I'm going to be traveling a fair amount over the holidays which means I'll likely be on public WiFi a lot more than usual, and with all of the various security and privacy issues that have popped up in the news recently, I figure the time is ripe to figure out a VPN strategy (since not everything I do is over SSL/HTTPS). [more inside]
I used to use Truecrypt to encrypt little enclosures so I wouldn't have to worry about my files so much when I, say, put them on a USB stick or backed them up to the cloud. There was a whole... thing with Truecrypt and now it's hard to say if I should use it anymore. Is there another program that's going to work well for this purpose? [more inside]
Thinking ahead to my eventual retirement, I phoned Sallie Mae earlier this year, and spoke with a rep who was easy to chat with, and seemed well-informed and helpful. I asked her if there was any sort of discount or other concession made for student loan payments once the debtor retired and began drawing Social Security. Her answer was that, good news, once I provide Sallie Mae with documentary evidence that I am drawing Social Security, the balance of my loans would be waived. [more inside]
Trying to understand what IT is doing with my workstation right now. Near-constant prompts to log in to Outlook (I am already logged in) and suddenly, for the first time, most websites (but oddly, not social media) are being blocked with EdgeWave iPrism. What's going on, and should I worry? Details inside. [more inside]
I got a new job (cool!) but have to turn in my MacBook Air from old job (oh well). Since I also used as my primary laptop for personal stuff, like banking and Facebook, it also has a ton of personal data on it. (I plan to buy my own laptop for next job. And no, I did not look at naughty stuff on it -- I do have a tablet.) The company wants the programs already installed left on the computer, which is reasonable -- so leave Photoshop and Word installed -- but I want to clear off any personal data. Is there a good way to scrub an Apple computer while leaving programs behind? Right now you could go to Twitter on my browser and log into my personal account without a problem. (I realize I can just Clear History on browsers, but also looking for deeper scrub, such as WiFi passwords and stuff on keychains).
One of many painful aspects to the James Foley tragedy is that the US attempted rescue, but was in error as to the location of the hostages. I wonder - is there not some geolocating device, maybe even a microchip, that could be required for journalists and tourists/hikers entering a war zone? I can understand that it would be an intolerable risk for soldiers and spies, but Foley was leaving an Internet café when he was abducted - not trying to live a hidden life.
So I recently completed a project, and was sharing the news with people on Facebook - but Facebook blocked the link to my website because it was apparently on some spammy/malware blacklist. I did some investigation, and my site comes up clean on every security scan thing I tried, except McAfee SiteAdvisor. It seems likely that it's a false positive, possibly due to my shared hosting. If there's a legitimate security issue, though, I'd like to find out what it is so I can fix it - but I don't know how I can do that. [more inside]
Recently I noticed a lot of controversy about whether Truecrypt is secure or not. It looks like their webpage is raising concerns about it, even to the point of suggesting that people migrate their data away from it. Arstechnica and others are following the story. What's going on? Might this be a hoax? Are truecrypt encrypted flashdrives not safe? If not, what level of security do they provide, if any? What would be a good alternative if we are to migrate away as quickly as possible?
My apartment building was sold in the past 6 months. The new owners have been completely gutting and renovating units as people have moved out; the work is going on for months. I'm planning to move out at the end of the month and wondering how much I need to worry about cleaning or repairing any minor damage if they're just going to do the same thing to my unit. Additionally, if they do charge me for any damages do I have any recourse to argue that they shouldn't have because they weren't preserving whatever it was any way? Obviously not expecting any binding legal advice on this, more curious if anyone has had similar experiences or any pointers to share.
My mother still gets her bank statements by paper mail. Her latest one failed to be delivered for 2 weeks now, and she verified the bank mailed it, so we assume it was delivered by the mail carrier to the wrong address, or dropped, or something. Nothing has happened yet, but it seems best to guard against the worst-case scenario, namely that someone else now has her home address, bank address, all account numbers (including retirement accounts), possibly other identifying information, and has the willingness to exploit it. What are the prudent steps we should take? [more inside]
I tried to install linux on a win8 laptop and failed although I tried everything to disable UEFI and security boot options in Bios. So I think there is no solution to install Linux on certain win8 Laptops. But someone told me of course I can install Linux on any win8 laptops by using virtualbox. So I'm wondering why can it be done? How exactly is virtualbox/virtual machine works for this issue? can anybody explain this to me in a easy to understand way? Thanks very much.
