Hacked Internet of Things Database

Last Update: April 24, 2017

More and more gadgets for the home are connected to the Internet for additional functionlality. Refrigerators to Thermostats to Door Locks, the list is never ending. Do not forget about security. You may have created an open door for hackers, become part of an evil Botnet, or illegal activity without your knowledge.

A vulnerable webcam can give ANYONE on the Internet a view of your home. Secure these home gadgets as strongly as possible. Many can NEVER be updated, which means that you should discontinue their usage.

Wi-Fi Network Connection

Here are some general tips to secure your devices at home:

  1. Connect your IOT device such as a Dropcam or Nest Smoke Detector to your Guest Wi-Fi network whenever possible.  This network should be walled off from the normal network, preventing access to all your Computers.  Malicious devices could snoop on your network and quietly send information without your knowledge.
  2. If the Wireless routers guest network is not secure, it is even better to have 3 routers in a Y configuration. You can purchase an inexpensive router that hooks up to your Cable/DSL modem, then have 2 separate wireless routers connected to this device. Put all Internet of Things devices on one of the Y routers. Connect your computers, smartphones, tablets to the other router.
  3. Have the Guest network that IOT devices are on, use a different dns server
  4. Turn off uPNP on your router to prevent ports from being opened up to access IOT devices.

Even the NSA is loving the rise of all these IOT devices to let them hack more easily. CCTV cameras were involved in a DDoS attacks, taking down small businesses who did not pay ransom.

Hacked Internet of Things Insecure Device List

Baby Monitors

Continue reading “Hacked Internet of Things Database”

Updated Safe Gadget Security Tutorials – Security Alerts 2017

The following alerts have been updated to reflect new and important security protection schemes:

4/12/2017: 2 easy ways to increase your security and not have to constantly update are:

4/4/2017: Google Project Zero has found a major flaw in a WiFi chip that is used on many Android and iPhones. Hackers can run malware on devices. Apple iOS 10.3.1 and newer fixes the bug. Android patches are rolling out soon. Make sure you update your device. Any phone that does not get security updates any more, should be recycled and replaced.

3/16/2017: Matthew Green, a well respected cryptographer and professor at Johns Hopkins has a great article discussing Secure Computing – Desktops vs Smartphones, iOS vs Android and more..

3/15/2017: ID Thieves are using the IRS and filing fake tax returns. Remember that the IRS never calls or sends email to you.  They use old fashion US mail.

2/16/2017: Apricorn makes a secure USB flash drives that require a pin code to be entered before they function.  No software or drivers required, so it works with any operating system. Dust and water resistant durable aluminium housing

2/2/2017: Laser Printers are vulnerable to security issues. Popular printer models manufactured by Dell, Brother, Konica, Samsung, HP, and Lexmark are all affected.

2/1/2017: Netgear has updated firmware for many routers that fixes a major security hole.

Continue reading “Updated Safe Gadget Security Tutorials – Security Alerts 2017”

iPhone Security, How to securely use your iPhone

Last Update: 3/16/2017

Apple iPhone 3GS

Matthew Green, a well respected cryptographer and professor at Johns Hopkins has a great article discussing Secure Computing – Desktops vs Smartphones, iOS vs Android and more..

Most iPhone users do not think very much about security. The iPhone is part of Apple’s closed ecosystem, helping to prevent viruses and malware from wreaking havoc. As the iPhone has grown in popularity, the smartphone has become more of a target by hackers and criminals. It is important that iPhone users immediately become more vigilant about smartphone security.  Our tutorial covers the iPhone through iPhone 7 Plus and iOS through iOS 10.

1. iPhone Software Updates

Apple upgrades the iOS software for the iPhone from time to time. Updates include additional functionality as well as security bug fixes. It is important that users apply updates immediately. Before iOS 5 users needed to connect their iPhones to a computer in order to update the smartphone’s software. Needless to say, this was inconvenient and led to many iPhones with obsolete software.

Always update to the latest iOS software available as soon as possible.

If you Jailbreak your iPhone, you need to be extra careful with regards to security as iOS updates are much more difficult for you. Be careful where you obtain your Jailbroken Apps as malware is much more prevalent.

2. iPhone App Security

Continue reading “iPhone Security, How to securely use your iPhone”

Free Antivirus, Free Internet Security Software

Last Update: 3/10/2017

Windows 7 Security Software, Security Essentials

Here are some resources for free internet security software from major vendors. Most of the software is free for home users, while businesses need to purchase a license. We divide the free software into different categories including internet security suites, antivirus, antispyware, and intrusion detection and prevention.

