As platforms become more popular, they also become more susceptible to more malware and spyware. This is because malware and spyware programmers look to reach the most possible users to gain maximum profit from their harmful apps. Luckily Malwarebytes, makers the popular and useful Windows malware scanner, have an app for the Android platform. Linked below is a guide to using Malwarebytes for the Android.
How to Use Malwarebytes' Anti-Virus App for Android
Useful technology resources suggested by the staff of the Office of Information Technology.
Tuesday, November 26, 2013
Thursday, November 14, 2013
Mobile Security Best Practices
Mobile Security Best Practices
With the
rapid proliferation of mobile devices not slowing down, malware infections are
on the rise, growing 163% in 2012. Just like the golden days of the internet,
hackers are more than happy to take advantage of this vast new crop of
unprotected devices.
But it’s not
only hackers we need to guard against. We need to make sure other scenarios are
covered, such as: What happens when my phone is lost or stolen? Or, How do I
prevent a data breach? And, How can I manage all this stuff? So with all this in mind, let’s go down the
list:
Authentication
How many of us just slide a finger to the right to unlock our devices? I’m betting more than half. Whether you choose a secure pattern, a pin or password, your fingerprint, or your face, make sure you are the only person who can get past your lock screen. This is the first line of defense when your phone ends up in someone else’s hands.
When a
device is lost or stolen, swift action is a must. Sure, using GPS to track down
a thief is enticing, but the main focus should be to keep data secure by
locking and/or wiping. Apple iPhone lets you use iCloud & Android
uses the Google Sync for remote wiping. There are plenty of good stand-alone apps that do a great job with this too.
Bluetooth & NFC
Turn them
off. Unless using a headset or sharing a photo with a friend, these tools are
open doors into your devices. Both are hackable with the right tools, and can
present real security risks. Viruses
have been found that spread from phone to phone via Bluetooth. So, keep them
disabled when not in use, and if your device supports hidden mode, use that
too.
We’ve
only skimmed the surface here, but the criteria covered above should serve as a
solid starting point to develop a secured mobile device or tablet.
Tuesday, October 29, 2013
iPad Air coming November 1st
Wednesday, October 9, 2013
Ransomware
New Malware is evolving allowing new viruses to encrypt data/files on users' computers. Only way to get your data/file is to pay the ransom. These viruses are now being called Ransomware such as Reveton or Crypto Locker, and they attempt to extort money from
victims by encrypting or blocking access to their data without their
knowledge, then demanding a ransom in order to undo the damage,
according to police and FBI officials.
Learn more about how to avoid ransomware and how to detect it.
http://www.microsoft.com/security/resources/ransomware-whatis.aspx
Learn more about how to avoid ransomware and how to detect it.
http://www.microsoft.com/security/resources/ransomware-whatis.aspx
Tuesday, October 1, 2013
Antivirus for Mac OS, ClamXav
Contrary to common knowledge, Apple products are not immune to viruses and malware. As Apple products and OS X become more and more popular, so does the creation of new viruses for the platform. Fortunately, there is a reliable antivirus program for Mac OS X. ClamXav is easy to install and easy to use. The program can be downloaded here. Once downloaded, the site also has a guide for installation and use.
Link to ClamXav guide.
Link to ClamXav guide.
Wednesday, September 11, 2013
New iOS is on the way
Apple just announced that a
new redesigned OS for their mobile devices will be released on
Sept. 18. iOS 7 will make your old phone seem new again. On Sept. 18 do the
following on your iOS device, settings\general\software update. Make sure that
you make a backup copy of your device before applying the update. http://www.cgu.edu/PDFFiles/oit/helpdesk/Back-Up.iOS.using.iTunes.pdf
Tuesday, September 3, 2013
Amazon MatchBook Service Provides eBooks for Printed Books
Amazon MatchBook is a new service that will provide ebooks for print books that were purchased since 1995. The service will cost a small fee and will launch in October. More information here.
