Opera has added a new feature for its free VPN service, Opera Max. The new feature, dubbed the VIP Mode, allows users to access the VPN service of the company without having to reactivate their connection after every 12 hours as it is the case. Continue reading “Opera Adds VIP Mode to Opera Max”
Individuals in Germany are set to lose their communication privacy rights soon as the government moves to adopt new and radical pieces of legislation. Continue reading “Germans Set to Lose Communications Privacy in Light of New Radical Laws”
The idea of the Internet of Things (IoT) started a few decades ago. Leading tech companies started exploring different ways in which seemingly unrelated devices at home and in the office could communicate with each other over the internet. Currently, this is a reality. Many people are using devices that can connect to the web. However, the Internet of Things has significant weaknesses as follows.
1. Failure to use encryption
Many IoT devices do not use encryption when communicating with each other. For example, when you remotely control your fridge back at home using your mobile phone, your refrigerator sends messages to your phone in clear text format. Encryption is important because it helps to hide messages from would-be hackers. However, many IoT devices forego using encryption. Therefore, it becomes easy for hackers to access communication among devices forming the internet of things.
2. Default login details
Most devices come with default login details. Manufacturers always advise clients to change the usernames and passwords before they start using the devices. Sadly, many people fail to modify the login details of their devices. Interestingly, hackers can search for the default login details of specific devices and use the information to hack into networks.
3. Outdated software
Many IoT devices run on old software. Currently, manufacturers of these devices are keener on sales than on ensuring that they have the required security software programs in place. Hackers can easily take advantage of outdated software in devices and launch sophisticated hacking attacks.
What you can do
- There is nothing much that you can do regarding the way IoT devices communicate with each other. It is up to developers to ensure that the devices use strong encryption protocols to communicate with each other.
- You should remember to change your login credentials before you start using a new IoT device. Changing your login details will protect you from hackers who prey on this particular vulnerability.
- You should be on the lookout for new security updates. Always take advantage of new security updates. Remember to install them promptly to protect your device from hackers.
New devices are often not highly secure. All new phones, laptops, tablets and other devices usually lack useful security features. If you use their default security features for a long time, you may become vulnerable to malware attacks. However, here are some things you can do to secure your new devices. Continue reading “How to Secure a New Device”
Australia is looking to block The Pirate Bay. It is one of the most loved torrent websites. Australian ISPs have just fifteen days to enforce the ban. Lovers of the site will feel horrible. The government won’t stop there. It will ban more torrent websites. So, how can PirateBay lovers bypass this ban? Continue reading “Unblocking the Pirate Bay – How to do it in Australia”
The days are gone when we all had to go out shopping. We can now jump in bed and order something online. The stores are many and competitive. So the prices are fair and the items genuine. Also, the internet has many freebies and offers. Online shopping is great, of course, but has some dangers too. Here are 8 dangers to expect. Continue reading “Disadvantages of Shopping Online – Eight Threats you Could Face”
Communication safety is important in this digital age. Whether its business or personal, you should protect your privacy. Encryption methods can keep criminals away. But, encryption is not all you need. You should get a good OPSEC. This refers to Operations Security. It is enough to protect your personal details from thieves. The OPSEC process entails five steps. This include: Continue reading “Describing the OPSEC Process and Key Steps”
AnchorFree, a firm, has conducted a study on how people behave when they are travelling. The results of the survey, which show the things that travellers are concerned with most, are interesting. Here are three important things from the study of how people behave regarding access to the internet that you need to know. Continue reading “Travellers and Internet Use: What you need to Know”
RAUM-Enabled malware is fast becoming a phenomenon. Many people are unwittingly falling victim to attacks that use this approach. Here are three important things about RAUM-Enabled malware that you need to know so that you can protect your devices and data. Continue reading “RAUM-Enabled Malware: Things you Need to Know”
The Federal Court of Australia has ordered all the ISPs in the country to block all peer-to-peer file-sharing sites. The court was acting on an application that copyright holders in the country presented to it. Many companies that hold the copyright of content in Australia asked the court to order ISP providers to block all sites that allow users to download content illegally. Here are three important things from the development that you should know. Continue reading “Australian #Siteblock: 3 Important Things”