Bibliography for Chapter 3 – Make It Safe At Home

3.1 Introduction

  1. Armerding, Taylor. “Malnets Lead the Cyberattack Pack.” CSO. 2 Oct. 2012. <http://www.csoonline.com/article/717878/malnets-lead-the-cyberattack-pack>.
  2. Cauthen, Linda F. “5 Ways to Prevent Your Identity from Being Stolen.” DumbLittleMan. 26 May 2013. <http://www.dumblittleman.com/2013/05/5-ways-to-prevent-your-identity-from.html>.
  3. Dube, Ryan. “6 Steps You Need To Take To Fortify Your Online Presence.” MakeUseOf. 10 Oct. 2012. <http://www.makeuseof.com/tag/6-steps-fortify-online-presence/>.
  4. Dunn, John E. “Antivirus Software a Waste of Money for Businesses, Report Suggests.” CSO. 27 Nov. 2012. <http://www.csoonline.com/article/722381/antivirus-software-a-waste-of-money-for-businesses-report-suggests>.
  5. Geier, Eric. “Beyond Antivirus Software: Eclectic PC Security Tools for System-wide Audits.” PCWorld. 13 Nov. 2012. <https://www.pcworld.com/article/2013814/beyond-antivirus-software-eclectic-pc-security-tools-for-system-wide-audits.html>.
  6. Goldman, David. “Antivirus Software Is Not Enough to Prevent a Cyberattack.” CNNMoney. 31 Jan. 2013. <http://money.cnn.com/2013/01/31/technology/security/antivirus/index.html>.
  7. Grossman, Jeremiah. “Tips for NOT Getting Hacked on the Web.” WhiteHat Security Blog. 6 Mar. 2012. <https://blog.whitehatsec.com/tips-for-not-getting-hacked-on-the-web/>.
  8. Krebs, Brian. “Tools for a Safer PC.” Krebs on Security. 2013. <http://krebsonsecurity.com/tools-for-a-safer-pc/>.
  9. Lee, Joel. “Digital Threats To Your Offline Security You Should Know About.” MakeUseOf. 6 Sept. 2013. <http://www.makeuseof.com/tag/digital-threats-to-your-offline-security-you-should-know-about/>.
  10. Nguyen, Nicole. “Be Like The NSA With These Extreme Mac Security Measures.” ReadWrite. 26 Aug. 2013. <http://readwrite.com/2013/08/26/mac-os-x-extreme-security>.
  11. Schwartz, Mathew J. “Microsoft Tech Support Scams: Why They Thrive.” InformationWeek. 13 May 2013. <https://www.informationweek.com/security/client/microsoft-tech-support-scams-why-they-th/240154756>.

3.2 Secure physical documents and devices

  1. Ahmed, Waqas. “Easily Disable USB Drives Or Read/Write Access For Guest Users With Ratool.” AddictiveTips. 4 May 2013. <http://www.addictivetips.com/windows-tips/removable-access-tool-done/>.
  2. Anon. “A Look at How Consumers Safeguard Their Devices.” Help Net Security. 28 Mar. 2013. <http://www.net-security.org/secworld.php>.
  3. Chung, Jackson. “How To Avoid Getting Hacked.” MakeUseOf. 13 Aug. 2013. <http://www.makeuseof.com/tag/how-to-avoid-getting-hacked/>.
  4. Dachis, Adam. “How to Automatically Unlock Your Gadgets Without a Password.” Lifehacker. 3 June 2013. <http://lifehacker.com/how-to-make-your-smartphone-automatically-unlock-your-s-510592193>.
  5. Dredge, Stuart. “How to Stop Your Child Spending $$$ on In-app Purchases in an IPad Game.” The Guardian. 03 Aug. 2013. <http://www.guardian.co.uk/technology/appsblog/2013/mar/13/stop-children-spending-money-in-ipad-games>.
  6. Dube, Ryan. “Has Someone Used Your PC? 3 Ways to Check.” MakeUseOf. 29 Aug. 2013. <http://www.makeuseof.com/tag/has-someone-used-your-pc-3-ways-to-check/>.
  7. Greenberg, Andy. “More Than A Dozen Brands Of Security Camera Systems Vulnerable To Hacker Hijacking.” Forbes. 28 Jan. 2013. <http://www.forbes.com/sites/andygreenberg/2013/01/28/more-than-a-dozen-brands-of-security-camera-systems-vulnerable-to-hacker-hijacking/>.
  8. Hoffman, Chris. “How to Build Your Own Internet Security Suite For Free.” HowTo Geek. 22 July 2013. <http://www.howtogeek.com/168361/how-to-build-your-own-internet-security-suite-for-free/>.
  9. Hoffman, Chris. “How to Ensure Your Router, Cameras, Printers, and Other Devices Aren’t Accessible on the Internet.” HowTo Geek. 15 Aug. 2013. <http://www.howtogeek.com/169575/how-to-ensure-your-router-cameras-printers-and-other-devices-arent-accessible-on-the-internet/>.
  10. Horowitz, Michael. “Check Your Router Now, before Lex Luthor Does.” Computerworld. 31 Jan. 2013. <http://blogs.computerworld.com/malware-and-vulnerabilities/21717/check-your-router-now-lex-luthor-does>.
  11. Horowitz, Michael. “Software Bugs as Weapons.” Computerworld. 16 July 2013. <http://blogs.computerworld.com/malware-and-vulnerabilities/22481/software-bugs-weapons>.
  12. McMillen, Andrew. “How Hackers Can Switch on Your Webcam and Control Your Computer.” The Age. 2 Apr. 2013. <http://www.theage.com.au/digital-life/consumer-security/how-hackers-can-switch-on-your-webcam-and-control-your-computer-20130328-2gvwv.html>.
  13. Schroeder, Stan. “New Android Trojan Is Nearly Impossible to Remove.” Mashable. 7 June 2013. <http://mashable.com/2013/06/07/new-android-trojan-downloads-other-malware-and-spreads-via-bluetooth/>.
  14. Shaw, Dougal. “Penetration Testing: IT Professionals Demonstrate How Hackers Can Access Webcams.” BBC News. 06 Feb. 2013. <http://www.bbc.co.uk/news/technology-22689158>.
  15. Swanner, Nate. “To Root, or Not to Root? The Ins and Outs of Rooting, Explained for Beginners.” Android Authority. 8 Jan. 2013. <http://www.androidauthority.com/rooting-for-beginners-144706/>.
  16. Wyatt, Edward. “F.T.C. Says Webcam’s Flaw Put Users’ Lives on Display.” New York Times. 4 Sept. 2013. <http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html>.

