SlideShare a Scribd company logo
1 of 12
DefendingYour Accounts, Devices, & Anonymity
 Information is power!
 Tech is very good today… even for hackers
 John the Ripper & GPUs
 Hacking effected 48% of Americans in 2014 & cost
businesses nearly $500mil in losses
 3.1 million Americans had their phones stolen in 2013
(1.4 million lost their phones)
 Not all hackers are evil (black hat)
 White hats find and help fix problems
 Nations are also in the game
 Stuxnet worm
 PRISM program
 Bugs (Heartbleed)
 Brute force hacking
 John the Ripper
 Social engineering
 Con men
 Packet sniffing
 WireShark
 Robbery
 3.1 million
 Viruses/worms
 Bugs
 PGP
 AES
 RSA
 PBKDF2: Password-Based Key Derivation Function 2
 WPA 2 (WiFi Protected Access)
 WiFi encryption
 TLS (https)
 Internet communication encryption
 Print scan (Touch ID / hand)
 Mostly safe from everyone but the police
 Eye scan (retina / iris)
 Odor sensor (breath)
 Voice recognition
 Face recognition
 The best password is a semisensical passphrase
 th3Qu!ckBr0wnf0XjumP3d.
 Minimum 9 characters including both upper &
lowercase letters, numbers, and specials
 Here’s a strong/unique passcode: !sWt^%vTR]/9
 Two-factor authentication (2FA) can also be
used for additional security
 Sadly, some sites restrict passcodes to 15
characters and/or do not allow specials
 Something you know & something you have
 Apple
 Google
 Microsoft
 Facebook
 Yahoo
 Evernote
 Cloud storage (Tresorit)
 E*Trade,Vanguard, PayPal, etc…
 Many more!
 80% of top security experts use one!
 1Password
 LastPass
 Dashlane
 KeePass
 Norton Identity Safe
 iCloud Keychain
 Google Synch
 Browsers
 Computer / Device specific
 Change the router nameASAP
 Change the admin password ASAP
 Change the gateway’s IP address
 UseWPA2 withAES encryption!
 Quantum computing
 Massively parallel
 Current passwords snap like a twig
 Quantum encryption
 Unbreakable
 The act of intercepting it breaks it
 VPNs
 Route users through multiple IPs masking their
identity and location
 TOR
 Browser based
 Uses proxies
 Always use HTTPS for commerce & utilize the
EFF’s HTTPS Everywhere extension
 Use 2FA on password recovery email accounts
 Do not underestimate the physical security of your
computers & mobile devices (use a PIN)
 Social engineering is a powerful tool
▪ As is dumpster diving
 Encrypt your PC’s hard drive (VeraCrypt)
 Use PayPal – Keep payment info. in one place
 If you’re not using a password manager, write your
passcodes down and keep them in a safe place.
That said, use a password manager!

More Related Content

What's hot

Internetsecuritypowerpoint 130404101055-phpapp02
Internetsecuritypowerpoint 130404101055-phpapp02Internetsecuritypowerpoint 130404101055-phpapp02
Internetsecuritypowerpoint 130404101055-phpapp02sanjay kumar
 
Web defacement
Web defacementWeb defacement
Web defacementstudent
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A DiscussionKaushik Patra
 
Ethical hacking for information security
Ethical hacking for information securityEthical hacking for information security
Ethical hacking for information securityJayanth Vinay
 
The Basics of Ethical Hacking
The Basics of Ethical HackingThe Basics of Ethical Hacking
The Basics of Ethical HackingVamshi TG
 
computer viruses
computer virusescomputer viruses
computer virusesdayasunny7
 
Security Assessment
Security AssessmentSecurity Assessment
Security AssessmentAnil Nayak
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0 Arjunsinh Sindhav
 
Cyber Security-Ethical Hacking
Cyber Security-Ethical HackingCyber Security-Ethical Hacking
Cyber Security-Ethical HackingViral Parmar
 
the best hacking ppt
the best hacking pptthe best hacking ppt
the best hacking pptfuckubitches
 

What's hot (20)

Hacker&cracker
Hacker&crackerHacker&cracker
Hacker&cracker
 
Hacking final
Hacking finalHacking final
Hacking final
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
Internetsecuritypowerpoint 130404101055-phpapp02
Internetsecuritypowerpoint 130404101055-phpapp02Internetsecuritypowerpoint 130404101055-phpapp02
Internetsecuritypowerpoint 130404101055-phpapp02
 