Internet Security Software Downside – Spying on You

Any internet security program needs to watch the sites you visit for malicious activity, this includes secure sites (https://)  To watch your secure browsing activity, security suites need to replace the security certificates with their own, performing a man in the middle (MITM) attack essentially.

Hopefully this snooping is all in the name of security, not in stealing your credit card, banking information, or identity. You can read more about Avast.

Kaspersky Anti-Virus is often free after rebate. You need to be comfortable with their ties to the Russian government.

1. ISP Provided Free Security Software

Subscribers to certain internet service providers get access to free commercial internet security software. There’s no need to pay a dime for top notch security software.

Continue reading “Free Antivirus, Free Internet Security Software”

Android Smartphone Security, How to securely use your Android Smartphone or Tablet

Last Updated: March 11, 2017

Android Smartphone,Samsung Galaxy 2, T-Mobile

Google’s Android operating system powers many popular cellphones including the popular Samsung Galaxy S7. Most Android Smartphone users as well as most of the pubic at large do not think very much about security.

If your phone is not running the latest Android security patches, you are open to attack. A recent Wall Street Journal article showed that only 2.8% of Android devices have the latest security patches. Compare that to 79% of iPhones.

Most Up to Date Android phone

This flagship phone runs the latest Android version and is patched regularly.

We will cover some techniques to enhance your Android phone security.

You need to test your Android Device for Vulnerabilities

Continue reading “Android Smartphone Security, How to securely use your Android Smartphone or Tablet”

Secure Firefox Browsing

Last Updated: 4/14/2016

firefox browser

Firefox is one of the most popular web browser for Windows and other platforms. This makes it a large target for malware and cybercrime. We will focus on securing Firefox, and will significantly increase the browser’s security through add-ins and special hardening settings. We are avoiding earlier versions of Firefox and recommend users to upgrade to the latest version of Firefox. We also recommend running under Windows 7, 8 or 10, so if you are running under an older version of Windows, we recommend you to upgrade or buy a new computer. Older versions of Windows like Windows XP were not built with security in mind.

Secure your computer, web browser, Internet connection

Follow our guides to secure your Windows PC or secure your Macintosh by installing the right software, firewall, antivirus software, etc. Secure your mobile devices: iPhone, Android smartphone or tablet, iPad. Configure the settings and add plug-ins to you web browser so that it is more secure. Consult our tutorials for: Internet Explorer 9, Google Chrome, and Mozilla Firefox. Secure your Internet Connection: Wireless Network, Public Wi-Fi.

We recommend booting from a Linux CD or USB key when performing mission critical applications such as online banking, online trading, or online shopping.

Firefox includes the following security oriented features:

  • Instant Web ID
  • Do not Track
  • Private Browsing
  • Clear Recent History
  • Customized Security Setting

The Golden rules of the Internet: Continue reading “Secure Firefox Browsing”

Recovering from a Malware Infection or Ransomware

Last Update: 3/26/2017

Windows Blue Screen Of Death, BSOD

Recovering from a Malware Infection or Malware Disaster is a difficult and time consuming process. This involves running 1 or more anti-malware programs to help eradicate any infections.

How to tell if you are infected

The first step in recovering from an infection is realizing that you are infected in the first place. Below are some telltale signs that you have been infected by malware.

  • Pop-up windows, especially ones selling anti-virus software
  • You are being asked to pay a ransom
  • Computer does not boot or start up
  • Computer starts playing funny sounds
  • Internet speed decrease
  • Internet access even when no program is running

If you have any of the above symptoms, it is time to check your computer for problems. Keep in mind that computers with inadequate amounts of RAM memory may run slower than normal. We recommend at least 2 GB of RAM with Windows Vista or Windows 7.

Checking Your System for Malware

After you have decided to check your system, you should scan your system with up to date anti-virus or anti-malware software.