3.3 Know your malware

  1. Anderson, Nate. “Meet the Men Who Spy on Women through Their Webcams.” Ars Technica. 10 Mar. 2013. <http://arstechnica.com/tech-policy/2013/03/rat-breeders-meet-the-men-who-spy-on-women-through-their-webcams/3/>.
  2. Anon. “Pair of PC Viruses Help Each Other Survive.” BBC News. 01 July 2013. <http://www.bbc.co.uk/news/technology-23125422>.
  3. B., David. “An Attacker’s Day into Human Virology 3: Common Properties of Human and Computer Viruses.” Privacy PC. 7 Feb. 2013. <http://privacy-pc.com/articles/an-attackers-day-into-human-virology-3-common-properties-of-human-and-computer-viruses.html>.
  4. Basu, Saikat. “8 Ways To Identify Unknown File Types.” MakeUseOf. 16 Apr. 2013. <http://www.makeuseof.com/tag/8-ways-to-identify-unknown-file-types/>.
  5. Bhardwaj, Julian. “Techniques in Ransomware Explained.” Naked Security. 14 Sept. 2012. <http://nakedsecurity.sophos.com/2012/09/14/new-technique-in-ransomware-explained/>.
  6. Bruce, James. “How Can Hackers Hijack My PC?MakeUseOf. 28 Apr. 2013. <http://www.makeuseof.com/tag/how-can-hackers-hijack-my-pc-makeuseof-explains/>.
  7. Chung, Jackson. “How A Computer Virus Spreads Online, And What You Can Do To Stop It.” MakeUseOf. 24 July 2013. <http://www.makeuseof.com/tag/how-a-computer-virus-spreads-online-and-what-you-can-do-to-stop-it/>.
  8. Constantin, Lucian. “Malware-infected Computers Rented as Proxy Servers on the Black Market.” Computerworld. 9 Oct. 2012.  <http://www.computerworld.com/s/article/9232197/Malware_infected_computers_rented_as_proxy_servers_on_the_black_market>.
  9. Eddy, Max. “Five Signs Your Android Device Is Infected With Malware.” PCMAG. 3 Apr. 2013. Web. 25 Aug. 2013. <http://securitywatch.pcmag.com/mobile-security/309980-five-signs-your-android-device-is-infected-with-malware>.
  10. Franceschi-Bicchierai, Lorenzo. “Sophisticated ‘Hesperbot’ Banking Malware Targets Europeans.” Mashable. 5 Sept. 2013. Web. 06 Sept. 2013. <http://mashable.com/2013/09/06/hesperbot-malware/>.
  11. Slangen, Simon. “What Is a DDoS Attack?MakeUseOf. 13 May 2013. Web. 11 Sept. 2013. <http://www.makeuseof.com/tag/what-is-a-ddos-attack-makeuseof-explains/>.
  12. Slangen, Simon. “What Is a Zero Day Vulnerability?MakeUseOf. 7 Jan. 2013. Web. 11 Sept. 2013. <http://www.makeuseof.com/tag/what-is-a-zero-day-vulnerability-makeuseof-explains/>.
  13. Stubbs, Chris. “Ad Injection and You – How Adware Gets on Your Computer.” DataProtectionCenter. 21 June 2013. Web. 25 Aug. 2013. <http://www.dataprotectioncenter.com/antivirus/microsoft/ad-injection-and-you-how-adware-gets-on-your-computer/>.
  14. Wisniewski, Chester. “Ransomware Encrypts Files Claiming SOPA Piracy Charges.” Naked Security. 6 Oct. 2012. Web. 25 Aug. 2013. <http://nakedsecurity.sophos.com/2012/10/06/ransomware-encrypts-files-claiming-sopa-piracy-charges/>.

3.4 Implement anti-virus scanning

  1. Anon. “5 Reasons Why Your Antivirus Software Isn’t Protecting You, and How to Fix Them.” PC Advisor. 4 July 2013. <http://www.pcadvisor.co.uk/features/security/3456212/5-reasons-why-your-antivirus-software-isnt-protecting-you/>.
  2. Brookes, Tim. “BitDefender Launches Free 60-Second Virus Scanner.MakeUseOf. 8 Dec. 2012. <http://www.makeuseof.com/tag/bitdefender-launches-free-60-second-virus-scanner-updates/>.
  3. Grimes, Roger. “How the Pros Sniff out a Malware Infection.” InfoWorld. 8 Jan. 2013. <http://akamai.infoworld.com/d/security/how-the-pros-sniff-out-malware-infection-210318>.
  4. Henry, Alan. “The Difference Between Antivirus and Anti-Malware (and Which to Use).” Lifehacker. 21 Aug. 2013. <http://lifehacker.com/the-difference-between-antivirus-and-anti-malware-and-1176942277>.
  5. Hoffman, Chris. “What Is The Benefit Of An Online/Cloud-Based Anti-Virus?MakeUseOf. 6 Aug. 2012. <http://www.makeuseof.com/tag/what-is-the-benefit-of-an-onlinecloud-based-anti-virus/>.
  6. Mogull, Rich. “Do You Need Mac Antivirus Software in 2013?TidBITS. 8 Jan. 2013. <http://tidbits.com/article/13476>.
  7. Rashid, Fahmida Y. “Antivirus Better at Detecting Email Malware Than Web Threats.” PCMAG. 25 Mar. 2013. <http://securitywatch.pcmag.com/apps-and-websites/309586-antivirus-better-at-detecting-email-malware-than-web-threats>.
  8. Robertson, Jordan. “Antivirus Software: Fighting Blame, Not Hacks.BusinessWeek. 14 Feb. 2013. <http://www.businessweek.com/articles/2013-02-14/antivirus-software-fighting-blame-not-hacks>.
  9. Rubenking, Neil J. “Is Your Antivirus Working?PCMAG. 4 June 2013. <http://securitywatch.pcmag.com/security-software/312184-is-your-antivirus-working>.
  10. Rubens, Paul. “Review: McAfee Deep Defender.” ESecurity Planet. 23 Aug. 2012. <http://www.esecurityplanet.com/windows-security/review-mcafee-deep-defender.html>.
  11. Sami, Deborah. “How Do I Use the New Software Updater in Avast 8?Avast! Blog. 6 Mar. 2013. <https://blog.avast.com/2013/03/06/how-do-i-use-the-new-software-updater-in-avast-8/>.
  12. Zorz, Zeljka. “System Doctor 2014: A Fake AV for the Upcoming Year.” Help Net Security. 7 Mar. 2013. <http://www.net-security.org/malware_news.php>.

