facebook Mobile App Privacy Lockdown</strong></p>
<p>The above settings affect the Facebook App, but there are additional settings that need to be set in the App.</p>
<p><strong>Prevent Facebook from using your Location</strong></p>
<p>Facebook&#8217;s App can use your location even when you are not running it.</p>
<p>To disable it in iOS:</p>
<ul>
<li> Settings &#8211; Privacy &#8211; Location Services -Facebook &#8211;  Never or While Using App</li>
</ul>
<p>To disable it in Android:</p>
<ul>
<li>Settings &#8211; Apps &#8211; Facebook &#8211; Permissions &#8211; Location &#8211; Off</li>
</ul>
<p><strong>Remove Uploaded Contacts from Facebook</strong></p>
<p><a href="https://www.facebook.com/invite_history.php" target="_blank" rel="noopener noreferrer">Click</a> here to visit the  page to remove uploaded contacts in Facebook.</p>
<p>Prevent Facebook from continuously uploading new contacts from your phone.</p>
<p><a href="https://www.safegadget.com/wp-content/uploads/2018/03/IMG_3051.png"><img loading="lazy" decoding="async" class="aligncenter wp-image-461 " src="https://www.safegadget.com/wp-content/uploads/2018/03/IMG_3051-473x1024.png" alt="" width="216" height="544" /></a></p>
<p>T<strong>urn off</strong> Upload contacts if you use the Facebook App, it is located at:</p>
<ul>
<li>3 lines in lower right corner of Faceebok App, <strong>Settings</strong>, <strong>Account settings</strong>, <strong>General</strong>, <strong>Upload contacts</strong></li>
<li><a href="https://www.facebook.com/help/838237596230667" target="_blank" rel="nofollow noopener noreferrer">Facebook</a> has a page to help you prevent syncing of contacts to Messenger. <a href="https://newsroom.fb.com/news/2018/03/fact-check-your-call-and-sms-history/" target="_blank" rel="nofollow noopener noreferrer">Details</a> on the issue with Facebook looking at all your calls</li>
</ul>
<p><strong>Adjust who can see your posts from New Feed or Profile</strong></p>
<p><a href="https://www.safegadget.com/wp-content/uploads/2018/03/IMG_3052.png"><img loading="lazy" decoding="async" class="size-medium wp-image-462 aligncenter" src="https://www.safegadget.com/wp-content/uploads/2018/03/IMG_3052-139x300.png" alt="" width="139" height="300" srcset="https://www.safegadget.com/wp-content/uploads/2018/03/IMG_3052-139x300.png 139w, https://www.safegadget.com/wp-content/uploads/2018/03/IMG_3052-768x1663.png 768w, https://www.safegadget.com/wp-content/uploads/2018/03/IMG_3052-473x1024.png 473w, https://www.safegadget.com/wp-content/uploads/2018/03/IMG_3052.png 1125w" sizes="auto, (max-width: 139px) 85vw, 139px" /></a></p>
<ul>
<li>Select 3 lines in lower right corner of Facebook App, <strong>Settings</strong>, <strong>Account settings</strong>, <strong>General, Privacy, Check a Few Important Settings</strong></li>
</ul>
<p>Select Friends or Only me</p>
<p>On the next screen for <strong>Posts</strong>, also select Friends or Only me</p>
<p>The next screen will then be <strong>Profile</strong></p>
<p><strong>Lock Down your Profile</strong></p>
<p><a href="https://www.safegadget.com/wp-content/uploads/2018/03/IMG_3053.png"><img loading="lazy" decoding="async" class="alignnone size-large wp-image-463" src="https://www.safegadget.com/wp-content/uploads/2018/03/IMG_3053-473x1024.png" alt="" width="473" height="1024" srcset="https://www.safegadget.com/wp-content/uploads/2018/03/IMG_3053-473x1024.png 473w, https://www.safegadget.com/wp-content/uploads/2018/03/IMG_3053-139x300.png 139w, https://www.safegadget.com/wp-content/uploads/2018/03/IMG_3053-768x1663.png 768w, https://www.safegadget.com/wp-content/uploads/2018/03/IMG_3053.png 1125w" sizes="auto, (max-width: 473px) 85vw, 473px" /></a></p>
<p>Select the appropriate level of lockdown for each item. <strong>Only me</strong> would be most secure.</p>
<p>The Next screen would be <strong>Apps</strong></p>
<p><strong>Remove Unnecessary Apps</strong></p>
<p><a href="https://www.safegadget.com/wp-content/uploads/2018/03/IMG_3055.png"><img loading="lazy" decoding="async" class="wp-image-464 aligncenter" src="https://www.safegadget.com/wp-content/uploads/2018/03/IMG_3055-473x1024.png" alt="" width="279" height="732" /></a></p>
<p>Click the X next to apps you no longer need.</p>
<p><strong>Timeline and Tagging</strong></p>
<ul>
<li>Select 3 lines in lower right corner of Facebook App, <strong>Settings</strong>, <strong>Account settings</strong>, <b>Timeline and Tagging</b></li>
</ul>
<p><a href="https://www.safegadget.com/wp-content/uploads/2018/03/IMG_3056.png"><img loading="lazy" decoding="async" class=" wp-image-465 aligncenter" src="https://www.safegadget.com/wp-content/uploads/2018/03/IMG_3056-473x1024.png" alt="" width="349" height="816" /></a></p>
<p>Adjust Time line and Tagging to:<strong> Only me </strong>for all settings</p>
<p>Change the 2 Review settings to: <strong>On</strong></p>
<p><strong>Limit Facebook Location Data</strong></p>
<ul>
<li>Select 3 lines in lower right corner of Facebook App, <strong>Settings</strong>, <strong>Account settings</strong>, <b>Location</b></li>
</ul>
<p><a href="https://www.safegadget.com/wp-content/uploads/2018/03/IMG_3057.png"><img loading="lazy" decoding="async" class="wp-image-467 aligncenter" src="https://www.safegadget.com/wp-content/uploads/2018/03/IMG_3057-473x1024.png" alt="" width="370" height="911" /></a></p>
<p>Do not allow Facebook to save your location, do not share location with Nearby Friends, Do not Find Wi-Fi</p>
<p><strong>Adjust Public Posts</strong></p>
<p>&nbsp;</p>
<ul>
<li>Select 3 lines in lower right corner of Facebook App, <strong>Settings</strong>, <strong>Account settings</strong>, <b>Public Posts</b></li>
</ul>
<p><a href="https://www.safegadget.com/wp-content/uploads/2018/03/IMG_3059.png"><img loading="lazy" decoding="async" class=" wp-image-468 aligncenter" src="https://www.safegadget.com/wp-content/uploads/2018/03/IMG_3059-473x1024.png" alt="" width="296" height="830" /></a></p>
<p>Adjust these settings to something less than <strong>Public</strong></p>
<p><strong>Interests</strong></p>
<ul>
<li>Select 3 lines in lower right corner of Facebook App, <strong>Settings</strong>, <strong>Account settings</strong>, <b>Ad Preferences</b></li>
</ul>
<p><strong><a href="https://www.safegadget.com/wp-content/uploads/2018/03/IMG_3061.png"><img loading="lazy" decoding="async" class=" wp-image-469 aligncenter" src="https://www.safegadget.com/wp-content/uploads/2018/03/IMG_3061-473x1024.png" alt="" width="382" height="849" /></a></strong>Remove all the Interests by clicking on each one and selecting <strong>Remove Interes</strong>t.  Other settings should have been set at Facebook.com with the instructions above.</p>
<p><strong>Facebook Messenger</strong></p>
<p>Facebook keeps all your messenger messages.. FOREVER.  Scary isn&#8217;t that?</p>
<p><a href="https://www.facebook.com/help/messenger-app/242107552657620?helpref=faq_content" target="_blank" rel="nofollow noopener noreferrer">Here</a> is how you delete Facebook messenger messages, conversations and photos.</p>
<p><strong>Items We are still working on cleaning:</strong></p>
<ul>
<li>Check-Ins</li>
<li>Removing Apps</li>
</ul>
<p>Do you feel more secure now?</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.safegadget.com/444/facebook-privacy-setting/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>How to Setup a Secure Wireless Network Router</title>
		<link>https://www.safegadget.com/28/how-to-setup-a-secure-wireless-network-router/</link>
					<comments>https://www.safegadget.com/28/how-to-setup-a-secure-wireless-network-router/#comments</comments>
		
		<dc:creator><![CDATA[SafeGadget]]></dc:creator>
		<pubDate>Tue, 01 Jan 2019 08:00:53 +0000</pubDate>
				<category><![CDATA[Computer Hardware]]></category>
		<category><![CDATA[Computer Software]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Wireless Networking]]></category>
		<category><![CDATA[antenna]]></category>
		<category><![CDATA[Asus]]></category>
		<category><![CDATA[dd-wrt]]></category>
		<category><![CDATA[Ethernet]]></category>
		<category><![CDATA[Guest Network]]></category>
		<category><![CDATA[Linksys]]></category>
		<category><![CDATA[Mac Address]]></category>
		<category><![CDATA[SSID]]></category>
		<category><![CDATA[Tomato]]></category>
		<category><![CDATA[Wireless Router]]></category>
		<category><![CDATA[WPA]]></category>
		<category><![CDATA[WPA2]]></category>
		<guid isPermaLink="false">http://www.safegadget.com/?p=28</guid>

					<description><![CDATA[Updated: 3/10/2019 Security has become an ever more important part of using a personal computer. Increasingly, the daily headlines include news of companies and websites getting hacked. It is important to learn how to properly secure your wireless Internet as well as secure your personal computer. This article focuses on how to secure your wireless &#8230; <a href="https://www.safegadget.com/28/how-to-setup-a-secure-wireless-network-router/" class="more-link">Continue reading<span class="screen-reader-text"> "How to Setup a Secure Wireless Network Router"</span></a>]]></description>
										<content:encoded><![CDATA[<p>Updated: 3/10/2019<br />
<img loading="lazy" decoding="async" src="https://www.safegadget.com/i/networking/Linksys-Wireless-Router-Linksys-Router-WRT54G.jpg" alt="Linksys wireless router, Linksys router, WRT54G" width="400" height="300" /></p>
<p>Security has become an ever more important part of using a personal computer. Increasingly, the daily headlines include news of companies and websites getting hacked. It is important to learn how to properly secure your wireless Internet as well as secure your personal computer.</p>
<p>This article focuses on how to secure your wireless network router so that you do not become part of the statistics. The wireless router typically includes a firewall that defines the perimeter of your network. Think of this as a fence, walling off your network from the Internet. Having a vulnerable wireless network allows criminals to ppossibly steal your data as well as Internet access. You could also become responsible for illegal downloading if your wireless Internet was compromised.</p>
<p><strong>October 2017 Wi-Fi KRACK attack Warning</strong></p>
<p><a href="https://www.krackattacks.com/" target="_blank" rel="nofollow noopener noreferrer">KRACK</a> attack on Wi-Fi. Attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted.  Virtually <strong>ALL</strong> Wi-Fi equipped devices need to be updated.  The attack is particularly bad on Android 6.0 and Linux. If you have a device with no updates (eg Internet of Things), <strong>you will be open to attacks.</strong></p>
<p>You should not be using any non-802.11ac devices any more, if at all possible; and you should make absolutely certain you&#8217;ve updated the firmware on all routers to the latest available version.</p>
<p>If that newest available firmware version is older than November 2017, it is without a doubt vulnerable to KRACK, and you&#8217;re going to need to discard and replace that device. If it&#8217;s older than, say, July 2018 it might or might not include KRACK mitigations, and you should go through all of that device&#8217;s firmware release notes since November 2017 to make certain.</p>
<p><strong>Government Spying via Compromised Wi-Fi Routers</strong></p>
<p><span id="more-28"></span></p>
<p><a href="https://wikileaks.org/vault7/document/WiFi_Devices/page-1/#pagination" target="_blank" rel="nofollow noopener noreferrer">WikiLeaks</a> has confirmed that insecure wireless routers were hacked and users spied probably by the <a href="https://www.helpnetsecurity.com/2017/06/16/cia-hacked-wireless-home-routers/" target="_blank" rel="nofollow noopener noreferrer">CIA</a>.  If you own a router on the list, update its software immediately or buy a new one.</p>
<p><strong>Federal Trade Commission Makes Asus Improve Router Security</strong></p>
<p>In February 2016, the <a href="https://www.ftc.gov/news-events/press-releases/2016/02/asus-settles-ftc-charges-insecure-home-routers-cloud-services-put" target="_blank" rel="nofollow noopener noreferrer">Federal Trade Commission settled charges with Asus</a>, over critical security flaws in its routers that put the home networks of hundreds of thousands of consumers at risk.</p>
