Feeds:
Posts
Comments

Archive for the ‘Security’ Category

We are all afraid of our email addresses being harvested and being used to send us spam. To overcome that fear, some bright person (who I don’t know) came up with an idea to use “email AT domain DOT com”, this essentially thwarted a spammer’s regex attack to harvest email address which were written as email@domain.com.

email_spam

However, spammers have gotten smarter, and using the above idea has gotten to be more dangerous than using your actual email address. Here is a very startling reason why, thanks to chris@localhost.

Search engines don’t index special characters, so an email of the form “email@domain.com” is protected from this sort of discovery.  The basic trouble is “email AT domain DOT com” is completely indexed by search engines, and its unique enough that whenever you see “at domain dot com”, you know its part of an email address.

So, rest assured if you continue to use this method to “protect” your email address, you might very well be saying hello to new spammers. Why? A simple Google query can give spammers access to at-least 1000 or more email addresses, and most spammers are usually good at writing decent regex to harvest emails.

How to Avoid Spammers and Still Share Your Email Address

Well, if you are already afraid of sharing your email address in public, let me tell you that there are several more ways in which you can actually share your email id online without having to worry about spammers.

Here are few ways in which you can safely share your email address online.

  1. Share your email address with reCAPTCHA Mailhide – One of the most effective ways (yet not foolproof) to put a halt to spamming is using a CAPTCHA. With the help of reCAPTCHA Mailhide, users will have to fill in a CAPTCHA before they can see your email address.
  2. Using Anonymous or Temporary Email IDs – Another efficient way of keeping away from spammers is to make the use of anon or temporary email IDs which cannot be linked back to your original account. If you think an anon ID is being spammed, simply delete it and your email will remain safe from spam.
  3. Email Obscurification – A good way to hide your email address on webpages is to obscure the actual email address and hide it behind a set of illegible code. This service provides a good way to obscure your email address using JavaScript.
  4. Using Images to Share Email – Another good way (yet not foolproof) of sharing your email address is to create an image with your email address and share it with others. You will find several online services to create images with your email address, Safe Mail is a good place to start out at.

[via Techie Buzz]

Advertisements

Read Full Post »

If you allow applications to save your passwords, anyone with physical access to your PC can decode them unless you’re properly encrypting them—and chances are pretty good you’re not. Let’s walk through the right and wrong ways to store your passwords.

For the purpose of this article, we’ll assume that the people you allow into your house are trustworthy enough not to hack your passwords, and your laptop has been stolen instead—but the tips here should apply to either scenario. Regardless of how you choose to save your passwords, you should make sure to use great passwords and even stronger answers for security questions.

Once You Click “Remember Password” It’s All Over

Almost any application that requires you to login to something will also provide an option to save your password, and once you’ve done that, your password may as well be plain text. Behind the scenes, even if the application encrypts the account information, it’s doing so with a static key that can be easily deciphered through some reverse engineering, and somebody not only can, but already has created a utility to recover those passwords.

It doesn’t even matter all that much if you’ve got a tough Windows password; anybody with physical access to your PC can use an Ubuntu Live CD to copy all of your data onto an external drive without modifying anything, and crack your files on another machine whenever they please (assuming you don’t have your entire hard drive encrypted). If they had a little more time, they could use Ophcrack to figure out your password, or they could just be mean and use the System Rescue CD to change your Windows password.

Once that person has access to your files, they can recover your passwords with free tools easily—you can recover passwords in a few clicks from Outlook, Instant Messenger, Wi-Fi, Internet Explorer, Firefox, Chrome, or any number of other applications. All it takes is a quick Google search to find even more cracking utilities.

Pidgin Stores Passwords in Plain Text

That’s right, your favorite open-source, multi-protocol instant messenger client stores your passwords in plain text. If you don’t believe me, just open up your %appdata%\.purple\accounts.xml file in your favorite text editor, and you’ll see your passwords right there for anybody to read.