We suggest you first delete any Temporary Files located on the drive. This will speed up virus scanning and even remove any viruses inside the Temporary Files folder. To delete Temporary Files follow the steps below: Continue reading “Recovering from a Malware Infection or Ransomware”

Secure Google Chrome Browsing

Last Update: 4/14/2016

Google Chrome Browser

Google Chrome is one of the most popular web browser for Windows, Mac, and Linux. This makes it a large target for malware and cybercrime. We will focus on securing Google Chrome, and will significantly increase the browser’s security through add-ins and special hardening settings. We also recommend running under Windows 10 or Windows 7, so if you are running under an older version of Windows, we recommend you to upgrade or buy a new computer. Older versions of Windows like Windows XP were not built with security in mind. Continue reading “Secure Google Chrome Browsing”

How to: Safe and Secure E-mail

Last Update: 8/4/2016

Spam, can of spam less sodium

Every computer user uses e-mail. Security breaches make headlines almost daily. With more and more people going online, consumers are worried more than ever about keeping their e-mail safe and secure.

E-mail is the major way most malware is transmitted across the Internet. E-mail is the largest attack vector against large companies, as it is far more difficult to physically infiltrate a company. In this article, we will help you use e-mail more securely.

A recent experiment of 150,000 test emails sent by Verizon Enterprise Solutions found that 23% of recipients opened the email, 11% click on the attachment. One person clicking on the attachment would have infected the organization.  The human is the weakest link.

Secure your computer, web browser, Internet connection

Follow our guides to secure your Windows PC or secure your Macintosh by installing the right software, firewall, antivirus software, etc. Secure your mobile devices: iPhone, Android smartphone or tablet, iPad. Configure the settings and add plug-ins to you web browser so that it is more secure. Consult our tutorials for: Internet Explorer 9, Google Chrome, and Mozilla Firefox. Secure your Internet Connection: Wireless Network, Public Wi-Fi.

The Golden rules of the Internet:

  • Do not trust anyone
  • If it is too good to be true, it probably is
  • Don’t install software from anonymous sources
  • Don’t automatically hit “yes” to any pop-up
  • If it looks suspicious, run

Secure Your Router

Continue reading “How to: Safe and Secure E-mail”

How to use Linux for more Secure Computing

Last Update: 7/12/2016

Ubuntu Linux

Linux is a great operating system to supplement your existing environment. We suggest using it on a bootable piece of media to perform your more important online tasks, such as online trading and online banking.

How to use Linux for secure computing

1. Installing a Clean Linux OS with no modifications, program add-ons, etc, helps prevent keyloggers, spyware, and other malware from being installed. Burning Linux Live CD to a write only media such as a CD/DVD or a Kanguru USB drive with Write protect switch, helps prevent any changes to a virgin Linux distribution. Keep in mind that no bookmarks, password managers, etc would be accessible.

The CD versions do take many minutes to boot up and ask you if you want to try Linux, so the USB route is definitely preferred.

2. Ubuntu Linux is a user-friendly Linux distribution and a good bet for most Linux newbies and novices. Try it on USB drive or burn it to a CD, there is no need to install the operating system on to a hard disk. We recommend you use an LTS or long term support version of Ubuntu so that there is long term stability to your Linux choice. (10.04 LTS is a good choice) The other popular Linux distribution is known as Fedora, it is more data center, server-oriented. If you are reading this, Ubuntu is the way to go.

3. Unetbootin is a useful utility that creates a bootable live USB drive or flash drive from Linux distributions, such as Ubuntu, Fedora, etc. It even downloads the Linux distribution automatically.   This program run on Windows, Mac OS X, and Linux, but the resulting USB drives are bootable only on PCs.

4. Backtrack is a specialized Linux distribution for penetration testing. It is filled with useful tools to test the security of computers and networks. You can use Unetbootin to install it on a USB drive. Backtrack is designed for security experts, it is not easy to learn.

5. Tails is a preconfigured Linux distribution full of security essentials. It includes the Iceweasel browser, which utilizes the Tor network for anonomys browsing. HTTPS Everywhere, Adblock Plus, and NoScript are preloaded, to increase security and block ads.

Continue reading “How to use Linux for more Secure Computing”

Free Software for Internet Security, Computer Protection on Windows Computers

Last Update: 1/24/2017

Optional Software from Microsoft and Other Third Party Developers is a crucial part of adding computer security to your Windows based PC. We recommend a minimal set of crucial network security software add-ons that we feel all users should install. Here are several extremely useful free security oriented software utilities from Microsoft, that are not bundled with the operating system. These programs add additional security for Windows and are free to download.

Before you make any changes to your system, always back it up.

Google Docs can replace Microsoft Word and Excel. Doing so helps prevent many of the security holes in Microsoft Office including Flash based bugs.

Windows 7 Security Software Microsoft Security Essentials

Microsoft Security Essentials – Free anti-virus software from Microsoft that is a no-brainer for everyone. Microsoft Security Essentials can also be used by small business on up to 10 PCs! It includes automatic updates and is easy to use.