<p>The proposed consent order will require ASUS to establish and maintain a comprehensive security program subject to independent audits for the next 20 years.</p>
<p><strong>Finally!</strong>, the government is forcing these manufacturers to fix wireless routers that can be come huge security holes.</p>
<p><strong>Wirless Routers are a big Security Hole</strong></p>
<p>The <a href="https://www.wsj.com/articles/rarely-patched-software-bugs-in-home-routers-cripple-security-1453136285" target="_blank" rel="nofollow noopener noreferrer">Wall Street Journal</a> commissioned a security researcher to test 20 popular internet Wireless Routers in late 2015. 10 had known security weaknesses. 4 had old firmware that when upgraded could contain undocumented security problems.  Keep your router&#8217;s software update and if it is <em>older than 2 years</em>, you should <strong>buy</strong> a new one. Few routers automatically update their software, like Windows does. Most networking companies&#8217; stop updating them after a year or two (They have no financial incentive), resulting in a major security risk.</p>
<p>Hackers can take control of insecure wireless routers to snoop on all your Internet traffic, initial denial of services attacks on others, or steal your financial information.</p>
<p><strong>Cable or DSL Modem Direct Connection</strong></p>
<p>Some high speed Internet connections allow you to directly connect your computer to the modem.  We recommend installing a network router in this situation to help protect the computer from external traffic. Install a wireless router and turn off the wireless capability if you do not need it.</p>
<p><strong>Hardwired Ethernet Network</strong></p>
<p>Secure wireless is an oxymoron! Using a hardwired Ethernet connection is much more secure than wireless Internet, a must for those looking for the maximum protection. Unfortunately, this is type of access is not possible for some devices (iPad, iPhone, etc.) and is far from convenient. Most users who demand the utmost in security and performance lay Ethernet networking in their homes and businesses. They may still run a wireless network, but limit access on that network to just a couple devices.</p>
<p><strong>What is the most secure Wireless Router?</strong></p>
<p>Wireless router hardware is available from many major manufacturers, including <a href="https://www.amazon.com/Apple-AirPort-Extreme-Station-ME918LL/dp/B00DB9WCR6" target="_blank" rel="nofollow noopener noreferrer">Apple</a>, <a href="https://www.amazon.com/s?ie=UTF8&amp;x=0&amp;ref_=nb_sb_ss_c_1_14&amp;y=0&amp;field-keywords=linksys%20router&amp;url=search-alias%3Delectronics&amp;sprefix=Linksys%20router?url=search-alias=electronics&amp;_encoding=UTF8&amp;tag=easyeco0d-20&amp;linkCode=ur2&amp;camp=1789&amp;creative=390957" target="_blank" rel="nofollow noopener noreferrer">Cisco</a> &#8211; <a href="https://www.amazon.com/s?ie=UTF8&amp;x=0&amp;ref_=nb_sb_ss_c_1_14&amp;y=0&amp;field-keywords=linksys%20router&amp;url=search-alias%3Delectronics&amp;sprefix=Linksys%20router&amp;_encoding=UTF8&amp;tag=easyeco0d-20&amp;linkCode=ur2&amp;camp=1789&amp;creative=390957" target="_blank" rel="noopener noreferrer">Linksys</a>, <a href="https://www.amazon.com/s?ie=UTF8&amp;x=0&amp;ref_=nb_sb_ss_c_1_14&amp;y=0&amp;field-keywords=linksys%20router&amp;url=search-alias%3Delectronics&amp;sprefix=Linksys%20router?url=search-alias=electronics&amp;_encoding=UTF8&amp;tag=easyeco0d-20&amp;linkCode=ur2&amp;camp=1789&amp;creative=390957" target="_blank" rel="nofollow noopener noreferrer">D-Link</a>, or <a href="https://www.amazon.com/s?ie=UTF8&amp;x=0&amp;ref_=nb_sb_ss_c_1_14&amp;y=0&amp;field-keywords=linksys%20router&amp;url=search-alias%3Delectronics&amp;sprefix=Linksys%20router?url=search-alias=electronics&amp;_encoding=UTF8&amp;tag=easyeco0d-20&amp;linkCode=ur2&amp;camp=1789&amp;creative=390957" target="_blank" rel="nofollow noopener noreferrer">Netgear</a>. We suggest avoiding smaller companies because they may be slow to update the software (firmware) and patch security holes. Unfortunately, even the large comes stop upgrade software on their routers after a year or two, you then should <strong>buy a NEW router</strong>. Fewer notify users of new software availability.</p>
<p>Manufacturer’s models differ in wireless range, speed, wireless standard support (Wireless-AC), and special features. <strong>Always</strong> make sure to update to the latest firmware available; bug fixes, security fixes, and enhancements were possibly added.</p>
<p><strong>More Advanced Routers</strong></p>
<p>The best routers are more robust routers targeted towards small business. They have more advanced security and are updated more often. If you are not technical, forget about buying one.</p>
<ul>
<li><a href="https://www.pfsense.org/products/" target="_blank" rel="nofollow noopener noreferrer">pfsense</a> &#8211; Makes a solid security appliance. Their 2 port model is more affordable at $299, $374 with 802.11N. You need to be somewhat technical to setup Virtual LANs.</li>
<li><a href="https://www.amazon.com/Ubiquiti-EdgeRouter-Advanced-Gigabit-Ethernet/dp/B00YFJT29C/" target="_blank" rel="nofollow noopener noreferrer">Ubiquiti Networks</a> &#8211; Makes a great low cost multi port router, <a href="https://www.amazon.com/Ubiquiti-EdgeRouter-Advanced-Gigabit-Ethernet/dp/B00YFJT29C/" target="_blank" rel="nofollow noopener noreferrer">EdgeRouter X</a>, for under $50. Add their <a href="https://www.amazon.com/Ubiquiti-UAP-AC-LITE/dp/B017MD6CHM/" target="_blank" rel="nofollow noopener noreferrer">UniFi AP AC Lite</a> access points ($90) and you have one of the <strong>best and</strong> cost effective Wireless setups. Again not for beginners. <a href="https://github.com/mjp66/Ubiquiti/blob/master/Ubiquiti%20Home%20Network.pdf" target="_blank" rel="nofollow noopener noreferrer">Great Setup Guide</a></li>
</ul>
<p><strong>Cheap 3 Router secure Wireless Setup for IOT</strong></p>
<p>Here is a good setup if you are concerned about security, are not a network expert, and need to have a guest network or have Internet of Things devices. (IE Nest Cam, Nest Smoke Detector, etc)  This configuration prevents these devices from snooping or intercepting your normal traffic. Using a typical Wireless router&#8217;s Guest network will NOT accomplish the same thing.</p>
<p>Kudos to Steve Gibson of Security Now. Buy or re-use a cheap old router that does not have to have wireless capabilities. We will be connecting them in a <a href="https://www.grc.com/sn/sn-545.htm" target="_blank" rel="nofollow noopener noreferrer">Y configuration</a>. Connect this Router 1 to your Cable / DSL Modem.</p>
<p>Wireless Router 2 and Wireless Router 3 are both plugged into Router 1.</p>
<ul>
<li>Use Wireless Router 2 for all your computer, tablet, smartphone needs.</li>
<li>Connect Wireless Router 3 with all your IOT or Internet of Things devices, like security systems, cameras, thermostat, etc.</li>
<li>IOT devices should use a different DNS Server than your standard one.</li>
</ul>
<p><strong>Optimizing Wireless Routers for Maximum Range</strong></p>
<ul>
<li>Physical Location – Where you place the wireless router is <strong>very </strong>important.
<ul>
<li>Position the wireless router to most central or optimal location for best coverage of your wireless network, and least amount of leakage to unwanted places like your neighbors or passersby on the street. This may be high up on a wall and may not be in the room the Internet connection is located in. Keep the wireless router away from microwave ovens and cordless phones.</li>
<li>If you have sufficient wireless coverage and your wireless router supports it, you could also <strong>Reduce</strong> your wireless router&#8217;s transmitter power so it doesn&#8217;t send the signal beyond your home.</li>
<li>Run a utility such as <a href="https://www.metageek.net/products/inssider/" target="_blank" rel="nofollow noopener noreferrer">inSSIDer</a> that helps you adjust your wireless router&#8217;s channel configuration to prevent interfering with surrounding wireless wifi networks. <a href="https://market.android.com/details?id=com.farproc.wifi.analyzer" target="_blank" rel="nofollow noopener noreferrer">Wifi Analyzer</a> for Android, Wi-Fi Finder iOS also works. Most routers are preset to channel 6, causing more collisions.</li>
<li>Antennas – Low cost 3<sup>rd</sup> party add on antennas extend range without the need to buy a new wireless router; <a href="https://www.freeantennas.com/" target="_blank" rel="nofollow noopener noreferrer">free antennas</a> can also extend range. Some antenna&#8217;s omnidirectional, while others are directional, allowing you to focus a wireless signal. Replace the cheap antenna that came with your wireless router, to significantly increase performance.</li>
<li>Add an <a href="https://www.easyecoblog.com/474/using-a-digital-timer-to-save-energy/">electrical power timer</a> to turn off the wireless router when not in use or at night. This saves money and offers added security.</li>
</ul>
</li>
</ul>
<p><strong>Wireless Network Router Settings</strong></p>
<p>Wireless routers need to be configured properly to ensure proper operation as well as maximum security. Although wireless routers from different vendors include differing configuration options, most include these configuration settings. We have included screenshots for a variety of popular wireless routers, but can never cover every single wireless router available. We recommend disconnecting your cable or DSL modem while your router is being configured as some routers take a while to boot up and present an unfiltered connection while loading up.</p>
<p><strong>Before</strong> you make any changes to your wireless router, always note how it was configured before the changes were done, so you can undo changes.</p>
<p>Access the administrator configuration for your wireless router by either running the software that was included with it or by accessing it directly from a web browser. For instance, Linksys router web interface for their wireless routers can be accessed when entering the following URL into your browser: https://192.168.1.1/</p>
<p style="text-align: center;"><a title="linksys wireless settings Wi Fi Router Security" href="/i/networking/Wireless-Router-WPA-Encryption/linksys-wireless-settings-Wi-Fi-Router-Security.jpg" rel="lightbox-album"><img loading="lazy" decoding="async" class="pic" src="/i/networking/Wireless-Router-WPA-Encryption/linksys-wireless-settings-Wi-Fi-Router-Security.jpg" alt="linksys wireless settings Wi Fi Router Security" width="558" height="438" /></a></p>
<p><strong>Administrator Password </strong></p>
<ul>
<li>Password entered to gain access to the wireless router hardware. The administrator password <strong>MUST</strong> be changed from factory default to something difficult and long. Many people never change the factory password and leave themselves wide open to getting hacked. See our article on generating secure passwords for tips.</li>
<li><a href="https://www.sordum.org/10411/router-default-password-v1-0/" target="_blank" rel="nofollow noopener noreferrer">Router Default Passwords</a> can show you passwords for routers left unchanged from default</li>
<li><strong>Disable</strong> <strong>remote router access</strong> or Remote management so no one can change your settings from outside your network. On Linksys routers, it is located on the <strong>Administration</strong> tab &#8211; <strong>Management</strong>.</li>
<li><strong>Enable Logs</strong> so that you can go back and see where problems arose.</li>
</ul>
<p style="text-align: center;"> <a title="Linksys Wireless Router WPA Encryption" href="/i/networking/Wireless-Router-WPA-Encryption/Linksys-Wireless-Router-WPA-Encryption.jpg" rel="lightbox-album"><img loading="lazy" decoding="async" class="pic" src="/i/networking/Wireless-Router-WPA-Encryption/Linksys-Wireless-Router-WPA-Encryption.jpg" alt="Linksys Wireless Router WPA Encryption" width="576" height="311" /></a></p>
