22 Dec

Google wants to eliminate passwords using your smartphone

Google wants to eliminate passwords using your smartphone

The chase continues. Google is currently testing a new way to connect to your Google Account. Once activated in your security settings and a phone linked to the account, you can access your Google account online from your computer by  clicking on your phone to allow this connection. A simple alert ( YES / NO ).

No more password needed!

Actually, not really. The password is always required. If Google eventually puts this technology in place soon and you lose your device or it is not within the reach or the battery is discharged, the password will always be useful.

We must also think you might change device or not wanting to use this function anymore, then again the password will be required. We see that the cell phone will be increasingly assigned an new authenticator role.

In this sense, as well as online payments, few people will want to have an inexpensive device that might not be fully protected. The phone is now a virtual wallet, keys of the house or the car, an unlimited access to our life!

This is not so far as we have said recently, one year or two at most, and the smartphone will be more than ever critically essential.

Share this
20 Dec

Google abandons SHA-1 encryption soon!

Google abandons SHA1 encryption soon!

Google handles well his security plan on the web and it seems to stick to it. Google waits hardly a week between each announcement of a new measure to increase the security or change an aspect of it. When it is not on its search engine, it is on Chrome, its flagship browser.

Websites and browsers encryptent data exchanged between them. A digital signature is created for each data packet to ensure that these data are not altered when transiting servers to servers.

The SHA-1 type of encryption for security certificates has some weaknesses and recommendation made by security authorities in 2011 was to abandon it on 1st January 2016.

Google will go in that sense, and in the course of January 2016, the release of Chrome 48 will present an error when you browse a Web site only with the SHA-1 encryption type.

The error should look like this:

SHA-1 encryption type error

In addition, on 1 January 2017 it will no longer be an alert to be displayed but an error that will completely block the possibility of visiting the site.

Make sure your web hosting company offers a ready SHA-2 environment for 2016 , such as Internet Cloud Canada which has already made the move since a while! Otherwise, your websites will display errors and of course you will lose the trust of your customers because they will not not buy or look at an insecure website!

Share this
17 Dec

Prevent viruses from installing on Windows!

Prevent viruses from installing on Windows!

The’re lots of solutions to stop viruses on Windows, but many are only focussing on the definitions of these viruses.  You can block the process at the base for some of them. There are many viruses or malware that install blithely in “Appdata” directory, a default hidden folder in the files of the administration account or in the one of the user.

This directory is very prolific for spywares, keyloggers and other malwares. It is possible for you to prevent the creation of new directories, files, and block executable for that specific folder.

We’ll see the procedure to block .EXE files in that directory:

1. Right-click the WIndows icon at the bottom left of the screen.

2. Select “Run”.

3. Type: gpedit.msc and ENTER to open the Group Policy Editor.

 

This editor allows you to create custom rules to prevent viruses from using the directory “Appdata”.

 

4. In the “Computer Configuration” section, click “Windows Settings”

5. Click the “Security Settings” tab, then “Software Restriction Policies”

6. Right click on “Additional Rules” and “New Path Rule” for all following rules. Do not forget to press the “Apply” button to save your rules.

We will create 6 custom rules in total in this section. For each rule, you do step 6.

 

Rule 1:


Path: % AppData% Local \ *. Exe

Security level: Not permitted

Description: Do not allow executables in Appdata

 

Rule 2:


Path: % LOCALAPPDATA% \ * \ *. Exe

Security level: Not permitted

Description: Do not allow executables in subdirectories of Appdata

 

Rule 3:


Path: % LOCALAPPDATA% \ Temp \ * zip \ *. Exe.

Security level: Not permitted

Description: Prevent executable .ZIP archive files attached to emails using the space of the user.

 

Rule 4:


Path: % LOCALAPPDATA% \ Temp \ 7z * \ *. Exe

Security level: Not permitted

Description: Prevent executable archived files attached to emails .7z to use the space of the user.

 

Rule 5:


Path: % LOCALAPPDATA% \ Temp \ Rar * \ *. Exe

Security level: Not permitted

Description: Prevent executable files RAR archive attached to emails using the space of the user.

 

Rule 6:


Path: % LOCALAPPDATA% \ Temp \ wz * \ *. Exe

Security level: Not permitted

Description: Prevent executable files Winzip annexed to archived emails using the space of the user.

 

We believe that this additional rules will make your computer more secure but you must keep your antivirus.

Also, consider these steps to properly secure your computer:


– Software: Malwarebytes Anti-Exploit
– Software: KeyScrambler
– Enable Windows Firewall
– Do your updates regularly for WIndows or for the virus definitions
– Do not surf on insecure sites or file sharing websites (P2P). If you can not stop you from using them, then use a second computer dedicated solely to these tasks or use a virtualization space on your computer, it will be effective against the spread of viruses and if you are infected, then you destroy this virtual space.

Share this

© 2018 Internet Cloud Canada.Tous droits réservés. (Sitemap).