Amfas Tech | Technology, Blogging & Internet Marketing: Online Security

Why Do I Need an SSL Certificate for my E-Commerce Store?

If you are one of those who is planning to launch an e-commerce website, then you already might have heard the term "SSL" a dozen times. And as I guessed you might be confused since you are not familiar with the term and several questions like what is it, how does it work, why is it so crucial, and blah blah blah might be going on your mind.

 

Relax, that is why we are posting this article. SSL initially may seem as a complicated topic but once you understand what exactly it is and why you need it, it doesn't seem any more like rocket science.

 

So let's start with an introduction to SSL, why you need it, and how you can get one for your store. By the end of this article, your confusion should be gone.

 

What is an SSL and What Does it Stand for?

First of all, SSL stands for Secure Sockets Layer and it is also sometimes called as Transport Layer Security (TLS). SSL is a protocol used to protect sensitive information to be private. It basically establishes an encrypted connection between the web browser and server by exchanging a symmetric key.

 

ssl

 

Every message that transmits should pass the internal inspection for the uprightness of this encryption before it works. And by any chance, if the check fails, the encrypted information will be safe. We use SSL almost every day when we browse sites like LinkedIn, YouTube, Facebook, and other e-commerce stores like Amazon, Flipkart, etc. The encryption used restricts hackers and eavesdroppers who steal sensitive information like credit cards or user credentials.

 

How Important is SSL to Websites?

Any website which wants to secure its transaction details, it will have to acquire an SSL certificate for that domain. The SSL certificate utilizes the encryption to all the website activities from page and form submissions and product pages to financial transactions. Hence, this restricts hackers from stealing your valuable data and other such attacks.

 

SSL for E-Commerce Websites

Because of its data protection nature, SSL is extensively used by almost every e-commerce store which collects customers' private and payment-related information. There are 2 main reasons behind the usage of SSL certificates

 

Data Protection

The very first reason for using SSL certificates is to keep sensitive information safe by sending them with an encrypted connection. Usually, e-commerce websites need customers' private information like user credentials, credit or debit card details for payment, etc. which could easily be stolen by thieves during it is sent by the customer to the server or the other way around if there are no encryption methods employed.

It is completely your responsibility to keep your customers' information safe and confidential. By utilizing an SSL certificate to enable SSL encryption not only makes your website's data but also your customers' private information well encrypted and thus becomes unreadable to anybody to steal your data.

 

Customers' Loyalty

The security of the private information especially credit or debit card details has always been the biggest concern of e-shopping customers because of the hacks and identity thefts happen every day. Consequently, customers are being quite careful while making online purchases which ultimately leads to the sales of your e-commerce store. If you are not able to convince your customers that their payment-related information is protected, then how can you expect them to trust you and buy products from your e-store?

 

With SSL enabled, your customers will feel a sense of protection and thus end up coming back to your website for future purchases.

 

How to Know if a Website Uses SSL?

There are 3 instant ways to find whether a website has an SSL certificate or not.

 

1. Look for a green colored "lock" icon in the address bar

2. The website URL starts with "https" instead of "http"

3. You can also check using SSL Installation Checker tool

 

Depending on the usage of SSL by a website, the above points may not be applicable to every page. Earlier, this wasn't the scenario. The Internet Standard was that the SSL certificates were limited to domains or certain pages where private information like payment-related data is sent or received.

 

But, when in 2014 Google announced that as the website security is a top priority for them that is why they had started using HTTPS as a ranking signal. Which means that a website having an SSL certificate had a greater opportunity at ranking higher for a search compared to the website not having one.

 

This has changed the whole picture of having an SSL certificate. Instead of securing just one page, store owners have started encrypting their websites with full SSL certificates, replacing their URLs from "HTTP" to "HTTPS."

 

How to Know if You Need an SSL Certificate for Your Store?

Well, by now you might have understood the need and importance of an SSL certificate for an e-commerce store. But, how to know if your store needs one? It's simple if your website doesn't require any kind of sensitive data then you may not really need one. Because the only thing that excludes store owners from having SSL certificates is the usage of offsite payment processors like PayPal.

 

If someone or you making a payment through PayPal then PayPal is responsible for keeping your financial data secure and safe. In such scenarios, you don't need an SSL because the information is never stored in your database for someone else to steal it.

Usually, offsite payment processors often have their own security systems and methods to safely process the transactions. Hence you don't need an SSL because they will have it covered.

 

Another scenario is if you don't allow your customers to create accounts (no username & no password) of any kind on your website then in that case too you wouldn't be needing an SSL. Which means unless you disable this account functionality on your website, you will need an SSL certificate to secure those accounts.

 

How to Get an SSL Certificate?

Well, there are lots and lots of websites who provide SSL certificates within no time. Some of the popular ones are GeoTrust, Comodo SSL and RapidSSL, There are different plans and pricing for certificates so before you purchase one , spend a few minutes correctly choosing the one you need.

 

To protect your customers' data and expand your business, it is extremely important to use an SSL certificate. As there are many providers of SSL, we recommend you to choose a reliable web host at an affordable price.

Continue Reading

Everything About WhatsApp Sharing Data to Facebook

Since the day WhatsApp introduced the end-to-end security encryption to the messages, the respect over this messenger has increased among people and they even protested against governments that wanted to channel all the messages under their watch for security purposes.

 

Privacy is a big thing than the system and the government here. Facebook, after acquiring the world’s largely used messenger (WhatsApp), have brought significant changes like the blue ticks, end-to-end security, document sharing and revised the number of people limitations for groups.

 

Recently, WhatsApp made changes to their terms and conditions that share the chats and phone numbers to Facebook for improving your Facebook ads and product experiences.

 

What’s wrong? Why would WhatsApp share data?

WhatsApp chats and your phone number are the private data. The main aim of end-to-end encryption is to provide that privacy to people and their conversations. If that private data is shared to improvise the marketing strategies of super node Facebook, privacy should be compromised internally.

 

WhatsApp is no more an individual company. Facebook acquired WhatsApp and now it is a child company. Facebook has authority to take any decisions about the WhatsApp now.

 

However, the private chats and phone number would not be shared to anyone outside the corporation. The data is not sold or leaked to any other company or organization. It will be kept secured encrypted within the WhatsApp and Facebook servers only.

 

whatsapp-share-data-to-facebook-option

 

You would see this option on your screen when opening WhatsApp. It says,

 

Share WhatsApp account information with Facebook to improve my Facebook ads and product experiences. Your chats and phone number will not be shared onto Facebook regardless of this setting.”

 

This means, unless you opt-in this option, WhatsApp will not share its data to the Facebook for better marketing. It also means that they would be sharing your phone number to the brands. If supposedly not shared with brands, the phone numbers might be used to notify you about their advertised products.

 

Didn’t understand? Let’s talk about some examples

Example 1: Let us suppose that you are chatting (WhatsApp) with your friend about the wedding shopping. The chats will be shared onto Facebook and analyzed. The analyzed data will be matched with their advertisers' demand by their marketing team. Then you would be shown the sponsored posts on Facebook newsfeed related to the products specifically that you were talking about with your friend.