3.5 Implement a backup strategy for your systems and data

  1. Ahmed, Waqas. “Schedule Encrypted Backups On Android & Save To Dropbox With TruBackup.” AddictiveTips. 31 May 2013. <http://www.addictivetips.com/android/schedule-encrypted-backups-on-android-save-to-dropbox-trubackup/>.
  2. Anon. “Review: SocialSafe Keeps Your Social Data Safe.” PCWorld. 2013. <http://www.pcworld.com/article/2043643/review-socialsafe-keeps-your-social-data-safe.html>.
  3. Boris. “How to Protect Your Computer and Data in Case Disaster Strikes.” The Next Web. 14 Oct. 2012. <http://thenextweb.com/lifehacks/2012/10/14/protect-your-data-and-computer-when-disaster-strikes/>.
  4. Casti, Taylor. “How to Back Up Your Smartphone.” Mashable. 22 Aug. 2013. <http://mashable.com/2013/08/22/smartphone-backup/>.
  5. Duffy, Jill. “How to Back Up an Android Device.” PCMAG. 29 Aug. 2013. <http://www.pcmag.com/article2/0,2817,2423270,00.asp>.
  6. Henry, Alan. “Most Popular Online Backup Service: Crashplan.” Lifehacker. 6 Aug. 2013. <http://lifehacker.com/most-popular-online-backup-service-crashplan-1039674096>.
  7. Hoffman, Chris. “6 Safest Ways To Backup & Restore Your Files in Windows 7 & 8.” MakeUseOf. 26 June 2013. <http://www.makeuseof.com/tag/6-safest-ways-to-backup-restore-your-files-in-windows-7-8/>.
  8. Hoffman, Chris. “How to Recover a Deleted File: The Ultimate Guide.” HowTo Geek. 8 Apr. 2013. <http://www.howtogeek.com/169344/how-to-recover-a-deleted-file-the-ultimate-guide/>.
  9. Kaufman, Lori. “The Best Websites for Backing Up and Sharing Your Data in the Cloud for Free.” HowTo Geek. 18 Aug. 2012. <http://www.howtogeek.com/121957/the-best-websites-for-backing-up-and-sharing-your-data-in-the-cloud-for-free/>.
  10. Kessler, Topher. “How to Migrate Time Machine Backups to a New Drive.” CNET Reviews. 22 Aug. 2013. Web. 11 Sept. 2013. <http://reviews.cnet.com/8301-13727_7-57599753-263/how-to-migrate-time-machine-backups-to-a-new-drive/>.
  11. Kishore, Aseem. “4 Ways to Safely Backup IPhone IPad Photos and Videos.” Online Tech Tips. 10 Aug. 2012. <http://www.online-tech-tips.com/smartphones/4-ways-to-safely-backup-iphone-ipad-photos-and-videos/>.
  12. Lee, Joel. “Don’t Lose Your Data: 5 Top Android Backup Solutions.” MakeUseOf. 12 Apr. 2013. <http://www.makeuseof.com/tag/dont-lose-your-data-5-top-backup-solutions-for-android/>.
  13. Lockhart, Joshua. “Be Prepared: These Are the Vital Files You Should Backup.” MakeUseOf. 30 May 2013. <http://www.makeuseof.com/tag/be-prepared-these-are-the-vital-files-you-should-backup/>.
  14. Low, Aloysius. “How to Backup and Restore Your Android Smartphone.” CNET Asia. 30 Aug. 2013. <http://asia.cnet.com/how-to-backup-and-restore-your-android-smartphone-62222232.htm>.
  15. McDonough, Meghan. “Data Disaster Averted! How to Back up Your Android Smartphone to Your PC.” Digital Trends. 21 July 2013. <http://www.digitaltrends.com/computing/how-to-back-up-your-android-smartphone-to-pc/>.
  16. Mendelson, Edward, and Michael Muchmore. “The Best Backup Software.” PCMAG. 28 Mar. 2013. <http://www.pcmag.com/article2/0,2817,2278661,00.asp>.
  17. Muchmore, Michael. “Disaster-Proof Your Data with Online Backup.” PCMAG. 30 Mar. 2013. <http://www.pcmag.com/article2/0,2817,2288745,00.asp>.
  18. Muchmore, Michael. “How to Create a Restore Point in Windows.” PCMAG. 17 May 2013. <http://www.pcmag.com/article2/0%2C2817%2C2418893%2C00.asp>.
  19. Prindle, Drew. “How to Clone a Hard Drive in Windows or Mac OS X.” Digital Trends. 28 Apr. 2013. <http://www.digitaltrends.com/computing/how-to-clone-a-hard-drive-in-windows-mac-or-linux/>.
  20. Rashid, Fahmida Y. “Google Test-Driving NSA-Proof Encryption for Google Drive.” PCMAG. 18 July 2013. <http://securitywatch.pcmag.com/privacy/313850-google-test-driving-nsa-proof-encryption-for-google-drive>.
  21. Rhee, Ed. “How to Create a Windows 8 USB Recovery Drive.” CNET How To. 6 Sept. 2013. <http://howto.cnet.com/8301-11310_39-57601638-285/how-to-create-a-windows-8-usb-recovery-drive/>.
  22. Sieber, Tina. “How To Diagnose And Fix A Dead Hard Drive To Recover Data.” MakeUseOf. 24 July 2013. <http://www.makeuseof.com/tag/how-to-diagnose-and-fix-a-dead-hard-drive-to-recover-data/>.
  23. Turner, Amber L. “Bulletproof Backup: How to Make Sure Your Desktop, Mobile & Web Data Are Safe.” The Next Web. 12 Aug. 2012. <http://thenextweb.com/lifehacks/2012/08/12/bulletproof-backup-how-secure-desktop-mobile-web-data/>.
  24. Westover, Brian. “How to Clone a Hard Drive.” PCMAG. 9 July 2013. <http://www.pcmag.com/article2/0,2817,2421302,00.asp>.
  25. Zorz, Mirko. “Can You Trust Your Online Backup Service?Help Net Security. 28 June 2013. <http://www.net-security.org/secworld.php?id=15157>.

3.6 Use firewalls to keep intruders out

  1. Ahmed, Waqas. “NetStalker Is A Rule-Based Firewall For Easy Internet Monitoring & Filtering.” AddictiveTips. 23 Jan. 2013. <http://www.addictivetips.com/windows-tips/netstalker-firewall-for-rule-based-internet-monitoring-filtering/>.
  2. Gibson, Steve. “NAT Router Security Solutions.” GRC. 8 Aug. 2006. <https://www.grc.com/nat/nat.htm>.
  3. Melissa. “The Complete Guide To Using Comodo Firewall – Safeguard Your PC from Online Threats.” Technorms. 26 Sept. 2011. <http://www.technorms.com/6069/comodo-firewall-review-usage-guide>.
  4. Pot, Justin. “Which Apps Are Using Your Internet Connection? Find Out With Little Snitch [Mac OS X].” MakeUseOf. 30 May 2013. <http://www.makeuseof.com/tag/which-apps-are-using-your-internet-connection-find-out-with-little-snitch-mac-os-x/>.
  5. Rashid, Fahmida Y. “Application Sandboxes Won’t Stop Advanced Attacks: Research.” SecurityWeek. 24 July 2013. <https://www.securityweek.com/application-sandboxes-wont-stop-advanced-attacks-research>.
  6. Rubenking, Neil J. “The Best Free Firewalls.” PCMAG. 24 July 2013. <http://www.pcmag.com/article2/0,2817,2422144,00.asp>.

