Archive for January, 2014

Why I quit using Gmail and Google

No Comments »

Google-privacy

Today I read an article about Gmail in particular and Google’s information gathering tactics in general. It turns out to be that Google fully admits that it does not really respect privacy of its users and that we, as internet users, should not even expect any privacy.

Read the rest of this entry »


How to Use Online Banking Really Safely, Part II

No Comments »

s_1

In the first part of this article we discussed the threats and the techniques that malevolent hackers, computer virus writers, spammers, and other criminal elements of the online world employed in order to gain access to bank accounts, credit cards, email accounts, and even identities of unsuspecting people. In the second part we will find out how to access online banking and other important accounts really safely.

One might argue that in order to protect yourself online sufficiently well, you’ve got to be really computer-savvy, if not an IT professional. However, it is not really so – maybe you’ll not completely protect your computer from all kinds of threats, at least you can ensure that your data are accessed only by those who you authorize, and that you have more piece of mind and sleep just a little better at night.

Read the rest of this entry »


How to Use Internet Banking Really Safely, Part I

No Comments »

mouse_on_hookIt is not a secret that the hunger for other people’s valuable data is still increasing, despite the many steps taken by software vendors and banks to tighten online security. The hunt for access data from online banking accounts began shortly after banks started offering the convenience of online access to their clientele. Back in those days it was relatively easy for a malicious hacker to get into someone else’s bank account, see its balance, and perform banking operations, such as outbound transfers. For example, hackers used numerous vulnerabilities in Windows XP, which didn’t even have an embedded software firewall to begin with. To exploit those vulnerabilities, a malefactor used so called “exploits” which were pieces of code inserted into an innocent-looking webpage. Then the hacker would send enticing spam email messages luring to the webpage containing the malicious exploit code.

Read the rest of this entry »


Introduction

No Comments »

internet securityHello everyone! My name is Paul, and this is the WireLayer blog. Here I and other authors will be covering various topics related to internet and computer security. Among other things we will be touching upon the following subjects:

 

 

  • How to protect your computers and mobile devices from dangers, such as intrusions, data leaks, trojans and viruses
  • Tips and
  • tricks on avoiding pitfalls which could put your data in danger
  • Notable events in the world, related to computer and internet security
  • Discussions of technologies used for spying on peoples’ computer lives
  • Technologies that you can and should use to protect your digital, and ultimately, personal life

Read the rest of this entry »