Are terms and conditions, disclosed after sale, legitimate? What if the associated item is a gift? [more inside]
I'm developing a website where people try to be click number X (sort of like radio call-in contests) to win a prize, and am looking for advice on ways to make it harder for someone to cheat. [more inside]
Car was broken into last night, and again I wondered why I can't seem to find a small HD camera and DVR combo that can be hidden in my car. [more inside]
I am a first time city apartment dweller, and don't have a clue on how/when to use my door buzzer. What is okay, what isn't, and yes, I am over thinking this, but it is bugging the hell out of me because I am already overstressed. [more inside]
I am about to buy some bluetooth speakers to be used in conjunction with a Windows computer and Itunes. I have heard vague rumblings to the effect that bluetooth has security issues that regular wifi devices do not. Ordinarily, I would buy wifi speakers but the few I can find are awfully damned pricey. Would I be putting myself at risk of compromising my computer's security if I set up a pair or two of bluetooth speakers in my apartment? In general, are there any bluetooth security issues I should be aware of, as a new user of this technology? Many thanks for your time.
Microsoft Security Essentials Missing From System Tray. [more inside]
We're going to Vegas in 3 weeks and I want to be able to spend my days walking around without having a purse always looped over my shoulder. My clothes don't have pockets. Fanny packs are the work of Satan. Is it a terrible idea to keep my often accessed stuff (cash, credit cards) in my bra and more important stuff (like health insurance card, driver's licence, etc) hidden in my panties? What should I do with my phone (that is also my camera)? [more inside]
My Dad received a spam email purporting to be from his email provider (BT Yahoo, fwiw) asking him to verify his account. In a moment of utter stupidity, I fell for the scam and entered his email password into a bogus website (I know, I know: STUPID). I was using his iPad at the time, and a ransomware website opened in safari, however the browser didn't lock, and I was able to close it straight away. I immediately logged into his email account and successfully changed his password to something completely different. Google tells me that there is currently no ransomware which can successfully hijack Apple devices, which my experience seems to bear out. I am a bit worried about the risk that I've accidentally compromised his email, though. Is there anything else I should do beyond what I've already done, ie changing the password? Should I contact BT Yahoo about it?
At my place of employment, I have been charged with physically securing our two servers. The decision has been made to bolt them to the concrete floor in a cage. I don't know how to shop for a server rack. We have an old one that they're on now, but it's an open rack, without sides or locks. I need one that's more of a cage, to keep people without the key out. It'll have to fit at least 8U worth of servers, and also accommodate a midsized tower somehow, and be 1000mm deep minimum. How do I shop for this? I can't find any information on whether any of the racks I'm looking at are bolt downable.
I read online that the director did a lot of research and consulted with military experts on how an actual terrorist siege on the white house could work. Of course, he also said that white house security experts have already planned for such an attack. I'm curious what would have been done differently in real life by the white house and DC security?
I am looking into alternatives to Windows EFS to protect sensitive data on a Linux web server. I know practically nothing about EFS, but I get the impression that the files are effectively plain-text if you are logged into the Windows machine as the user who owns the files, so the same level of "encryption" exists in a Linux environment if the files have only read/write perms for file owner and no perms for anybody else. My colleague says "No, it is not the same level of security" but doesn't provide any further info regarding how/why it's different. What am I missing here? [more inside]
Please help me translate the phrase, "Something that you bought at another store has not been cleared. I can fix that for you. Thank you." [more inside]
This has happened twice now, and it is freaky. Google chrome on the iMac I use in my office at work (at a university) will have usernames and passwords for people who have never been in my office ever. The first time it happened it was my father's email, and the second time it was my stepmother's. Why would chrome be filling in these odd emails when it doesn't even save my own login information after closing the browser window? [more inside]
Strangers from adjoining neighborhoods have created a path on private land behind my house. What are some ways I can stop them? [more inside]
Open source software is considered trustworthy because anyone can validate the source code and hold the developer accountable. Usually developers will also make compiled binaries available for convenience. How can we know that these binaries are compiled from the same source code the developer published, and not a malicious variant of it? [more inside]
With email and website passwords, are successful "brute force" attacks still common, where an automated bot tries thousands and thousands of passwords on the same user account until one works? [more inside]
I need to retrieve the SSID of a wifi network that is not in range from either an iPhone or an old hard drive. [more inside]
Help me name my new product, which combines the functionality of popular existing apps, but is specialized with high-security features. [more inside]
I'd like my security deposit back, please. [more inside]
I was checking the security setting on my gmail account this AM and was alarmed to see that govtrack.us had somehow been granted " granted the following services access to your Google Account". Especially concerning since i had never seen that site, or even heard of it. What gives?
