Slow

now browsing by tag

 
 

#deepweb | Tech Q&A: TOR browser is secretive, slow and can be risky – Business – The Ledger

Source: National Cyber Security – Produced By Gregory Evans

Q. I read your column on private Web browsing (see tinyurl.com/vd6fwz3). What do you think about using the TOR browser for privacy?

Dave Woehning, Cottonwood, Ariz.

A. The free TOR browser allows you to be more anonymous on the internet than you would be with browsers such as Mozilla Firefox or Google Chrome. But TOR (which stands for The Onion Router) also runs slower than other browsers, and enables some potentially risky activity. Here are some details:

Anonymity: TOR (see tinyurl.com/3k65xdw) conceals your identity better than other browsers by hiding your IP address and routing your browsing through three network relay points called “nodes.” This can cause problems. A website that can’t see your IP address doesn’t know where you are. It may block you or display the wrong language. And TOR isn’t foolproof. There are ways it can be hacked to get your info.

Speed: TOR is inherently slower than other browsers because your requests pass through those three nodes. Those steps raise the time between when you request a website and when it appears on your screen.

Security: The TOR browser allows you to access both the “Surface Web” (the internet most people know) and the “Deep Web,” (the rest of the internet where information is not organized into websites and can’t easily be found.) The Deep Web provides legitimate ways to safeguard private data. But a portion of the Deep Web, called the Dark Web, conceals illegal activities, such as selling drugs, guns, child pornography and stolen credit card numbers. Even computer-security experts are wary of the Deep Web; the average computer user should avoid it.

Q. I bought a Windows 7 Gateway PC in 2014. It’s not on Gateway’s list of PCs that can be upgraded to Windows 10, so can I upgrade to Windows 8.1 instead (assuming I can find a copy)?

Steve Haller, Minneapolis

A. Windows 8 debuted two years before you bought your Windows 7 PC, so you can upgrade to Windows 8.1 (the version now available.) A Google search for “buy Windows 8.1” lists about a dozen offers to sell it. And Windows 8.1 will receive security updates until Jan. 10, 2023.

However, if you like Windows 7, which was designed to be used with a mouse, you may not like Windows 8.1, which was designed to be used with a touch screen, although it can also be used with a mouse. (For a comparison of the two operating systems, see tinyurl.com/ufevaa8).

Q. Is it possible to upgrade my HP Pavilion PC from Windows Vista to Windows 10?

John Mulhern, Coon Rapids, Minn.

A. Any PC running Windows Vista is at least 10 years old and is unlikely to be compatible with the latest version of Windows 10. Even if it is compatible with Windows 10, it may not work with future updates, so I recommend that you buy a new PC. But, if you are willing to pay for a Windows 10 upgrade that may fail, here are directions (see tinyurl.com/ycjsmwn3). In any event, you shouldn’t continue to use Windows Vista, which hasn’t received security updates since April 2017.

Steve Alexander covers technology for the Minneapolis Star Tribune. Readers may write to him at Tech Q&A, 425 Portland Ave. S., Minneapolis, Minn. 55488-0002; email: steve.j.alexander@gmail.com. Please include a full name, city and phone number.

Source link
——————————————————————————————————

The post #deepweb | <p> Tech Q&A: TOR browser is secretive, slow and can be risky – Business – The Ledger <p> appeared first on National Cyber Security.

View full post on National Cyber Security

How to #Know If Your #Slow #Computer Is #Secretly #Mining #Cryptocurrency

Mining cryptocurrency used to require thousands of dollars worth of equipment to see any kind of meaningful return, but not anymore. Newer digital currencies like Monero, ByteCoin, and AEON have given would-be miners the ability to mine tokens right from their laptops. This might benefit small-time miners that want to get involved in the sector, but for every good thing online there are always people that figure out a way to use it for bad.

Hackers have begun using these tools to infect computers and websites to secretly mine cryptocurrencies. This emerging type of malware attack has been dubbed as “cryptojacking”, and it could cause your computer to overheat and crash. Luckily, spotting these hidden miners isn’t all that difficult.

Cryptojacking essentially hijacks your computer’s CPU power to mine. This means when you’re browsing the web, the malware is running in the background completely unbeknownst to you. There are a few types of this malware, and some run only when you visit a certain website and others can be maliciously installed on your computer. The best way to prevent this is by using antivirus software and adblockers.

If you’ve already been hit with this kind of malware, you’ll notice either your computer acting sluggish, getting warmer than usual, or its fan constantly spinning. If you aren’t running any kind of demanding software, like video games or video editing programs, this should be the first hint that your computer is working overtime.

If you’ve noticed your laptop acting up, it’s time to go check on what’s going on under the hood. Mac users can view a detailed breakdown of everything their computer is running by searching “Activity Monitor” and using the magnifying glass icon at the top-right of the screen. Windows users can simply hold down the Ctrl-Alt-Del keys to bring up “Task Manager.”

