Security improvements in Windows 10

Security Improvements in ransomware protection in Windows 10 Ransomware is the most extensive digital danger to safety and productivity now a day. Its impact is touched everywhere around the world. No computer user is safe, from the average home users that they could lose the ability to perform daily Internet activities, and all the way to organizations whose business operations can be toothless by ransomware infection are affected. Many high-profile events have demonstrated that ransomware can have shattering effects on all of the desktop users. Microsoft upgrades their Windows 10 to be more secure because they recognize that the threat to output that shameless modern cybercrime represents and capitalizes significantly in a thoughtful and simple strategy that is showing to be effective as new attacks arise. Microsoft has observed that extremely skilled and well-funded attackers can find unexpected paths to their aims. So, they detect and help avoid these threats with advanced defence services such as Windows Defender Antivirus and Windows Defender Advanced Threat Protection.   Microsoft’s Windows Defender AV on Windows 10 controls the power of the cloud and artificial intelligence built on top of the Microsoft Intelligent Security Graph to quickly identify new threats, this include ransomware, as it first sees anywhere around the globe. In the Windows 10 Creators Upgrade, they significantly improved the ability of Windows Defender AV to recognize and stop ransomware more efficiently and faster than ever. With the Windows 10 Creator update, it will have a deeper level of the technical details on the ransomware detailed investments in Windows 10 Creators Update.   Security structures built in Windows 10 reflect their next-gen,...

How to validate that your home router is not compromised

The wireless router can be the easiest target for hackers to compromise your network, if configured improperly. Hackers will employ many different methods to attempt to hack your router. Some of these methods that I will be talking about include Wi-Fi hacking and DNS hijacking. There are many different preventative measures than can be taken to ensure that you have a secure router. Setting up a secure router is very important because not only can your network and personal information be compromised, but you may be held legally responsible for all of the potentially illegal traffic that goes through your network. Validate that your router is secure A popular method for hackers to compromise all devices in DNS hijacking; DNS hijacking is when a hacker subverts the resolution of DNS queries. In other words, they can direct you to malicious websites even when you try to visit a known secure website such as your online banking website. This can be done to a personal computer within a network, or even the router if a router has vulnerabilities within its firmware. There are tools that exist to test if you are a victim of DNS hijacking. One such tool is F-Secure, you can check your security with this tool by visiting f-secure.com/router-checker/. What this tool does is analyze your own router’s DNS requests to see if they are being redirected to a third-party rogue DNS, or if the DNS requests are acting as they should.   Hackers may also try to gain access to your router by cracking your Wi-Fi password or simply joining your network if it is left...

How to setup and configure a wireless network in a secure manner

An improperly configured wireless network can present massive consequences for anyone. Consequences can range from freeloaders using your internet – to malware, data theft, and liability for illegal activity. If your network is left open and unsecured, you are practically inviting freeloaders to use your internet; you wouldn’t leave your doors open and unlocked at night, would you? You might know your neighbors well, but you do not want to be responsible for them or their kids downloading movies on your network. More dedicated hackers would prey on networks might prey on wireless networks using old weak encryption or might even try to guess weak and common passwords regardless of what kind of encryption you are using. Methods of Attack You should not only worry about those who live around you, there is a method called ‘wardriving’ that hackers use to prey on wireless networks. Wardriving involves people driving around, searching for and trying to gain access to networks while in a vehicle. Obviously open networks can be joined with ease, however there are more complex methods for more knowledgeable hackers. They use software such as Aircrack to obtain a handshake with a wireless network. The handshake is the exchange of the encrypted key between the client and the wireless router. The handshake is retrieved by sending de-authentication packets to disconnect devices from the wireless network; they then wait for a device to reconnect (most will automatically). Once a device attempts to reconnect, Aircrack captures the handshake as a .CAP file. The .CAP file can then be cracked with Aircrack using the CPU or converted to another format to...

Options Available for Data Encryption in Windows 10

Data encryption is very important in todays day and age. Security on all our devices must be implemented to its full extent. Online thieves have been getting more and more tricky with stealing user information for their own benefit. Taking the wrong steps with protecting your data on your PC could result in thieves stealing your identity. Here are options available for data encryption in Windows 10. Data encryption takes data and translates it into another form of code so the only way of reading the data is with a decryption key. This is the most popular and secure way of handling the protection of data. There are two main types of data encryption, asymmetric encryption and symmetric encryption. Asymmetric encryption is also known as public key encryption because it uses public and private keys to encrypt or decrypt data. Symmetric encryption is the same, but it uses one single key to encrypt and decrypt the data. This would mean that the sender and receiver must know the key to able to read the message. Sending the secret key over the network could cause issues if the key falls into the wrong hands. That person would be able to read every message that was encrypted with symmetric encryption. The way asymmetric encryption uses its keys is that they are in a key pair. One key is public, so anyone could send you a message while the other private secret key is kept just for you. When sending a message, the only way to view it is by having both the public key and the private key. This method is...

How to Validate That Your Home Router Is Not Compromised

Not keeping your home router secure is the same as not having a front door on your house. Your router delivers the internet to your house and it’s important to protect that entry way. Hackers are very malicious and will cause havoc for you if your home router is not properly secured. Hackers could cause many threats to your system and understanding how they do this can help you understand how to protect your home router. By taking simple steps you can stop anyone from causing damage to your life on the internet. Here is how to validate that your home router is not compromised. One threat that hackers use is called DNS hijacking. DNS stands for Domain Name System and its role is to act as a phonebook for the internet. DNS is what helps you reach a website. When you type in a website in your browser the browser checks the DNS and keeps hopping around to finally locate the server that is hosting the website. When DNS servers locate the website, they translate the domain name to an IP address to help the server that hosts the website find you. Hijacking the DNS could result in routing you to an unknown server without you even knowing. Hackers could redirect you to fake looking websites that you wouldn’t even know are fake. For example, you try to reach your banking website but instead someone redirects you to a fake banking website that looks exactly like the website you normally use. You type in your credentials and just like that the hacker has your banking information. With this...
How to Validate your Home Router is not Compromised

How to Validate your Home Router is not Compromised

In this day and age information security is becoming more and more vital. In a world where every week massive targeted hacks compromised an unprecedented amount of data, and ransomware can bring the largest of companies to their knees we must do everything we can to secure our personal home networks. I think in many cases people focus solely on securing their computers giving little to no thought about their router. This is an unfortunate oversight, securing your router the literal gateway connecting your personal network to the raw internet is every bit as essential as securing your personal computer. Home routers are often targeted in cyber-attacks because the majority of people never change the factory settings. It is amazing how many people leave the default device name and password, doing this amounts to inviting criminals into your network. Not only do people not change these credentials but generally the routers you get from your service provider are subpar and have well documented back doors. I know this sounds scary because in all honesty it is, however there are some very simple steps you can take to validate that your home router is not compromised. One of the most important and basic steps you can take in securing your router is to change the administrative credentials. How to do this varies slightly by manufacture and model but is generally an easy process involving logging into a website or sometimes connecting your computer to the router via ethernet. Once logged in its usually as easy as entering and saving more secure credentials. This is of the upmost importance when it...