Tuesday, November 26, 2013

How to Use Malwarebytes' Anti-Virus App for Android

As platforms become more popular, they also become more susceptible to more malware and spyware. This is because malware and spyware programmers look to reach the most possible users to gain maximum profit from their harmful apps. Luckily Malwarebytes, makers the popular and useful Windows malware scanner, have an app for the Android platform. Linked below is a guide to using Malwarebytes for the Android.

How to Use Malwarebytes' Anti-Virus App for Android

Thursday, November 14, 2013

Mobile Security Best Practices


Mobile Security Best Practices



Mobile devices are quickly surpassing traditional computers for more and more of our needs.  As these functions evolve and expand, and we use our wireless tools to access more information, the security risks multiply.

With the rapid proliferation of mobile devices not slowing down, malware infections are on the rise, growing 163% in 2012. Just like the golden days of the internet, hackers are more than happy to take advantage of this vast new crop of unprotected devices.

But it’s not only hackers we need to guard against. We need to make sure other scenarios are covered, such as: What happens when my phone is lost or stolen? Or, How do I prevent a data breach? And, How can I manage all this stuff?  So with all this in mind, let’s go down the list:

Authentication 

 How many of us just slide a finger to the right to unlock our devices?  I’m betting more than half.  Whether you choose a secure pattern, a pin or password, your fingerprint, or your face, make sure you are the only person who can get past your lock screen.  This is the first line of defense when your phone ends up in someone else’s hands.


 Remote Location & Wiping


When a device is lost or stolen, swift action is a must. Sure, using GPS to track down a thief is enticing, but the main focus should be to keep data secure by locking and/or wiping. Apple iPhone lets you use iCloud & Android uses the Google Sync for remote wiping. There are plenty of good stand-alone apps that do a great job with this too. 


 Bluetooth & NFC 


Turn them off. Unless using a headset or sharing a photo with a friend, these tools are open doors into your devices. Both are hackable with the right tools, and can present real security risks.  Viruses have been found that spread from phone to phone via Bluetooth. So, keep them disabled when not in use, and if your device supports hidden mode, use that too.


We’ve only skimmed the surface here, but the criteria covered above should serve as a solid starting point to develop a secured mobile device or tablet.


Tuesday, October 29, 2013

iPad Air coming November 1st

The iPad Air is a thinner and lighter iPad, weighing only 1 pound. This is the fifth generation iPad with a 9.7 inch display. The pricing starts at $499 for a 16GB version with WiFi. More details are available here.

Wednesday, October 9, 2013

Ransomware

New Malware is evolving allowing new viruses to encrypt data/files on users' computers. Only way to get your data/file is to pay the ransom. These viruses are now being called Ransomware such as Reveton or Crypto Locker, and they attempt to extort money from victims by encrypting or blocking access to their data without their knowledge, then demanding a ransom in order to undo the damage, according to police and FBI officials.
Learn more about how to avoid ransomware and how to detect it.

                     http://www.microsoft.com/security/resources/ransomware-whatis.aspx

Tuesday, October 1, 2013

Antivirus for Mac OS, ClamXav

Contrary to common knowledge, Apple products are not immune to viruses and malware. As Apple products and OS X become more and more popular, so does the creation of new viruses for the platform. Fortunately, there is a reliable antivirus program for Mac OS X. ClamXav is easy to install and easy to use.  The program can be downloaded here. Once downloaded, the site also has a guide for installation and use.

Link to ClamXav guide.

Wednesday, September 11, 2013

New iOS is on the way


Apple just announced that a new redesigned OS for their mobile devices will be released on Sept. 18. iOS 7 will make your old phone seem new again. On Sept. 18 do the following on your iOS device, settings\general\software update. Make sure that you make a backup copy of your device before applying the update.  http://www.cgu.edu/PDFFiles/oit/helpdesk/Back-Up.iOS.using.iTunes.pdf




Tuesday, September 3, 2013

Amazon MatchBook Service Provides eBooks for Printed Books

Amazon MatchBook is a new service that will provide ebooks for print books that were purchased since 1995. The service will cost a small fee and will launch in October. More information here.

Tuesday, August 13, 2013

How to Turn On or Off Cached Exchange Mode

How to Turn On or Off Cached Exchange Mode

Occasionally, you may find that the syncing of email and Global address book (GAL) on your cell phone or computer is not 'up to date' when viewed in Outlook. This is due to Outlook storing or 'caching' a copy of the address book and email on your computer.

To force a refresh, follow the instructions below:

1. Open Outlook and click on the [Files] tab











2. The Account Information screen opens. Click on the Account Settings icon and select [Account settings...] from the drop down menu



















3. The Email Accounts screen opens, select the appropriate account and then click on the Change button:

















4. The Server Settings screen is displayed. Under the sever name field there is a checkbox entitled Use Cached Exchange Mode. Uncheck this box to force address book and email synchronization with the server. Then click on Next button.















5. An alert message appears informing you that the change will not come into effect until you have restarted Outlook. Click OK to continue.






6. The Congratulations screen appears. To close the wizard click on the Finish button















7. You will return to the Email Accounts screen, Click Close to exit

8. Restart Outlook to complete the process. On restart you may find Outlook is slow to open up. This is due to the cache being switched off and is expected.