Windows 7 Security Software Microsoft Baseline Security Analyzer

Microsoft Baseline Security Analyzer – Scans your system for security problems, missing or obsolete Windows components and patches. This is oriented towards small and medium sized businesses but can also be used by consumers.

Continue reading “Free Software for Internet Security, Computer Protection on Windows Computers”

Welcome to Safegadget.com

Welcome to Safegadget.com, the one-stop website for securing your computer and gadgets. Don’t wait until you have become a victim of malware. While it is impossible to prevent all attacks, it is important that we all secure our systems so we aren’t easily hacked. This is akin to wearing a seat belt to prevent an accident.

We feature many different security tutorials.

Harden the Security of your Browser

Boost the Security of your Smartphones and Tablets

Learn how to perform the following Safely and Securely
Continue reading “Welcome to Safegadget.com”

How to International Travel and Maintaining Computer Security Tips

Apple iPhone 3GS

The International Travel Security Problem

Many of us travel internationally but few realize how important computer security can be when we visit other countries. People doing business in countries like China and Russia (or any other country for that matter) need to pay strict attention to their technology security protocols to prevent the real and growing threat of high tech espionage. There have been instances of people returning from abroad and having their laptops or smartphones compromised. A mobile device used internationally and later hooked up to the Company’s network provides an excellent infection vector. The folks intent on stealing information could be government or corporate based.

Learn how to use your iPhone or Android Smartphone in China

How to Protect Yourself When Traveling

Some people might find the following list a bit paranoid, but you never can be too safe. People that work for major corporations, government, or security firms need maximum protection from attackers. There are tools that can detect the location of a mobile device to within 100 feet and can target phones by the phone number, IMEI (International Mobile Equipment Identity) number and intercept all communications from the mobile device.

  • Leave your cell phone and laptop at home
  • Buy a phone and SIM card in the other country
  • Beware of any SMS message especially if they have links
  • Do not bring any sensitive data or passwords
  • Use temporary or loaner cell phones and laptops which will be erased when you get home
  • Make sure all gadgets are fully up to date and have security software enabled. The best encryption should be utilized
  • Never let your electronics out of your site
  • If your device gets inspected at the border, it should never be connected to the Company’s network again
  • Turn off Bluetooth and Wi-Fi
  • Avoid public Wi-Fi altogether
  • Do not use a public phone charging cable, it could be capturing video while you charge
  • Disable microphones and cameras
  • During meetings, turn off your devices and remove their batteries. (Prevents possible recording)
  • Use a VPN with heavy encryption to connect to the Internet
  • Use Google Voice to create a “throw away” voice accounts
  • Do not connect to your Company’s or government’s network while abroad
  • Use coded language when discussing sensitive matters
  • Cut and paste passwords to prevent keylogging
  • Change any and all passwords you used on the trip, immediately
  • Enable two factor authentication for services that support this; Facebook, Gmail, eBay, etc.

Continue reading “How to International Travel and Maintaining Computer Security Tips”

How to Safely use Twitter

Last update 1/9/2015

Twitter Logo

Twitter is becoming more popular everyday. With millions of people to be targeted, Twitter is definitely a battleground for security and privacy. This website has become a worldwide hit and consequently has become a target for those intent on spamming, spreading worms, and stealing private information. In this article, we will cover many techniques to allow you to safely use Twitter.

Secure your computer, web browser, Internet connection

Follow our guides to secure your Windows PC or secure your Macintosh by installing the right software, firewall, antivirus software, etc. Secure your mobile devices: iPhone, Android smartphone or tablet, iPad. Configure the settings and add plug-ins to you web browser so that it is more secure. Consult our tutorials for: Internet Explorer 9, Google Chrome, and Mozilla Firefox. Secure your Internet Connection: Wireless Network, Public Wi-Fi.

It is important that you follow the tips above to ensure your computer is secure. There have been Twitter Spam Attacks caused when malware infects a computer and gives control of the user’s Twitter account to a spammer. The spammer then posts messages on Twitter offering everything from Free items to pictures of celebrities, all appearing to be posted by the infected user. If one of your friends clicks on the offer, they instantly get infected, repeating the cycle of malware propagation.

Access the Real Twitter

Always make sure you are at a real Twitter log in page when you access their site. Do not count on Twitter links in email or on web pages to access the real Twitter website.