 

Let’s consider that you were talking about the wedding jewelry. When you log in to Facebook and scroll through the newsfeed, you will be shown the ads for wedding jewelry. 

 

You will also be getting SMSs related to the jewelry products from Facebook about their advertisers.

 

Example 2: If you are searching for best smartphones under some budget say $200. You will be shown the sponsored posts on the Facebook newsfeed with all the smartphone phone ads.

 

This happens generally because of the safe cookies and the search analysis of your queries on Facebook. This sort of usage stats are being gathered without our notice or as the part of terms & conditions.

 

This is not new to us. They are just expanding the reach

This marketing strategy is not new to us. Even search engines do the same through the safe cookies. Facebook also does the same by taking the information from these cookies.

 

Remember, you would realize Facebook showing relevant ads in the newsfeed. Never mind if you don’t. I will give you an example screenshot.

 

facebook-sponsored-ad

Pic: The above screenshot is from Facebook

 

The Titan company page admin might have bought ads focusing the keyword for watches. I was watching for the watches a day ago and this comes up on my newsfeed. The purpose of the WhatsApp sharing the data Facebook relates closely to this.

 

How does sharing  WhatsApp chats data and phone number help them?

It’s simple. Collecting more data will increase the productivity by increasing the advertiser’s target accuracy and in turn earns good ROI.

 

For example, if you and your friend are talking about a new pair of shoes for the next week’s bday party and you don’t do much Facebooking. When you login for one in thousand reasons that day itself, you won’t be shown the sponsored posts of relevant products and ads. It won’t help you as well as Facebook as you won’t be interacting to them. 

 

#Take a minute to understand the logic. I’ve all the time in the world.

 

To tackle such situations, Facebook takes the data of your chats and brings up the relevant ads on the newsfeed (like as that Titan sponsored post that I shared above).

 

Should you stop sharing data to Facebook?

Are you interested in getting relevant ads for your chats?

 

If you answer ‘Yes’ to this question, you should opt-in to share your data. If it’s a ‘No’, just opt-out.

 

There is a possibility that Facebook might bring textual sponsored messages intruding into your chats in the middle of something like the online dating apps do suggesting the premium membership while chatting.

 

WhatsApp had promised that it will not introduce the ads in the form of banners. That is not everything. The creativeness of advertising and marketing may take any forms. It may take the words that you type (keywords I mean) and turn it into hyperlink pointing to the advertiser’s link Hike do it for inserting emoji’s and stickers.

 

So, it’s all about your priorities. The privacy may be compromised but not the security.

 

How to block WhatsApp from sharing data to Facebook?

The sharing of data is not a knife on the neck. You can opt-out from sharing your chats and your phone number. There are two ways to do this.

 

Method 1: You can opt-out by unchecking the checkbox when it shows on the screen about their new terms & privacy policy. It would something look like this,

 

whatsapp-share-data-opt-out

After unchecking it, just click on Agree to continue using WhatsApp as usual.

 

Why would you need to click agree even after unchecking? Is it a trick?

No. Not at all. Whether you agree to share your data or not, you have to agree to the terms and policy updates of the product in order to use WhatsApp. This would be common to any application.

 

Method 2: Go to Settings > Account > Uncheck the option ‘Share my WhatsApp account information to Facebook..”

 

Just a second

I hope this long post has helped you understand the corporate operations behind the companies. Opting in or out is still your own decision.

 

Share this to your social media timelines to help your friends also understand this. I would consider that your thankfulness for my efforts I put here in this article.

Continue Reading

10 Tips to Prevent Yourself from Online Scams While Looking for Jobs

Wondering how to look for a job online? Today, the advent of the internet has made our job-hunting process easier a lot and now we can find amazing job offers online sitting in the comfort of our home moreover, can go for the one that perfectly suits our personality and preferences. The modern day and age is bringing a myriad of opportunities to ease our living.

Well, don’t get excited. This is just one side and as we always say, ‘Every coin has two sides’ same is the case here. Undoubtedly, there are a number of legitimate and stable companies that provide an exciting range of job offers with the help of telecommuters. However, there are many fraudulent companies or unscrupulous individuals who scam thousands of job seekers.

The trend is growing at a rapid pace and there are many cases of scams that we come across daily. You might be surprised, that how these scammers get into your computer to steal your money and identity? Well, the answer to this question is hard to find, because of a number of ways that enable the scammers to offer great job and employment opportunities.

As we can see today, millions of people are looking for the jobs from homes to make their livelihood easier and happier, therefore, in order to trap the job seekers they majorly deal in the areas of home-based and business opportunities.

It has become a common practice of the crooks to defraud thousands and thousands of job seekers by making use of the latest and hi-tech schemes combining with the old ones. This is the surest way to make you fool to get out your personal information as well as your money. In the case of job scams, all our information related to personal, financial, identity theft and credit are on the line.

You never know, you might be their next victim. So, get ready to save you and your friends from such type of real online job scammers. Have a look at the 10 tips on how to prevent you from scams while looking for work online.
Internet Lottery

1. Avoid providing your personal information

No matter what the case is, it is always necessary that we should not disclose our personal details to any person unless or until we do not have surety that he/she will not misuse it. This can leads to identity theft. Review this article to find more on that topic. When applying for jobs online be aware of the questions that are the big red flags. Never impart your social security number and home address to anyone at your initial contact because it is hard to distinguish whether it is a legitimate company or a crook. Be cautious and do a proper research about the company.

2. Get help from the social networking sites

Asking someone about the company is not a right step to clear your doubts. To make you feel satisfied, sign up for a reliable site such as ‘FlexJobs’ to get daily updates related to the number of work options that are home based. This will prove to be an excellent tool and surely guide you so that you can make a difference between the real online job and a scammer. Never make a decision in hassle; this will put you in trouble. In order to get the right job, always put your best foot forward at the times you are searching for the job.

3. Go for the one that sounds too good to be true

While looking for jobs, it’s very often that we come across the ads that offer much more than our expectations and we get attracted towards such advertisements. Have you ever wondered that how it can be possible that someone is offering us annual salaries of $50,000 a year even without asking about our skills, prior experience and education? Do not response to such ads and look somewhere else to find the perfect job that meets your needs.

4. Never share your Bank Account Details

As we all know, Bank Details are the most crucial details that we should not discuss with any new or unknown employer. Though, direct money transfer is the most efficient technique that we all are enjoying today. However, to save you from the job scams don’t agree to share your bank account details with any third person whom you don’t trust. Feel free to grant access to your account, if it is legitimate.

5. Reject the Jobs with no expertise required

We often get many emails and job postings where it is clearly mentioned that no experience and expertise is required. Do you really think there is any firm that will hire you without even bothering about your skills and experience? All legitimate job offerings include some sort of requirements (education, skills, and experience) are essential to qualify the job posting.