3.7 Lock down your home network

  1. Arnold, Arnie, and Marvin Tobisch. “Wi-Fi & Router Acronyms in a Nutshell.” PC Advisor. 25 Mar. 2013. <http://www.pcadvisor.co.uk/how-to/network-wifi/3436997/wi-fi-router-acronyms-in-nutshell/>.
  2. Bruce, James. “What Is Port Forwarding & How Can It Help Me?MakeUseOf. 21 Nov. 2012. <http://www.makeuseof.com/tag/what-is-port-forwarding-and-how-can-it-help-me/>.
  3. Dube, Ryan. “What Is DD-WRT And How It Can Make Your Router Into A Super-Router.” MakeUseOf. 27 July 2012. <http://www.makeuseof.com/tag/ddwrt-router-superrouter/>.
  4. Goldman, Jeff. “Security Flaws Found in D-Link Routers.” ESecurity Planet. 7 Feb. 2013. <http://www.esecurityplanet.com/network-security/security-flaws-found-in-d-link-routers.html>.
  5. Kishore, Aseem. “What Is Port Forwarding and What Is It Used For?Online Tech Tips. 4 Apr. 2013. <http://www.online-tech-tips.com/computer-tips/ott-explains-what-is-port-forwarding-and-what-is-it-used-for/>.
  6. Lynn, Samara. “Wireless Witch: How to Secure Your Wireless Network.” PCMAG. 6 June 2013. <http://www.pcmag.com/article2/0,2817,2420002,00.asp>.
  7. Ngo, Dong. “Home Networking Explained.” Internet Security for Consumers. 11 Sept. 2013. <http://564738.com/home-networking-explained/>.
  8. Prince, Brian. “Researchers Spotlight Vulnerabilities in Popular Wireless Routers.” SecurityWeek. 8 Apr. 2013. Web. 25 Aug. 2013. <https://www.securityweek.com/researchers-spotlight-vulnerabilities-popular-wireless-routers>.
  9. Smith, Matt. “Connected: Your Complete Guide To Home Networking.” MakeUseOf. 2013. Web. 11 Sept. 2013. <http://www.makeuseof.com/pages/connected-your-complete-guide-to-home-networking>.

3.8 Filter undesirable Internet content with a HOSTS file

  1. Eddy, Max. “Going After Affiliate Networks, Malware’s Achilles’ Heel.” PCMAG. 5 Mar. 2013. <http://securitywatch.pcmag.com/none/308704-going-after-affiliate-networks-malware-s-achilles-heel>.
  2. Higgins, Kelly J. “Phishers Hack Hosting Providers To Launch Mass Attacks.” Dark Reading. 25 Apr. 2013. <http://www.darkreading.com/attacks-breaches/phishers-hack-hosting-providers-to-launc/240153663>.
  3. Hoffman, Chris. “How to Block Websites in Windows 8′s Hosts File.” HowTo Geek. 23 Aug. 2012. <http://www.howtogeek.com/122404/how-to-block-websites-in-windows-8s-hosts-file/>.
  4. Mathews, Lee. “4 Free Proxies To Block Ads in Google Chrome (or Any Browser).” Download Squad. 8 Sept. 2008. <http://downloadsquad.switched.com/2008/09/08/4-free-proxies-to-block-ads-in-google-chrome-or-any-browser/>.
  5. Wilson, Tim. “Legitimate Sites Are Most Likely To Serve Up Malware, Cisco Study Says.” Dark Reading. 31 Jan. 2013. <http://www.darkreading.com/vulnerability-management/167901026/security/vulnerabilities/240147403/legitimate-sites-are-most-likely-to-serve-up-malware-cisco-study-says.html>.

3.9 Choose your DNS provider

  1. Lee, Joel. “How To Optimize Your DNS For Faster Internet.” MakeUseOf. 12 Feb. 2013. <http://www.makeuseof.com/tag/optimize-your-dns-for-faster-internet/>.
  2. Pot, Justin. “DNS Jumper – Hop From One DNS Service To Another, Quickly [Windows].” MakeUseOf. 24 Apr. 2013. <http://www.makeuseof.com/tag/dns-jumper-hop-from-one-dns-service-to-another-quickly-windows/>.

3.10 Make your system less vulnerable

  1. Anon. “How to Make a Disallowed-by-default Software Restriction Policy.” Mechbgon. 2012. <http://www.mechbgon.com/srp/index.html>.
  2. Henry, Alan. “Should I Remove It? Tells You Which Programs Are Safe to Remove.” Lifehacker. 13 Aug. 2013. <http://lifehacker.com/should-i-remove-it-tells-you-which-programs-are-safe-t-1113609875>.
  3. Hoffman, Chris. “How to Let Someone Else Use Your Computer Without Giving Them Access To All Your Stuff.” HowTo Geek. 12 Aug. 2013. <http://www.howtogeek.com/170269/how-to-let-someone-else-use-your-computer-without-giving-them-access-to-all-your-stuff/>.
  4. Krebs, Brian. “Windows Security 101: EMET 4.” Krebs on Security. 18 June 2013. <https://krebsonsecurity.com/tag/enhanced-mitigation-experience-toolkit/>.
  5. Mir, Fawad. “List Of Windows Services That Can Be Safely Disabled.” AddictiveTips. 28 Feb. 2013. <http://www.addictivetips.com/windows-tips/list-of-windows-services-that-can-be-safely-disabled/>.
  6. Radu, Marian. “How to Protect Your Computer against Dangerous Java Applets.” DataProtectionCenter. 16 Apr. 2013. <http://www.dataprotectioncenter.com/antivirus/microsoft/how-to-protect-your-computer-against-dangerous-java-applets/>.

