LinkedIn Introduces Intro, allows them to read all your e-mail
LinkedIn the Online Social Networking site for business has recently introduced a new feature for the iPhone. Aside from integrating itself within the iPhone e-mail system, this new service claims to be a security feature by reading your email and then attaching a banner to your messages saying that the sender of your message is in your LinkedIn network. There are many features like this that already exist, however, what is different in this instance is that your email goes through LinkedIn’s server first and not through an app on your phone. LinkedIn has historically had problems with password control and have been implicated in a class action lawsuit with regard to e-mail hacking.
Please do not enable Intro on your phones, if you have please disable and change passwords for your NDSU credentials.
This year marks the 10th anniversary of the National Cyber Security Awareness Month put on by Department of Homeland Security and theNational Cyber Security Alliance. The goal of which is to increase awareness of security problems and solutions to the general public. Each day this month we will be posting a cyber-security tip on our page. Please Share these tips and if nothing else follow a few of them.
October 30, 2013
Chrome, Firefox, Internet Explorer, Safari, whatever, they are all the same right, they just get the Internet to my eyes so why should I use one over the other?
The first browser was invented in 1990 and its name was WorldWideWeb, and thus the www before most Internet addresses, it was not until 1993 and Netscape came along that web browsing really started to take off. With the browser wars and Apple resurging in popularity did differences in browsers really start to take on a difference of opinions in the security community.
Browsers essentially take computer machine code and make it available for people to read it, and being written by people to do this, naturally there have been mistakes in the way the browser was written or even essential designs into how the browser interacts with the underlying operating system. Thus the entrance of browser exploits. There have been some very bad browser exploits that allow operating system level commands to be run on a computer from a webpage, and most modern browsers have run into these problems.
So, which one do you use and trust? Ultimately, its your choice, however, there are a few caveats I’ll put on here. When you are using an Internet browser:
· Be Up To Date – Use the latest version of your browser software and keep it up to date.
· Be Careful What You Click On – All the security locks in the world are not going to do you any good if you let the bad guys in the front door.
· Be Vigilant – Read the warnings that a browser gives you, find out why you have a broken key icon on some page, why does my toolbar flash yellow, what does a certificate error mean.
· Keep Your Helper Applications Up To Date As Well – Third party applications like Java make the Internet appear the way it does, but also can allow some bad stuff to happen if they are old.
These tips should keep your Internet experience a little bit safer and keep the content that you wish to view in your field of vision.
August 26, 2014
Smartphone Shared Memory Vulnerability Found.
A Vulnerability in the barrier between applications and operating systems has been found in Android, Windows Phone, and iOS devices. This vulnerability could allow an attacker to track user activity over time on a mobile device through the use of specially crafted app that a user installs on their device.