6. Do a background check of the scammer

Before you make any decision, it is advisable to think twice and more in order to find out the status of the company. False Job Postings promises you for easy money, but it is up to you whether to jump into it without making any proper research or to protect you from job scams or schemes. To get the best job and to save you from the job scammers, harness the power of the internet.

7. Avoid making payments to get the job

There are a number of scam companies who take money from the candidates and then disappear. It is illegal to ask money from the job seekers in order to help them get good jobs. Never pay upfront for a promise, these are the things that are the signs of warning. Be alert of any recruiter who promises to provide you job leads.

8. Say ‘NO’ to Jobs with vague Job requirements

How to make a difference between the real email and the scam one is the biggest issue that we face. Well, the points that will help you to say ‘NO’ to the scam emails will include things like ‘Age must be 18 years old’, ‘Must be a Citizen’, ‘Do you have internet access?’ all these are the ridiculous questions that have nothing to do with your job. The real job always includes questions that are relevant to your qualification, Skills, and experience.

9. Ignore the emails containing unsolicited Job offers

Sending unsolicited job offers is an old trick that is used by the scammers for long. If they have sent you an email that seems to be well-written then don’t get trapped. If the email contains a legitimate address with the company’s original email site then you can trust it. But, if it is the one with the free email site, then do not pay attention to it, just ignore.

10. Stay Away from the marketing gimmicks of the scammers

If you find some amazing testimonials then don’t get impressed. These are designed specially by the scammers to grab the attention of the job seekers to make them fall for the scam. Scammers are often caught making such false money back guarantee policies by the real job companies online.

All the above-mentioned tips will definitely help you to keep your guard up moreover, to bring crooks to justice.

Not only this, if you have experienced Identity theft which is the most common practice by the fraudulent these days, then take a corrective measure at the right time to prevent you from online fraud and identity theft. It is the crime in which hackers misuse your personal information through various methods such as Data Breaches, Skimming, Unsecured Smartphone, Phishing and more.

To put a stop to identity theft in the first place, always use different passwords for your every account which must contain at least 8 characters along with letters, numbers, and symbols. Always try to use cash instead of Debit and Credit Cards. Moreover, avoid giving your personal information to the unsolicited callers to save you from identity theft.

About Author:

Andrew Gordon is a general content writer usually writes about the current events & news. Everyone expect usable information from content writers. He provides as much of that kind of information as possible. His Favorite quote is “Become your best. Share your best with the world!”
Continue Reading

Avoid Content Theft on Your Website by Using Simple CSS3

If writing the content is one side of the coin, protecting it from being copied lies right on the other side of it. Copying content would actually involve in selecting the text on the webpage. This can be blinded by using CSS3 to the content copier which annoys him while doing the theft.

Note: Content on the website can be copied in many advanced ways. Selecting the text with the mouse and copying content is the most traditional way of copying content. This tutorial is for beginner bloggers and website owners who don’t have much idea about the defensive mechanisms in protecting the content. This technique might not help you at fullest of its purpose. So, we recommend you to go for DMCA Takedown services if you are pretty serious about your content.

avoid-content-theft

CSS3 have a selector named ::selection which can be used to style the selected text on the webpage. Using this selector, we can change the color, background, cursor and outline of the text. This selector was removed before the CSS3 recommendation status and can hopefully be added in the future version recommendations. However, this works well on all major browsers (with down versioning limit).

How it works?

As I told you in the above line that it can style color and background of the text, we are going to use the same properties to create a blind spot in the selection.

What is blind spot?
Blind spot is nothing but making the visibility of the text to zero using ::selection selector. For that, we use both the color and background properties.

Here is what you should do

Observe the following piece of code, I’ll guide you how to customize and install it on your website.

<style>
::-moz-selection { /* Code for Firefox */
    color: INSERT YOUR FONT COLOR ;
    background: AS SAME AS FONT COLOR;
}
::selection {
    color: INSERT YOUR FONT COLOR ;
    background: AS SAME AS FONT COLOR;
}
</style>

Add the color of your font on the webpage to both the color and background properties. This creates a mono-color selection style hiding the text within, thus creating confusion to the copier.

Add the above piece of code in <head> section of your website so that it will load up before the content.

Psych tip: Actually, copiers have less patience, that’s why they prefer the 30 sec copy-paste job to the 3-4 hours article writing one. So, If you could annoy him for 30 seconds at least, they will fly off your website.
Continue Reading

Why Should You Use VPN as a Serious Blogger?

Virtual Private Networks and blogging are closely related to each other. Blogging, being an online activity would need the anonymity to the internet bots (either good or bad) to hide the preferences and browsing habits which could influence and manipulate the SERP at your end.

 

If you are a blogger and you have spent some time on searching and doing research on the topics that you are writing on, the ordering of the results on the SERP will change positions based on the cookies that were saved on to your computer.

 

The cookies are the most misleading elements of networking when it comes to the intelligent search engine algorithm analysis.

 

It might benefit the search engines to improve the user experience as a user but will effect the recording stats of your SEO strategies as a blogger.

 

You would so need to connect to the internet to blog through a mediator server that cannot be tracked by the search bots.

 

If you have ever noticed in the Google Analytics about the unknown/encrypt incoming searches or its sources, you would have got my point by now.

 

Why VPN? Can’t I use a proxy?

Though they work similar up to some extent, VPN and proxy are two different network models that have their own benefits and losses.

 

A proxy server will definitely slow down the speed of the internet access no matter how much speed your internet connection can bare.

 

Also, a proxy can only bypass the restriction of the content and websites that were imposed in the area/country. It cannot provide the encryption at full extent.   

 

And most importantly, a proxy cannot virtually add the device to the private network of the office or an organization from the remote computer(computer at your location).

 

A VPN on the other hand will not only secure and protect the privacy of the user connected but also removes the geo-restrictions of the content on the internet. It allows to connect to the office network securely and allows the access to the content on the network safely. You can see secure SSL VPN demo from this page.

 

 

Using VPN as a blogger

Blogging involves a lot of research before writing. It takes lot of time skimming though the content, digesting the facts and sorting out the content points.

 

1. The time you spend on the computer will hint the user behavior cookies to sort out the SERP results. (Yes! I’ve said that before).

 

2. If your blogging platform considers the location that you are posting from, restrictions might be imposed on content based on the location. In other perspective, some blogposts with locations tagged locations are checked against genuinely by the search engine algorithms.

 

For example, If I have posted an update about Apple WWDC event tagging blogpost like as posted from San Francisco, the cookies in the local computer will check and determine the authority scores in ranking it on the SERP. (Yes, that’s an unknown analysis paradigm of search engine algorithms)

 

3. If you are blogging some serious content over the public hotspot or shared network, that content that is being composed/drafted can be eavesdropped by the hacker (probably the competitor blogger). The safety matters here.

 

4. If everything has to be recorded, communicated and shared along with the office  mates in office network and you are not in the office, a virtual private network helps you connect, share and communicate.