I found several "favourited" videos in my YouTube account that were definitely not my or my partner's doing. What could have happened? Was I hacked? [more inside]
Please help me understand the difference (or non-difference) in safety for Firefox vs. Chrome browser extensions (plugins/add-ons). [more inside]
Apparently, I didn't keep the answers to my iTunes security authorization questions. I think I can guess my answers with a few more tries, but I might get locked out before I get there. Will the wrong answer count reset back to zero after a wait time? Meaning, can I try again tomorrow, or will I still get locked out? [more inside]
Secure VPN for a novice? [more inside]
New IPad - very computer savvy - do I need to worry about security on my new IPad? I check my banking accounts everyday on my laptop and would like to use my IPad for this. Is there additional security needed (to download) or am I good to go?
This past weekend I had a huge moving sale, and ended up with about $1500 in small bills ($1s, $5s, $10s, $20s). Between cleaning my apartment and packing everything up today, I forgot to go to the bank and deposit the money into my account. Tomorrow morning I fly out of JFK (Terminal 4, specifically) to move to San Francisco, and since my flight is early there's no time to go to a bank. I feel weird traveling with these huge wads of cash, especially as it's all small bills. Right now it's all stuffed into a cigar box in my carry-on. I don't think it will fit in my wallet. Will the currency exchange places give me $100s (or better yet a money order) for my cash, and will I find one before passing through security? Will TSA steal from me, or give me a hard time for carrying these wads of bills? Is there possibly a Bank of America branch in JFK? What should I do? I don't think I'm comfortable depositing this much cash through an ATM, and anyway it would take forever.
Are there any cities that still have effective gates? [more inside]
Should I get a home security system? [more inside]
Recommend a Decent Home Security System with the following features: [more inside]
What kind of security box should I get? Small/affordable ones please! [more inside]
It's very very hot today. My method of cooling the house is entirely fan based. I would like to be able to leave the windows cracked for the cats when I'm at work, and when I'm sleeping, but the first floor presents a security issue. What can you recommend to secure double hung windows? [more inside]
I just walked past an armoured truck doing a cash drop to a bank. On the back was a sign saying "Police follow this vehicle". Is this a request or a statement? What's it trying to achieve and does it work?
I have contacted the designer of my WordPress theme for support and they are asking for log-in info. This seems like a "stop right there" kinda thing. Am I being to cautious? [more inside]
I need to find a source for travel and security advisories for locations around the world. Our organisation is too small to employ a security advisor and I don't always trust the locals. What publicly available resources do you use to prepare for travel? [more inside]
On a scale of 1-10, with 1 being "very safe" and with going-to-11 being "the most crazy," how insane is it to try to get into London from Heathrow to do some light sightseeing on my way back home to the US. (I've read the previous questions, but needed some clarification about some of the issues!) [more inside]
My new boss is totally different from my old boss. Help me persuade my colleagues not to hate him. [more inside]
I want a secure way for people to log into a server on my Windows machine from the internet. I have an idea; is it good? [more inside]
So...I'm thinking my Mac has a virus. I have a Mac OS X 10.5.8. I keep running out of hard drive space and deleting files constantly, so I got Disk Inventory X to see where my space is. Turns out there is 20 GB of 130,000 text files on my computer in a hidden file marked "private". I can't see this "private" folder from the file manager...only from Disk Inventory X. What do I do? [more inside]
When uploading my files to the cloud, are they automatically encrypted before they leave my computer?
When uploading my files to major cloud services (Microsoft SkyDrive, Google Docs and Google Picasaweb), are they automatically encrypted before they leave my computer? [more inside]