The decision to store the passwords in plain text is a deliberate one that’s been thoughtfully considered, and while you might initially think it’s a terribly insecure way to handle security, keep in mind that you can simply download any number of utilities like Nirsoft’s MessenPass and recover the passwords from AIM, Windows Live Messenger, Trillian, Miranda, Google Talk, Digsby, etc. The Pidgin developers point out that their option is actually the preferred method for security:

Having our passwords in plaintext is more secure than obfuscating them precisely because, when a user is not misled by a false sense of security, he is likely to use the software in a more secure manner.

The best answer, of course, is to not allow your IM client to store your passwords at all—but if you must store them, you should at least use the built-in Windows encryption, if not a full-blown TrueCrypt setup. Either option would be better than the pseudo-protection most other applications provide.

Password Managers Are the Only Secure Storage

The only truly secure way to store your passwords is to use a password manager to securely track your passwords, combined with a a great master password to protect the rest of your saved passwords—if you use an easy password for your password manager, it would be easy to crack with a brute force attack. Don’t lure yourself into a false sense of security by just using one—your password manager password should be at least 10 alpha-numeric characters if you really want to be secure.

You’ve got a number of great password managers to choose from, like reader favorite Keepass, a cross-platform tool which has many plugins that help you master your passwords and make using a password manager easier to deal with. And, of course, let’s not forget that Firefox has a full password manager built right into the application.

Use a Firefox Master Password (With More Than 8 Characters)

If you want to use Firefox to save the passwords for all your web accounts, you should make sure to enable a Firefox Master Password by heading into Tools –> Options –> Security and checking the box for Use a master password.

Once you’ve done this, Firefox will store all of your passwords with nearly unbreakable AES encryption—providing you use a password with more than 8 alpha-numeric characters and at least one capitalized letter. If you used a weak and pathetic password like “secret”, it could be broken in a matter of minutes with a brute force cracking tool, but a decent 8+ random character password will take at least 73 years for a brute force attack.

Each time you start Firefox and go to a site that requires a saved password, you’ll be first prompted for your master password. By default, the master password authentication will be active for the entire session, but you can use the Master Password Timeout extension to lock your master password again after a certain interval, which is handy if you walk away from your desk without remembering to lock it with Win+L.

Use TrueCrypt to Encrypt Everything

Rather than deal with password managers or whether or not to save your passwords, you could simply create a separate, encrypted TrueCrypt drive, and use portable versions of your applications to keep everything totally secure. If you’re even more paranoid, you can use TrueCrypt to encrypt the entire hard drive—you will be prompted for a password every time you boot, but you can relax knowing that anything you do will be encrypted, even if you use scripts with your passwords stored in plain text. If TrueCrypt isn’t your thing, you can use the built-in encryption functionality in Windows—just keep in mind that if you change your password your data will be inaccessible, and your Windows password can be cracked, giving them full access to your files.

[via Lifehacker]

Read Full Post »

According to a study conducted by computer security company Sophos, anywhere from 41 to 49 percent of users (by age group) they test-requested friendship with on Facebook accepted their invitation. The problem, as they see it: After they became friends with people they don’t know, they’ve got access to dates of birth, email addresses, the places they went to school, the town in which they live, and a lot more—basically it’s a great start gathering all of the things an identity thief would need to get the ball rolling. Do you blindly accept friend requests on Facebook? And if you do, do you have a limited profile set up for those people you don’t know that limits the personal information they can see? [Sophos via CNET]

[via Lifehacker]

is

PopoutAccording to a study conducted by computer security company Sophos, anywhere from 41 to 49 percent of users (by age group) they test-requested friendship with on Facebook accepted their invitation. The problem, as they see it: After they became friends with people they don’t know, they’ve got access to dates of birth, email addresses, the places they went to school, the town in which they live, and a lot more—basically it’s a great start gathering all of the things an identity thief would need to get the ball rolling. Do you blindly accept friend requests on Facebook? And if you do, do you have a limited profile set up for those people you don’t know that limits the personal information they can see? Let’s hear it in the comments. [Sophos via CNET]

Read Full Post »