 

If you are a serious blogger and is looking for some serious and premium VPN software, NordVPN is the one you should checkout

 

What do you think? Let me know your thoughts about it.

Continue Reading

How to Protect Private Data from Hacked Myspace Account

Myspace login accounts were compromised by a suspected Russian hacker group and made them available in the hacker forum. The notification is officially sent through email by the Myspace team with instructions to safeguard the account. I’ll be walking you though the process of protecting private data from your Myspace account in this article.

 

This is not he first time Myspace has been under attack. The potential threat to the Myspace is the out casting of the accounts for longer periods. Hackers who have been observing the decimating of the Myspace social networking platform had exploited some attacks recently where they revealed the private data of the users on hackers forum.

 

Like any social networking platform, Myspace also have the user privacy protecting mechanisms if which are not taken care will turn against their own will. If you are having a Myspace account and though you are not using it anymore, follow these tips to keep your private data more secured and non-hackable.

 

myspace-accounts-hacked-2016

 

I have no much details on my Myspace account. Should I still worry?

 

Don’t settle down with ‘No much details’ thing. Anything that has to be seen behind the password wall is a protectable detail.

 

Follow these steps and take recommended actions to protect private data from hacked Myspace account.

 

1. The first and foremost action to take it to change the password of your Myspace account. Because it is the first door to step-in for the hacker. It at least blocks the hacker from accessing your account another time.

 

2. Set your profile accessing permissions to private. Do not allow access to public visitors to see your profile. Go to Settings > Privacy and set the Profile Privacy to Restricted Profile.

 

restricted-profile-settings-myspace

 

3. Myspace’s ad-technology uses your personal and registered information to deliver targeted ads based on your interests. Choose not to receive such emails as they can pose more threat to the personal information if their ad-technology get hacked.

 

Go to Advertise from the Privacy options and select I do not want to receive

 

4. If you are no more using the Myspace account and you don’t want to delete it, better remove the photos from it rather than leaving them for predators – especially ladies should take care of this.

 

5. Also remove the profile information like the place you live and phone number if any given. Make sure the hacker won’t get access to your contact details which can worsen the situation.

 

In case of precise security measures, removing photos from the profile also helps you protect the private data from a hacked Myspace account.

 

Hope that helps!

Continue Reading

Beware of Ransomware! Prevent, Protect & Recover Your Data

Ransomware might sound a new word for some of you. It is one of those blackmailing software programs that will get installed on computers silently and takes control of the data on them. Unlike malware, adware and other kind of viruses like Trojans, Ransomware programs will not exhibit any misbehavior of computer software programs but will demand for money.
 

What is this Ransomware? Why will it demand the user for money?

Ransomware, being installed, once installed, will encrypt the important data on your computer/network without asking for your permissions and will blackmail you in order to you to access the data by decrypting. A window or notification which cannot be closed will be displayed on the screen showing a countdown clock giving you the time to pay the money to safeguard your data. If you neglect, you data might be deleted or never be restored again.
 

Encrypting the data? Doesn’t that mean my data is safe?

You data will be safe as long as you have control over the encryption and decryption procedures. How could it be safe if it is encrypted by some unknown person leaving you no way to decrypt unless you pay some money in return?
 

How a computer can be affected?

Ransomware takes different forms. It will not enter into your computer just like a software program.
 
Via Emails – Hackers will try to inject the program as an attachment in email with different file extension which will be exploited once the file is downloaded and tried to open.
 
Via Security Loop Holes – Hackers will be hunting for the security loop holes to inject the virus programs into our computers. That’s why software vendors advise users to regularly update their software with new patches and upgrades.
 
Via Freeware – One of the major virus transmission media is the freeware. Hackers consider freeware software as the potential method to spread viruses to take control of users’ computers. After all, not all freeware software programs are virus prone but, be careful while downloading them from source.
 
Via Cracked Version Software/Game – Only 30% of the computer users buy software genuinely. All others just download them from internet. A computer means only the hardware for most of the people but software is the one that costs 10 times more than an average computer.
 
A cracked version of the software/game of game might give you full access but it also brings many security risks along with that. Remember that your anti-virus or firewall programs are not invincible enough to block every attack and data slip.
 
A recent ransomware attack exploited the popularity of the game Minecraft by offering a “mod” to players of Minecraft. When they installed it, the software also installed a sleeper version of ransomware that activated weeks later.
 
I wonder if you are not thinking about the reason why the IT industry discourage the using of some popular legacy software programs like Windows XP, Adobe Flash etc.

How to know if my computer is infected?

 
ransomware-example
 
Ransomware is not stealth-ware. It exploits right away at the time it enters the computer or exploits after some time like ‘mod’ ransomware of Minecraft. However, you will be able to see a window or undeniable notification opened with a countdown timer. So, better not search for it and delete other files in suspicion by mistake.
 
You will be given instructions to pay for the hacker to decrypt the files which would be notified to you in time.
 

My Computer is infected. What to do now?

Before you scream it out, ask yourself the following questions,
  • Do I have any important data on the computer?
  • If my important data is still accessible?
  • Do I have a backup of the data? If yes, to what extent?
The above three questions answers your tension about this kind of virus. Generally ransomwares uses RSA 2048 encryption technology to encrypt the files on the victim’s computer. An average desktop computer will take 6.7 quadrillion to crack the 2018 bit RSA key if run without turning it off.
 
Not only you, the ransomware countdown timers also won’t wait till you develop a crack for the encryption and build a super PC. So, there are limited options for you now.
  1. To wipe all the data on your hard disk and make it new again
  2. To safeguard the unaffected data onto another safe drives (preferably cloud drives like Google Drive, One Drive and so on)
  3. To restore the latest backup
Before you take any further step, make sure to take the following actions in order to avoid spreading or re-affecting of the ransomware.
 

Action #1: Disconnect from network

Disconnect the infected computer from the network to avoid the further spreading or damaging of data on the other computers on the network. Ransomware can easily spread through shared files, folders, networks and USB thumb drives.
 
Cloud storage drives might restore the data as they maintain better security measures to storing the data from millions of users. For better recovery results, better to disconnect even though not connected to any network and only connected to internet through modem.
 

Action #2: Calculate the scope of recovery

Some files may not be affected because of the security programs you are using to lock or encrypt them. Check the list of files that you can still access and move them on to cloud drives or another safe drive as a precaution.
 
Some ransomware will list the encrypted files in the registry. This might help you separate the affected files and programs from the unaffected ones. Search on the internet for better knowledge of the ransomware that is installed on your computer.
 

Action #3: Check for security holes on your network

In general ransomware does not spread over the network like other malware programs. They will only encrypt the files that has direct access to. If you see the ransomware spreading through the network on all/any other computers, it means that your network system has got some security loop holes. Better take care of it first.
 

Wrapping up with a solution

The best solution for ransomware infection is that restoring of the backup. It is the ideal solution that gives maximum best result than trying out 3rd party decrypting software. If yours is an organization or a company, backup is an essential security mechanism that you should afford at any cost.
 