Tuesday, August 13, 2013
How to Turn On or Off Cached Exchange Mode
How to Turn On or Off Cached Exchange Mode
Occasionally, you may find that the syncing of email and Global address book (GAL) on your cell phone or computer is not 'up to date' when viewed in Outlook. This is due to Outlook storing or 'caching' a copy of the address book and email on your computer.
To force a refresh, follow the instructions below:
1. Open Outlook and click on the [Files] tab2. The Account Information screen opens. Click on the Account Settings icon and select [Account settings...] from the drop down menu
3. The Email Accounts screen opens, select the appropriate account and then click on the Change button:
4. The Server Settings screen is displayed. Under the sever name field there is a checkbox entitled Use Cached Exchange Mode. Uncheck this box to force address book and email synchronization with the server. Then click on Next button.
5. An alert message appears informing you that the change will not come into effect until you have restarted Outlook. Click OK to continue.
6. The Congratulations screen appears. To close the wizard click on the Finish button
7. You will return to the Email Accounts screen, Click Close to exit
8. Restart Outlook to complete the process. On restart you may find Outlook is slow to open up. This is due to the cache being switched off and is expected.
Claremont Graduate University | Office of Information Technology
ACB 303 | 909-621-8174
Tuesday, August 6, 2013
Recent Reports of DHS-Themed Ransomware
National Cyber Awareness System:
07/30/2013
10:57 AM EDT
Original release date: July 30, 2013
US-CERT has received reports of increased activity concerning an apparently
DHS-themed ransomware malware infection occurring in the wild. Users who are
being targeted by the ransomware receive a message claiming that use of their
computer has been suspended and that the user must pay a fine to unblock it.
One iteration of this malware also takes a webcam (if available) photo or video
of a recipient and posts it in a pop-up to add to the appearance of legitimacy.
The ransomware falsely claims to be from the U.S. Department of Homeland
Security and the National Cyber Security Division.Users who are infected with the malware should consult with a reputable security expert to assist in removing the malware, or perform a clean reinstallation of their OS after formatting their computer's hard drive.
US-CERT and DHS encourage users and administrators not to pay the perpetrators and to report the incident to the FBI at the Internet Crime Complaint Center (IC3).
Use caution when encountering these types of email messages and take the following preventive measures to protect themselves from phishing scams and malware campaigns that attempt to frighten and deceive a recipient for the purpose of illegal gain.
?
Do not click on or submit any information to
webpages.
?
Do not follow unsolicited web links in email
messages.
?
Use caution when opening email attachments.
Refer to the Security Tip Using Caution
with Email Attachments for more information on safely handling email
attachments.
?
Maintain up-to-date antivirus software.
?
Users who are infected should change all
passwords AFTER removing the malware from their system.
?
Refer to the Recognizing and Avoiding Email Scams (pdf) document for more
information on avoiding email scams.
Refer to the Security Tip Avoiding
Social Engineering and Phishing Attacks for more information on social
engineering attacks.
Tuesday, July 23, 2013
Using the Barracuda Spam Firewall
The Barracuda access URL is https://mailfilter.cgu.edu. From there,
you can log in or download the Outlook add-in (fig. 1)
When the add-in is installed, it will show up in Outlook.
The “Mark as Spam” and “Mark as Not Spam” buttons will help Barracuda learn
which emails to block or let through (fig. 2). To login, the username is your
email address. If you don’t know your password, you can click the “Create New
Password” button and it will be sent to your email (fig. 3) Once logged into Barracuda, you
can edit your blacklist and whitelist as well as change your spam settings.
Email addresses and domains on the blacklist will be automatically blocked and
whitelisted addresses and domains will be automatically sent through (fig. 4).
The email scoring system determines how aggressive Barracuda is at blocking possible spam. Remember that the lower the number, the more possibility Barracuda will tag/quarantine/block possible spam (fig. 5).
Tuesday, July 9, 2013
New GPS Unit Projects Display Directly Onto Cars Windshield
As a way to make looking at GPS more safe, Garmin has created a unit that projects an "HUD" directly onto the windshield. This means users will not have to take their eyes off the road while using GPS.
