Browsed by
Month: March 2017

3DSC 2.29: Create Backups of Your Files

3DSC 2.29: Create Backups of Your Files

Last year I suffered a catastrophic malfunction of my main hard drive.  After returning from a work trip I settled in to check email only to find my computer unwilling to boot.  This is not the first time I have broken a computer.  Fortunately this time I was prepared.  The step that saved me in this instance is today’s task: backup your files.

Complete Privacy & Security Podcast E025

Complete Privacy & Security Podcast E025

Complete Privacy & Security Podcast Episode 025: Custom Linux Builds for Privacy & Security This week, we catch you up on Justin’s 30 Day Security Challenge and David Westcott joins us to talk about the Buscador Linux build. Plus, we discuss web browsers, answer listener questions, and a present a new investigation technique in the OSINT segment.

3DSC 2.28: Obscure Your Phone Number

3DSC 2.28: Obscure Your Phone Number

Your phone number may not seem like a big deal. You give it out to nearly everyone one – and every service – in your life. I believe that your phone number is more important than your social security number as an individual identifier. Your phone number is linked to your entire digital trail – your public online accounts, the dossiers private data broker have on you, your mortgage information, your medical history, the location of every place you have…

Read More Read More

3DSC 2.27: Secure Your Communications

3DSC 2.27: Secure Your Communications

Today we will wrap up our three-day mini-series covering smartphone security.  Your call history and text messages are available to your mobile service provider.  They are also available to malicious parties that can hack your service provider.  Your phone calls and text messages are also available to anyone with certain technology.  Though IMSI-catchers like the Stingray are only available to law enforcement, today’s state “secrets become tomorrow’s PhD theses and the next day’s hacker tools.” 

3DSC 2.24: Smartphone Security Part II

3DSC 2.24: Smartphone Security Part II

Today’s task is to encrypt your device and put a (better) passcode on it.  I realize that most of you probably have a passcode on your mobile phone, but many out there don’t.  Even if you do I want to make those passcodes better; this is a critical step in smartphone security.  Phones are much more easily lost or stolen than your laptop and they carry a wealth of information about you.  You should protect the data that is on…

Read More Read More

3DSC 2.23: Smartphone Security Part I

3DSC 2.23: Smartphone Security Part I

Today we will move into securing our mobile devices. At this point your laptop and desktop computers should be reasonably well-protected. Smartphones and tablets have the potential to represent an even greater attack surface is not secured properly. today’s task is to ensure your smartphone OS  and all installed apps are updated. Ensuring all software is updated is the single greatest security measure you can take to protect your device from malware.

3DSC 2.22: Use Private Payment Methods

3DSC 2.22: Use Private Payment Methods

At this point your personal credit should be locked down pretty tightly. With your credit report in hand, you have reasonable certainty that your credit has not been stolen. With a credit freeze initiated, you don’t have to worry about anyone opening new lines of credit in your name. However, these previous techniques do nothing to protect your existing accounts, so it is still important to protect your credit card numbers. Today, you should set yourself up to use private…

Read More Read More