Try to restore files from backup at most extent. If you have not taken any backups, you may have to lose some money or data itself. If you have no important data in the computer, try to wipe it off completely (not formatting). Wiping off the data will erase the file table on the drives and cleans the hard disk as new as it was when bought.
If you even can’t wipe off the data or the encrypted data is important and it is the only copy on your computer, better to take a step down and pay the hacker for decrypting them. Because data is the only weakest asset of any individual or company in digital era.
 
Once the data is restored or recollected, take precautions for the next time. Use the best security programs and take regular backups to other secured computers or cloud. Train the employees in case of a company. Research and make a list of ransomware programs and block them right at the firewall. Keep the anti-virus- anti-malware and anti-spam software updated with latest definitions and never ever try to use patched security software.
 
There available some ransomware decryptors developed by popular security software organizations like Kaspersky and Cisco to fight specific ransomware programs like CoinVault, TeslaCrypt and Bitcryptor. Let’s hope the other security software companies also come forward and develop better solutions to keep our data safe.
 
Wish you a #SaferInternetDay
Continue Reading

How to Remove Your Phone Number from True Caller Database?

Being identified is not good every time. When it is on True Caller, it is more frustrating. True Caller, having the major database of phone number identities serves better at sometimes and stealing privacy at most of them.

Its purpose, to find the details of unknown number owner is fulfilled when it comes to cyber threat and related cyber cases. When it comes to privacy, it scores almost zero. Let me tell you some story lines that will make you understand why True Caller is a total loss of privacy - Mr. Somebody who is a popular guy in his town who is often getting unknown calls from both the love and hatred. He bared this non-sense for a month and he thought can’t take it any more. So he decided to change his most liked and chosen number 9988776655. He was happy after changing his number and two months passed. He got some new contacts along with the new ones this time. The unknown phone calls increased and finally made him quit using a mobile phone.

The solution for such a problem is not the quitting using mobile phones, but quit being listed in True Caller database. True Caller allows to find people by name or phone number. This feature not only annoys famous one, but also individuals who wants to hide their phone number details. What if it happens in case of a girl? what if someone could easily get her number and start teasing?

true caller phone numer removal

As the number of True Caller app users are increasing day by day, protecting our numbers from being recorded into their databases is impossible. So it is better to remove it ourselves. True Caller officially allows users to request for the removal of their numbers from their database. Let’s see how to.

Requesting a removal

To request a phone number removal,

Step 1: Open the link http://www.truecaller.com/unlist in another tab.

Step 2: Enter your phone number that you wanted to be removed and enter the capcha code and click ‘Unlist’ button.

Step 3: That’s it you’re done! Just wait for another 24 hours from now on and check it in True Caller search after that.

If anyone searches for your number, they would get ‘0’ results displayed. Isn’t it simple?

Note: On the good side, Truecaller is a very good app that helps us know who is calling. We actually don't pick up everycall everytime due to some busy-ness but, some calls are yet to be answered anytime. Hope that explains everything on teh positive side of it.

Continue Reading

Essential Guide to Avoid Major Online Hacks and Scams

The question about online security does always finds a new security vulnerability from time to time. The so called safe SSL has found serious vulnerabilities named as heartbleed bug in the past. The default internet browser, internet explorer of all versions has also been found vulnerable by Microsoft itself before hackers exploit by using it. It was said that the bug that is found in internet explorer is also a deadly vulnerability. Microsoft responds to the issue quickly and releases a patch including for Windows XP.

Though you install the powerful anti-virus on your computer and use strong firewall rules, you cannot stop this unless you get some awareness about the type of attacks and how they are executed.

As a part of our self-claimed responsibility, Amfas Tech always tries to bring awareness about the online scams, hacking, computer, mobile and online security issues from time to time.

Let us see some major type of hacking techniques used by the hackers on internet along with their preventive measures at their best.

Online Scams – Hackers always feed on victims ignorance and desire to earn easy money online. We have also seen some famous online scams in the past while we are discussing about the online security. Of them, email scammers are most famous ones. You cannot expect to stop receiving these kind of emails because of the security vulnerabilities in the technologies.

There is a misconception that the victims are old aged people but the statistics show 30% of those victims are youngsters under 30 years of age.

Online-scams

There is a cyber crime control center, the Internet Crime Complaint Center (www.ic3.gov) that works along with FBI(federal Bureau of Investigation) and NW3C(National White Collar Crime Center) to eradicate these cyber hacks. In 2013 alone, quarter million complaints were were registered as per the annual crime reports of IC3. What about those who never complained and those who don’t know how to?

Rather than clicking links in emails, book your frequently used website links like insurance company, bank etc.., and use those bookmarks every time you visit that site.

Don’t fall for the unknown lottery ticket and fortune transfer scams. Think about it a second before you respond to them. How could you think an unknown person would transfer his million dollar fortune to you? Be smart!

Phishing – We have talked about phishing so many times in the past and also have seen demonstration of how can a facebook account can be hacked using the technique. The theme of the demonstration is the reason for the major icloud hack that happened on famous celebrity digital devices in the recent past. Can you think that a device which is protected by the secure protocols and powerful encryptions technologies be cracked simply? No! never unless you are careless.

phishing
In the case of icloud hack, there is nothing wrong with the Apple side but the user’s. The celebrities have fallen to the phishing links and the world started blaming Apple. A phishing site is actually an imposter of the original website to snatch the sensitive details like credit card information. The hacker designs the website to look like the original one and baits an email to the victim. The victim then hurries to keep his/her account safer which is not actually.

Do check the URL of the site twice(including the spelling) on which you are going to punch your sensitive data like password and credit card information. Use 2-step verification process to make any transactions online. Using mobile and email verification codes makes it harder to hack.

Generally, sites that take credit card information would be secured with SSL security over HTTPS protocol. Also check for it before you do any thing drastically.

Massive data Breaches – The above two methods practiced by hackers focused on an individual victim where as the massive data breaches costs the privacy loss of number of individuals collectively. Hackers target POS systems to hack the data in bulk. Computes at retails stores and small companies should be protected against such breaches. The recent “Backoff” virus is a pure proof of vulnerability in POS systems. The recent hacks of Home Depot, Target and other major retailers have compromised millions of credit cards and revealed their information.

Hackers will sell the bulk hacked data in internet forums to those who are willing to buy. The recent happening of Russian hackers selling out millions of Gmail IDs along with passwords on the internet has been found to be one of the major hacks of the year 2014.

So as to keep the databases like retail systems secured, Microsoft have already suggested businesses to upgrade to latest operating systems in the past. But still number of businesses cannot afford to get an upgradation. Also, it is necessary to host your data in secured dedicated servers that serve data on proper authentication only. The reason why I said dedicated server is because there should be no sharing of computing and storage resources that may raise conflicts in case of wanted security to your data.

Upgrade your businesses to secure servers. Choose a right company that can provide you right solution to keep your data safe. Because maintaining security of data is showing your loyalty to customers.