<p style="text-align: center;">Cisco Linksys Wireless Security Settings</p>
<p style="text-align: center;"><a title="cisco e3000 wireless router wpa2 security" href="/i/networking/Wireless-Router-WPA-Encryption/cisco-e3000-wireless-router-wpa2-security.jpg" rel="lightbox-album"><img loading="lazy" decoding="async" class="pic" src="/i/networking/Wireless-Router-WPA-Encryption/cisco-e3000-wireless-router-wpa2-security.jpg" alt="cisco e3000 wireless router wpa2 security" width="485" height="375" /></a></p>
<p style="text-align: center;">Cisco Linksys Dual Band 2.4Ghz 5Ghz Wireless Security Settings</p>
<p style="text-align: center;"><img loading="lazy" decoding="async" src="https://www.safegadget.com/i/networking/DLink-Wireless-Router-Security-Settings.jpg" alt="Dlink Wireless Security Settings" width="568" height="816" /></p>
<p style="text-align: center;">DLink Wireless Security Settings</p>
<p><strong>Wireless Encryption</strong></p>
<ul>
<li>It is best to use WPA2-Personal security mode, AES encryption (do not select TKIP), a long Pre-Shared Key. Recommendation: Long (40+ characters) and include symbols, and upper and lower case. You will have to enter this password on each wireless device.</li>
<li><strong>Do not </strong>use WEP or WPA encryption as they are easily hacked. WEP encryption can be broken in under a minute. If you have hardware that does not support WPA2 encryption, replace the hardware.</li>
<li><strong>Always</strong> use encryption and NEVER have an open Wi-Fi access point without a password.</li>
</ul>
<p>&nbsp;</p>
<p style="text-align: center;"><a title="D Link Wireless Router MAC Address Filter" href="/i/networking/Wireless-Router-WPA-Encryption/D-Link-Wireless-Router-MAC-Address-Filter.png" rel="lightbox-album"><img loading="lazy" decoding="async" class="pic" src="/i/networking/Wireless-Router-WPA-Encryption/D-Link-Wireless-Router-MAC-Address-Filter.png" alt="D Link Wireless Router MAC Address Filter" width="845" height="483" /></a></p>
<p><strong>Mac Address Filtering</strong></p>
<ul>
<li>This should be <strong>Disabled</strong>. This ensures that only authorized Wireless devices’ Mac Address (the serial number of the networking devices) are allowed to access the wireless router. Enabling it <strong>does not make</strong> it anymore secure against hackers. They can spoof Mac Addresses.</li>
</ul>
<p><strong>SSID</strong></p>
<ul>
<li>Name – Change the default name. Do not use your address or a personal name. It is important to have a unique name so that when you&#8217;re away from home, your devices do not automatically try to logon to other wireless networks with the same name. This will also make you less susceptible to attacks using precomputing tables based on default names. Make sure you do not use names like: linksys, netgear, attwifi, 2wire####.</li>
<li>To make your WiFi Network name more secure you should also add &#8220;_nomap_optout&#8221; to the end of it.  This prevents early Windows 10 installs from sharing it and Google from indexing it.</li>
<li>Broadcast – Should be enabled to present easy access and prevent devices beaconing for it when it is out of range. Hiding it <strong>does not make</strong> it anymore secure against hackers.</li>
</ul>
<p>&nbsp;</p>
<p style="text-align: center;"><a title="UPNP Wireless Security Netgear Router" href="/i/networking/Wireless-Router-WPA-Encryption/UPNP-Wireless-Security-Netgear-Router.jpg" rel="lightbox-album"><img loading="lazy" decoding="async" class="pic" src="/i/networking/Wireless-Router-WPA-Encryption/UPNP-Wireless-Security-Netgear-Router.jpg" alt="UPNP Wireless Security Netgear Router" width="1193" height="808" /></a></p>
<p><strong>UPNP – <em>Disable</em> </strong>this feature.  Very Important! It makes your network much more vulnerable. Although adding devices will require manual action. You could also enable Universal plug and play only when adding a new device.</p>
<p><strong>Wi-Fi Protected Setup</strong> (WPS) &#8211; <strong><em>Disable</em> </strong>this feature (if possible) and enable manual setup, even though it makes setup much easier.  It makes your network much more vulnerable to external hacking. A flaw allows a remote attacker to recover the WPS PIN and, with it, the router&#8217;s WPA/WPA2 password in a few hours was uncovered in December 2011. Checkout our <a href="https://www.safegadget.com/72/major-wireless-network-vulnerability-wps-bug/">WPS article</a> on this.</p>
<p>Some older Linksys routers have SecureEasySetup<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> (SES), which can be disabled to increase security.</p>
<p><strong>Bands – </strong>More advanced wireless routers operate on multiple frequencies at the same time.</p>
<ul>
<li>2.4 GHz – This is the typical Wi-Fi frequency used by most wireless routers.</li>
<li>5 GHz – More advanced routers support this frequency. Your computer or Wi-Fi device needs to also support the 5 GHz frequency option, so an extra network adapter may be required. Utilizing only this frequency helps prevent your network from being probed by less sophisticated hackers. *Note* 5 GHz performance transfer rate decreases dramatically the farther the device is from the router. Buy a new router if this is the case.</li>
</ul>
<p><strong>DHCP</strong></p>
<ul>
<li>DHCP is used to handout Internet IP Addresses to your local network devices. Be sure to set a limit to the number of DHCP addresses given out by your router. This number should correspond to the actual number of devices you own. Occasionally, login to your router and audit the number of DHCP addresses given out, to look for nearby Internet leeches. <a href="https://sourceforge.net/projects/roguescanner/" target="_blank" rel="nofollow noopener noreferrer">RogueScanner</a> is a free tool that will help you find rogue wireless access points and devices.</li>
</ul>
<p><strong>DNS</strong></p>
<p>Set the DNS (Domain Name Server) that the router uses to either your ISP&#8217;s DNS Server or better yet, to Google&#8217;s high performance DNS: <a href="https://developers.google.com/speed/public-dns/" target="_blank" rel="nofollow noopener noreferrer">8.8.8.8</a></p>
<p>Leaving the field empty could lead to DNS spoofing.</p>
<p><strong>Wireless Routers with Guest Network </strong></p>
<p>This is an <strong>IMPORTANT</strong> feature to look for in a new Wi-Fi router. If your wireless router is capable of setting up a separate network for your Guests and Internet of things (IOT &#8211; Cameras, Doorbells, etc) devices, you need to ensure that it is set up properly to prevent access to your main network. Keep in mind that some older guest networks (Linksys, Cisco) simply have a password but do not utilize wireless encryption such as WPA2. Buy a new router if this is the case.</p>
<p>Use a different password for this network and give this out to your guests.  Also place the following types of devices on this network, not your main network.</p>
<ul>
<li>Security Cameras</li>
<li>Wireless Thermostats and Smoke detectors (IE Nest)</li>
<li>Internet of things devices (Toys, Cars, Appliances, etc)</li>
<li>Cars</li>
</ul>
<p><strong>Isolating Guest Network Access</strong></p>
<p>If you have a D-Link wireless router, be sure that the <strong>Enable Routing Between Zones </strong>option is <strong>not</strong> checked. This will prevent access by a guest network client, onto your main network.</p>
<p>If you have an Asus wireless router, be sure that the <strong>Access Intranet </strong>option is set to <strong>Disable</strong>. This will prevent access by a guest network client onto your main network.</p>
<ul>
<li>Some Asus routers have <strong>Set AP Isolated</strong> in their Wireless-Professional Menu. Setting this to <strong>Yes </strong>for the 2.4Ghz Band will also increase security by preventing guest network clients from accessing each other.</li>
<li>Advanced Asus Router users: If you are running 3rd party Asus <a href="https://asuswrt.lostrealm.ca/" target="_blank" rel="nofollow noopener noreferrer">Merlin firmware</a> adding this rule to a <em>firewall-start</em> file will prevent guest network users from being able to access each others:
<ul>
<li><em>wl -i wl0.1 ap_isolate 1</em></li>
</ul>
</li>
</ul>
<p><strong>Known Wireless Router Issues</strong></p>
<p>If you own an <a href="https://www.securityfocus.com/archive/1/526942" target="_blank" rel="noopener noreferrer">AsusRT-N66U</a> or <a href="https://kb.linksys.com/Linksys/ukp.aspx?pid=80&amp;app=vw&amp;vw=1&amp;login=1&amp;json=1&amp;docid=56b6de2449fd497bb8d1354860f50b76_How_to_prevent_getting_The_Moon_malware.xml" target="_blank" rel="nofollow noopener noreferrer">Linksys E-series wireless</a> router, make sure it has been updated to prevent the Moon worm.</p>
<p><strong>Additional Security</strong></p>
<ul>
<li>Options such as Radius Authentication may be supported by the wireless router. This is more for corporate or small business security. <a href="https://www.zeroshell.net/eng/" target="_blank" rel="nofollow noopener noreferrer">ZeroShell </a>allows you to set up a RADIUS server inside a virtual machine.</li>
</ul>
<p><strong>Third Party Wireless Router Firmware</strong></p>
<ul>
<li>3<sup>rd</sup>Party Firmware or software for the wireless router is often available with additional features not available from the manufacturer’s firmware. This many also be more secure than your original firmware.
<ul>
<li>Why? – Need a particular special feature. Often only for power users.</li>
<li>What features would be available? – Stability, security, configurability</li>
<li>Wireless Router Compatibility – Check website to see if your wireless router is supported by 3<sup>rd</sup> party firmware</li>
</ul>
</li>
</ul>
<p style="text-align: center;">  <a title="Wireless Router Tomato Firmware" href="/i/networking/Wireless-Router-WPA-Encryption/Wireless- Router-Tomato-Firmware.png" rel="lightbox-album"><img loading="lazy" decoding="async" class="pic" src="/i/networking/Wireless-Router-WPA-Encryption/Wireless- Router-Tomato-Firmware.png" alt="Wireless Router Tomato Firmware" width="901" height="808" /></a></p>
<ul>
<li><a href="https://www.polarcloud.com/tomato" target="_blank" rel="nofollow noopener noreferrer">Tomato</a> – Popular 3<sup>rd</sup> party replacement firmware for many wireless routers.</li>
</ul>
<p>&nbsp;</p>
<p style="text-align: center;"><a title="DD WRT Wireless Router WPA2 Security Encryption" href="/i/networking/Wireless-Router-WPA-Encryption/DD-WRT-Wireless-Router-WPA2-Security-Encryption.jpg" rel="lightbox-album"><img loading="lazy" decoding="async" class="pic" src="/i/networking/Wireless-Router-WPA-Encryption/DD-WRT-Wireless-Router-WPA2-Security-Encryption.jpg" alt="DD WRT Wireless Router WPA2 Security Encryption" width="1009" height="594" /></a></p>
<ul>
<li><a href="https://www.dd-wrt.com/site/support/router-database" target="_blank" rel="nofollow noopener noreferrer">DD-WRT</a> – Popular open-source 3<sup>rd</sup> party replacement firmware for many wireless routers. This firmware enables you to adjust the transmit power of the router to help boost range.</li>
<li><a href="https://asuswrt.lostrealm.ca/" rel="nofollow">Asuswrt-Merlin</a> &#8211; This 3rd party alternative firmware is focused on Asus routers.</li>
</ul>
<p><a href="https://www.amazon.com/s?ie=UTF8&amp;x=0&amp;ref_=nb_sb_ss_c_1_14&amp;y=0&amp;field-keywords=linksys%20router&amp;url=search-alias%3Delectronics&amp;sprefix=Linksys%20router?url=search-alias=electronics&amp;_encoding=UTF8&amp;tag=easyeco0d-20&amp;linkCode=ur2&amp;camp=1789&amp;creative=390957" target="_blank" rel="nofollow noopener noreferrer">Buffalo</a>  makes wireless routers with DD-WRT pre-installed. This allows them to reduce the amount of software (firmware) they have to write, and concentrate their efforts more on hardware. If you are afraid of accidentally damaging your wireless router by installing 3<sup>rd</sup> party firmware consider purchasing a Buffalo High Performance wireless router.</p>
<ul>
<li>Do It Yourself (DIY) Wireless Router – allows for advance features , good if you have extra computers, higher performance needs, QoS, IP filtering, traffic stats, special network configurations that are not mainstream.