3.11 Get smart about passwords

  1. Ahmed, Waqas. “PassBox Is A Windows Password Vault With A Metro-Inspired UI.” AddictiveTips. 2 May 2013. <http://www.addictivetips.com/windows-tips/passbox-windows-password-vault-with-metro-inspired-ui/>.
  2. Al-Marhoon, Mohammed. “Password Management Guide.” MakeUseOf. 2013. <http://www.makeuseof.com/pages/the-password-management-guide-fulltext>.
  3. Anon. “Analysis of Passwords in Sony Security Breach.” Flowing Data. 13 June 2013. <http://flowingdata.com/2011/06/13/analysis-of-passwords-in-sony-pictures-security-breach/>.
  4. B, David. “Create, save and Store Secure Passwords: Interview with David Emm, Kaspersky Lab.” Privacy PC RSS. 16 Jan. 2013. <http://privacy-pc.com/how-to/create-save-store-secure-passwords-interview-with-david-emm.html>.
  5. Baekdal, Thomas. “Strategic InsightsThe Usability of Passwords – FAQ.” Baekdal. 24 Jan. 2011. <http://www.baekdal.com/insights/the-usability-of-passwords-faq>.
  6. Balaban, David. “LastPass Premium Review.” Privacy PC. 6 Mar. 2013. <http://privacy-pc.com/password-management-software-review/lastpass-premium-review.html>.
  7. Balaban, David. “Secure Password Managers and Military-Grade Encryption on Smartphones 3: Free Password Keepers for IOS.” Privacy PC. 5 Dec. 2012. <http://privacy-pc.com/articles/secure-password-managers-and-military-grade-encryption-on-smartphones-3-free-password-keepers-for-ios.html>.
  8. Braverman, Beth. “3 Keys to a More Secure Password.” CNNMoney. 15 Mar. 2013. <http://money.cnn.com/2013/03/01/technology/secure-password.moneymag/index.html>.
  9. Broida, Rick. “Passwords: You’re Doing It Wrong. Here’s How to Make Them Uncrackable.” PCWorld. 8 May 2013. <http://www.pcworld.com/article/2038067/passwords-youre-doing-it-wrong-heres-how-to-make-them-uncrackable-.html>.
  10. Clueley, Graham. “Why You Shouldn’t Store Your Passwords in Google’s Chrome Browser.” GrahamCluley. 7 Aug. 2013. <http://grahamcluley.com/2013/08/why-you-shouldnt-store-your-passwords-in-googles-chrome-browser/>.
  11. Cluley, Graham. “55% of Net Users Use the Same Password for Most, If Not All, Websites. When Will They Learn?Naked Security. 23 Apr. 2013. <http://nakedsecurity.sophos.com/2013/04/23/users-same-password-most-websites/>.
  12. Cluley, Graham. “Hacking Account Passwords Is Easy, When 1 in 6 People Use Their Pet’s Name.” GrahamCluley. 5 Aug. 2013. <http://grahamcluley.com/2013/08/pet-name-passwords/>.
  13. Ducklin, Paul. “Anatomy of a Brute Force Attack – How Important Is Password Complexity?Naked Security. 16 Aug. 2013. <http://nakedsecurity.sophos.com/2013/08/16/anatomy-of-a-brute-force-attack-how-important-is-password-complexity/>.
  14. Dunn, John E. “LastPass Users Get TOR Blocking Security Feature.” CSO. 2 Aug. 2012. <http://www.csoonline.com/article/712823/lastpass-users-get-tor-blocking-security-feature>.
  15. Goodin, Dan. “Anatomy of a Hack: How Crackers Ransack Passwords like “qeadzcwrsfxv1331”.” Ars Technica. 27 May 2013. <http://arstechnica.com/security/2013/05/how-crackers-make-minced-meat-out-of-your-passwords/>.
  16. Goodin, Dan. “How Elite Security Ninjas Choose and Safeguard Their Passwords.” Ars Technica. 10 July 2013. <http://arstechnica.com/security/2013/07/how-elite-security-ninjas-choose-and-safeguard-their-passwords/>.
  17. Goodman, Jeff. “LastPass Announces Partnership with PwnedList.” ESecurity Planet. 17 Sept. 2012. <http://www.esecurityplanet.com/network-security/lastpass-announces-partnership-with-pwnedlist.html>.
  18. Hoffman, Chris. “5 Password Management Tools Compared: Find The One That’s Perfect For You.” MakeUseOf. 31 July 2013. <http://www.makeuseof.com/tag/5-password-management-tools-compared-find-the-one-thats-perfect-for-you/>.
  19. Hoffman, Chris. “Everything You Need To Know About Passwords.” MakeUseOf. 24 July 2013. <http://www.makeuseof.com/tag/everything-you-need-to-know-about-passwords/>.
  20. Hoffman, Chris. “How To Change, Reset, And Picturize Your Windows 8 Password.” MakeUseOf. 18 Feb. 2013. <http://www.makeuseof.com/tag/how-to-change-reset-and-picturize-your-windows-8-password/>.
  21. Klosowski, Thorin. “Is There Any Reason Not to Use My Social Network Account to Sign Into Apps?Lifehacker. 15 Feb. 2013. <http://lifehacker.com/5984575/is-there-any-reason-not-to-use-my-social-network-account-to-sign-into-apps>.
  22. Londis, Dino. “10 Top Password Managers.” InformationWeek. 1 May 2013. <https://www.informationweek.com/security/client/10-top-password-managers/240153906>.
  23. Love, Dylan, and Daniel Goodman. “A Simple Way To Create A Super Strong Password.” Business Insider. 4 Mar. 2013. <http://www.businessinsider.com/a-simple-way-to-create-a-super-strong-password-2013-3>.
  24. Mello Jr., John P. “LivingSocial Breach: Advice from Security Experts.” CSO. 28 Apr. 2013. <http://www.csoonline.com/article/732462/livingsocial-breach-advice-from-security-experts>.
  25. O’Reilly, Dennis. “Password-protect E-mail on Your IPhone and IPad.” CNET How To. 17 July 2012. <http://howto.cnet.com/8301-11310_39-57473192-285/password-protect-e-mail-on-your-iphone-and-ipad/>.
  26. Osborne, Charlie. “Top 25 Common, Attackable Passwords: Stop Using ‘ninja’ and ‘jesus’ZDNet. 25 Oct. 2012. <http://www.zdnet.com/top-25-common-attackable-passwords-stop-using-ninja-and-jesus-7000006373/>.
  27. Perlroth, Nicole. “How to Devise Passwords That Drive Hackers Away.” New York Times. 7 Nov. 2012. Web. <http://www.nytimes.com/2012/11/08/technology/personaltech/how-to-devise-passwords-that-drive-hackers-away.html>.
  28. Pogue, David. “Remember All Those Passwords? No Need.” New York TImes. 5 June 2013. <http://www.nytimes.com/2013/06/06/technology/personaltech/too-many-passwords-and-no-way-to-remember-them-until-now.html>.
  29. Rashid, Fahmida Y. “Password Resets on Email Key to Online Compromise.” PCMAG. 20 Aug. 2012. <http://securitywatch.pcmag.com/none/301736-password-resets-on-email-key-to-online-compromise>.
  30. Rashid, Fahmida Y. “Select Strong Secret Questions to Protect Accounts.” PCMAG. 25 Aug. 2012. <http://securitywatch.pcmag.com/none/301737-select-strong-secret-questions-to-protect-accounts>.
  31. Schmidt, Jürgen. “Password Protection for Everyone.” The H Security. 5 Feb. 2013. <http://www.h-online.com/security/features/Password-protection-for-everyone-1795647.html>.
  32. Schwartz, Mathew J. “iPhone 5s Fingerprint Scanner: 9 Security Facts.” InformationWeek. 11 Sept. 2013. <http://www.informationweek.com/security/mobile/iphone-5s-fingerprint-scanner-9-security/240161131>.
  33. Sieber, Tina. “5 Steps You Should Take NOW To Make Your Email & Social Media Accounts Recoverable.” MakeUseOf. 11 July 2012. <http://www.makeuseof.com/tag/5-steps-email-social-media-accounts-recoverable/>.
  34. Snyder, Craig. “PWGen – A Very Advanced Password Generator [Windows].” MakeUseOf. 10 Mar. 2013. <http://www.makeuseof.com/tag/pwgen-a-very-advanced-password-generator-windows/>.