Using very unique transaction passwords and monitor your credit card and financial statements from time to time might help you keep conscious at least about the hacks.

October is awarded as the National Cyber Security month by the FBI of San Diego division this year. Regarding the event FBI have advised to implement some security measures to keep yourself safe online. Go through their instructions also to learn more about online security.

SingleHop, the cloud hosting services company took a campaign to spread the word of online safety and has been encouraging bloggers by providing necessary useful information in PDFs to spread the same through their blogs.

Amfas Tech wishes all the best to SinlgleHop and we’re proud to be a part of the campaign. #StaySafeOnline.
Continue Reading

Mozilla Blocks All Versions of Adobe Flash by Default as Security Vulnerabilities Found

Yesterday, Alex Stamos, the new security officer at Facebook has tweeted about Adobe to announce the end-of-life date for Flash software and its plugin for browsers. He made that statement with very strong base of software vulnerabilities that were found in recent times with Adobe Flash software.

 

 

Later today, Mark Schmidt, the head of Firefox support team has also tweeted about the Flash’s security vulnerabilities in their browser. He says that the Firefox browser now blocks all the Adobe flash related software plugins by default.

 

 

It is recommended to check updates to the Firefox plugins for safety. As per the add-ons blockage news, All users who have the Flash player of version 18.0.0.203(click-to-play) are affected.

 

image

 

We have seen Mozilla Firefox blocking vulnerable plugins like Java and others to make sure of the security of the user in the past. The blocking of Flash somehow smells fishy and it may not be temporary unless Adobe patches those serious security holes.

 

What is happening with Adobe Flash actually?

Adobe Flash plugin can be hacked and unnecessary pop-ups and flash animations can be run on the victims browser to distract or to bait a click that can snatch the browser or personal data to the hacker.

 

It also affects your Firefox browser’s stability, user experience and performance causing frequent crashes and downloading of unwanted malware directly on to the user’s computer.

 

What to do?

Stay tuned to software updates from both the vendors. Both the browser and plugin are to be updated in this scenario to mitigate risks and fill the security holes.

 

Out of the box, keep the virus definitions updated in your anti-virus software that is installed on your computer.

 

Contact the Mozilla support team in order to keep track of updated information about the issue(s).

 

Do you think that the flash should be stopped using forever? Share your thoughts in comments below.

Continue Reading

Hide My IP Software Review: The importance and need for IP hiding

IP address is your unique identity on the online planet. Anyone can easily identify your location based on IP address of your connected device. Showing up your IP address publicly will has its adverse effects on both sides of the situation.

 

Some websites in the internet cannot be accessed in some countries. Because of the restrictions posed by their governing laws, you would not be able to access those websites freely or completely. As internet connects people with the rest of world, irrespective of the countries, there is a need for unrestricted access to websites.

 

All the banned websites are not actually bad websites. For example, Google was banned in China as the country thought that it violated their laws. That doesn’t make Google a bad website for the rest of the world too. Visitors of China would want to access the Google’s website which they cannot and it would be hard for them to switch to any other search engine all of a sudden. This brings up the necessity of hiding of IP address.

 

Also, when you connect to internet, some applications and software might track down your location and can manipulate the results that suits for you. This open book online activity creates a vulnerability on your side and a sweet spot to hackers. If you remember the flying ads on some websites saying that some [local name of a girl] is waiting for your in [location], you would understand what I mean clearly.

 

What is Hide My IP and how to download it?

Hide My IP helps us to hide/mask our IP address on the network with fake one’s and enables anonymous web surfing by encrypting our internet connection thereby protecting our privacy.

 

Features of the software:

  • You can surf the web anonymously
  • Protects your identity online
  • Encrypt your internet connection
  • Prevent the government from spying on you
  • Send anonymous emails
  • 30-days money back guarantee

Hands-on the application

Downloading and installing the application has no strings attached. I’ve not faced any hiccups in installing the application on my PC.

 

When run, Hide My IP shows up the real IP address on the network along with the safety masking/encryption options.

 

shows up real IP on start up

 

Choose you IP rotations, location and click Hide My IP button to start hiding your real IP address. It would then show up with you new and fake IP address like as shown in the following screenshot:

 

fake IP

 

You can even configure the software for different browsers. Click on Advanced Settings and it allows you to choose the header privacy and SSL encrypted connections.

 

browser settings

 

Hide My IP even allows you to control the IP hiding for web browsers and internet applications alone. It even allows you to run this software for specific applications.

 

With Hide My IP, you can,

  • Hide your real IP on computer startup itself
  • Rotate IPs for more security
  • Clear cookies on changing to new IP address
  • Control browser header privacy
  • Encrypt the connections with SSL
  • Choose a desired fake IP location
  • Control the program’s integrity with the some applications specifically

You can buy and download Hide My IP from this link.

 

Download trial version

You can even download the trial version of this application that allows you to use the software for 7 days without any restrictions to the premium service.

 

Share your opinions on the software after using it. We’d be happy to hear your thoughts on this.

Continue Reading

LastPass Account Got Hacked? Here Is The Safety Guide

LastPass, the online login credentials safety vault was hacked yesterday and the team notified the issue to their users through an email. The email says,

 

We wanted to alert you that, recently, our team discovered and immediately blocked suspicious activity on our network. No encrypted user vault data was taken, however other data, including email addresses and password reminders, was compromised.

 

We are confident that the encryption algorithms we use will sufficiently protect our users. To further ensure your security, we are requiring verification by email when logging in from a new device or IP address, and will be prompting users to update their master passwords.

 

lastpass-hacked

 

We apologize for the inconvenience, but ultimately we believe this will better protect LastPass users. Thank you for your understanding, and for using LastPass.

 

Regards,
The LastPass Team

 

They are pretty much confident about their encryption algorithms in protecting their users. However, they recommend the users to update their master passwords.

 

Besides updating the master password, there are certain things that you better know about, to ensure more security of your LastPass account.

  1. LastPass, as they claim, implements very good encrypting algorithms to secure their users accounts. They have intelligently designed cyber attack response system which raised the alarms this time.
  2. LastPass don’t have access to users’ master password. They use numerous rounds of complexity to their hash algorithms making them difficult to be hacked.
  3. The guess attacks will not crack LastPass’s algorithms. The unique string inclusions in encrypting the algorithms helps them keep these kind of attacks go ineffective in the beginning itself.
  4. Though the attacker guesses your weak master password, you data vault will not be exposed to him. He then will be asked to complete email verification(because login from a new IP address or location triggers the security breach alarms and activates the counter measure instructions).
  5. Do not use your master password for any other website.
  6. Enable multifactor authentication for your LastPass account for added security features. To enable so, go to your LastPass vault > Account Settings > Multifactor Options.
  7. Never disclose your master password even to LastPass team.
  8. Check LastPass security updates on their blog. Emails might be misleading.
Continue Reading

How to Secure Your Website from Hackers

This guest post was contributed by Caroline on behalf of Secure Thoughts, one of the best possible online sources for information regarding internet security.