<ul>
<li><a href="https://www.smoothwall.org/download/" target="_blank" rel="nofollow noopener noreferrer">Smoothwall</a> – Popular 3<sup>rd</sup> party Linux based router software. Runs on any Pentium-class PC with at least 128 MB of RAM. <a href="https://www.snort.org/" target="_blank" rel="nofollow noopener noreferrer">Snort</a> Intrusion Detection System support is also available, so you do not have to run Snort in a separate installation.</li>
</ul>
</li>
</ul>
<p><strong>Testing Wireless Router Security</strong></p>
<p>Testing wireless router security is important to see how secure your wireless router really is. Here are some sites that help test your wireless router’s security. You can adjust your configuration to close any vulnerabilities they find.</p>
<ul>
<li><a href="https://www.rapid7.com/vulnerability-scanner.jsp" target="_blank" rel="nofollow noopener noreferrer">Rapid7</a> &#8211; Has penetration testing software</li>
<li><a href="https://www.grc.com/x/ne.dll?bh0bkyd2" target="_blank" rel="nofollow noopener noreferrer">Shields Up</a> – Tests your network with tools from Steve Gibson of GRC.</li>
<li><a href="https://www.hackerwatch.org" target="_blank" rel="nofollow noopener noreferrer">HackerWatch</a> – Tests your network with tools from McAfee.</li>
<li><a href="https://hackertarget.com/" target="_blank" rel="nofollow noopener noreferrer">HackerTarget</a> &#8211; Multiple tests on your network</li>
<li><a href="https://arachni-scanner.com/" target="_blank" rel="nofollow noopener noreferrer">Arachni</a> &#8211; Security scanning framework</li>
</ul>
<p>By applying special settings to your wireless router, you can significantly increase the security of your wireless network to prevent theft and secure our privacy.</p>
<p>Also keep you wireless router&#8217;s software up to date and buy a new one every couple years, if there has not been an software update recently.</p>
<p>This concludes our <em>How to setup a Secure Wireless Network Router </em> article. Other articles on Safegadget.com help you secure the other aspects of your personal computer, including<em> How to Set up a Secure wireless network Route</em><a href="https://www.safegadget.com/28/how-to-setup-a-secure-wireless-network-router/">r</a>, and <em><a href="https://www.safegadget.com/41/secure-internet-explorer-9-browsing/" target="_blank" rel="noopener noreferrer">How to Secure Internet Explorer</a> </em>article<em>, </em>or<em> <a href="https://www.safegadget.com/44/secure-firefox-browsing/" target="_blank" rel="noopener noreferrer">How to Secure Firefox</a> </em>Article. Please see our other articles on security tips for your e-mail, iPad, online banking, online shopping, smart phones, and more.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.safegadget.com/28/how-to-setup-a-secure-wireless-network-router/feed/</wfw:commentRss>
			<slash:comments>24</slash:comments>
		
		
			</item>
		<item>
		<title>How to Create, Store, and Use Secure Passwords</title>
		<link>https://www.safegadget.com/34/how-to-create-store-and-use-secure-passwords/</link>
					<comments>https://www.safegadget.com/34/how-to-create-store-and-use-secure-passwords/#comments</comments>
		
		<dc:creator><![CDATA[SafeGadget]]></dc:creator>
		<pubDate>Tue, 01 Jan 2019 08:00:36 +0000</pubDate>
				<category><![CDATA[Computer Software]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Macintosh]]></category>
		<category><![CDATA[Online Service]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Smartphone]]></category>
		<category><![CDATA[Automatic Form Filler]]></category>
		<category><![CDATA[Keepass]]></category>
		<category><![CDATA[Lastpass]]></category>
		<category><![CDATA[Password Manager]]></category>
		<category><![CDATA[Roboform]]></category>
		<guid isPermaLink="false">http://www.safegadget.com/?p=34</guid>

					<description><![CDATA[Last Update: 1/1/2020 Passwords are one of the biggest security problems on the Internet, possibly even more so than Malware. Poorly chosen passwords and security questions are making online accounts easily hackable by cyber-criminals. Check to see if you have a compromised account See if a password you used has been hacked Everyone knows it&#8217;s &#8230; <a href="https://www.safegadget.com/34/how-to-create-store-and-use-secure-passwords/" class="more-link">Continue reading<span class="screen-reader-text"> "How to Create, Store, and Use Secure Passwords"</span></a>]]></description>
										<content:encoded><![CDATA[<p>Last Update: 1/1/2020<br />
<img loading="lazy" decoding="async" src="http://www.safegadget.com/i/password-security/Password-Entry.jpg" alt="iPad password entry screen" width="400" height="267" /></p>
<p>Passwords are one of the biggest security problems on the Internet, possibly even more so than Malware. Poorly chosen passwords and security questions are making online accounts easily hackable by cyber-criminals.</p>
<ol>
<li>Check to see if you have a <a href="https://haveibeenpwned.com/" target="_blank" rel="nofollow noopener noreferrer">compromised account</a></li>
<li>See if a password you used has been <a href="https://haveibeenpwned.com/Passwords" target="_blank" rel="nofollow noopener noreferrer">hacked</a></li>
</ol>
<p>Everyone knows it&#8217;s important to create and use complex passwords, ones that do not include:</p>
<ul>
<li>Words from the dictionary of any language</li>
<li>Personal information such as names of your kids, pets, addresses, etc.</li>
<li>The same password for more than one site</li>
<li>Ones that are written down</li>
</ul>
<p>Few people follow this type of policy. If you are guilty of one or more of the above, you are at risk of getting hacked. Hackers are able to use brute force attacks to test over 200,000 passwords per hour. As technology improves, they will be able to test passwords even faster. In this article we will help you create, store, and easily use secure passwords.</p>
<p><strong>Secure your computer, web browser, Internet connection<br />
</strong></p>
<p>Follow our guides to <a title="How to: Internet Security and Windows Security Made Easy" href="http://www.safegadget.com/16/how-to-internet-security-and-windows-security-made-easy/">secure your Windows PC</a> or <a title="Free Security How to: Computer Security, Computer Protection on Macintosh" href="http://www.safegadget.com/30/free-security-how-to-computer-security-computer-protection-on-macintosh/">secure your Macintosh</a> by installing the right software, firewall, antivirus software, etc. Secure your mobile devices: <a title="iPhone Security, How to securely use your iPhone" href="http://www.safegadget.com/51/iphone-security-how-to-securely-use-your-iphone/">iPhone</a>, <a title="Android Smartphone Security, How to securely use your Android Smartphone or Tablet" href="http://www.safegadget.com/54/android-smartphone-security-how-to-securely-use-your-android-smartphone/">Android smartphone or tablet</a>, <a title="iPad Security, How to securely use your iPad" href="http://www.safegadget.com/53/ipad-security-how-to-securely-use-your-ipad/">iPad</a>. Configure the settings and add plug-ins to you web browser so that it is more secure. Consult our tutorials for: <a title="Secure Internet Explorer 9 Browsing" href="http://www.safegadget.com/41/secure-internet-explorer-9-browsing/">Internet Explorer 9</a>, <a title="Secure Google Chrome Browsing" href="http://www.safegadget.com/45/secure-google-chrome-browsing/">Google Chrome</a>, and <a title="Secure Firefox Browsing" href="http://www.safegadget.com/44/secure-firefox-browsing/">Mozilla Firefox</a>. Secure your Internet Connection: <a title="How to Setup a Secure Wireless Network Router" href="http://www.safegadget.com/28/how-to-setup-a-secure-wireless-network-router/">Wireless Network</a>, Public Wi-Fi.</p>
<p><strong>Better Usernames</strong></p>
<p><span id="more-34"></span></p>
<p>We suggest users first start with a non-obvious username. Don&#8217;t use your first name or first name + last name as your username throughout your online accounts. Make up a name or alias. Include numbers and/or upper and lowercase letters. Better yet, use a different username on every site. The <em>password managers</em> recommended below will automatically remember all your logins.</p>
<p><strong>What is a good password?</strong></p>
<p>1. Characters, numbers, symbols, length, complexity</p>
<p>A good password has alphabetical characters of both upper and lower case, numbers, symbols. The password should be at least 12 characters in length. Length is <strong>more</strong> important than complexity. Computers have gotten so fast that they are able to password crack shorter passwords in no time especially with high speed GPUs. Keep in mind that some online services have limits as to what characters are valid and how long a password can be.</p>
<p>Examples of <strong>good</strong> passwords include: 9F1%6!Q(&amp;3mdIOe39 or f7aX3z&amp;a8L2;&#8217;\]</p>
<p>These are pretty hard to remember, aren&#8217;t they? We will include suggestions on how to create strong and easy to remember passwords below.</p>
<p>2. What passwords not to use</p>
<p>There should be no words from the dictionary of any language, present in your password. No personal information should be in your password including birthdays, names, addresses, phone numbers, etc. <span style="font-family: arial,geneva,helvetica;">Develop a mnemonic system for remembering complex passwords.</span></p>
<p>Examples of <strong>bad</strong> passwords include: 12345 or john or 123elm or password</p>
<p>If you <strong>have</strong> to use one of these passwords, at least harden them with some extra symbols and length.</p>
<p>Examples of <strong>better</strong> passwords include: 12345!!!!???? or !!!!john!!!! or $$$$123elm$$$$ or %%password!! or {[password]}</p>
<p>Not only are the passwords only slightly more difficult to remember, but the security is enhanced by orders of magnitude.</p>
<p>3. <strong>Every</strong> website you visit should have a <em>different</em> password. The average Internet user has over 25 password protected accounts. If you only use one password, you would be in danger of losing your <strong>entire</strong> universe, if only one site got hacked and they stored passwords in plain text.</p>
<p>Examples of <strong>better</strong> passwords include: 12345!!!!????ebay or 12345!!!!????gmail</p>
<p>Another way to create an easy to remember but secure password is to come up with a memorable sentence or phrase and use the first character of each word. Append onto the end of each site&#8217;s password, the name of each website and a symbol and a number.</p>
<p>Example sentence: Jack and Jill went up the hill to fetch a pail of water</p>
<p>Website: gmail.com</p>
<p>Password: JaJwuthtfapowgmail!1</p>
<p>4. How often to change your password</p>
<p>Passwords should be changed every so often, especially if you think it has been compromised. Changing a password <em>too often</em> causes major logistical problems. Some companies require password changes every XX weeks.  This causes more harm than good. Works will then reuse old passwords or slight variants of them. The focus should be on changing the <em>most important and most used</em> passwords every couple months. <a href="https://www.us-cert.gov/cas/tips/ST04-002.html" target="_blank" rel="nofollow noopener noreferrer">US-CERT</a> has additional password tips.</p>
<p>5. Avoid sites that are not making security a priority. See the posts on <a href="http://plaintextoffenders.com/" target="_blank" rel="nofollow noopener noreferrer">Plain text Offenders</a>.</p>
<p><strong>How to create secure passwords</strong></p>
<p>Read the National Institute on Standards and Technology&#8217;s <a href="https://pages.nist.gov/800-63-3/sp800-63b.html" target="_blank" rel="nofollow noopener noreferrer">2017 password guidelines.</a></p>
<p>1. Manually creating passwords</p>
<p>You will basically pick numbers, characters, and symbols at random and keep doing so until you have created a fairly long password. The upside is that it is easy to do, but the downside is that you will probably not pick very random passwords.</p>
<p>2. Web pages that create secure passwords</p>
<p>There are several websites that help you generate secure passwords. Keep in mind that having to visit a website every time you need to generate a password, becomes inconvenient really fast.</p>
<ul>
<li><a href="https://www.grc.com/haystack.htm" target="_blank" rel="nofollow noopener noreferrer">GRC </a>has a password haystack page that helps compute how long it would take to hack a given password.</li>
<li><a href="https://www.grc.com/passwords.htm" target="_blank" rel="nofollow noopener noreferrer">GRC</a> also has a page that generates high-security passwords.</li>
<li><a href="http://www.pctools.com/guides/password/" target="_blank" rel="nofollow noopener noreferrer">PC Tools</a> helps you generate secure passwords with customizable criteria</li>
</ul>
<p>3. Software Utilities</p>
<p>Several free software programs can also help you generate secure passwords. Most of these programs also store the passwords, so they&#8217;ll be covered in the section below.</p>
<p>4. Password testers</p>
<p>It is best to test your password&#8217;s security with the hacking tools the expert hackers use. Windows-based password hacking utilities include: <a href="http://www.openwall.com/john/" target="_blank" rel="nofollow noopener noreferrer">John the Ripper</a> password cracker, <a href="https://sectools.org/tool/cain/" target="_blank" rel="nofollow noopener noreferrer">Cain and Abel</a> (Windows only)</p>
<p>5. Password recovery questions or security questions</p>
<p>We recommend that users enter secure passwords in these fields and <strong>not</strong> the true answer. Hackers can and have mined social media including Facebook to extract answers to these questions. You can alternately put in the correct answer and then consistently append a word to it.</p>
<p>6. Need to register and generate a password to see content?</p>
<p><a href="http://bugmenot.com/" target="_blank" rel="nofollow noopener noreferrer">BugMeNot.com</a> is a database of usernames and passwords for sites that require logging in to see content.</p>
<p>7. If you use Steam, turn on Steam Guard so you need to respond to an email or use a mobile code every time you login to Steam from a new computer. Blizzard has an addon <a href="https://us.battle.net/support/en/article/24520" target="_blank" rel="nofollow noopener noreferrer">two factor authentication</a> app to protect their gaming logins for iOS, and they also have a hardware authenticator for sale.</p>