3.12 Use encryption

  1. Ahmed, Waqas. “EncryptOnClick: Secure Files With Multiple Layers Of Encryption.” AddictiveTips. 7 Sept. 2012. <http://www.addictivetips.com/windows-tips/encryptonclick-secure-file-with-multiple-layers-of-encryption/>.
  2. Ahmed, Waqas. “Sync Files To An Encrypted Local Or Network Folder With CryptSync.” AddictiveTips. 12 Mar. 2013. <http://www.addictivetips.com/windows-tips/sync-files-to-an-encrypted-local-or-network-folder-cryptsync/>.
  3. Dube, Ryan. “Encrypt Your Gmail, Hotmail, And Other Webmail: Here’s How.” MakeUseOf. 11 July 2013. <http://www.makeuseof.com/tag/encrypt-your-gmail-hotmail-and-other-webmail-heres-how/>.
  4. Gordon, Whitson. “HTTPS Everywhere 3.0 Keeps Your Data Safe on 1,500 More Web Sites.” Lifehacker. 9 Oct. 2012. <http://lifehacker.com/5950311/https-everywhere-30-keeps-your-data-safe-on-1500-more-web-sites>.
  5. Gross, Doug. “How to Hide Your Data from Internet Snoops.” CNN. 16 July 2013. <http://edition.cnn.com/2013/06/18/tech/web/how-to-encrypt-email/index.html>.
  6. Kessler, Topher. “How to Password-protect a PDF before E-mailing in OS X.” MacFixIt. 11 July 2013. <http://reviews.cnet.com/8301-13727_7-57593348-263/how-to-password-protect-a-pdf-before-e-mailing-in-os-x/>.
  7. Lancet, Yaara. “4+ Ways To Secretly Hide Messages In Pictures.” MakeUseOf. 24 May 2013. <http://www.makeuseof.com/tag/4-ways-to-hide-secret-messages-in-pictures/>.
  8. Larson, Jem. “The Best Cloud Encryption Tools.” IT Security Column. <http://www.itscolumn.com/2012/09/the-best-cloud-encryption-tools/>.
  9. McDowell, Guy. “Free Military-Grade Privacy For Your Files: How Bitlocker Works [Windows].” MakeUseOf. 12 Apr. 2013. <http://www.makeuseof.com/tag/free-military-grade-privacy-for-your-files-how-bitlocker-works-windows/>.
  10. McDowell, Guy. “How To Encrypt Data on Your Smartphone.” MakeUseOf. 18 June 2013. <http://www.makeuseof.com/tag/how-to-encrypt-data-on-your-smartphone/>.
  11. McElhearn, Kirk. “Encrypt Any Disk in Mountain Lion.” CSO. 9 Aug. 2012. <http://www.csoonline.com/article/713341/encrypt-any-disk-in-mountain-lion>.
  12. Meredith, Leslie. “How to Keep Secrets on Your Smartphone.” Mashable. 21 Nov. 2012. <http://mashable.com/2012/11/21/keep-secrets-smartphone/>.
  13. Motal, Julius. “FaceNiff Is a Hacker’s Dream for Android Users.” PCMAG. 2 June 2011. <http://www.pcmag.com/article2/0,2817,2386312,00.asp>.
  14. O’Reilly, Dennis. “Two Free Ways to Encrypt Google Drive Files.” CNET How To. 2 July 2013. <http://howto.cnet.com/8301-11310_39-57591859-285/two-free-ways-to-encrypt-google-drive-files/>.
  15. Rubens, Paul. “Buyer’s Guide to Full Disk Encryption.” ESecurity Planet. 9 May 2012. <http://www.esecurityplanet.com/mobile-security/buyers-guide-to-full-disk-encryption.html>.
  16. Schofield, Jack. “How Can I Encrypt My Laptop to Protect My Personal Data?The Guardian. 06 June 2013. <http://www.guardian.co.uk/technology/askjack/2013/jun/06/laptop-encrypt-personal-data>.
  17. Steinberg, Joseph. “How To Send Messages That Even The NSA Cannot Read.” Forbes. 08 Sept. 2013. <http://www.forbes.com/sites/josephsteinberg/2013/09/08/how-to-send-messages-that-even-the-nsa-cannot-read/>.
  18. Ungerleider, Neal. “NSA Cramping Your Style? Use These Easy Encryption Solutions.” Fast Company. 21 June 2013. <http://www.fastcompany.com/3013346/nsa-cramping-your-style-use-these-easy-encryption-solutions>.
  19. Wahad, Fatima. “Compose Encrypted Emails From Within Gmail With SafeGmail For Chrome.” AddictiveTips. 22 Oct. 2012. <http://www.addictivetips.com/web/compose-encrypted-emails-from-within-gmail-with-safegmail-for-chrome/>.
  20. Widder, Brandon. “How to Use (Apple’s) Passbook.” Digital Trends. 13 Jan. 2013. <http://www.digitaltrends.com/mobile/how-to-use-passbook/>.
  21. Wlodarz, Derrick. “BitLocker 101: Easy, Free Full Drive Encryption for Windows.” Technibble. 23 July 2013. <http://www.technibble.com/bitlocker-101-easy-free-full-drive-encryption-for-windows/>.
  22. Zukerman, Erez. “How To Send Sensitive, Secure Emails, Passwords, And Files Without Fear.” MakeUseOf. 6 Dec. 2012. <http://www.makeuseof.com/tag/how-to-send-secure-emails-without-fear/>.

3.13 Protect wired and wireless ports on your computer

  1. Brandon, John. “How to Prevent Thumb Drive Security Disasters.” CIO. 27 Jan. 2012. <http://www.cio.com/article/698939/How_to_Prevent_Thumb_Drive_Security_Disasters>.
  2. Kastrenakes, Jacob. “USB Condom Protects Your Devices from Nasty Ports.” The Verge. 13 Sept. 2013. <http://www.theverge.com/2013/9/13/4726486/usbcondom-protects-charging-devices-from-hackers-juice-jacking>.
  3. Lee, Joel. “Using NFC? 3 Security Risks To Be Aware Of.” MakeUseOf. 8 Aug. 2013. <http://www.makeuseof.com/tag/using-nfc-3-security-risks-to-be-aware-of/>.
  4. Lee, Joel. “Why USB Sticks Are Dangerous & How To Protect Yourself.” MakeUseOf. 3 Apr. 2013. <http://www.makeuseof.com/tag/why-usb-sticks-are-dangerous-and-how-to-protect-yourself/>.
  5. Mah, Paul. “How to Secure USB Drives and Other Portable Storage Devices.” CIO. 28 May 2013. <http://www.cio.com/article/734016/How_to_Secure_USB_Drives_and_Other_Portable_Storage_Devices>.
  6. Younas, Usman. “How To Disable AutoPlay & AutoRun In Windows 8.” AddictiveTips. 23 Nov. 2012. <http://www.addictivetips.com/windows-tips/how-to-disable-autoplay-autorun-in-windows-8/>.

3.14 Keep your software up-to-date

  1. Bell, Donald. “How to Update Apps in ITunes 11.” CNET How To. 31 May 2013. <http://howto.cnet.com/8301-11310_39-57587114-285/how-to-update-apps-in-itunes-11/>.
  2. Couch, Aaron. “OUTDATEfighter: Keep Your Computer Updated And Bloatware-Free With This Fantastic Tool [Windows].” MakeUseOf. 9 May 2013. <http://www.makeuseof.com/tag/outdatefighter-keep-your-computer-updated-and-bloatware-free-with-this-fantastic-tool-windows/>.
  3. Elliott, Melissa. “Software Upgrade Hygiene: Stop Putting It Off, It Will Only Hurt More.” Veracode. 5 Feb. 2013. <https://www.veracode.com/blog/2013/02/software-upgrade-hygiene-stop-putting-it-off-it-will-only-hurt-more/>.
  4. Keizer, Gregg. “Apple, Microsoft to Leap on App Auto-update Bandwagon.” Computerworld. 17 July 2013. <https://www.computerworld.com/s/article/9240856/Apple_Microsoft_to_leap_on_app_auto_update_bandwagon>.
  5. Rashid, Fahmida Y. “Blackhole Creator on Quest to Expand Exploit Empire.” SecurityWeek. 10 Jan. 2013. <https://www.securityweek.com/blackhole-creator-quest-expand-exploit-empire>.
  6. Rubenkin, Neil J. “Study: 7 of 13 Top Rated Antivirus Fail Against HTTPS Exploits.” PCMAG. 15 Aug. 2012. <http://securitywatch.pcmag.com/none/301478-study-7-of-13-top-rated-antivirus-fail-against-https-exploits>.