 

Hosting a website can be very useful in the Internet Age. But if that website is not protected, then you, your data, and the data of your visitors, clients, and potential clients is in danger. Thus, keeping your website protected is of utmost importance. Fortunately, there are simple steps that can be taken to protect your website from these hackers:

 

How To SecureYour Website From Hackers

 

Stay Updated and Up-To-Date on Everything

Staying updated and up-to-date is the most important and simplest means of protecting your website from hackers. But staying “updated” means several different things:

 

First, stay updated with the latest news and information regarding the most current hacking threats. You can do this by paying attention to trustworthy periodicals, websites, blogs, podcasts, and radio programs that focus on the nature of hacking, current hacking threats, and computer security. By doing this, you will be better aware of the dangers threating your website and will, thus, be able to take proactive measures to prevent being hacked.

 

Second, because hackers are constantly devising new ways of infiltrating their target, it is necessary to keep all platforms and scripts up-to-date. After all, platforms and scripts are often times updated in order to better protect the user from these destructive and hostile invaders.

 

Third, install all the latest security plugins for the platforms or scripts used by your website and update them as soon as updates are released. Security updates are created for a reason: They are there to protect you and your website.

 

Further, there are also many third-party security applications that can be used with various platforms or scripts. These can provide an added layer of security. Prices vary with some, like Acunetix WP Security, costing nothing at all. In any instance, a little bit of research can go a long way to discovering which of these might be useful for your website and keeping your website more protected.

 

Put a Firewall between Your Website and the Hacker

Nonetheless, even by staying updated and up-to-date, your website still remains vulnerable. A web application firewall (WAF) better alleviates this vulnerability by reading all of the data that passes between your website server and the data connection. Reading this data means that known malware, Trojans, spyware, or other unwanted entities can be traced to their origin and deleted before they infect your website or computer system. Thus, your data remains a bit more secure.

 

Protecting Your Website Means Protecting Your Computer

Defending your website does not only require, however, that you build a layer of security around your website. If a hacker wants to access your website badly enough, he will stop trying to break the lock on your window and steal the key to the front door, that is, rather than hacking your website, he will attempt to hack into your computer system. There, he can gain access to your website as well as all sorts of other personal information.

 

The first way to protect your computer is reactive but still effective: install anti-hacking software and run it regularly (at least once weekly but daily if possible). Find any unwanted entities left by these hackers and then delete or quarantine them; this can be one of the more effective means of removing the backdoors hackers may have placed on your computer.

 

A second, more proactive, and, thereby, more effective means of protecting your computer system (and website) is to prevent hackers from first accessing the gateways to your personal files and folders that constitute it at all. Perhaps the most efficient means of doing this is to install a virtual private network (VPN). Essentially a VPN uses a third-party server to encrypt your data whenever you access the internet. By using a VPN, a hacker will be unable to trace your internet usage back to you: it will be re-routed to a server elsewhere. The data you share online is thus secure and, so too, is your website. You can research more information about VPNs to find the one that has the features that are right for you.

 

Closing Remarks

In short, while there are many other ways to protect your website from hackers, the simplest way is by combing these three dimensions of security: 1) stay updated and up-to-date on everything, 2) use a WAF to trace information as it travels between the website server and its data connection, and 3) prevent entry into the website indirectly through the use of anti-hacking software and a VPN.

 


* If you have any complaints regarding this guest post, please don’t hesitate to contact us.
Continue Reading

WhatsApp Video Calling Feature Link is a Spam

The voice calling is done and WhatsApp has been thinking about introducing video calling feature for its users. But the official statement or the update is not yet released and it strike an idea in hackers’ minds to cash in the enthusiasm of WhatsApp users.

 

Recently, WhatsApp users have been receiving a message with a link from their friends’ circles saying that it will update the application and enable video calling feature. The link is not actually an official updater but a hackers’ bait for WhatsApp users. It is found to be uploading your sensitive information and contacts list on your phone to hackers’ databases.

 

Beware of WhatsApp spam

 

How it works?

Just like many other average spams, this video calling feature spam also impersonates the original updater like UI when clicked on the link. It will show a progress bar mocking the update in front and will be uploading your information in the background. After it is completed, it will then be propagated to your friends’ circles and the same happens to them too.

 

How can we say that it is spam?

If you are using WhatsApp since last two updates, the voice calling feature and material design, it would be easy to recognize this as a spam right then. All the previous updates were applied by getting a call from voice call enabled WhatsApp friend or from Google Play application update service. Isn’t it? If so, why would you get a separate unknown link to update it this time? Do you think updating the application through third-party link is safe?

 

If you have clicked on the link and have seen that progress bar UI till completion, check now if you got any such feature enabled on your WhatsApp. Definitely, you won’t.

 

How to keep yourself safe from this scam?

It’s simple. Don’t click on the link you receive from your friends through messages. WhatsApp can propagate coded messages that can easily track your details in seconds. If you are aware of messages like ‘share this message and see the red apple moving’, you could imagine the range of vulnerability.

 

Be safe!

Continue Reading

Secure Your Website with Defencely, The Expert Solution

Security is the primary concern of everyone. All of us want to stay secure. You say the same about your website also. Who want an insecure website? So, this time a Guy from India is here to help you overcome this issue. There may many people who had suffered from malware attacks on their websites. It points out the need for a tool like defencely.

 

What is this so- called Defencely?

defecely-assessing-amfastech-security-level

 

Defencely is not at all a scanner or an automated tool to find vulnerabilities or security issues. It is an online platform of experts who constantly assess your website to find and fix vulnerabilities if any. There is a dashboard provided for every customer. You will get access to it once you create an account. No matter which platform you using (WordPress, Drupal, Ruby or anything), they will shield your website.

 

Features

1. Zero- False Positives

You might have seen some Anti- Virus software which catch secure files as malware. That is what actually called as false positives. False positives badly worry us. We think it is a real problem. Defencely.com promises you not to deliver any false positives.

 

2. Availability of Useful Guides

There is a possibility that you know nothing about the prevention of vulnerabilities. So Defencely provides you easy- to- follow guides to fix the problem it finds and to take prevention so that it will not happen again.

 

3. No Page Scan Limits

No limits such as 10 or 100 pages a day. You pay so you get the maximum. We can scan any amount of pages using this awesome security tool, Defencely.

 

4. User- Friendly Dashboard

The dashboard is not messy loaded with good- for- nothing facilities. You will get every tool you want. But you can’t find one which has no use at all.

 

5. No Need of a Developer

The developer is not a necessity with Defencely. They don’t recommend you to increase your budget by hiring a developer. The experts from Defencely are ready to help you with any issues regarding vulnerabilities or security issues.

 

6. Free Security Report

Everyone loves freebies. Don’t worry if you have no money to get services from Defencely. They provide a security report for every website upon request. There is a field on their homepage. So you can get a report for free and can purchase the security service any time.