<p><a href="https://arstechnica.com/security/2017/05/thieves-drain-2fa-protected-bank-accounts-by-abusing-ss7-routing-protocol/" target="_blank" rel="nofollow noopener noreferrer">Two factor authentication systems using SMS text messages are not secure</a>, due to hijacking of mobile phone accounts and the weak SS7 routing system. Even <a href="https://www.cnbc.com/2018/08/01/reddit-hack-shows-even-strong-security-measures-can-be-bypassed.html" target="_blank" rel="nofollow noopener noreferrer">Reddit</a> got hacked this way. We suggest <strong>only</strong> using two factor when you can use a physical token or a time based <a href="https://www.safegadget.com/139/hacked-internet-things-database/" target="_blank" rel="nofollow noopener noreferrer">authenticator like Google&#8217;s</a>. Send text messages to a VoIP number such as Google Voice  instead. Do not allow Google Voice to forwards Texts/Calls to your main number.</p>
<p><a href="https://support.google.com/accounts/answer/6103523?co=GENIE.Platform%3DiOS&amp;hl=en" target="_blank" rel="nofollow noopener noreferrer">Google Smart Lock</a> is also a great way to generate second factor authentication but using your iPhone or Android phone and their app.</p>
<ul>
<li>A <a href="https://www.issms2fasecure.com/assets/sim_swaps-01-10-2020.pdf" target="_blank" rel="nofollow noopener noreferrer">new paper</a> in 2020 from Princeton researchers shows how easy it is to pull off a SIM Swap against AT&amp;T, Verizon, T-Mobile and others.</li>
</ul>
<p>Many sites give alternate methods of logging in, if you do not have your second factor available. Commonly these are using your social security number or birthday, data that could be publically found.  This helps negates the advantage of two factor.</p>
<p>In the end, using Two Factor authentication is better than not using it.</p>
<p>These keys are more secure than using Text or SMS to send a one time code. Criminals can divert SMS messages and calls, to another device (either by social engineering a customer service person at the phone company, or via more advanced attacks like <a href="https://www.google.com/search?q=ss7+attack&amp;oq=ss7+attack&amp;aqs=chrome.0.0l6.1527j0j7&amp;sourceid=chrome&amp;ie=UTF-8" target="_blank" rel="noopener noreferrer">SS7 hacks</a>).</p>
<p>8. There are password cracking utilities from companies like <a href="http://www.elcomsoft.com/" target="_blank" rel="nofollow noopener noreferrer">Elcomsoft</a> that can break the encryption on many programs and even smartphones. Keep this in mind when assessing the security of a product.</p>
<p>9. If you are buying a new notebook, consider buying one with a hardware security module built-in. The new <a href="http://www.intel.com/Ultrabook" target="_blank" rel="nofollow noopener noreferrer">Intel Ultrabook</a> lightweight notebook specification includes support for a <a href="http://ipt.intel.com/welcome.aspx" target="_blank" rel="nofollow noopener noreferrer">IPT</a> Identity Protection Technology hardware security module or Trusted Platform Module (TPM) that can enhance security by requiring both a password and this hardware key to access certain websites.</p>
<p><strong>How to store and use secure passwords</strong></p>
<p>1. Do not store your passwords in a simple Word or text document. Also, do not write your passwords on a piece of paper or Post-it note. Obviously, your passwords could be easily stolen this way. Storing password in a browser is also a no-no. They have been hacked easily. If you really need to write down your passwords, only write down parts of your passwords and or login, and leave the rest blank.</p>
<p>2. The best place to generate and store passwords is a password wallet utility program.  Our goal is to find a Multi-platform PC, Mac, iOS and Android compatible program that can create  secure passwords, save the passwords, and automatically fill forms with the secure passwords. Here are some examples:</p>
<ul>
<li><a href="https://lastpass.com/" target="_blank" rel="nofollow noopener noreferrer">Lastpass </a>&#8211; A password manager that works on Windows, Mac, Apple iOS, Linux, WebOS, Windows phone, Symbian, Android, and Blackberry. Stores data on the web for access anywhere and at anytime. Automatic form filling, one click login. Supports Yubikey, multi-factor authentication including Google two step authentication. Free for mobile users starting in August 2015. Make sure you have Password Iterations set <strong>higher</strong> than 1. Downside: Mobile version costs money, data is stored on their servers. A two factor authentication system using SMS text messages is not secure.</li>
<li><a href="http://keepass.info/" target="_blank" rel="nofollow noopener noreferrer">KeePass</a> &#8211; Open source password manager with auto type capabilities. Available for Windows.  Unofficial versions for Apple iOS, Android, Mac, Linux. Be sure to select the options to:
<ul>
<li><strong>Lock workspace after KeePass inactivity</strong></li>
<li>Lock workspace after global user inactivity</li>
<li>Lock workspace when minimizing main window</li>
<li>Lock workspace when locking the computer or switching the user</li>
<li>Lock workspace when the computer is about to be suspended</li>
<li>Lock workspace when the remote control mode changes</li>
<li><strong>Downside</strong>: Password database is stored locally, no online synchronization.</li>
</ul>
</li>
<li><a href="http://download.cnet.com/1Password/3000-18501_4-95581.html" target="_blank" rel="nofollow noopener noreferrer">1Password </a>-A $49.99 password and identity manager that automatically save and fill website logins. Supports Apple iOS, Android, Mac, and Windows.<br />
<strong>Downside</strong>: Cost, Can&#8217;t retrieve master password.</li>
<li><a href="https://www.passpack.com/" target="_blank" rel="nofollow noopener noreferrer">Passpack </a>&#8211; Free version supports up to 100 logins. Windows only. Supports most browsers. Supports yubikey. Uses Adobe Air. Allows sharing of logins.<br />
<strong>Downside</strong>: Adobe AIR only. (No iOS support)</li>
<li><a href="http://passwordsafe.sourceforge.net/" target="_blank" rel="nofollow noopener noreferrer">Password Safe</a> &#8211; Open source password manager for Windows.<br />
<strong>Downside</strong>: Windows only.</li>
<li><a href="http://www.roboform.com/" target="_blank" rel="nofollow noopener noreferrer">Roboform</a> &#8211; A password and wallet manager for Mac and Windows that is complete with 1-Click form filling. One identity is Free, Unlimited Logins, Identities, Bookmarks, Safenotes and more cost $29.95.<br />
Roboform everywhere supports Apple iOS devices, Windows phone, symbian, Palm, Android, and Blackberry. It costs $9.95 for the first year. $19.99/year thereafter.<br />
<strong>Downside</strong>: Cost, occasionally pops up when not needed, smartphone apps can&#8217;t fill forms, remote access doesn&#8217;t allow editing form-fill data.</li>
<li><a href="http://www.clipperz.com/" target="_blank" rel="nofollow noopener noreferrer">Clipperz</a> &#8211; Free Online password manager from an Italian company.<br />
<strong>Downside</strong>: Web based, requires connection.</li>
<li><a href="https://stephenhaunts.com/projects/safe-pad/" target="_blank" rel="nofollow noopener noreferrer">SafePad</a> &#8211; Is a notepad with password protection</li>
</ul>
<p>Our recommendation is to use one of the password managers above for most of your passwords, while remembering a couple important passwords through memorization. Your e-mail, online banking, and online trading passwords <strong>should not</strong> be stored within these password managers.</p>
<p><strong>Important:</strong> If you use a password manager and use its convenient form filler, <strong>DO NOT enable automatic form filling. </strong>You could be brought to a malicious page and have all your information automatically entered on it, before you realized it.</p>
<p>3. Never send your password via email, over a social network like Facebook, or via phone.</p>
<p>4. Do not forget to backup your Google account with <a href="https://www.google.com/takeout/" target="_blank" rel="nofollow noopener noreferrer">Google Takeout</a></p>
<p>We have covered many ways for you to create, store, and use secure passwords. If more people utilized the techniques covered above, fewer password intrusions would occur.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.safegadget.com/34/how-to-create-store-and-use-secure-passwords/feed/</wfw:commentRss>
			<slash:comments>16</slash:comments>
		
		
			</item>
		<item>
		<title>How to: Safe Online Shopping</title>
		<link>https://www.safegadget.com/46/how-to-safe-online-shopping/</link>
					<comments>https://www.safegadget.com/46/how-to-safe-online-shopping/#comments</comments>
		
		<dc:creator><![CDATA[SafeGadget]]></dc:creator>
		<pubDate>Tue, 01 Jan 2019 08:00:32 +0000</pubDate>
				<category><![CDATA[Browser]]></category>
		<category><![CDATA[Firefox]]></category>
		<category><![CDATA[Google Chrome]]></category>
		<category><![CDATA[Internet Explorer]]></category>
		<category><![CDATA[Macintosh]]></category>
		<category><![CDATA[Online Service]]></category>
		<category><![CDATA[Online Shopping]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[online shopping]]></category>
		<guid isPermaLink="false">http://www.safegadget.com/?p=46</guid>

					<description><![CDATA[Last Update: 1/22/2020 Online shopping has been gaining market share every year. Security breaches make headlines almost daily. With more and more shoppers going online, consumers are worried more than ever about keeping their online shopping safe and secure. In this article, we will help you shop more securely. Secure your computer, web browser, Internet &#8230; <a href="https://www.safegadget.com/46/how-to-safe-online-shopping/" class="more-link">Continue reading<span class="screen-reader-text"> "How to: Safe Online Shopping"</span></a>]]></description>
										<content:encoded><![CDATA[<p>Last Update: 1/22/2020</p>
<p><img loading="lazy" decoding="async" src="http://www.safegadget.com/i/computers/PC-Desktop-Computer.jpg" alt="PC, desktop computer" width="400" height="267" /></p>
<p>Online shopping has been gaining market share every year. Security breaches make headlines almost daily. With more and more shoppers going online, consumers are worried more than ever about keeping their online shopping safe and secure. In this article, we will help you shop more securely.</p>
<p><strong>Secure your computer, web browser, Internet connection<br />
</strong></p>
<p>Follow our guides to <a title="How to: Internet Security and Windows Security Made Easy" href="http://www.safegadget.com/16/how-to-internet-security-and-windows-security-made-easy/">secure your Windows PC</a> or <a title="Free Security How to: Computer Security, Computer Protection on Macintosh" href="http://www.safegadget.com/30/free-security-how-to-computer-security-computer-protection-on-macintosh/">secure your Macintosh</a> by installing the right software, firewall, antivirus software, etc. Secure your mobile devices: <a title="iPhone Security, How to securely use your iPhone" href="http://www.safegadget.com/51/iphone-security-how-to-securely-use-your-iphone/">iPhone</a>, <a title="Android Smartphone Security, How to securely use your Android Smartphone or Tablet" href="http://www.safegadget.com/54/android-smartphone-security-how-to-securely-use-your-android-smartphone/">Android smartphone or tablet</a>, <a title="iPad Security, How to securely use your iPad" href="http://www.safegadget.com/53/ipad-security-how-to-securely-use-your-ipad/">iPad</a>. Configure the settings and add plug-ins to you web browser so that it is more secure. Consult our tutorials for: <a title="Secure Internet Explorer 9 Browsing" href="http://www.safegadget.com/41/secure-internet-explorer-9-browsing/">Internet Explorer 9</a>, <a title="Secure Google Chrome Browsing" href="http://www.safegadget.com/45/secure-google-chrome-browsing/">Google Chrome</a>, and <a title="Secure Firefox Browsing" href="http://www.safegadget.com/44/secure-firefox-browsing/">Mozilla Firefox</a>. Secure your Internet Connection: <a title="How to Setup a Secure Wireless Network Router" href="http://www.safegadget.com/28/how-to-setup-a-secure-wireless-network-router/">Wireless Network</a>, Public Wi-Fi.</p>
<p>1. Configure your wireless router for optimal security. Consult our article <a href="http://www.safegadget.com/28/how-to-setup-a-secure-wireless-network-router/">How to set up a secure wireless router</a> for details. For maximum security, do your online shopping when connected by a hardwired connection such as Ethernet.</p>
<p>2. Ensure that your operating system is set up securely. Consult our <a title="How to: Internet Security and Windows Security Made Easy" href="http://www.safegadget.com/16/how-to-internet-security-and-windows-security-made-easy/">computer security guides for Windows</a> and <a title="Free Security How to: Computer Security, Computer Protection on Macintosh" href="http://www.safegadget.com/30/free-security-how-to-computer-security-computer-protection-on-macintosh/">Macintosh</a>. For maximum security, you could <a href="http://www.safegadget.com/35/how-to-use-linux-for-more-secure-computing/">start off a Linux boot CD or USB key</a>.</p>
<p>Burning Linux Live CD to a write only media such as a CD/DVD or a <a href="https://www.amazon.com/Kanguru-FlashTrust-WP-KFT3-Drive-WP-KFT3-8G/dp/B00NW4P9A2/" target="_blank" rel="nofollow noopener noreferrer">USB drive with Write protect switch</a>, helps prevent any changes to a virgin Linux distribution. Keep in mind that no bookmarks, password managers, etc would be accessible.</p>
<p>The CD versions do take many minutes to boot up and ask you if you want to try Linux, so the USB route is definitely preferred.</p>
<p><span id="more-46"></span></p>
<p>3. Secure your Internet browser. Consult our <a title="Secure Internet Explorer 9 Browsing" href="http://www.safegadget.com/41/secure-internet-explorer-9-browsing/">security guides to Internet Explorer</a>, <a title="Secure Firefox Browsing" href="http://www.safegadget.com/44/secure-firefox-browsing/">Firefox</a>, and <a title="Secure Google Chrome Browsing" href="http://www.safegadget.com/45/secure-google-chrome-browsing/">Google Chrome</a>.</p>
<p>4. Make sure you are shopping at a <strong>reputable</strong> online store that has a good reputation. Gone are the days when you could score a stellar deal on a iPad from a no-name vendor. Online shops need to buy and sell in volume to produce low prices. Check vendor review sites like <a href="http://www.google.com/products/seller?zmi=amazon.com&amp;q=ipod&amp;hl=en" target="_blank" rel="nofollow noopener noreferrer">Google Product Search</a>, <a href="https://www.bbb.org/search" target="_blank" rel="nofollow noopener noreferrer">BBB online</a>, or <a href="http://www.resellerratings.com/" target="_blank" rel="nofollow noopener noreferrer">Reseller ratings</a> for feedback.</p>
