Purpose

Dedicated to helping people make themselves safe and their Homes harder targets,...or when James Bond meets Soccer Mom




Thursday, September 2, 2010

Cellular Security - Removing Cell Phone Virus'

How To Remove Mobile Trojans or Cell Phone Virus

As we move more and more into the smart-phone era of cellular technology, we are exposing ourselves to a different type of criminal in cyberspace – aside from your computers (although your smart-phone is a mini-computer). Below is some advice and information I ran across the following website http://www.nospysoftware.com/spyware-articles/cell-phone-virus.php

The more and more we get into this 21st century technology, just like anything with the good comes the bad.

Trojans unlike viruses are a program that never duplicates or copies itself but does damage or compromise the security of the mobile. The best defense against mobile virus is antivirus software but most antivirus software won’t find all variants of Trojans so again a firewall is needed.


The Kaspersky Antivirus is one of the antiviruses available for removing the cell phone virus like cell phone virus 911. The spy sweeper is an award winning software that effectively and safely detects and removes Trojans from your mobile. The antivirus software is a pest patrol that protects your cell phone from the cell phone spyware and removes them. The best way to remove Trojan is preventing it before it gets installed. Some of the preventive techniques are explained below.

Preventive Techniques:

Fortunately, security products that can detect malicious code exist for most mobile device operating systems. For smart phones in particular, real-time automatic and on-demand virus scan capabilities can protect files that are stored on the smart phone's file system, while the firewall should use protocol and port filtering to protect the data and applications being transmitted. To ensure that devices are protected against new threats, users should be able to download the latest virus protection updates when the device has access to a wireless connection.

Another way of prevention is

* Do not install pirated software on your mobile. Only install software from reliable resources.
* Do not accept any messages sent over blue tooth from somebody you don’t know or if you are not expecting to receive one.
* Provide training to personnel using mobile phones / PDAs. People cannot be held accountable to secure their information if they haven't been told how.
* Patch management for software on mobile devices should not be overlooked. This can often be simplified by integrating patching with syncing, or patch management with the centralized inventory database.

The anti virus software can easily detect and remove all the current Symbian Malware and can also detect if infected files are trying to be installed and stop them. But at the end of the day if you use your common sense and follow the rules you will have nothing to worry about at all.

Smartphones, PDAs, and laptops are increasingly being used in much the same way as desktop computers, putting these devices at risk of the onslaught of threats that has been seen in recent years on PCs. Mobile phone virus though still not as widespread as computer viruses can still be a nuisance and lead to monetary loss or identity theft. Taking some basic precautions as described above could effectively combat cell phone virus and mobile viruses.

Tuesday, August 31, 2010

Personal Security - Self Defense With a Gun

There have been a couple of news reports of people defending themselves against the bad guys with their guns! Personal protection and home security is very important! The following articles are examples of defending yourself and your home. Please keep in mind that with proper training and practice, you will become more confident with your weapon and will less likely have an accident. When the time comes to use it, you will be more likely to make a valid decision – saving and protecting yourself and or your family!


Police: Home intruder shot, killed by Midtown resident
Anchorage Daily News/adn.com, Published: August 30th, 2010


Anchorage police have identified the man who was shot and killed early Sunday during a failed home-invasion robbery attempt. Robert Kost, 23, of Anchorage died of his wounds after being shot by a tenant of a Midtown triplex in the 800 block of West 23rd Avenue , said police Lt. Dave Parker. Police believe two or more others were with Kost during the robbery attempt just after midnight Sunday, and homicide detectives are searching for them. The others ran away after the shooting, Parker said.

Read more: http://www.adn.com/2010/08/29/1429906/police-intruder-shot-killed-in.html#ixzz0yDTtRRK0

69-year-old Ala. woman shoots home intruder, Decatur, Ala.

A pistol-packing 69-year-old woman in northern Alabama believes intruders will think twice before messing with her again.

Police say Ethel Jones shot an 18-year-old man in the stomach when she found him inside her bedroom at her home in Decatur .

