Simple tips to avoid getting hacked

With all the recent news about NSA spying on us, Heartbleed, the bug being called one of the Internet’s biggest security threats, corporate cyber security failures and large-scale hacks, the task of keeping yourself safe online can seem daunting.

Here are some simple tips to keep yourself safe.

1. Use HTTPS when ever possible
You can check whether a site offers encryption by looking at the address in your browser and seeing whether it begins with “https”, as opposed to “http” or “www” (the “S” stands for “secure”).

TIP: Install the HTTPS Everywhere browser extension.
HTTPS Everywhere is an add-on for Chrome, Firefox and Opera that ensures that whenever you visit a site that offers data encryption, you’re using it.
The extension can be downloaded for free from the Electronic Frontier Foundation.
https://www.eff.org/https-everywhere

2. Keep Your Software Up To Date
One of the Best ways to keep you Mac humming along is you keep you software current and up to date. Now that Apple gives away OS X Mavericks, you have very few reasons not to upgrade to the new OS, unless your system does not support it, then its time to talk to Sewelltech about a new Mac.
Apple has published a list of the Macs compatible with Mavericks.
http://www.apple.com/osx/specs/

When companies discover vulnerabilities in their software that hackers can exploit, they send out security patches to solve the problem.
It’s definitely an annoyance to have to interrupt your work to download new software and restart your computer. But when the alternative could be getting hacked, it’s a small price to pay.

3. Two-factor authentication.
Services like Facebook, Twitter and Google’s Gmail offer a feature known as two-factor authentication, which works with your smartphone to add an extra layer of security when you’re logging in.

After you’ve entered your password, you’re prompted to enter a numeric code that’s sent to your phone via text message or generated by a mobile app. That way even if someone steals your password, they won’t be able to get into your account unless they also have your phone as well.

TwoFactorAuth.org highlights all the sites that do or do not support two-factor authentication
http://twofactorauth.org

4. Browse anonymously
Surfing without giving away anything about yourself can be simple. Google the words “free secure anonymizing proxy” (no quotes) and experiment with the sites that turn up. A secure anonymizing proxy sits between your browser and the sites you visit. The site sees only the proxy.

For a more thorough solution, download and use The Onion Router (TOR). This Open Source tool originated in a U.S. Navy project, but now it’s used by all kinds of people worldwide, including the hactivist group Anonymous.

When you surf through TOR, your browser’s data requests take a circuitous route through randomly-chosen TOR servers. All traffic is encrypted except the final connection from a TOR server to the actual website. Anyone intercepting a packet along the way won’t learn anything about you or the destination website.
https://www.torproject.org/index.html.en

5. The hazards of connecting to insecure public Wi-Fi networks.
Still, the best way to protect yourself is to never do anything you wouldn’t want to share in public while connected to insecure Wi-Fi

When you connect to a public network in a place like a coffee house, hackers that are logged onto the same Wi-Fi network can intercept your Web traffic from unencrypted websites. Sites that begin with “http://” are unencrypted and less safe. Sites that begin with “https://” are encrypted and generally considered more secure.

If hackers can see what you’re doing online, your personal details are then up for grabs.
Once again Use HTTPS when ever possible

Stalker is a tool created by security firm Immunity Inc. to demonstrate the hazards of connecting to insecure public Wi-Fi networks.
What Stalker really demonstrates is how easy it is to compile a creepy profile of a person, composed entirely of information they’ve unknowingly shared. Be Scared.
http://immunityproducts.blogspot.com/2012/08/stalker-analyzing-your-wireless-data.html

6. Find My iPhone Activation Lock in iOS 7
With iOS 7, Find My iPhone includes a new feature called Activation Lock, which is designed to prevent anyone else from using your iPhone, iPad, or iPod touch if you ever lose it. It starts working the moment you turn on Find My iPhone in iOS 7. With Activation Lock, your Apple ID and password will be required before anyone can:

  • Turn off Find My iPhone on your device
  • Erase your device
  • Reactivate and use your device

This can help you keep your device secure, even if it is in the wrong hands, and can improve your chances of recovering it. Even if you erase your device remotely, Activation Lock can continue to deter anyone from reactivating your device without your permission. All you need to do is keep Find My iPhone turned on, and remember your Apple ID and password.

Setting up a passcode on your iPhone, iPad, iPod touch or Mac is an important part of protecting your data. Each time you turn on or wake up your device, it will ask you for your passcode before you can use the device. If your device supports Touch ID, you can use your fingerprint instead of a passcode.

Use your passcode
You’ll need to enter your passcode whenever you:

  • Turn on or restart your device
  • Wake your device
  • Unlock the screen

7. Your Selfies’ Metadata May Be Too Revealing
Beyond revealing what you look like, selfies containing metadata can reveal your exact location — which means the person receiving your selfie can potentially figure out where you live.

Metadata can include GPS information, the date and time the photo was taken, and information on how and what conditions the photos were taken in. Programs like Apple’s iPhoto application or Preview can reveal the metadata information.

The primary reason to remove metadata from your selfies is to protect your privacy. For example, if you engage in online dating and you send a selfie to a prospective date, it’s possible that person could figure out your exact location and show up unexpectedly.

When it comes to legal ramifications, selfies have been used to arrest criminals.
In fact, remember the Burger King employee who stood on top of two containers of shredded lettuce and then posted a picture of the gross act.
It took internet users only 15 minutes to track down and bust this person.
Well the three employees involved in the incident were terminated after a photo with metadata disclosed their location.
https://shine.yahoo.com/shine-food/burger-king-employee-stands-lettuce-busted-internet-163700384.html

To remove the GPS information from your photo, you must change the settings on your camera phone. Here’s how to do it if you have an iPhone:

Open up your Settings.

  • Select the Privacy option and choose the Location Services settings.
  • Under Location Settings, you’ll see all the applications on your phone that stores and uses your location information.
  • From that list, select the Camera option and toggle the function to Off.
  • Once the Camera option is turned off under Location Settings, your iPhone won’t store GPS information unless toggle the switch to On again.
  • So depending on the type of camera you have, the instructions for removing metadata will vary.