<p>5. Type the URL for the shop <strong>directly</strong> in the address bar, do not rely on a link from email.  This helps prevent phishing scans. Make sure you are accessing the online store&#8217;s website using a secure connection, look for <strong>https://</strong> in the browser&#8217;s address bar and a padlock icon <img loading="lazy" decoding="async" class="alignnone" title="https secure browsing, padlock icon" src="http://www.safegadget.com/favicon.ico" alt="" width="16" height="16" /> in the browser. A broken key, broken padlock, or any open lock indicates it is not secure. If you want to ensure security, see if the online store takes orders over the phone.</p>
<p>6. When creating an account at the online store, we recommend you use a <strong>unique</strong> password as it is far safer in case the store gets hacked. You would not want hackers to get a password that worked on other websites. Consult our <a href="http://www.safegadget.com/34/how-to-create-store-and-use-secure-passwords/">How to create, store and use secure passwords</a> article for suggestions. Using Paypal, Apple Pay, or Google Pay also solves the unique password problem.</p>
<p>7. Pay for your purchase with a credit card and not a debit card or check. This gives you the best purchase protection, under Federal law your liability is limited to $50.</p>
<p>Some credit cards allow you to create <strong>single use, virtual, or disposable</strong> credit card numbers. Try to use these unique credit card numbers whenever possible. Check your credit card issuer&#8217;s website to see if they offer this feature.</p>
<p>If possible, <strong>do not allow the online store to save</strong> your credit card number.</p>
<p>Remove your credit card and use prepaid gift cards on Facebook, iTunes, Playstation Network, and Xbox Live.</p>
<p>8. Another method to avoid transmitting your credit card number is by using <a href="https://pay.google.com/" target="_blank" rel="nofollow noopener noreferrer">Google pay</a> or <a href="https://www.paypal.com/" target="_blank" rel="nofollow noopener noreferrer">PayPal access</a>. These checkout systems store your credit card number and prevent the number from being seen by the online store. Additionally when paying with PayPal, select the option that causes payment to come from your credit card, not from your bank account. This gives you more recourse in case of problems.</p>
<p style="text-align: center;"><a title="PayPal Security Key eBay" href="/i/online-shopping/PayPal-Security-Key-eBay.jpg" rel="lightbox-album"><img loading="lazy" decoding="async" class="pic" src="/i/online-shopping/PayPal-Security-Key-eBay.jpg" alt="PayPal Security Key eBay" width="200" height="150" /></a></p>
<p>9. If you are using PayPal or buying from eBay, consider purchasing their <a href="https://cms.paypal.com/us/cgi-bin/?cmd=_render-content&amp;content_ID=security/security_key" target="_blank" rel="nofollow noopener noreferrer">PayPal Security Key</a> that adds an additional log on step. You need to hit the button on the security key and type in the security code it displays before you can log into eBay or PayPal.</p>
<p>These keys are more secure than using Text or SMS to send a one time code. Criminals can divert SMS messages and calls, to another device (either by social engineering a customer service person at the phone company, or via more advanced attacks like <a href="https://www.google.com/search?q=ss7+attack&amp;oq=ss7+attack&amp;aqs=chrome.0.0l6.1527j0j7&amp;sourceid=chrome&amp;ie=UTF-8" target="_blank" rel="noopener noreferrer">SS7 hacks</a>).</p>
<p><a href="https://arstechnica.com/security/2017/05/thieves-drain-2fa-protected-bank-accounts-by-abusing-ss7-routing-protocol/" target="_blank" rel="nofollow noopener noreferrer">Two factor authentication systems using SMS text messages are not secure</a>, due to hijacking of mobile phone accounts and the weak SS7 routing system. Even <a href="https://www.cnbc.com/2018/08/01/reddit-hack-shows-even-strong-security-measures-can-be-bypassed.html" target="_blank" rel="nofollow noopener noreferrer">Reddit</a> got hacked this way. We suggest <strong>only</strong> using two factor when you can use a physical token or a time based <a href="https://www.safegadget.com/139/hacked-internet-things-database/" target="_blank" rel="nofollow noopener noreferrer">authenticator like Google&#8217;s</a>. Send text messages to a VoIP number such as Google Voice  instead.</p>
<ul>
<li>A <a href="https://www.issms2fasecure.com/assets/sim_swaps-01-10-2020.pdf" target="_blank" rel="nofollow noopener noreferrer">new paper</a> in 2020 from Princeton researchers shows how easy it is to pull off a SIM Swap against AT&amp;T, Verizon, T-Mobile and others.</li>
</ul>
<p>10. Sign up for alerts from your credit card vendor by email or text message. This will allow you to respond to any credit card fraud rapidly. Also carefully check each month&#8217;s credit card statement for erroneous or fraudulent charges. Consider checking your outstanding charges every couple of weeks via the credit card company&#8217;s website.</p>
<p>11. When shopping on a smartphone or tablet, using the built in 3G/4G connection is a lot safer than connecting via a local wireless internet hotspot. This warning applies to both apps and mobile internet browsers.</p>
<p>12. Explicitly <strong>logout</strong> of a website after you are finished.  Do not just close the browser.  This helps terminate your session officially.</p>
<p>13. Print out the confirmation screen of your order to ensure you do not get overcharged.</p>
<p><strong>Things Not To Do</strong></p>
<p>1. Do not shop when using public wifi hot spots or when using a shared computer in a cyber cafe. Many of these locations provide little to no security and are prone to snooping or malware. This warning also includes smartphones and tablets connected to public wireless internet.</p>
<p>Do you perform all the above?  Do you have other security tips?</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.safegadget.com/46/how-to-safe-online-shopping/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Android Smartphone Security, How to securely use your Android Smartphone or Tablet</title>
		<link>https://www.safegadget.com/54/android-smartphone-security-how-to-securely-use-your-android-smartphone/</link>
					<comments>https://www.safegadget.com/54/android-smartphone-security-how-to-securely-use-your-android-smartphone/#comments</comments>
		
		<dc:creator><![CDATA[SafeGadget]]></dc:creator>
		<pubDate>Tue, 01 Jan 2019 08:00:12 +0000</pubDate>
				<category><![CDATA[Android]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[Computer Hardware]]></category>
		<category><![CDATA[Google Chrome]]></category>
		<category><![CDATA[Online Shopping]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Smartphone]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Virus]]></category>
		<category><![CDATA[Wireless Networking]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Lock Screen]]></category>
		<category><![CDATA[QuadRooter]]></category>
		<category><![CDATA[SSL]]></category>
		<category><![CDATA[Stagefright]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">http://www.safegadget.com/?p=54</guid>

					<description><![CDATA[Last Updated: June 18, 2019 Google&#8217;s Android operating system powers many popular cellphones including the popular Samsung Galaxy S10. Most Android Smartphone users as well as most of the pubic at large do not think very much about security. If your phone is not running the latest Android Monthly security patches or is Android 6 or &#8230; <a href="https://www.safegadget.com/54/android-smartphone-security-how-to-securely-use-your-android-smartphone/" class="more-link">Continue reading<span class="screen-reader-text"> "Android Smartphone Security, How to securely use your Android Smartphone or Tablet"</span></a>]]></description>
										<content:encoded><![CDATA[<p>Last Updated: June 18, 2019</p>
<p><a href="https://www.safegadget.com/wp-content/uploads/2018/02/Samsung-S9.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-543" src="https://www.safegadget.com/wp-content/uploads/2018/02/Samsung-S9.jpg" alt="" width="225" height="225" srcset="https://www.safegadget.com/wp-content/uploads/2018/02/Samsung-S9.jpg 458w, https://www.safegadget.com/wp-content/uploads/2018/02/Samsung-S9-150x150.jpg 150w, https://www.safegadget.com/wp-content/uploads/2018/02/Samsung-S9-300x300.jpg 300w" sizes="auto, (max-width: 225px) 85vw, 225px" /></a></p>
<p>Google&#8217;s <a href="http://www.amazon.com/mn/search?_encoding=UTF8&amp;x=0&amp;y=0&amp;field-keywords=samsung%20galaxy%20s2&amp;url=search-alias%3Delectronics&amp;sprefix=samsung%20gala?url=search-alias=electronics&amp;_encoding=UTF8&amp;tag=easyeco0d-20&amp;linkCode=ur2&amp;camp=1789&amp;creative=390957" target="_blank" rel="nofollow noopener noreferrer">Android</a> operating system powers many popular cellphones including the popular <a href="http://www.amazon.com/mn/search?_encoding=UTF8&amp;x=0&amp;y=0&amp;field-keywords=samsung%20galaxy%20s2&amp;url=search-alias%3Delectronics&amp;sprefix=samsung%20galaxy&amp;_encoding=UTF8&amp;tag=easyeco0d-20&amp;linkCode=ur2&amp;camp=1789&amp;creative=390957" target="_blank" rel="noopener noreferrer">Samsung Galaxy S10</a>. Most Android Smartphone users as well as most of the pubic at large do not think <em>very much</em> about security.</p>
<p>If your phone is <strong>not</strong> running the latest Android <a href="https://www.android.com/security-center/monthly-security-updates/" target="_blank" rel="nofollow noopener noreferrer">Monthly security patches</a> or is Android 6 or older, you are <strong>open to attack. </strong>A recent <a href="https://www.google.com/webhp?sourceid=chrome-instant&amp;ion=1&amp;espv=2&amp;ie=UTF-8#q=site:wsj.com+google+mends+gaps+in+android+security&amp;*" target="_blank" rel="nofollow noopener noreferrer">Wall Street Journal article</a> showed that only <strong>2.8%</strong> of Android devices have the latest security patches. Compare that to 79% of iPhones, due to Apple&#8217;s more uniform eco-system.</p>
<p><strong>As of February 2019 only Android 7 to 9 receive security updates now)</strong></p>
<p><strong>Most Up to Date Android Smartphones</strong></p>
<ul>
<li><a href="https://www.verizonwireless.com/smartphones/google/" target="_blank" rel="nofollow noopener noreferrer">Google Pixel</a> 3</li>
</ul>
<p>This flagship phone runs the latest Android version and is patched regularly. Sold directly from Google or from a couple wireless carriers.</p>
<p>You can check this <a href="https://support.google.com/nexus/answer/4457705?hl=en" target="_blank" rel="nofollow noopener noreferrer">Google Support page</a> that shows when updates will be available for Google devices and when devices stop getting updates.</p>
<p><span id="more-54"></span></p>
<p>Keep in mind that <a href="https://www.helpnetsecurity.com/2018/04/16/android-patching-issues/" target="_blank" rel="nofollow noopener noreferrer">some companies claim to have all the latest security patches but may not.</a></p>
<p>We will cover some techniques to enhance your Android phone security.</p>
<p><strong>Obsolete Hardware</strong></p>
<p>Most hardware vendors like Samsung <strong>stop</strong> issuing updates after 3 years of release.  Need a good reason to upgrade to a new phone?  This is it. Incapacitate then recycle your old phone to prevent reuse.</p>
<p><a href="https://security.samsungmobile.com/workScope.smsb" target="_blank" rel="nofollow noopener noreferrer">Samsung</a> has a page that lists which devices are still getting updates, as does <a href="https://support.google.com/pixelphone/answer/4457705?hl=en" target="_blank" rel="nofollow noopener noreferrer">Google</a>.</p>
<p><a href="https://www.samsung.com/levant/support/smart-switch/" target="_blank" rel="nofollow noopener noreferrer">Samsung SmartSwitch</a> helps you update phones on Windows or Mac.</p>
<p>If you have an Phone or Tablet that no longer gets updates, we would recycle it and buy a new one RIGHT away. Keep in mind that <a href="https://source.android.com/security/bulletin/2017-07-01#broadcom-components" rel="nofollow">Android Patch in July 2017</a> is the first version that fixed a <a href="https://arstechnica.com/information-technology/2017/07/broadcom-chip-bug-opened-1-billion-phones-to-a-wi-fi-hopping-worm-attack/">Huge Broadcom Wi-Fi bug</a>. Without that fix, you can get hacked by just having a Wi-Fi signal nearby.</p>
<p><strong>Google Play Protect</strong></p>
<ul>
<li>Be sure your device is running <a href="https://www.android.com/play-protect/" target="_blank" rel="noopener noreferrer">Google Play Protect</a>.  It scans for Malware and bad apps. This was release in July 2017 and runs on Google Play Services 11 or higher. This is a unification of Android security systems like Verify Apps, browser protection, and anti-theft measures.</li>
</ul>
<p><strong>You need to test your Android Device for Vulnerabilities</strong></p>
<p>Here are the major security holes that you need to test your phone against.  If your phone fails any of these, get it <em>updated </em>or buy a <strong>new</strong> phone.</p>
<p>2/1/2019: <a href="https://source.android.com/security/bulletin/2019-02-01.html" target="_blank" rel="noopener noreferrer">Google</a> has patch a major bug in Android where you can get hacked just by looking at a picture in a SMS, Email, or web page!  Update your Android software to Patch Level February 2019 or later, right away.  If your phone no longer gets updates, please consider buying a new one.</p>
<p><a href="https://www.checkpoint.com/resources/quadrooter-vulnerability-consumer/" target="_blank" rel="noopener noreferrer">QuadRooter</a> &#8211; <a href="http://blog.checkpoint.com/2016/08/07/quadrooter/" target="_blank" rel="nofollow noopener noreferrer">Learn more</a> about this issue. August 2016</p>
<p><a href="https://blog.avast.com/2015/11/05/droidjack-isnt-the-only-spying-software-out-there-avast-discovers-that-omnirat-is-currently-being-used-and-spread-by-criminals-to-gain-full-remote-co" target="_blank" rel="nofollow noopener noreferrer">DroidJack</a> Remote spying &#8211; <a href="http://droidjack.net/" target="_blank" rel="nofollow noopener noreferrer">Learn more</a> about this issue. August 2015</p>
<p><a href="https://play.google.com/store/apps/details?id=com.zimperium.stagefrightdetector" target="_blank" rel="nofollow noopener noreferrer">Stagefright</a> MMS Flaw- <a href="https://en.wikipedia.org/wiki/Stagefright_(bug)" target="_blank" rel="nofollow noopener noreferrer">Learn more</a> about this issue. August 2015</p>