3.15 Keep your system clean and running smoothly

  1. Ahmed, Waqas. “Autorun Angel Is A Cloud-Based Security Analyzer For Startup Items.” AddictiveTips. 29 Mar. 2013. <http://www.addictivetips.com/windows-tips/autorun-angel-cloud-based-security-analyzer-for-startup-items/>.
  2. Anon. “How Do I Get Rid of Annoying Toolbars?DataProtectionCenter. 14 Mar. 2013. <http://www.dataprotectioncenter.com/antivirus/avast/how-do-i-get-rid-of-annoying-toolbars/>.
  3. Anon. “Tips to Avoid Crapware & Bloatware on Your Windows PC.” The Windows Club. 27 Feb. 2013. <http://www.thewindowsclub.com/tips-avoid-bloatware-crapware-windows-pc>.
  4. Rashid, Fahmida Y. “How to Remove Babylon Search Toolbar.” PCMAG. 2 May 2013. <http://www.pcmag.com/article2/0,2817,2418379,00.asp>.
  5. Wallen, Jack. “Five Easy to Use Drive Janitors to Help Clean up Your Hard Drive.” Tech Republic. 14 Mar. 2013. <http://www.techrepublic.com/blog/five-apps/five-easy-to-use-drive-janitors-to-help-clean-up-your-hard-drive/1771>.

3.16 Select browser(s) and security add-ons

  1. Ahmed, Waqas. “Get Rid Of Potentially Harmful Cookies From All Major Browsers With MAXA Cookie Manager.” AddictiveTips. 29 Aug. 2013. <http://www.addictivetips.com/windows-tips/delete-tracking-cookies-from-major-browsers-maxa-cookie-manager/>.
  2. Anon. “Introducing DoNotTrackMe (DNTMe) for Online Privacy Made Easy.Facecrooks. 18 Jan. 2013. <http://facecrooks.com/Internet-Safety-Privacy/Introducing-DoNotTrackMe-DNTMe-for-online-privacy-made-easy.html>.
  3. Anon. “Unwanted Tracking Is Not Cool.” Disconnect. Web. 27 Aug. 2013. <https://disconnect.me/>.
  4. Basu, Saikat. “How to Stop Flash From Loading Automatically With FlashControl [Chrome].” MakeUseOf. 8 Apr. 2013. <http://www.makeuseof.com/tag/how-to-stop-flash-from-loading-flashcontrol-chrome/>.
  5. Bernstein, Peter. “MaskMe Personal Privacy Tool – Protection from Data Miners.” Tech Zone 360. 22 July 2013. <http://www.techzone360.com/topics/techzone/articles/2013/07/22/346563-maskme-personal-privacy-tool-protection-from-data-miners.htm>.
  6. Breen, Christopher. “How to Block Auto-play Videos: Mac OS X Tips.” MacWorld UK. 25 June 2013. <http://www.macworld.co.uk/macsoftware/news/?newsid=3454574>.
  7. Constantin, Lucian. “Firefox Adds Built-in HTML5-based PDF Viewer to Improve Security.” Computerworld. 11 Jan. 2013. <https://www.computerworld.com/s/article/9235609/Firefox_adds_built_in_HTML5_based_PDF_viewer_to_improve_security>.
  8. Couch, Aaron. “How To Become A Chrome Power User, Part 2: Bookmarks, Settings & Extensions.” MakeUseOf. 3 Apr. 2013. <http://www.makeuseof.com/tag/how-to-become-a-chrome-power-user-part-2-bookmarks-settings-extensions/>.
  9. Geier, Eric. “5 Steps to Ultimate Firefox Security.” CIO. 28 May 2013. <http://www.cio.com/article/734023/5_Steps_to_Ultimate_Firefox_Security>.
  10. Geier, Eric. “Best Security Tips for Safer Google Chrome Browsing.” CIO. 18 Mar. 2013. <http://www.cio.com/article/730411/Best_Security_Tips_for_Safer_Google_Chrome_Browsing>.
  11. Grooten, Martijn. “German Anti-botnet Advisory Recommends the Use of Ad Blockers for Security.” Virus Bulletin. 17 May 2013. <http://www.virusbtn.com/news/2013/05_17.xml>.
  12. Grossman, Jeremiah. “Web Browser Defense-in-Depth: 3 Layers Is Good, 5 Is Better.” WhiteHat Security Blog. 12 Feb. 2012. <https://blog.whitehatsec.com/web-browser-defense-in-depth-3-layers-is-good-5-is-better/>.
  13. Horowitz, Paul. “Block Ads on the IPhone, IPad, & IPod Touch with a Simple Trick.” OSX Daily. 22 Feb. 2013. <http://osxdaily.com/2013/02/22/block-ads-iphone-ipad-trick/>.
  14. Kerner, Sean M. “4 Ways to Secure an Apple Mac Browser.” ESecurity Planet. 10 June 2013. <http://www.esecurityplanet.com/mac-os-security/4-ways-to-secure-an-apple-mac-browser.html>.
  15. Klosowski, Thorin. “Lifehacker Pack for Chrome 2013: Our List of the Best Extensions.” Lifehacker. 24 July 2013. <http://lifehacker.com/lifehacker-pack-for-chrome-2013-our-list-of-the-best-e-880863393>.
  16. Lancet, Yaara. “Reveal Where Short Links Really Go To With These URL Expanders.” MakeUseOf. 20 Nov. 2012. <http://www.makeuseof.com/tag/reveal-where-suspicious-short-links-really-go-to-with-these-url-expanders/>.
  17. Lee, Joel. “Everything You Need to Make Firefox Private & Secure.” MakeUseOf. 17 May 2013. <http://www.makeuseof.com/tag/everything-you-need-to-make-firefox-private-and-secure/>.
  18. Levinson, Meridith. “6 Ways to Defend Against Drive-by Downloads.” CIO. 10 Feb. 2012. <http://www.cio.com/article/699970/6_Ways_to_Defend_Against_Drive_by_Downloads>.
  19. Lord, Nate. “Browser Security Settings for Chrome, Firefox and Internet Explorer: Cybersecurity 101.” Veracode. 22 Mar. 2013. <https://www.veracode.com/blog/2013/03/browser-security-settings-for-chrome-firefox-and-internet-explorer/>.
  20. Mogull, Rich. “Isolate Adobe Flash by Using Google Chrome.” TidBITS. 7 Feb. 2013. <http://tidbits.com/article/13545>.
  21. O’Reilly, Dennis. “Selective Ad Blocking Lets You Support Your Favorite Sites.” CNET How To. 11 July 2013. <http://howto.cnet.com/8301-11310_39-57593140-285/selective-ad-blocking-lets-you-support-your-favorite-sites/>.
  22. Overa, Adam. “Which Web Browser Should You Run On Your Android Device?Tom’s Hardware. 29 Nov. 2012. <http://www.tomshardware.com/reviews/android-web-browser-recommendation,3316-2.html>.
  23. Pegoraro, Rob. “How to Change Your Browser on Apple Gadgets.” USA Today. 02 Sept. 2012. <http://www.usatoday.com/tech/products/story/2012-09-02/pegoraro-iphone-ipad-browsers/57536124/1>.
  24. Rashid, Fahmida Y. “Mobile Web Browsers Overlooking Security Requirements, Researchers Say.” SecurityWeek. 7 Dec. 2012. <https://www.securityweek.com/mobile-web-browsers-overlooking-security-requirements-researchers-say>.
  25. Rubenking, Neil J. “Good News: Phishing Protection Actually Works.” PCMAG. 20 Aug. 2013. <http://securitywatch.pcmag.com/security-software/314939-good-news-phishing-protection-actually-works>.
  26. Storer, Kyrksen. “Bitdefender Launches Free Safepay Standalone to Protect EBanking, Shopping.” MarketWatch. 25 July 2013. <http://www.marketwatch.com/story/bitdefender-launches-free-safepay-standalone-to-protect-ebanking-shopping-2013-07-25>.
  27. Tanner, Adam. “The Web Cookie Is Dying. Here’s The Creepier Technology That Comes Next.” Forbes. 17 June 2013. <http://www.forbes.com/sites/adamtanner/2013/06/17/the-web-cookie-is-dying-heres-the-creepier-technology-that-comes-next/>.
  28. Trapani, Gina. “How to Block Ads in Google Chrome.” Lifehacker. 7 Sept. 2008. <http://lifehacker.com/5046529/how-to-block-ads-in-google-chrome>.
  29. Wahab, Fatima. “Protect Privacy On Facebook By Removing URL Tracking Tokens In Chrome.” AddictiveTips. 5 June 2013. <http://www.addictivetips.com/web/protect-privacy-on-facebook-by-removing-url-tracking-tokens-in-chrome/>.

