Friday, January 27, 2017

browser autofill

 Most browsers allow autofill or similar functions. After enabling this feature the browser will fill in fields the browser has seen from one of your sessions.
 A researcher found a site that captured all user's personal information and sent this information to the requesting site. This information included that person's name, mail address, email address, credit card number, credit card expiration date, credit cart CCV etc. The web site displayed the autofill-ed information with a negative offset on the user's screen. Thus the user would be unaware that information was being sent since the negative offset fields was not seen on the screen.

 The feature is handy and is different from a browser asking if the user wishes to have the browser save credit card information.
 If you wish to disable this feature you will need to do this for each and every browser you might use.
 Use each browser's help function to disable this setting (autofill, auto complete or similar) if you wish to add this protection.

Wednesday, January 25, 2017

Identity Theft - IRS version

 Noticed this story on the news recently. I know several people who have been victims. All of those victims have been working for years to get their federal tax issues from identity theft resolved.

 The issue, with 3 items of Personal Identifiable Information (PII) anyone can file a federal tax return and get a check or debit card with a large refund. Victims of other identity theft breaches may not realize how PII can be cumulative (add up) to enough information to create multiple cases of identity theft.

 Think of standing in line at the pharmacy. You over hear other's name and date of birth. Add their SSN and you can file a federal tax return. Those 3 items are available in oh so many places. Every other item of information needed to file a return can be falsified.

 So, how to prevent this type of IRS fraud? File early with the IRS and invest in identity theft protections was on the news article. Until the IRS has a better and speedier method of validation of the items needed to file a tax return we are all at the mercy of thieves.

 Use a WEB search engine to gleam further detail

Monday, January 23, 2017

Administrator

In presentations i mention to use a non-Administrator account for normal day-to-day use to avoid malware infections. Most malware runs as the current user. If that user is not an administrator the depth and scope of the malware byte (sic) may be lessened.
 Administrator has almost full privilege on a Personal Computer (PC). Normal (non-admin) accounts have lesser privilege and rights. When a function or request requires administrator rights or privileges the Operating System (OS) will ask for an administrator account's passphrase. We will cover this in more detail at a Cyber Security SIG meeting.
 Now to tell if your account is an administrator? How to add a non-administrator account? How to spot check that malware as not added or changed an account to add or remove administrator rights and/or privilege?

Microsoft Windows.
 Bring up the Control Panel. Cortiana - Control Panel

Click on User Accounts:
By default the Control Panel User Accounts shows the current logged in user. john in this case.
Note john is a Local Account.
Now by using the Manage another account you should get a User Account Control (UAC) pop-up window. This pop-up window will blank the background windows so it is more difficult to ignore.
By supplying the cited administrator's passphrase the system will display a window with all known accounts. Accounts can be local, workgroup, homegroup or domain. We will cover those types in a SIG session.

Note jpj is an Administrator.

If your current login account is an Administrator you can use the Add a user account at the bottom of the window to add a non administrator accounts to use for day-to-day.
For Windows 10 you will get a pop-up asking for an email address to add a Microsoft account by specifying an email address for a Microsoft account. This is handy for visiting relatives so they can have their cloud or Microsoft content available while on your PC. For our purposes we want to add a local non-administrator account.
Click on the Sign in without a Microsoft account (not recommended)   which i recommend.

Supply the requested information for the new non-Administrator account and click Next. This adds the local non-Administrator account to the system. Use the User Accounts Control Panel to verify the new account is a non-Administrator account.

 Now you have an local account for day-to-day use and an Administrator account to use as required for Administrator functions. You can have more than one of each type of account.
 For some functions you will get the User Account Control pop-up. Supply an Administrator passphrase and continue with the required function.
 For some functions you may need to right click on the function and click on the Run as Administrator.
 For some functions you many need to CRTL-ALT-Delete and choose Switch User to use an Administrator account.
 IMPORTANT: Use the Administrator account(s) with care. With great power comes great responsibility. If a User Account Control pop-up appears during day-to-day use and you have not requested any service requiring Administrator rights or privilege do not supply an administrator passphrase without research. Typically this is malware or similar attempting privilege escalation.
Then again it may be required for a function. Use care with the UAC pop-up.

MacOS
 Similar concept. Multiple non-Administrator and multiple Administrator accounts can be added.
Launchpad -> System Preferences > Users & Groups
This window shows the current Users and an indicator of Administrator rights and privileges. With the Allow user to administer this computer check box you can control the desired account(s).
 Functions that require administrator rights or privileges will require you click on the lock icon labeled Click the lock to make changes and supply an administrator passphrase.
 MacOS is linux based. So from the command line or terminal window use the technique listed for linux.

linux
 from a command shell search for User IDentification (UID) of 0.

for linux based PCs administrator is UID of 0. grep is a shell command to search for UID of 0.