Jones says she sleeps with her gun under a pillow next to her. She says she grabbed it after hearing a door rattle shortly before 3 a.m. Monday.

Police say the suspect removed a window air conditioner to get inside the home. He is in the hospital and faces a charge of second-degree burglary.

http://www.sltrib.com/sltrib/home/50195350-76/ala-decatur-woman-decaturdaily.html.csp


Police say man fatally shot alleged mugger in South Dallas
The Dallas Morning News, Monday, August 30, 2010,By Avi Selk


A Sachse man shot his alleged mugger to death in South Dallas early Friday morning, according to police records.

Nicholas Lewis, 22, who lived on Cleveland Street , died in the hospital a few hours after he allegedly held up Jeffrey Hall, 43, in the 1800 block of Pennsylvania Avenue.

Lewis pointed a semiautomatic pistol at Hall and demanded his wallet, according to a police report. Hall told police he handed his wallet to Lewis, who started to ride away on a bicycle.

But Lewis then turned, according to police, and fired at Hall – missing him and striking his pickup.

Hall then pulled out his licensed pistol and shot Lewis multiple times, according to police. Hall shot Lewis in the torso, the buttocks and the head, according to Lewis' sister, who says she watched him die at Baylor Medical Center at Dallas a few hours later.

Lt. David Pughes of the Dallas Police Department said police so far had no reason to doubt Hall's claim that he shot Lewis in self-defense. But it would be up to a grand jury to decide whether to file any charges, Pughes said. Reached at home, Hall declined to comment.

Latasha Lewis said that her brother "had his shortcomings," but that she could not believe he fired at Hall.

"I'm not justifying him robbing," she said. "He was wrong if that's what he did. But if he drove off on his bicycle, the best thing you could have done was to call the police."

http://www.dallasnews.com/sharedcontent/dws/news/localnews/stories/DN-shooting_30met.ART.State.Edition2.3583e60.html

Sunday, August 29, 2010

Cyber Security - Wi-Fi Security

This weekend I was talking to family about Wi-Fi and the security measure one needs to take when at a Wi-Fi hotspot such as a cyber cafe or even at home. Locking your router with a complex password is a start. However, I cam across an article By Jorge L. Valens, from the Sun Sentinel this weekend that touches the surface of this phenomena. Below are the key points he had:


Looking to set-up a Wi-Fi network at home or enjoy browsing the Internet in public? FIU Network Manager Eric Johnson offers this advice.

1. Protect your network with a WPA/WPA2 encryption and allow it to generate a password for you, rather than choosing something predictable like your last name or birthday.

2. Use common sense when connecting to a Wi-Fi network outside of your home. If you notice more than one network, ask someone at the location you are at, be it a coffee shop or an airport which network is the correct one.

3. Don't do things in public you don't want to be seen. Most public Wi-Fi hotspots are not secured, always assume someone can see what you are surfing on in these places.

4. Use different passwords for different services. Sites like social networking sites don't always default to a secure connection. Bad guys will try to use a password they collect from those sites

5. Be careful about signing on to social networking sites and forums. These sites typically don't use HTTPS protocols and require login/pass to get in. If your social network password is the same as the one for your bank account, hackers will use them.

The article also had more important points to remember:

Leaving the default security settings switched on in a home wireless router is never a good idea.

Elias Montoya, technology director for Abadin Cook, a Miami-based law firm, said users should make sure to stick to a strong password, such as the WEP 2 generated password, that mixes characters, numbers and letters rather than choosing something predictable like their home phone number or leaving the default password.

"The [Wi-Fi] user should be in the mindset that nothing is 100 percent secure. … If someone is intent on hacking you, they will," Montoya said.

Wi-Fi use in public places, such as coffee shops, is becoming increasingly popular, but these networks are typically wide open, said Johnson.

"You should always treat any Internet activity you do at these locations as if it's being monitored," he said.

Johnson added that people should stay away from doing anything that they would not want to be seen, such as online banking.

Many coffee shops offer free, secure Wi-Fi to customers.

For the complete article, click here.

Stay safe out there in cyberspace!