Last Update: 3/16/2017
Matthew Green, a well respected cryptographer and professor at Johns Hopkins has a great article discussing Secure Computing – Desktops vs Smartphones, iOS vs Android and more..
Most iPhone users do not think very much about security. The iPhone is part of Apple’s closed ecosystem, helping to prevent viruses and malware from wreaking havoc. As the iPhone has grown in popularity, the smartphone has become more of a target by hackers and criminals. It is important that iPhone users immediately become more vigilant about smartphone security. Our tutorial covers the iPhone through iPhone 7 Plus and iOS through iOS 10.
1. iPhone Software Updates
Apple upgrades the iOS software for the iPhone from time to time. Updates include additional functionality as well as security bug fixes. It is important that users apply updates immediately. Before iOS 5 users needed to connect their iPhones to a computer in order to update the smartphone’s software. Needless to say, this was inconvenient and led to many iPhones with obsolete software.
Always update to the latest iOS software available as soon as possible.
If you Jailbreak your iPhone, you need to be extra careful with regards to security as iOS updates are much more difficult for you. Be careful where you obtain your Jailbroken Apps as malware is much more prevalent.
2. iPhone App Security
Continue reading “iPhone Security, How to securely use your iPhone”
Last Updated: March 11, 2017
Google’s Android operating system powers many popular cellphones including the popular Samsung Galaxy S7. Most Android Smartphone users as well as most of the pubic at large do not think very much about security.
If your phone is not running the latest Android security patches, you are open to attack. A recent Wall Street Journal article showed that only 2.8% of Android devices have the latest security patches. Compare that to 79% of iPhones.
Most Up to Date Android phone
This flagship phone runs the latest Android version and is patched regularly.
We will cover some techniques to enhance your Android phone security.
You need to test your Android Device for Vulnerabilities
Continue reading “Android Smartphone Security, How to securely use your Android Smartphone or Tablet”
Last Update: 4/23/2017
Security has become an important part of using a personal computer. Gone are the days of just installing anti-virus and not worrying any further. Increasingly, the headlines include news of companies and websites getting hacked and personal date stolen. It is important to learn how to secure Windows and apply Internet Security, whether it is a notebook or desktop. Microsoft Windows remains the most popular personal computer operating system around. Because of its ubiquity, Windows has become a prime target for cyber criminals intent on stealing your information. This article focuses on how to secure your Windows-based PC so that you do not become part of the statistics. Our other tutorials help you secure your Firefox or Chrome Browser, e-mail, secure your wireless network, online shopping, iPad, smartphone and more.
Before you make any changes to your system, always back it up.
We recommend booting from a Linux CD or USB key when performing mission critical applications such as online banking, online trading, or online shopping.
Physical Hardware Security
If the computer is located in a location accessible by others, it needs to be physically secured. Prevent others from stealing the machine, installing key loggers into the machine’s ports, or other foreign, unapproved devices into your personal computer’s USB interface ports. Consider disabling your USB ports for safety sake. Obviously, if the computer is located in a home, physical hardware security is not as important. Never, plug in a USB flash drive or device that you find on the ground or that unexpectedly arrives.
Consider buying a secure flash drive such as Lok-it that requires a PIN to be entered before it allows access.
Securing the Windows Vista and Windows 7 Operating System.
Continue reading “How to: Windows Internet Security and Windows Security Made Easy”