Web defacement
Web defacementWeb defacement
Web defacement
 
Hacking (basic)
Hacking (basic)Hacking (basic)
Hacking (basic)
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A Discussion
 
Ethical hacking for information security
Ethical hacking for information securityEthical hacking for information security
Ethical hacking for information security
 
Hacking
HackingHacking
Hacking
 
The Basics of Ethical Hacking
The Basics of Ethical HackingThe Basics of Ethical Hacking
The Basics of Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
Hacking Hacking
Hacking
 
Protection
ProtectionProtection
Protection
 
computer viruses
computer virusescomputer viruses
computer viruses
 
Hacking
HackingHacking
Hacking
 
Security Assessment
Security AssessmentSecurity Assessment
Security Assessment
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Cyber Security-Ethical Hacking
Cyber Security-Ethical HackingCyber Security-Ethical Hacking
Cyber Security-Ethical Hacking
 
the best hacking ppt
the best hacking pptthe best hacking ppt
the best hacking ppt
 

Similar to Digital security

Csi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide MerdingerCsi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide Merdingershawn_merdinger
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key loggerPatel Mit
 
Digital security for journalists laurent eschenauer
Digital security for journalists  laurent eschenauerDigital security for journalists  laurent eschenauer
Digital security for journalists laurent eschenauerNelly Luna
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
Digital Security for Journalists
Digital Security for JournalistsDigital Security for Journalists
Digital Security for JournalistsLaurent Eschenauer
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Securitydrkelleher
 
Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01Miigaa Mine
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hackingsatish kumar
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
Computer security
Computer securityComputer security
Computer securityfiza1975
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professionalciso_insights
 
Data Privacy for Activists
Data Privacy for ActivistsData Privacy for Activists
Data Privacy for ActivistsGreg Stromire
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII studentsAkiumi Hasegawa
 
The ultimate privacy guide
The ultimate privacy guideThe ultimate privacy guide
The ultimate privacy guideJD Liners
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationTom Eston
 

Similar to Digital security (20)

Csi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide MerdingerCsi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide Merdinger
 
Dr. Alan Shark
Dr. Alan SharkDr. Alan Shark
Dr. Alan Shark
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key logger
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Digital security for journalists laurent eschenauer
Digital security for journalists  laurent eschenauerDigital security for journalists  laurent eschenauer
Digital security for journalists laurent eschenauer
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Digital Security for Journalists
Digital Security for JournalistsDigital Security for Journalists
Digital Security for Journalists
 
System-Security-acit-Institute
System-Security-acit-InstituteSystem-Security-acit-Institute
System-Security-acit-Institute
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Security
 
Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 
Encryption Primer por Cathy Nolan
Encryption Primer por Cathy NolanEncryption Primer por Cathy Nolan
Encryption Primer por Cathy Nolan
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Computer security
Computer securityComputer security
Computer security
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
Hacker
HackerHacker
Hacker
 
Data Privacy for Activists
Data Privacy for ActivistsData Privacy for Activists
Data Privacy for Activists
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
The ultimate privacy guide
The ultimate privacy guideThe ultimate privacy guide
The ultimate privacy guide
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 

Recently uploaded

Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 

Recently uploaded (20)

Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 

Digital security

  • 2.  Information is power!  Tech is very good today… even for hackers  John the Ripper & GPUs  Hacking effected 48% of Americans in 2014 & cost businesses nearly $500mil in losses  3.1 million Americans had their phones stolen in 2013 (1.4 million lost their phones)  Not all hackers are evil (black hat)  White hats find and help fix problems  Nations are also in the game  Stuxnet worm  PRISM program  Bugs (Heartbleed)
  • 3.  Brute force hacking  John the Ripper  Social engineering  Con men  Packet sniffing  WireShark  Robbery  3.1 million  Viruses/worms  Bugs
  • 4.  PGP  AES  RSA  PBKDF2: Password-Based Key Derivation Function 2  WPA 2 (WiFi Protected Access)  WiFi encryption  TLS (https)  Internet communication encryption
  • 5.  Print scan (Touch ID / hand)  Mostly safe from everyone but the police  Eye scan (retina / iris)  Odor sensor (breath)  Voice recognition  Face recognition
  • 6.  The best password is a semisensical passphrase  th3Qu!ckBr0wnf0XjumP3d.  Minimum 9 characters including both upper & lowercase letters, numbers, and specials  Here’s a strong/unique passcode: !sWt^%vTR]/9  Two-factor authentication (2FA) can also be used for additional security  Sadly, some sites restrict passcodes to 15 characters and/or do not allow specials
  • 7.  Something you know & something you have  Apple  Google  Microsoft  Facebook  Yahoo  Evernote  Cloud storage (Tresorit)  E*Trade,Vanguard, PayPal, etc…  Many more!
  • 8.  80% of top security experts use one!  1Password  LastPass  Dashlane  KeePass  Norton Identity Safe  iCloud Keychain  Google Synch  Browsers  Computer / Device specific
  • 9.  Change the router nameASAP  Change the admin password ASAP  Change the gateway’s IP address  UseWPA2 withAES encryption!
  • 10.  Quantum computing  Massively parallel  Current passwords snap like a twig  Quantum encryption  Unbreakable  The act of intercepting it breaks it
  • 11.  VPNs  Route users through multiple IPs masking their identity and location  TOR  Browser based  Uses proxies
  • 12.  Always use HTTPS for commerce & utilize the EFF’s HTTPS Everywhere extension  Use 2FA on password recovery email accounts  Do not underestimate the physical security of your computers & mobile devices (use a PIN)  Social engineering is a powerful tool ▪ As is dumpster diving  Encrypt your PC’s hard drive (VeraCrypt)  Use PayPal – Keep payment info. in one place  If you’re not using a password manager, write your passcodes down and keep them in a safe place. That said, use a password manager!

Editor's Notes

  1. There are always tradeoffs between security & convenience…
  2. ashleymadison.com hack – 37 million users (10% of U.S.) Identity theft effects about 15 million Americans each year
  3. JtR = password cracker / can run through thousands/sec (potentially billions) Kevin Mitnick, king of hackers (con man) Cell industry: Only 47% of users use PINs to secure their phones Device kill switch was killed by Congress (Find My iPhone – find, lock, wipe / Send Last Location) Ransomware has even targeted police Firewall all routers and PCs, use virus protection (Avast), & keep your software updated!
  4. Pretty Good Privacy (PGP) Advanced Encryption Standard (AES) Rivest, Shamir, Adleman (RSA) Transport Layer Security (TLS)
  5. Not as secure as passcodes, but way more convenient. Hopefully more people will lock their devices now With Touch ID, turn phone off before dealing with police as iPhones require PIN on restart
  6. “Diceware” is the most effective (random) method to generate strong/unique passcodes without using a password manager 16 character+ passcodes are mostly secure from brute force attempts LIE for the answers to security questions & note the lies in your password manager! *Usernames can also be varied from site to site and changed like passwords if allowed
  7. REQUIRES cell phone. The “real” way is to use a 2nd phone… Authorize least two different devices & store backup codes someplace safe! Evernote can also encrypt notes internally via desktop client Tresorit : Only you hold key & servers operate under Swiss law Amazon is a holdout – Boo! Mention Vanguard’s device specific login option
  8. The ONLY easy way to implement both strong & unique passcodes 1Password can backup to iCloud, Dropbox, or Wifi & never stores your master key! Change password for Google Synch Recommend 2FA if backing-up to the cloud for extra security
  9. Default brand names, passwords, and gateway IPs are online so don’t use them! For extra security limit admin acess to Ethernet only or by MAC address
  10. From hundreds of millions/sec to thousands of trillions/sec
  11. Bonus! While you’re at it, why not browse the Internet anonymously too? Mention EFF’s new Privacy Badger extension for blocking unwanted tracking cookies
  12. Lock your devices with passcodes! iPhones can be set to wipe after 10 failed attempts Windows Vista+ can auto encrypt hard drive (BitLocker) Using 2FA on PayPal isn't a bad idea either... Be cautious around (unknown) open & ad hoc networks / Disable Java extension when unnecessary / Don’t use IE / Tape over webcams when not in use Apple users should also change their iCloud security key! *The secret to digital security is random characters, lies, and a password manager!