 

free-security-report-defencely

 

Is it a Reliable Company?

Of course. You can trust them as the way you trust yourself. They have pointed out the vulnerabilities of official sites of Apple, Adobe, Microsoft, Google, EBay, Zynga, RedHat and much more. How can you not trust such a service? Defencely has been recognized by PayPal, the largest money transfer platform. According to the official site of Defencely, they found 11,217 vulnerabilities, reported and solved by the experts.

 

Who is Behind Defencely?

Defencely was started by Ritesh Sarvaiya, an Indian guy. He was from a not- so- rich family and we have a lot to learn about him. Once in an interview he said that success is all about not giving up while answering a question about his success. He was born and brought- up in Mumbai and now living in U.S. for his entrepreneurial needs. He is the Chief Executive Officer of the company at present.

 

Should We Go for Defencely?

Why not? You should go for it. If you are a person often concerns about the security of your website, Defencely fits your needs as well as pocket. If you are an owner of a small (or large) business like an e- commerce store, you should buy their service as soon as possible. There are many plans available with variable features and price. So, give it a try today.

Continue Reading

Ask Google About Your Lost Phone Now | Type “Find My Phone” in Google and Find Your Phone on the Map

Google have introduced an useful application in its search engine that finds our phone and locates it on the map.

 

To find your phone, go to Google.com and type “find my phone” (without quotes) and see the magic.

 

Take a look at the screenshot to know how it works:

 

find-my-phone

 

When you type “find my phone” in search engine, it automatically finds the device, place and accurate distance.

 

You can simply send a ring if you dropped it somewhere at home or in car and searching for it. It rings with a different ringtone louder than usual and so can you find it easily.

 

Not showing your phone location?

If “find my phone” in Google is not showing your phones location, that means you have not enabled location sharing on your phone. You can enable it from the browser itself by doing the following.

 

security-reasons-login-failure

 

Step #1: Sign in to your Google account by clicking on Sign in button if showed.

 

Step #2: It might show this following error if location sharing is not enabled on your phone.

 

location-sharing-not-enabled

 

Step #3: Click on Allow button to enable your device’s location sharing from your browser.

 

finding-my-phone-location

 

It then locates your device and shows the exact location within some accuracy. For example, take a look at the screenshot of my Moto E2 phone that I have tracked earlier.

 

android-device-manager-location-identified

 

To get access to this screen,

 

Go to https://www.google.co.in/android/devicemanager and login with your Google account that you used on your device. This screen will give you more controls than Ring. You can even Lock your device or Erase your information from it in case it was lost or stolen.

 

NOTE: You cannot track your device if it is rooted, Google account signed out or factory reset. This feature of Google cannot completely help you get your stolen phone back. So, don’t quit the idea of filing a complaint in nearby police station. It might be more easy to track with their help.

 

Won’t that make Google password secrecy more serious?

Yes! of course. It does. Sharing your Google password to your friends and others can give some control over your phone and content for sure. So, better not to disclose your password of the Google account that you are using on your Android device.

 

I don’t want Google show my location. How to hide my location?

You have full control over this feature. You can turn this off for your security purposes, just like the one you saw in a screenshot above.

 

To hide your location on Google, go to your phone Settings > Location > Turn Off. It then goes unavailable on Google when searched.

 

device-unavailable

 

Always remember, you can gain control over the phone’s Ring, Lock and Erase features even though the phone’s location sharing is turned off.

 

Hope that clears all the doubts.

 

What do you think? Is it safe or vulnerable? Share your thoughts in comments.

Continue Reading

Comparison of Comodo & GeoTrust SSL Certificates Features

Having a website is not enough, but keeping it safe against hacking attacks is one of the top most essential needs to be considered. Buying an SSL certificate can ensure the security and establishes trust in customer minds to dive into the website. After all, making the customers feel safe on a business website will not only bring more business conversions, but also builds a base of loyal customers.

 

ssl-gotrust-comodossls

 

Businesses prefer to buy SSL certificates, which seem the true value of their money along with better security features. There are two mainly preferred SSL certificate providers in the industry: GeoTrust and Comodo. We’ll take a tour of these two major SSL certificate providers in this article.

 

GeoTrust SSL Certificate

GeoTrust is a large digital certificate provider. The GeoTrust brand is now owned by Symantec as part of its $1.28 billion acquisition of VeriSign’s security business in 2010. It is the world's second largest digital certificate provider. More than 100,000 customers in over 150 countries trust GeoTrust to secure online transactions and conduct business over the Internet. GeoTrust's world-class SSL Certificates offer rapid issuance at a cost-effective price, enabling up to 256-bit SSL encryption, and include a range of GeoTrust® True Site Seals based on the level of identity verification.

 

Comodo SSL Certificate

Comodo SSL is a type of internet security products of the Comodo Group's certificate authority. An SSL certificate is required to use the Secured Socket Layer protocol, which creates a secure and encrypted connection to the Internet. The Comodo certificate profile includes Organization Validation certificates, Domain Validation certificates, Extended Validation Certificate, Multi-Domain certificates, Unified Communications certificates, email certificates, and code signing certificates. Comodo CA undergoes an annual WebTrust audit by Ernst & Young.

 

GeoTrust SSL and Comodo SSL: A Comparison

Though the names sound different, there is no much difference in the level of security each of these companies provide and the cost of the certificate. The one thing that makes GeoTrust SSL better compared to Comodo is the price and the Issuance date.

 

Comodo offers different levels of SSL security with a free version, which allows business owners to understand the SSL process before they buy paid version for their websites. Whereas, GeoTrust also offers free certificate for 30 days for organizations that get to know about SSL functionality and process. Both the companies offer the same 256-bit encrypted certificates without the difference in the security levels and quality of the services.

 

In fact, GeoTrust SSL prices range from $65 to $349 USD per year and are flexible. The warranties are valid for mis-issuance of the certificate and ranges from 100k-500k. It exhibits 99.9% support for all browsers and have 0% errors, therefore the business owner need not to worry about losing customers because of the errors caused during the transaction activities performed by the customers.

 

Also, GeoTrust offers EV SSL that present in the browser with a green bar, which ensures customers to move around, order, buy and make transactions through the website on the network. Any business using this GeoTrust SSL certificate will have a security seal on the site there to ensure that the website has strong web security. Check for the green certified URL on the address bar of the web browser.

 

Whereas, Comodo offers cheap prices breaking the ice for small business owners to adapt security for their website. But the better value, worthy-spent-for price and services always rests with GeoTrust. Most of the companies and businesses trust on GeoTrust more than another SSL certificate provider.

 

Verdict:

Both Comodo and GeoTrust are most famous and trusted SSL certificate providers. The priority of choosing one between these two depends on the various factors like price, quality of the service, browser compatibility and adaptability. From the website owner point of view, customer security always stays on the top whatever certificate authority they choose.

 

Hope this comparison helps you to choose the best one between the both. All the best! Stay safe online!

Continue Reading