<p><a href="https://play.google.com/store/apps/details?id=com.zimperium.zshellshock" target="_blank" rel="nofollow noopener noreferrer">Shellshock</a> &#8211; <a href="https://en.wikipedia.org/wiki/Shellshock_(software_bug)" target="_blank" rel="nofollow noopener noreferrer">Learn more</a> about this issue. September 2014</p>
<p><strong>Why is Android more susceptible to attack?</strong></p>
<ul>
<li>Older Smartphones with unpatched old versions of Android</li>
<li>Many phones <strong>never</strong> being given latest updates</li>
<li>Bigger audience to attack due to market share</li>
<li>Chipset vendors fixes slow to reach public</li>
<li>Multiple App stores</li>
<li>Apps are not thoroughly vetted</li>
<li>Bloatware, trialware from handset makers</li>
<li>Malware introduced in production chain</li>
</ul>
<p>The Android Smartphone is part of Android&#8217;s open ecosystem, making viruses and malware more possible than closed platforms like the iPhone. As the Android Smartphone has grown in popularity, the smartphone has become more of a target by hackers and criminals. The DroidDream and Plankton Android malware infected over 250,000 phones before anyone discovered their malware. Google removed over 58 malicious apps from this single malware. A recent survey has shown that only 30% of Android Smartphone users installed security software on their phones. Malware can grab private data or use the phone to communicate externally.<br />
Carrier IQ is a <a href="http://news.cnet.com/8301-31921_3-57335715-281/how-carrier-iq-was-wrongly-accused-of-keylogging/?tag=mncol;topStories" target="_blank" rel="nofollow noopener noreferrer">controversial</a> piece of software that can show you what certain Android phones and spyware can do if the carriers allow it.</p>
<p>It is important that Android Smartphone users immediately become more vigilant about smartphone security. Our tutorial covers the Android Smartphones running most versions of the Android operating system.</p>
<p><a href="http://androidvulnerabilities.org/" target="_blank" rel="nofollow noopener noreferrer">Android Vulnerabilities.org</a> gives a snapshot of how many devices are insecure.</p>
<p><strong>The NSA and Android</strong></p>
<p>Did you know that the NSA has been programming for Android and has inserted its code into the operating system? This has been happening since 2011 and has been focused on adding code to prevent hackers and marketers from accessing personal data on your Android device. Devices including the Samsung Galaxy S4 and HTC One have NSA code embedded, but not enabled by default. Apple does not accept code from government agencies. Android is open source, so programmers can more easily scrutinize every line of code that is in it. Hopefully the NSA will not add monitoring code in the future.</p>
<p><strong>1. Android Smartphone Software Updates</strong></p>
<p>Google upgrades the Android software for the Android Smartphone <a href="https://www.android.com/security-center/monthly-security-updates/" target="_blank" rel="nofollow noopener noreferrer">all the time.</a> Montly Updates include additional functionality as well as security bug fixes. It is important that users apply updates <strong>immediately</strong>. Yes, updates take a while to install, but you do need to do it right away. Contact your smartphone vendor for the latest Android software update to your handset.</p>
<p>Some handset makers take their time to release Android updates.  <em><strong>Beware</strong></em>. This is the MAIN reason why millions of Android phones go <strong>unpatched</strong>.  Buy a phone that use plain Android and can take updates directly from Google, like the Google Nexus or Pixel line.</p>
<p><a href="http://www.darkreading.com/6-ways-to-keep-androids-safe-/d/d-id/1326132" target="_blank" rel="nofollow noopener noreferrer">90 percent of Android devices two years or older have an operating system that’s vulnerable.</a></p>
<p><strong>Replacing an Android Phone due to Lack of Updates</strong></p>
<p>If you have an Android Smartphone that does not get the latest Android updates, we highly recommend you <strong>REPLACE</strong> the smartphone with a new one that does. Unfortunately you will need to switch phones every 2-3 years to keep up to date. Recycle the phone, <strong>do not give it away.</strong></p>
<p>This <a href="https://support.google.com/nexus/answer/4457705?hl=en" target="_blank" rel="nofollow noopener noreferrer">Google support page</a>  shows you the status of Google Nexus Software updates and security updates.</p>
<p>These Nexus phones, tablets are have no guaranteed security updates after October 2017!</p>
<ul>
<li>Nexus 10</li>
<li>Nexus 9</li>
<li>Nexus 7</li>
<li>Nexus 6</li>
<li>Nexus 5</li>
<li>Nexus 4</li>
</ul>
<p>If you <strong>Root</strong> your Android Smartphone, you need to be <em>extra careful</em> with regards to security as updates are much more difficult for you. Be careful where you obtain your Android Apps as malware is much more prevalent. Rooting also exposes your device&#8217;s internal hardware to software much more so than normal. This is the equivalent of running your PC as Administrator.</p>
<p><strong>2. Android Smartphone App Security</strong></p>
<p>Apple&#8217;s App Store reviews all submissions before adding them, but Google does not thoroughly review Apps added to their store. Google does run a security scanner on apps to ensure that they do not include known malware. There have been several occasions where Apps containing malware have entered the <a href="https://market.android.com/" target="_blank" rel="nofollow noopener noreferrer">Google play formerly known as Android Market</a>.</p>
<p><strong>Neither</strong> App Store technique is full proof, <strong>users</strong> need to be careful when installing apps.</p>
<p>Apps are prone to security vulnerabilities that are fixed by updates. Keep apps updated regularly and remove apps that you do not use. To update applications do the following:</p>
<ul>
<li>Tap the <strong>Notification menu</strong> at the top and drag it downwards. If there are App updates available, they will be shown</li>
<li>Tap on App updates to bring you to Google play formerly known as Android Market</li>
<li>Tap the App to be updated</li>
<li>Repeat the process for all Apps</li>
</ul>
<p>Google has the ability to remotely remove malicious apps from your Android Smartphone. This is <strong>NOT</strong> true if you buy from 3rd party App store.</p>
<p>When installing new Apps, we suggest you install well known Apps from <a href="https://market.android.com/" target="_blank" rel="nofollow noopener noreferrer">Google play formerly known as Android Market</a> or <a href="http://www.amazon.com/mobile-apps/b?ie=UTF8&amp;node=2350149011&amp;ref_=sd_allcat_adr_app&amp;_encoding=UTF8&amp;tag=easyeco0d-20&amp;linkCode=ur2&amp;camp=1789&amp;creative=390957" target="_blank" rel="nofollow noopener noreferrer">Amazon App Store</a> with positive reviews, and avoid brand new Apps from unfamiliar companies, and unofficial 3rd party App stores like mmoovv.com or samsunggalaxy-s.ru.This becomes a problem when the official App Market is blocked, such is the case in China.</p>
<p>It is fairly easy to repackage free Apps into a clone of the App. Repackaged Apps that also include Malware or Spyware have been encountered on 3rd party Android Markets. Free pirated versions of paid Apps are also found on 3rd party sites. Download only from the official App Market and give new Apps time to build trust and to allow others to help test the App for malware and security risks.</p>
<p>Users also need to be aware that scareware where apps are displaying advertisements for battery saving apps have been tied to malware. If the user taps on the ad, your phone&#8217;s browser launches and proceeds to download the apps file. These apps could endanger your privacy by stealing your address book, or cause money to be withdrawn from your accounts via costly phone calls or SMS messages.</p>
<p><strong>3. Suggested Android Smartphone Settings for Security</strong></p>
<p>Below are several suggestions for Android Smartphone settings to increase security on the smartphone. If you use swipe patterns to unlock the phone, make sure you clean your Android devices&#8217; screen regularly otherwise people can see how your pattern looks.  Doing repeated circular or square patterns helps foil thieves.</p>
<p>Enable Passcode</p>
<ul>
<li>Open <strong>Settings<br />
</strong></li>
<li>Select <strong>Security</strong></li>
<li>Select <strong>Screen Lock</strong></li>
<li>Select <strong>Password</strong></li>
<li>Enter a Passcode &#8211; Do not select an obvious passcode like 1234a or 1111a</li>
</ul>
<p>Google automatically encrypts its Nexus smartphones, but other companies are not required to do this. As of 2016, less than 10% of Android phones had encryption enabled. 80% of iPhones had encryption turned on. Android 6 Marshmallow requires encryption to be enabled by default.</p>
<p>Encrypt your Android Smartphone and require a PIN or password to decrypt it every time you power it on. It takes an hour or longer to initially encrypt your Smartphone. Older Android phones many operate slower when encryption is enabled. Launching apps might take a second or two longer. Turning on encyption requires a full battery or the phone connected to a charger.</p>
<ul>
<li>Open <strong>Settings<br />
</strong></li>
<li>Select <strong>Security</strong></li>
<li>Select <strong>Encrypt phone</strong></li>
<li>Click<strong> Encrypt phone</strong></li>
</ul>
<p>Lock SIM card makes your phone require a PIN before becoming enabled.</p>
<ul>
<li>Open <strong>Settings<br />
</strong></li>
<li>Select <strong>Security</strong></li>
<li>Select <strong>Set up SIM card lock<br />
</strong></li>
<li>Select <strong>Lock SIM card</strong></li>
</ul>
<p>If you are not using any Bluetooth devices, disable Bluetooth to increase battery life and prevent security risks.</p>
<ul>
<li>Open <strong>Settings<br />
</strong></li>
<li>Select <strong>Wireless and Networks</strong></li>
<li>Uncheck <strong>Bluetooth</strong></li>
</ul>
<p>Backing up your Android Smartphone regularly is an important task. If you have a rooted Android Smartphone use the <a href="https://market.android.com/details?id=com.koushikdutta.rommanager" target="_blank" rel="nofollow noopener noreferrer">ROM Manager</a> and <a href="https://market.android.com/details?id=com.keramidas.TitaniumBackup" target="_blank" rel="nofollow noopener noreferrer">Titanium Backup root</a>.  Regular Android Smartphones need to pay for backup Apps like <a href="https://market.android.com/details?id=com.rerware.android.MyBackupPro" target="_blank" rel="nofollow noopener noreferrer">MyBackup Pro</a>. There are free Apps to backup individual areas like SMS, images, or Applications.</p>
<p><strong>4. Android Smartphone Email Security</strong></p>
<p>It is important that email accounts accessed from a smartphone are setup utilizing encryption when available. Many email providers including Google&#8217;s Gmail, Microsoft Exchange, AOL Mail and Yahoo Mail support SSL (secure sockets layer) when accessing their mail servers. If SSL is not used, your emails as well as your password can be read by hackers. Most major email providers automatically activate SSL if you let Android setup your email account.</p>
<p>If you are setting up a new email account, make sure that you have <strong>enabled SSL or TLS</strong> in the <strong>Security type</strong> field for both the <em>incoming</em> and the <em>outgoing</em> mail server.</p>
<p>To check an existing Mail Account for secure SSL access, do the following:</p>
<ul>
<li>Open <strong>Email </strong>application<strong><br />
</strong></li>
<li>If Combined Inbox is shown, Select a mail account by tapping <strong>Accounts</strong> then Select the email account. Otherwise, hit <strong>Menu</strong> then <strong>Account Settings</strong></li>
<li>Check <strong>Incoming</strong> <strong>settings</strong> and <strong>Outgoing</strong> <strong>settings</strong></li>
<li>Examine the <strong>Security Type</strong> field</li>
<li>Verify that it is not set to<strong> None</strong></li>
</ul>
<p>If it is set to <strong>None</strong>, check with your email provider to verify their SSL support and enable it if possible.</p>
<p>Also, make sure your email account has been cleansed with a good spam filter. This is a basic requirement of any solid email provider. If your email vendor needs spam filtering assistance, consider accessing the email account via POP inside a Gmail account.</p>
<p><a href="https://www.openkeychain.org/">OpenKeychain</a> &#8211; public key encryption for emails and files, to make sure your emails are only read by who you sent them to and others can send you messages only you can read.</p>
<p><strong>5. Find a Lost Android Smartphone, Erase a Lost Android Smartphone</strong></p>
<p>Andrdoid 5.1 and higher includes a Device Protection feature. This is required on all phones manufactured after June 30, 2015 and sold in California. You can set it up in the Lock screen settings. It requires you be signed into your Google account.</p>
<p><a href="https://www.google.com/android/find">Find My Device</a> is a helpful feature made by Google, so you can locate, ring, or wipe your device remotely.</p>
<p>If you are running an older version of Android, you need a 3rd party app to handle finding a lost phone. Here are some options:</p>
<ul>
<li><a href="https://market.android.com/details?id=com.androidlost&amp;feature=related_apps" target="_blank" rel="nofollow noopener noreferrer">Android Lost</a> &#8211; Locate, wipe, lock, take pictures, and much more</li>
<li><a href="https://market.android.com/details?id=com.prey&amp;feature=search_result" target="_blank" rel="nofollow noopener noreferrer">Prey </a>&#8211; Open source, cross-platform, lost phone or tablet protection</li>
<li><a href="https://market.android.com/details?id=com.alienmanfc6.wheresmyandroid&amp;feature=related_apps" target="_blank" rel="nofollow noopener noreferrer">Wheres My Droid</a> &#8211; Find your lost phone, password protection, notification of changed SIM card. Paid Pro version includes remote phone erasing</li>
</ul>
<p>When you lose your device utilize the lost device App you installed. If you cannot access the device, make sure you contact your Wireless carrier so they can disable the device. If you recover your Smartphone, make sure you change all passwords.</p>
<p>Also consider creating a special graphics file with your emergency contact information that can be used as your lock screen. If you are having a life threatening emergency, people could still access this information. If your Android Smartphone is lost and password protected, people could still contact you.</p>
