
Learning from mistakes makes you getting smarter. Moreover, if existing errors coming from the professionals expert.
IT professionals can get caught on tracks of cybercriminals. However, from there they can share useful lessons for all computer users. CnwinTech asks some leading IT experts about their experiences while connecting to the Internet. Their experience could be valuable lessons for Internet users.
CnwinTech does not expect to get so many honest answers and some very open. Eugene Kaspersky tells how he succeeded in thwart the kidnapping of his son. The figure of open source, Richard Stallman also expressed his personal opinion about some errors in the Windows operating system.
Actually, anyone can implement its own principles in securing data. However, the experience of the experts may also be a personal safety guide.
Eugene Kaspersky: Kidnapping
Click to Expand
However, these events bring their own lessons to Eugene Kaspersky. The investigation revealed that the perpetrators collecting personal information from social networks and observing the daily activities of potential victims. With this information, they planned a criminal.
“No one knows exactly the reason they chose Ivan as a victim,” said Eugene Kaspersky in a special interview with CnwinTech. “However, I suspect because Ivan publishes too much personal information on Vkontakte (Russian Facebook),” he added. With that information, kidnappers can easily find out detailed activities of Ivan, watching, and calculate the level of personal security.
With the case, Eugene Kaspersky today still feels guilty since he did not explain the dangers of using social networking and does not give advice to restrict the publication of personal data. “Do not make the same mistake. Act immediately to protect your children”, he warned.
Thorsten Holz: Hackers who hacked
Click to Expand
“With the verification of two factors, the network must be more secure (from us)”, says Thorsten Holz. In addition to the password, the user must enter a TAN which will be received on mobile phones via SMS or TAN-apps. Login is just using your username and password hacker easier. With a trojan keylogger, hackers can read any password easily. Currently, Google and Facebook have provided a two-factor login.
Mikko Hypponen: Account hijacked
Click to Expand
Since the ’90s, cybercrime is a billion-dollar business, and virus makers like to target the community. From there, Mikko Hypponen draw lessons, a program whose name is not familiar (not known) rarely get into the target criminals. “Use another program,” Mikko Hypponen advice. There are many alternatives, like Linux replacement for Windows 7, Foxit Reader replacement Acrobat Reader, or IE replacement Opera.
Bruce Schneier: Brain-Backup
Click to Expand
Konstantin von Notz: Encrypting e-mail
Click to Expand
Jacqueline Beauchere: Choose your friends
Click to Expand
Therefore, Jacqueline advises young parents to make online security a family theme. You have to explain certain restrictions, including checking a list of Facebook friends on a regular basis. This must be done because the case has been common, the best friend today could be the main enemy in the next day.
Digital clean-up on a regular basis can prevent cyber-mobbing. “The end of the school year or when changing schools is a good time to do it,” said Jacqueline. “Check your list of friends on social networks with your child and remove any of some can be dangerous,” she said.
Brian Krebs: Unfriendly Resources
Click to Expand
Since then, these security experts separate the work environment from external communication. “You never know who sent people through the Internet, even by friends though. They can send malware”. Now, Brian Krebs much more cautious. “I only install programs that I know and I really want,” added Brian.
Joanna Rutkowska: Secure System
Click to Expand
This Polish security researcher has argued like that because with their team Invisible Things Lab, she has been working on open-source operating system QubesOS extremely secure. Therefore, Joanna Rutkowska does not offer general security solutions are sold, but with the right answer to the question. For example, how to surfing every day in cyberspace safely?
Thus, you should try to own and use a variety of tools for different tasks. “I use the iPad for surfing and computers backed up to work,” says Joanna. However, it is no longer required when using QubesOS. “Maybe a few more years I can tell you, for those who want a secure computer, you only need to use QubesOS” added Joanna little promotion.
Richard Stallman: Windows spy
Click to Expand
Stephen Pao: Dealing with errant staff
Click to Expand
Furthermore, this network expert can log into a Facebook profile corresponding to view and modify various data at will. Pao just leave funny notes and warns employee with a special note that said “You already know, you work in an IT security company? Use HTTPS!”
Without HTTPS, usually, Data sent without any encryption between website and PC. In an open WLAN, it is an invitation for hackers. On Facebook, its setting option at “Account Settings | Securit | Secure Browsing“. If you have not already, please do. The same function is also offered by many other web services.
Candid Wuest: innocent Flash disk
Click to Expand
“I have to reinstall all the computers,” he said. An error due to lack of caution which is not easy to avoid this Symantec expert. Because not all programs recognize the security of any virus, an online scan actually can help it. Virustotal.com web service instance can check files with the assistance of more than 40 different virus scanner applications.
Sebastian Schreiber: outdated code