Claremont Graduate University | Office of Information Technology 
ACB 303 | 909-621-8174

Tuesday, August 6, 2013

Recent Reports of DHS-Themed Ransomware



US Computer Emergency Readiness Team banner graphic
National Cyber Awareness System:
07/30/2013 10:57 AM EDT

Original release date: July 30, 2013
US-CERT has received reports of increased activity concerning an apparently DHS-themed ransomware malware infection occurring in the wild. Users who are being targeted by the ransomware receive a message claiming that use of their computer has been suspended and that the user must pay a fine to unblock it. One iteration of this malware also takes a webcam (if available) photo or video of a recipient and posts it in a pop-up to add to the appearance of legitimacy. The ransomware falsely claims to be from the U.S. Department of Homeland Security and the National Cyber Security Division.
Users who are infected with the malware should consult with a reputable security expert to assist in removing the malware, or perform a clean reinstallation of their OS after formatting their computer's hard drive.
US-CERT and DHS encourage users and administrators not to pay the perpetrators and to report the incident to the FBI at the Internet Crime Complaint Center (IC3).
Use caution when encountering these types of email messages and take the following preventive measures to protect themselves from phishing scams and malware campaigns that attempt to frighten and deceive a recipient for the purpose of illegal gain.
?         Do not click on or submit any information to webpages.
?         Do not follow unsolicited web links in email messages.
?         Use caution when opening email attachments. Refer to the Security Tip Using Caution with Email Attachments for more information on safely handling email attachments.
?         Maintain up-to-date antivirus software.
?         Users who are infected should change all passwords AFTER removing the malware from their system.
?         Refer to the Recognizing and Avoiding Email Scams (pdf) document for more information on avoiding email scams.
Refer to the Security Tip Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.

Tuesday, July 23, 2013

Using the Barracuda Spam Firewall



Barracuda can be a helpful spam management tool. This will give some tips on how to use Barracuda.
The Barracuda access URL is https://mailfilter.cgu.edu. From there, you can log in or download the Outlook add-in (fig. 1)

When the add-in is installed, it will show up in Outlook. The “Mark as Spam” and “Mark as Not Spam” buttons will help Barracuda learn which emails to block or let through (fig. 2). To login, the username is your email address. If you don’t know your password, you can click the “Create New Password” button and it will be sent to your email (fig. 3) Once logged into Barracuda, you can edit your blacklist and whitelist as well as change your spam settings. Email addresses and domains on the blacklist will be automatically blocked and whitelisted addresses and domains will be automatically sent through (fig. 4).

The email scoring system determines how aggressive Barracuda is at blocking possible spam. Remember that the lower the number, the more possibility Barracuda will tag/quarantine/block possible spam (fig. 5).

Tuesday, July 9, 2013

New GPS Unit Projects Display Directly Onto Cars Windshield

As a way to make looking at GPS more safe, Garmin has created a unit that projects an "HUD" directly onto the windshield. This means users will not have to take their eyes off the road while using GPS.

Full article here.

Tuesday, June 11, 2013

Yahoo! Email Has Intergrated With Dropbox

Yahoo! Mail will now allow large attachments to be sent using the Dropbox services. This will be handy for sharing large files via email which was restricted before. Dropbox is a hand tool for cloud storage.

More information and the full article here.

Tuesday, May 14, 2013

How to Identify Spam Email








While spam filters will catch most of it for you, every email user should know how to identify the occasional spam email that makes it through. This post contains tips to help you identify spam, but please remember: diligence alone is no replacement for good anti-malware and spam filtering software. Responding to these messages can cost you hours of frustration cleaning up a mailbox filled with spam, or a lifetime dealing with identity theft.

Check out the sample message below to learn some of the ways to identify spam email:

Never respond to or click links in a suspicious message. Simply forward the message to helpdesk@cgu.edu & then delete it.


Claremont Graduate University | Office of Information Technology
 | ACB 303 | 909-621-8174

Tuesday, May 7, 2013

Caring for iPads and Laptops

Proper care of electronics can extend their life and usefulness. Here are some useful guides for caring for iPads and laptops.

Caring For Your iPad
Caring For Your Laptop

Tuesday, April 30, 2013

MOOC Resources

Unless you have been living on a remote island with no access to the news, you have been overwhelmed with  the 'buzz' around MOOCs. Needless to say, MOOCs are a 'hot topic' with many opinions and a volatile marketplace. Of course the best way to find out what it's all about is to sign up for one - and there are multitudes! Whether it's Coursera, edX, Udacity - or even Canvas.net, there are plenty of selections available. And you won't be alone if you sign up just to 'lurk' without really participating - it's a common practice.

It makes no difference what strategy you use to become better informed, but it's definitely worthwhile to find out what all of the buzz is about. Indeed, it will probably diminish - but I doubt it will just go away. The odds are high that it will be a permanent part of the online learning landscape for years to come, but in what way it's still too early to tell. Hopefully much will be gained from this 'grand experiment' in higher education.

So, to help you get started on your investigation, I'm adding a few resources here:


Enjoy!

Carleen

Tuesday, April 16, 2013

10 Tricks to Make Yourself a Dropbox Master


Sharing large files online -- files too big for e-mail attachments -- can be tricky. Dropbox works by giving you a folder on its site where you can store any files. You can share your folder with other Dropbox users, so that after you upload a large file, someone else can download it. Here are some tips and tricks to make the most use out of your Dropbox account, including getting more space!



Tuesday, April 2, 2013

How to recognize phishing e-mails

Since the volume of spam and phishing emails is up recently, it might be wise to be familiar with how phishing emails work so they can be recognized before any damage is done.

How to recognize phishing e-mails


Tuesday, March 19, 2013

Secured Passwords

With Spring here it's time to change your old password! Follow the eight easy rules below as a guide.
  1.     Don't use passwords that are based on personal information that can be easily accessed or guessed.
  2.     Don't use words that can be found in any dictionary of any language.
  3.     Make the password at least 8 characters in length.
  4.     Use both lowercase and capital letters.
  5.     Use a combination of letters, numbers, and special characters.
  6.     Use passphrases when you can.
  7.     Use different passwords on different systems.
  8.     Don’t write down passwords where they are easily obtained.