A Different kind of Secure Online Storage

In the words of Wuala : Backup. Sync. Share. Access Everywhere.

Wuala – Secure Online Storage – Backup. Sync. Share. Access Everywhere..

In the wake of the Dropbox guys dropping the ball and admitting they not be quite as secure as they had previously suggested – AND that they had changed their terms and conditions that also implies that your stuff might not be as private as you thought – Wuala – along with a couple of others are jumping on the bandwagon in a hope of denting the line.

Wuala comes from your friendly hard drive manufacturer LaCie. It is a ‘freemium’ model (first gig is free – compared to dropbox’s 2 gigs). I downloaded and installed. So far I am puzzled as to why it seems to be so slow – but also I am missing the social media aspects (or at least if they are there – I haven’t yet found them – so that I can’t quite as easily save stuff into my Wuala to share with others.

Still – for now – I will stick with it – though free always has a cost – will link to that post another time!

(Oh and you could also buy La Cie’s new wireless hard drive so that you can back up locally and to the cloud – automatically – in parallel.)

Get your Cookies Together

Most websites you visit will leave a small file called a ‘cookie’ on your computer to store information about you, and store any relevant site preferences. Most of the time this is fine, however some sites use this information to track your surfing habits for profiling/advertising purposes and more.Flash Cookies: Flash Cookies, can potentially be even more insidious, as they can store up-to 25x more information (100Kb) than regular cookies. Flash Cookies can even be used to restore regular cookies, long after the original cookie has been deleted.

Databases/Local Storage: Databases, and Local Storage are generally more innocuous, and are used mainly by web applications to store data.

Cookie, helps you to manage exactly who can access information about your online activities, all in one convenient location. With a clear and intuitive interface, Cookie is a must have application for anyone serious about protecting their personal information. After an initial simple setup, Cookie requires minimal effort to keep your computer clear from unwanted data-mining.

Full Article Here : Get your cookies together

Ten Tips To Secure Your Mac

My thanks to Deborah Pozin for the heads up on this one. The original article can be read here – but for a quick short cut – ten tips from the National Security Agency no less on how to keep your Mac safe.

1. System Preferences/Accounts: Create a non-admin account for everyday activities.

2. System Preferences/Accounts: Disable Automatic Login and User List through “Login Options.” Set “Automatic login” to “Off.” Set “Display login window as” to “Name and password.”

3. System Preferences/Accounts: Disable guest account and sharing. Select the Guest Account and disable it by un-checking “Allow Guest to log in to this computer.” Uncheck “Allow guests to connect to shared folders.”

4. System Preferences/Security: Require password “5 seconds” after sleep or screen saver begins.

5. System Preferences/Security: Use secure virtual memory.

6. System Preferences/Security: Disable Location Services.

7. System Preferences/Security: Disable remote control infrared receiver.

8. System Preferences/Network: For every network interface listed click “Advanced” then the “TCP/IP” tab. “Configure IPv6:” to “Off” if not needed.

9. Utilities/Terminal: To keep users and guests from snooping around home folders, run this command:sudo chmod go-rx /Users/username.

10. Utilities/Terminal: Disable unnecessary services by using the chart to the right with this command:sudo launchctl unload -w /System/Library/ and LaunchDaemons/com.apple.blued.plist.

Read the full article here

More on Mac Malware

The Malware on Mac discussion continues to rage.

Spotted this one this morning from MacWorld. Interesting read – with lots of links to other sites to get a more complete read on what is going on, in ti scase exploding the myths that we are all doomed – but at the same time reminding us all to be vigilant !

Each week the Macalope skewers the worst of the week’s coverage of Apple and other technology companies. In addition to being a mythical beast, the Macalope is not an employee of Macworld. As a result, the Macalope is always free to criticize any media organization. Even ours.

The Full Scoop Here

Also – three short pieces on the topic from The Official Apple User Group Digest

01  Apple Malware: How bad is it?

We had so many content items in our Safenetting column this week, I had to break this edition into two parts – the first of which deals with the Apple malware issue … How bad is the Mac malware scare? (FAQ)

* Remove Mac Protector (Uninstall Guide)
* Three Ways to Secure Macs at Work: Lessons from “MacDefender”
* Antivirus for Mac: It’s Time
* Quiz: Hackers and patches and malware, oh my!
* Apple Orders Technicians to Feign Ignorance About Mac Malware
* Apple Ignores Malware Support Calls, Just Want Your Money?
* Apple “refusing support” for Mac malware
* and more . . .


02  Safenetting InfoManager 11-05-23

User Group Network UGN Safenetting and Cybercrime report Cybercrime never lets up. With this week’s news about Apple, it’s no longer a one-pony show!

This week:

* Study Sees Way to Win Spam Fight
* How to stop unwelcome SMS marketing
* Canada is the new global phishing hotspot
* Cyber fraud: How to avoid falling prey to online scams
* Hacker Mind Tricks Increasing Malware Downloads
* Is Android the new Windows?
* Six rising threats from cybercriminals
* New malware tricks users into thinking hard drive failure is imminent
* . . . and more


03  Mac Malware Threat — Last Monday’s  initial alert.



Malware on the Mac

Ars Technica is a well respected site that happens to have published a great article on Mac Malware. Discussed at length at the recent User Group meeting, I thought it appropriate to publish a link to this article for those that are interested and want to follow through. A quick synopses of their conclusion – but I highly recommend the full article – and the link to the TUAW article as well.

So what do you do if you find yourself with a variation of MAC Defender on your machine? TUAW recently posted a complete guide to protecting yourself, but the general gist is this: uncheck “open safe files after downloading” in your Safari preferences so that apps that are downloaded automatically through something like a crafty Google Image search don’t just pop right up and start running.

If something that looks suspicious does pop up and you haven’t installed it yet, delete the app immediately. If you have installed it, you may need to start killing some processes in order to get it out of your life, but as long as you don’t enter any credit card info, you’re not likely to get scammed any further by MAC Defender. For now, that is.

In addition, a quick reminder of the link to Sophos, who provide Malware software. This is the software that Rick discussed at the meeting.

I personally have no experience of it, but the company is well reported on the bulletin boards, and discussed alongside of solutions like Norton (part of Symantec), McAfee and Kaspersky

Full Article :: Malware on the Mac: is there cause for concern? Ars investigates

Passed on – with thanks to :: Ars Technica