Full article here.
Full article here.
Tuesday, June 11, 2013
Yahoo! Email Has Intergrated With Dropbox
Yahoo! Mail will now allow large attachments to be sent using the Dropbox services. This will be handy for sharing large files via email which was restricted before. Dropbox is a hand tool for cloud storage.
More information and the full article here.
More information and the full article here.
Tuesday, May 14, 2013
How to Identify Spam Email
While spam filters will catch most of it for you, every email user should know how to identify the occasional spam email that makes it through. This post contains tips to help you identify spam, but please remember: diligence alone is no replacement for good anti-malware and spam filtering software. Responding to these messages can cost you hours of frustration cleaning up a mailbox filled with spam, or a lifetime dealing with identity theft.
Never respond to or click links in a suspicious message. Simply forward the message to helpdesk@cgu.edu & then delete it.
Claremont
Graduate University | Office of Information Technology
| ACB 303 | 909-621-8174
Tuesday, May 7, 2013
Caring for iPads and Laptops
Proper care of electronics can extend their life and usefulness. Here are some useful guides for caring for iPads and laptops.
Caring For Your iPad
Caring For Your Laptop
Caring For Your iPad
Caring For Your Laptop
Tuesday, April 30, 2013
MOOC Resources
Unless you have been living on a remote island with no access to the news, you have been overwhelmed with the 'buzz' around MOOCs. Needless to say, MOOCs are a 'hot topic' with many opinions and a volatile marketplace. Of course the best way to find out what it's all about is to sign up for one - and there are multitudes! Whether it's Coursera, edX, Udacity - or even Canvas.net, there are plenty of selections available. And you won't be alone if you sign up just to 'lurk' without really participating - it's a common practice.
It makes no difference what strategy you use to become better informed, but it's definitely worthwhile to find out what all of the buzz is about. Indeed, it will probably diminish - but I doubt it will just go away. The odds are high that it will be a permanent part of the online learning landscape for years to come, but in what way it's still too early to tell. Hopefully much will be gained from this 'grand experiment' in higher education.
So, to help you get started on your investigation, I'm adding a few resources here:
It makes no difference what strategy you use to become better informed, but it's definitely worthwhile to find out what all of the buzz is about. Indeed, it will probably diminish - but I doubt it will just go away. The odds are high that it will be a permanent part of the online learning landscape for years to come, but in what way it's still too early to tell. Hopefully much will be gained from this 'grand experiment' in higher education.
So, to help you get started on your investigation, I'm adding a few resources here:
- The Educause Library on MOOCs - includes articles, events, and a definition; will continue to be updated
- The Chronicle "Major Players in the MOOC Universe" - informative graphic that includes investors, professors, board members, etc.
- The Chronicle "What You Need to Know About MOOCs" - continually updated information with timeline in the Technology section
Enjoy!
Carleen
Tuesday, April 16, 2013
10 Tricks to Make Yourself a Dropbox Master
Sharing large files online -- files too big for e-mail attachments -- can be tricky. Dropbox works by giving you a folder on its site where you can store any files. You can share your folder with other Dropbox users, so that after you upload a large file, someone else can download it. Here are some tips and tricks to make the most use out of your Dropbox account, including getting more space!
Tuesday, April 2, 2013
How to recognize phishing e-mails
Since the volume of spam and phishing emails is up recently, it might be wise to be familiar with how phishing emails work so they can be recognized before any damage is done.
How to recognize phishing e-mails
How to recognize phishing e-mails
Tuesday, March 19, 2013
Secured Passwords
With Spring here it's time to change your old password! Follow the eight easy rules below as a guide.
- Don't use passwords that are based on personal information that can be easily accessed or guessed.
- Don't use words that can be found in any dictionary of any language.
- Make the password at least 8 characters in length.
- Use both lowercase and capital letters.
- Use a combination of letters, numbers, and special characters.
- Use passphrases when you can.
- Use different passwords on different systems.
- Don’t write down passwords where they are easily obtained.
Subscribe to:
Posts (Atom)