After you have spent the last month doing the Thirty Day Security Challenge, today’s task is one of the most important you can undertake: help make others more private and secure.
Last year I suffered a catastrophic malfunction of my main hard drive. After returning from a work trip I settled in to check email only to find my computer unwilling to boot. This is not the first time I have broken a computer. Fortunately this time I was prepared. The step that saved me in this instance is today’s task: backup your files. Continue reading “3DSC 2.29: Create Backups of Your Files”
Complete Privacy & Security Podcast
Episode 025: Custom Linux Builds for Privacy & Security
This week, we catch you up on Justin’s 30 Day Security Challenge and David Westcott joins us to talk about the Buscador Linux build. Plus, we discuss web browsers, answer listener questions, and a present a new investigation technique in the OSINT segment. Continue reading “Complete Privacy & Security Podcast E025”
Your phone number may not seem like a big deal. You give it out to nearly everyone one – and every service – in your life. I believe that your phone number is more important than your social security number as an individual identifier. Your phone number is linked to your entire digital trail – your public online accounts, the dossiers private data broker have on you, your mortgage information, your medical history, the location of every place you have ever taken your mobile device, and every person to whom you have placed a call or text message, how long the call lasted, and where it originated. Phone companies also typically don’t do a great job of protecting this information. I think you should make ever effort within your power to obscure your real phone number. Continue reading “3DSC 2.28: Obscure Your Phone Number”
Today we will wrap up our three-day mini-series covering smartphone security. Your call history and text messages are available to your mobile service provider. They are also available to malicious parties that can hack your service provider. Your phone calls and text messages are also available to anyone with certain technology. Though IMSI-catchers like the Stingray are only available to law enforcement, today’s state “secrets become tomorrow’s PhD theses and the next day’s hacker tools.” Continue reading “3DSC 2.27: Secure Your Communications”
Today’s article will follow up on yesterday’s, and cover three follow-up tasks that will greatly increase the security of your mobile device. They are simple and easy.
Today’s task is to encrypt your device and put a (better) passcode on it. I realize that most of you probably have a passcode on your mobile phone, but many out there don’t. Even if you do I want to make those passcodes better; this is a critical step in smartphone security. Phones are much more easily lost or stolen than your laptop and they carry a wealth of information about you. You should protect the data that is on your phone. Continue reading “3DSC 2.24: Smartphone Security Part II”
Today we will move into securing our mobile devices. At this point your laptop and desktop computers should be reasonably well-protected. Smartphones and tablets have the potential to represent an even greater attack surface is not secured properly. today’s task is to ensure your smartphone OS and all installed apps are updated. Ensuring all software is updated is the single greatest security measure you can take to protect your device from malware. Continue reading “3DSC 2.23: Smartphone Security Part I”
At this point your personal credit should be locked down pretty tightly. With your credit report in hand, you have reasonable certainty that your credit has not been stolen. With a credit freeze initiated, you don’t have to worry about anyone opening new lines of credit in your name. However, these previous techniques do nothing to protect your existing accounts, so it is still important to protect your credit card numbers. Today, you should set yourself up to use private payment methods.
Complete Privacy & Security Podcast
Episode 024: A Normal Guy Goes All In
This week “Benjamin” stops by to explain how he went off-radar, listener questions, plus an OSINT segment on retrieving deleted Tweets. Continue reading “Complete Privacy & Security Podcast E024”