Both of these menus will display a graph of how much of your computer’s processing power is being used. Any massive spikes should be red flags. You’ll also see an ordered list of the programs using the most processing power at the moment. Before ending any of these programs be sure to research what they are, as you could be ending a crucial part of your operating system.

Both Tesla and the Los Angeles Times have had their sites infected by cryptojacking software. Companies with popular websites are the most at risk, as hackers can embed code onto their servers and use the CPU power of everyone who visits the site. But making it a habit to check on how your computer is running will ensure your device isn’t getting used to make someone else a crypto fortune.

advertisement:

The post How to #Know If Your #Slow #Computer Is #Secretly #Mining #Cryptocurrency appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Mobile is slow, but cyber-security business will help company grow, says Singtel CEO

Source: National Cyber Security – Produced By Gregory Evans

Mobile is slow, but cyber-security business will help company grow, says Singtel CEO

Cyber security is a key growth segment for Southeast Asia’s largest telco Singtel, as price competition in data and voice intensifies globally, its chief executive told CNBC. “Our core carriage business that is your traditional voice, data businesses, those face significant price competition … The growth that we have seen in our ICT (information and communication technology) businesses has certainly …

The post Mobile is slow, but cyber-security business will help company grow, says Singtel CEO appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

The Big Chill: Don’t Let Cybersecurity Threats Slow Productivity & Economic Growth

download

Source: National Cyber Security – Produced By Gregory Evans

The Big Chill: Don’t Let Cybersecurity Threats Slow Productivity & Economic Growth

Trust is an essential underpinning of life in the digital age. We trust our friends on Facebook not to share our private family photos. We trust our email clients and antivirus software to keep viruses and spam at bay. But for many people, the risks of using the internet are scary enough to curb their […]

The post The Big Chill: Don’t Let Cybersecurity Threats Slow Productivity & Economic Growth appeared first on National Cyber Security.

View full post on National Cyber Security

North Korea’s Yongbyon Nuclear Facility: Slow Progress at the Experimental Light Water Reactor

Source: National Cyber Security – Produced By Gregory Evans

A 38 North exclusive with analysis by William Mugford. Summary Recent commercial satellite imagery of the Yongbyon Nuclear Scientific Research Center has revealed new developments over the past six months, most recently in January 2016, suggesting that North Korea’s Experimental Light Water Reactor (ELWR) is edging closer to becoming operational. These developments are: 1) the […] North Korea’s Yongbyon Nuclear Facility: Slow Progress at the Experimental Light Water Reactor is an article from 38 North: Informed Analysis of North Korea, published by the US-Korea Institute at SAIS. View full post on 38 North: Informed Analysis of North Korea

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post North Korea’s Yongbyon Nuclear Facility: Slow Progress at the Experimental Light Water Reactor appeared first on National Cyber Security.

View full post on National Cyber Security

Chinese computer hack attacks slow ahead of Obama summit: experts

Source: National Cyber Security – Produced By Gregory Evans

Major intrusions by Chinese hackers of U.S. companies’ computer systems appear to have slowed in recent months, private-sector experts say, ahead of a meeting between China’s president and President Barack Obama with cyber security on the agenda. Three senior executives at private-sector firms in the field told Reuters they had noticed a downtick in hacking activity. “The pace of new breaches feels like it’s tempering,” said Kevin Mandia, founder of Mandiant, a prominent company that investigates sophisticated corporate breaches. A point of friction in U.S.-Chinese relations, cyber security will be a major focus of talks with Chinese President Xi Jinping this week in Washington, D.C., Obama said earlier this week. In the same remarks, Obama called for a global framework to prevent the Internet from being “weaponised” as a tool of national aggression, while also holding out the prospect of a forceful U.S. response to China over recent hacking attacks. Mandia has probed major corporate breaches, including those at Sony Pictures Entertainment (6758.T), Target (TGT.N) and healthcare insurers. Experts have connected some of these to a breach of classified background investigations at the U.S. Office of Personnel Management, which was traced to China. Government-supported hackers in China may have backed […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Chinese computer hack attacks slow ahead of Obama summit: experts appeared first on National Cyber Security.

View full post on National Cyber Security

Apple’s Encryption Will Slow, Not Stop, Cops And Spies National Cyber Security

nationalcybersecurity.com – While the newest Apple Inc. (AAPL) and Google Inc. (GOOGL) smartphones will automatically encrypt data stored on them, that won’t keep U.S. law enforcement and intelligence agencies from obtaining …

View full post on Hi-Tech Crime Solutions Weekly

Apple’s Encryption Will Slow, Not Stop, Cops And Spies

Apple’s Encryption Will Slow, Not Stop, Cops And Spies

While the newest Apple Inc. (AAPL) and Google Inc. (GOOGL) smartphones will automatically encrypt data stored on them, that won’t keep U.S. law enforcement and intelligence agencies from obtaining evidence linked to the devices. Read More….

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security