3.17 Take care where you get your apps

  1. Burgess, Brian. “Confirmed: CNET’s Download.com Gains Crapware Status.” GroovyPost. 22 July 2013. <http://www.groovypost.com/unplugged/confirmed-cnet-download-com-gains-crapware-status/>.
  2. Cohen, David. “Information Accessed By Facebook-Connected Apps.” AllFacebook. 5 Apr. 2013. <http://allfacebook.com/mypermissions-infographic_b114645>.
  3. Ducklin, Paul. “Android Malware in Pictures – a Blow-by-blow Account of Mobile Scareware.” Naked Security. 31 May 2013. <http://nakedsecurity.sophos.com/2013/05/31/android-malware-in-pictures-a-blow-by-blow-account-of-mobile-scareware/>.
  4. Eddy, Max. “Bad Piggies Android Malware Pulled From Google Play.” PCMAG. 13 June 2013. <http://securitywatch.pcmag.com/malware/312575-bad-piggies-android-malware-pulled-from-google-play>.
  5. Eördögh, Fruzsina. “How To Enable 2-Factor Verification On Gmail (And Avoid Getting Hacked).” ReadWrite. 7 Aug. 2012. <http://www.readwriteweb.com/archives/how-to-enable-2-factor-verification-on-gmail-and-avoid-getting-hacked.php>.
  6. Ferrer, Methusela C. “Fake Apps and the Lure of Alternative Sources.” Technet. 17 July 2013. <http://blogs.technet.com/b/mmpc/archive/2012/07/17/fake-apps-and-the-lure-of-alternative-sources.aspx>.
  7. Gonsalves, Antone. “Many Free Android Apps Are Starting To Look A Lot Like Malware.” ReadWrite. 5 Apr. 2013. <http://readwrite.com/2013/04/05/free-android-apps-starting-to-look-like-malware>.
  8. Higgins, Kelly J. “Microsoft: Software Activation-Key Generators Major Malware Conduits.” Dark Reading. 9 Oct. 2013. <http://www.darkreading.com/threat-intelligence/167901121/security/vulnerabilities/240008762/microsoft-software-activation-key-generators-major-malware-conduits.html>.
  9. Hoffman, Chris. “Cracked Android Apps and Games: Read This Before Downloading.” MakeUseOf. 5 July 2013. <http://www.makeuseof.com/tag/cracked-android-apps-and-games-read-this-before-downloading/>.
  10. Kaiser, Tiffany. “IDC: 33 Percent of Software Is Counterfeit, Malware Market Will Reach $114 Billion This Year.” DailyTech. 26 Mar. 2013. <http://www.dailytech.com/IDC+33+Percent+of+Software+is+Counterfeit+Malware+Market+will+Reach+114+Billion+this+Year/article30209.htm>.
  11. Kirk, Jeremy. “Google Play Store Inundated with Scam Apps, Symantec Says.” CSO. 28 July 2013. <http://www.csoonline.com/article/737144/google-play-store-inundated-with-scam-apps-symantec-says>.
  12. Pinola, Melanie. “MyPermissions Now Alerts You When Apps Gain Access to Your Accounts.” Lifehacker. 20 June 2013. <http://lifehacker.com/mypermissions-now-alerts-you-when-apps-gain-access-to-y-517795869>.
  13. Prince, Brian. “Hacked Versions of Popular Mobile Apps Widespread, Report Finds.” SecurityWeek. 20 Aug. 2012. <http://www.securityweek.com/hacked-versions-popular-mobile-apps-widespread-report-finds>.
  14. Ragan, Steve. “Trend Micro: Top Android Markets Are Hosting Thousands of Malicious Apps.” SecurityWeek. 21 Dec. 2013. <https://www.securityweek.com/trend-micro-top-android-markets-are-hosting-thousands-malicious-apps>.
  15. Rashid, Fahmida Y. “Premium SMS Services in This Week’s Dangerous Android Apps.” PCMAG. 8 June 2013. <http://securitywatch.pcmag.com/android/312387-premium-sms-services-in-this-week-s-dangerous-android-apps>.
  16. Rowinski, Dan. “Pay Attention to Mobile App Permissions!ReadWrite. 20 Aug. 2012. <http://www.readwriteweb.com/mobile/2012/08/infographic-pay-attention-to-mobile-app-permissions.php>.
  17. Smith, Matt. “Buyer Beware: How Not To Fall For Fake & Dangerous Apps [iOS & Android].” MakeUseOf. 19 Mar. 2013. <http://www.makeuseof.com/tag/buyer-beware-how-not-to-fall-for-fake-and-dangerous-apps/>.
  18. Staff Writer. “Warning: Free Apps May Be Loaded with Malware.” BusinessTech. 6 July 2013. <http://businesstech.co.za/news/mobile/41208/warning-free-apps-may-be-loaded-with-malware/>.
  19. Yamada, Kannon. “The Seven Deadly Android Permissions: How To Avoid The Sin Of Slothful Preparedness.MakeUseOf. 16 Mar. 2013. <http://www.makeuseof.com/tag/the-seven-deadly-android-permissions-how-to-avoid-the-sin-of-slothful-preparedness/>.
  20. Yin, Sara. “The Safest Android App Markets.” PCMAG. 13 Sept. 2012. <http://securitywatch.pcmag.com/none/302606-the-safest-android-app-markets>.
  21. Zorz, Zeljka. “The Dangers of Downloading Software from Unofficial Sites.” Help Net Security. 23 May 2013. <http://www.net-security.org/malware_news.php>.

3.18 Use Two-Factor Authentication for logins

3.19 Use a Virtual Keyboard for improved login security