<p><img loading="lazy" decoding="async" src="http://www.safegadget.com/i/networking/McDonalds-Free-Wi-Fi.jpg" alt="McDonalds Free Wi-Fi" width="200" height="150" /></p>
<p><strong>6. Using WiFi securely</strong></p>
<p>When accessing a wireless network outside the home, exercise caution. Any information sent over an external wireless may be subject to eavesdropping. Unless you know the Wi-Fi network is secure, we would recommend against connecting to it.</p>
<p>If you really want to use an unfamiliar wireless connection, limit usage to non-critical apps, email, and web. <strong>Do not</strong> e-mail, online shop, online bank, or online trade from public wifi hot spots or cyber cafes. Many of these locations provide little to no security and are prone to snooping or malware.</p>
<p>The Android Smartphone can remember wireless networks by name and automatically log into them. This convenience function turns into a security problem because the Android Smartphone will automatically send the same password to a wireless network of the same name. So if you name your wireless router, <em>Linksys</em>, if you encounter another wireless router with the same name, the Android Smartphone will automatically use the password. A hacker could exploit this to obtain your wireless router&#8217;s password. We suggest you do not enable any automatic joining to wireless networks. The Android Smartphone is very good at transparently switching from a cellular data network to a Wi-Fi wireless network. You can turn off Wi-Fi auto connect by the following:</p>
<ul>
<li>Open <strong>Settings</strong> app</li>
<li>Choose <strong>Wireless &amp; Networks</strong></li>
<li>Select <strong>Wi-Fi Settings</strong></li>
<li>Uncheck <strong>auto connect</strong></li>
</ul>
<p>When accessing the Internet on a smartphone or tablet, using the built in 3G/4G connection is a lot safer than connecting via a local wireless internet hotspot. This warning applies to both apps and mobile internet browsers.</p>
<p>The safest way to use a public wireless network is by employing a VPN (virtual private network) which securely tunnels all of your Android Smartphone&#8217;s traffic through a secure server. There are many paid services that sell VPN access.</p>
<p>Disable WiFi when you are not accessing wireless networks. This will extend your battery life and increase security.</p>
<p><strong>7. Secure Browsing with Android &#8220;Browser&#8221;<br />
</strong></p>
<p>Force websites to use secure connections &#8211; It is important to utilize secure connections or HTTPS whenever possible. Several large websites have configuration options to force these secure connections. Here is more information on configuring HTTPS with: <a href="https://mail.google.com/support/bin/answer.py?answer=74765" target="_blank" rel="nofollow noopener noreferrer">Gmail</a>, <a href="https://www.facebook.com/notes/facebook-engineering/secure-browsing-by-default/10151590414803920/" target="_blank" rel="nofollow noopener noreferrer">Facebook</a>, <a href="http://blog.twitter.com/2011/03/making-twitter-more-secure-https.html" target="_blank" rel="nofollow noopener noreferrer">Twitter</a>, <a href="https://www.google.com/support/websearch/bin/answer.py?answer=173733&amp;hl=en" target="_blank" rel="nofollow noopener noreferrer">Google</a>. Google.com defaults to HTTPS if you are signed into your Google Account, if you are not, just manually add the <strong>s </strong>after http to force a secure connection i.e &#8211; <a href="https://www.google.com/" target="_blank" rel="nofollow noopener noreferrer">https://www.google.com</a></p>
<p>Use a password manager to create, use, and store passwords for websites. See our <a title="How to Create, Store, and Use Secure Passwords" href="http://www.safegadget.com/34/how-to-create-store-and-use-secure-passwords/">password manager guide</a> for details.</p>
<p><strong>8. Careful Link Clicking and Attachment Opening<br />
</strong></p>
<p>As we have learned on computers, clicking on links in email can lead to viruses or malware being installed. We need to take the same precautions and more, on an Android Smartphone. Avoid clicking links in email, text messages, and websites that are unfamiliar to you.</p>
<p>Email attachments require the same amount of caution. Only open attachments when they are expected. Avoid opening your email provider&#8217;s spam folder and do not open any attachments in your spam folder.</p>
<p><strong>Opening Attachments Safely with Gmail</strong></p>
<p>Forward the email with attachment to a Gmail account.  From there, you can use Google Docs to open Word Processing, Spreadsheets, etc.  No need to endanger your own computer.</p>
<p><strong>9. Android Smartphone Free Antivirus and Internet Security Software</strong></p>
<p>Android Smartphone anti virus software is available and highly recommended because of the open Android Market for Apps. Be aware that fake anti-malware Apps have appeared, so stick to brand name antivirus Apps.</p>
<p><a href="https://market.android.com/details?id=com.zrgiu.antivirus" target="_blank" rel="nofollow noopener noreferrer">Antivirus Free</a> &#8211; free antivirus App for Android</p>
<p><a href="https://market.android.com/details?id=com.antivirus" target="_blank" rel="nofollow noopener noreferrer">AVG Antivirus</a> &#8211; free mobile security and antivirus App for Android</p>
<p><a href="https://market.android.com/details?id=com.drweb" target="_blank" rel="nofollow noopener noreferrer">DR. Web Anti-virus Light</a> &#8211; free antivirus App for Android</p>
<p><a href="https://market.android.com/details?id=com.lookout" target="_blank" rel="nofollow noopener noreferrer">Lookout </a>&#8211; free mobile security and antivirus App for Android</p>
<p><a href="https://market.android.com/details?id=com.symantec.mobilesecurity" target="_blank" rel="nofollow noopener noreferrer">Norton Mobile Security</a> &#8211; free mobile security and antivirus App for Android</p>
<p><a href="https://market.android.com/details?id=com.webroot.security&amp;rdid=com.webroot.security" target="_blank" rel="nofollow noopener noreferrer">Webroot Secure Anywhere Mobile</a> &#8211; Free Mobile Phone and Tablet security antivirus protection.</p>
<p><em>Android Smartphone security Apps</em></p>
<p><a href="https://play.google.com/store/apps/details?id=org.torproject.android&amp;hl=en" target="_blank" rel="nofollow noopener noreferrer">Orbot: Tor on Android</a> &#8211; Enhance your privacy, break through firewalls and communicate more safely.</p>
<p><strong>10. Android Market Password and Payment Option<br />
</strong></p>
<p>You can delete the payment information in your Google account after making a purchase. You must have a payment method in order to make purchases or make refunds. If you are very cautious, remove payment information when you do not anticipate App purchases.</p>
<p><strong>11. Malicious QR Codes</strong></p>
<p>QR codes are appearing in print and all over the place. Be aware that malicious QR codes that lead the user to download malware have been found. Be sure you check the link the QR code points to before using it.</p>
<p><strong>12. NFC &#8211; Near Field Communication</strong></p>
<p>NFC has been touted as using your phone as a contact-less credit card.  It is being hyped up by smartphone manufacturers as well as credit card firms.  This technology opens up a new way of hacking your credit card info.  TURN IT OFF and avoid it.  This recent <a href="https://docs.google.com/viewer?url=http://www.blackwinghq.com/assets/labs/presentations/EddieLeeDefcon20.pdf" target="_blank" rel="nofollow noopener noreferrer">Defcon</a> presentation shows how a security researching skimmed a NFC credit card and used it.</p>
<p>To disable NFC on the Samsung Galaxy S III and other phones:</p>
<ol>
<li>Tap <strong>Apps</strong></li>
<li>Choose <strong>Settings</strong></li>
<li>Scroll down the screen and tap <strong>More Settings</strong></li>
<li>Uncheck the <strong>NFC box</strong></li>
<li>Close the Settings app</li>
</ol>
<p><strong>13. Avoid Huawei and ZTE Android Smartphones</strong></p>
<p>These Chinese companies are drawing a lot of attention. Congress suggests people avoid their products due to possible<a href="http://www.reuters.com/article/2012/10/10/usa-china-huawei-zte-idUSL1E8L9NW720121010" target="_blank" rel="nofollow noopener noreferrer"> suspicious equipment behavior</a>.</p>
<p>We have covered many ways to improve your Android Smartphone security. Utilizing our tips will help significantly improve the already good security of the Android Smartphone.</p>
<p><strong>14. Stagefright MMS Messaging Bug</strong></p>
<p>August 2015. A specially crafted MMS message can cause your phone to be taken over. Many old phone may never get updated to fix this.</p>
<p>If you’re using Google Hangouts as your default SMS client, disable automatic downloading of media files sent via MMS:</p>
<p><strong>Settings</strong> &#8211; <strong>SMS</strong> &#8211; <strong>Auto Retrieve MMS</strong> uncheck</p>
<p>Here’s how to protect your phone from the if you are using Google Messenger (the default SMS client for Android Version 5.0+):</p>
<p><strong>Messenger</strong> &#8211; <strong>Settings</strong> &#8211; <strong>Advanced</strong> &#8211; <strong>Auto Retrieve</strong> OFF</p>
<p>Here’s how to protect your phone from the if you are using Messages (the default SMS client for Samsung Galaxy S6):</p>
<p><strong>Messages</strong> &#8211; <strong>More</strong> &#8211; <strong>Settings</strong> &#8211; <strong>More Settings </strong>&#8211; <strong>Multimedia messages &#8211; Auto Retrieve</strong> OFF</p>
<p><strong>15. Secure Messaging</strong></p>
<p>Law enforcement and probably the NSA use cell phone tower simulators called Stingrays, IMSI catchers, or dirtbox made by Harris. These fake cell phone towers slurp handset identification information and can snoop on data. They deploy these in small planes to net a ton of intercepts, without getting a warrant. Cell phone users have no right to privacy in public areas.</p>
<p>You can fight back by using secure messaging clients like <a href="https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms&amp;hl=en" target="_blank" rel="nofollow noopener noreferrer">Signal</a> or <a href="https://chatsecure.org/" target="_blank" rel="nofollow noopener noreferrer">Chat Secure</a>. Older Stingrays only support 2G, not 3G/4G included with the Hailstorm upgrade, so turning off 2G will help here.</p>
<p><strong>Disable 2G On Android prior to 5.0 &#8211; Stops Stingray</strong><br />
1) Pull up the phone dialer and dial *#*#4636#*#* (that spells INFO)<br />
2) This brings you to the Testing screen where can select “Device information”.<br />
3) Scroll down a little and it should say “WCDMA Preferred” or similiar.<br />
4) Change it to WCDMA Only.</p>
<p>It will now stay on 3G/4G/4GLTE and avoid the old school GSM 2G Data towers, keeping you safe from older Stingrays.</p>
<p>Note: Google removed this option on Lollipop 5.0<strong>.</strong></p>
<p>You can detect a Stingray by running the apps <a href="https://play.google.com/store/apps/details?id=de.srlabs.snoopsnitch&amp;hl=en" target="_blank" rel="noopener noreferrer">SnoopSnith</a> or <a href="https://privacysos.org/blog/how-to-defeat-fbi-or-police-stingray-surveillance/" target="_blank" rel="nofollow noopener noreferrer">Android IMSI-Catcher Detector</a>.</p>
<p><strong>16. Public Charging &#8211; Video Jacking</strong></p>
<p>Do not use a public phone charging cable, it could be capturing video video HDMI recording while you charge aka <a href="http://krebsonsecurity.com/2016/08/road-warriors-beware-of-video-jacking/" target="_blank" rel="nofollow noopener noreferrer">Video Jacking</a>. Always use your own charging cable.</p>
<p><strong>17. Secure your mobile phone&#8217;s account from hijacking or Port-Out Scams</strong></p>
<p>Hackers have been calling wireless carriers like: AT&amp;T, Sprint, T-Mobile, and Verizon asking them to switch control of mobile phone numbers to themselves.</p>
<p>They will <strong>repeatedly</strong> call, hundreds of times, and make up all kinds of sob stories to get control. Once they hijack control, they will reset passwords of any device that uses that phone number as a security backup via SMS Text or two factor authentication. IE Google, Facebook, Twitter, Bitcoin accounts, etc.</p>
<p>How do you protect against phone hijacking?</p>
<ul>
<li><a href="https://www.ftc.gov/news-events/blogs/techftc/2016/06/your-mobile-phone-account-could-be-hijacked-identity-thief" rel="nofollow">FTC</a> has details</li>
<li>Do not use your cell phone number in the first place!</li>
<li>Use two factor authentication that uses a physical key or Google Authenticator App, not Text</li>
<li><a href="https://www.att.com/esupport/article.html#!/wireless/KM1049472" target="_blank" rel="nofollow noopener noreferrer">AT&amp;T</a> &#8211; Enable an account passcode</li>
<li><a href="https://www.sprint.com/en/support/solutions/account-and-billing/update-your-pin-and-security-questions-on-sprint-com.html" target="_blank" rel="nofollow noopener noreferrer">Sprint</a> &#8211; Customers setup a PIN when first signing up</li>
<li><a href="https://www.t-mobile.com/company/privacy-resources/account-security/account-verification.html" target="_blank" rel="nofollow noopener noreferrer">T-Mobile</a> &#8211; Enable a customer care password</li>
<li><a href="https://www.verizonwireless.com/support/account-pin-faqs/" target="_blank" rel="nofollow noopener noreferrer">Verizon</a> &#8211; Setup an account PIN</li>
</ul>
<p>T-Mobile customers can also call in to the company’s customer support line and place a separate “SIM lock” on their account, which can only be removed if the customer shows up at a retail store with ID.</p>
<p>Be sure to use Google Authenticator instead of Text messages for second factor authentication when possible.</p>
<p>If your phone stops receiving a signal and says “emergency calls only” or “no network,” even after you restart your phone, contact your mobile carrier to see whether your account has been hijacked.</p>
<p><strong>Conclusion</strong></p>
<p>Android is a sophisticated operating system. Because of the nature of its diverse eco-system, users unfortunately need to be proactive to keep their device secure and up to date.</p>
<p>Do you have any Android Security Tips?</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.safegadget.com/54/android-smartphone-security-how-to-securely-use-your-android-smartphone/feed/</wfw:commentRss>
			<slash:comments>19</slash:comments>
		
		
			</item>
	</channel>
</rss>