Think before Clicking on Links

Continue reading “How to Safely use Twitter”

iPad Security, How to securely use your iPad

Apple iPad, tablet computer

Most iPad users do not think very much about security. The iPad is part of Apple’s closed ecosystem, helping to prevent viruses and malware from wreaking havoc. As the iPad has grown in popularity, the tablet has become more of a target by hackers and criminals. It is important that iPad users immediately become more vigilant about tablet security. Our tutorial covers the iPad, and iPad 2.

1. iPad Software Updates

Apple upgrades the iOS software for the iPad from time to time. Updates include additional functionality as well as security bug fixes. It is important that users apply updates immediately. Before iOS 5 users needed to connect their iPads to a computer in order to update the tablet’s software. Needless to say, this was inconvenient and led to many iPads with obsolete software.

iOS 5 allows updates to occur without the iPad being connected to a computer, allowing users to stay current far easier. We recommend all owners of the iPad and the iPad 2, upgrade to iOS 5 immediately. iOS 5 in fact includes many security fixes.

If you Jailbreak your iPad, you need to be extra careful with regards to security as iOS updates are much more difficult for you. Be careful where you obtain your Jailbroken Apps as malware is much more prevalent.

2. iPad App Security

Apple’s App Store reviews all submissions before adding them. All iPad apps must be authenticated and signed which helps to ensure they haven’t been tampered with or altered. This helps prevent malicious apps from infecting the App Store. Apps are prone to security vulnerabilities, that are fixed by updates. Keep apps updated regularly and remove apps that you do not use. Regularly use the App Store app and select Updates. iOS 7 adds the capability to auto update your apps. Be sure to use this function. Apple has the ability to remotely remove malicious apps from your iPad.

Continue reading “iPad Security, How to securely use your iPad”

Free Security How to: Computer Security, Computer Protection on Macintosh

Apple MacBook Notebook Laptop

We begin our coverage of Macintosh security with this article. Next, we cover Free Security How to: Computer Security, Computer Protection on Macintosh Security Software.

Security is one of the most important parts of owning a computer. While Mac OS X has been safe in the past, Apple continues to gain market share resulting in hackers and virus writers making more attempts to break into the Mac. 2012 was even more dangerous for Mac OS X, the Mac Defender attack woke up Mac users, and no longer can Mac users peruse their computer without fear of attack. 2012 included several more widespread incidences.  It is important to take a few precautions to protect your information and personal data.

This article will focus on what steps you can take to lock down your Mac to protect yourself. The good news? Mac OS X Mountain Lion 10.8 is a more secure operating system. For most Mac users, many of the steps in this tutorial may be considered unnecessary to protect them from hackers and virus attacks, but if you are security conscious and require access to the Internet from an unprotected or questionable wireless network then some of these steps may just save your Macintosh from being a victims of a major attack.

Apple has a security configuration page with specific security settings for different versions of Mac OS X. Be warned that many of their security tweaks are complex and  require command line input. The NSA has a shorter guide on how to secure Mac OS X. This guide also has some security tweaks requiring command line input or more detailed changes than some owners would feel comfortable doing like setting up a firmware password.

Recent Macintosh Malware Outbreaks

Flashback Trojan – March 2012 – This piece of malware infected hundreds of thousands of Macintosh’s through a security hole in Java. Apple was too slow to put out an update to Java.

SMSSend Trojan – December 2012 – New malware which sent out expensive SMS messages.

Continue reading “Free Security How to: Computer Security, Computer Protection on Macintosh”

Free Security How to: Internet Security, Computer Protection with Addon Software on Macintosh

Apple MacBook Notebook Laptop

We continue our coverage of Macintosh security with this article. Previously, we covered Free Security How to: Computer Security, Computer Protection on Macintosh.

The Mac can be made even more secure through the installation of third party utility software. Several programs listed below are free, while others cost money. Consider the free tools first, and supplement them with paid products if necessary.

Keeping Your Mac Clean

It’s important to make sure that old software or unused browser cache files, that could be simply wasting space and causing your system to run slower, are removed when they are not needed. Old software that has not received any new updates or software whose developer has dropped support for, can also pose as a security risk, especially if the software needs to access the Internet. The following optional third party Macintosh software helps fix problems like this.

Optional Mac OS X 3rd Party Software

Keeping your Mac Clean:

0: Sophos Anti-Virus for Mac Home Edition

Continue reading “Free Security How to: Internet Security, Computer Protection with Addon Software on Macintosh”