If you are having trouble viewing this email, click here to view this online

 

VOLUME 73

   ISSUE 73

28 August 2017

Article of the Month Around the World

Best Practices to use internet
 

What is Cyber Space?


Cyberspace is the Internet. We use the Internet in many ways - to talk to our friends and family, play video games, download music, watch TV shows, and much more. Our families use the Internet to conduct work and business. Companies manage transportation, electricity, banking, and other important everyday activities online. Can you imagine the world without the Internet?
 

But there are few best practices and ethics to follow when we use internet and devices related to information technology. Make sure the connection is https before you enter your login credentials for a website.

 

And try to use different passwords for your online accounts. As an example, donít use your Gmail or Hotmail password as your Facebook or twitter password and always try to use strong passwords which are hard to guess as an example never use your pet name or friendís name as a password. And the most important thing is never share your password with anyone. We donít share our toothbrush with anyone. Don leave your pc or mobile device unlocked. Lock it with a pattern or a password as a best practice.

Always try to use two factor authentications for your social media accounts like Facebook, twitter and mail accounts.


Be mindful of what you reveal online specially on social medias. You donít know who is watching you. So, you must be very careful when you post something online. Think about how many real friends you have on your social media account be careful when you talk with strangers. And if thereís any sign about bulling inform your parents.


 

And donít use pirated versions of softwareís as it may contain malicious scripts attached, backdoors for hackers to access your device. And the other important thing is never skip operating system or software updates security updates and patches. Always try to use an antimalware software and keep it up to date.

Remember that responsible companies like banks and other services like PayPal will never ask for your passwords through emails so if there is a suspicious email in your inbox never reveal your sensitive information it could be a phishing attempt. Donít get hooked. Never respond to email requests for your passwords.

Always keep a backup of your important data as a best practice so that you can use it in case you lose your data. Because malwares like ransomwares are very common these days. Factory reset your mobile phone, full format your pc before you give them for repairs.

Everything on the internet are not true so check for reliable sources before you read something. Donít open files that ends in .exe unless you know who sent it.


And the most important thing is donít get addicted to social medias and other gaming activities. Itíll affect your mental and physical health too. Go out and play with your friends spent more time with your family members.


By

Akhila Shan Keerthisinghe

Shan is an undergraduate of Sri Lanka Institute of Information Technology who is currently following BSc(Hons) IT Specializing Cyber Security. Currently he is working as Intern - Information Security Engineer at Sri Lanka CERT|CC



 

 

 

 

 

 

 

 

 

 


 




 

 

 

 

 

 

 

 

 

 

 

 

References

1 Statistics on the Internet growth in Sri Lanka
http://www.trc.gov.lk/images/pdf/
statis_sep_2012.doc
2.The Dragon Research Group (DRG)
http://www.dragonresearchgroup.org/
3.TSUBAME (Internet threat monitoring system) from JPCERT | CC
https://www.jpcert.or.jp/english/tsubame/
4.Shadowserver Foundation
http://www.shadowserver.org/wiki/
5. Team Cymru
http://www.team-cymru.com
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
  
  Google girds for enterprise battle with Chrome OS subscription
  

  

"....Google this week added features and functionality to a $50 subscription plan, renamed Chrome Enterprise, to position its lightweight Chrome OS as credible competition for rival Microsoft and Windows in the workplace...."

 

'Self-driving' lorries to be tested on UK roads

  

"...Small convoys of partially driverless lorries will be tried out on major British roads by the end of next year, the government has announced.
A contract has been awarded to the Transport Research Laboratory (TRL) to carry out the tests of vehicle "platoons"....."

  Creators Update on two-thirds of Windows 10 machines
   

'...Last month Microsoft removed the throttle that was limiting the rollout of the Creators Update, opening it up to every compatible machine. As a result, penetration of this latest version of Windows has gone from 50 percent to 65 percent, according to the numbers provided by AdDuplex....'

How to switch from Android to iPhone

   

  

'...iPhone sales regularly exceed analystsí expectations, and millions of people who are purchasing an Apple smartphone for the first time are switching from Android devices. So, if you are an Android user thinking of switching to iOS, you arenít alone. This guide should help you enjoy a smooth transition....'

PRIVACY ACTIVISTS SUFFER LEGAL SETBACK IN NATIONAL SECURITY LETTER CASE

  

'....Privacy activists suffered a legal blow when a panel of California appeals court judges ruled Monday the Federal Bureau of Investigation could continue its practice of secretly issuing National Security Letter (NSL) requests for customer data from communications firms....'

Month in Brief
Facebook Incidents Reported to Sri Lanka CERT|CC in July 2017
     
  Statistics - Sri Lanka CERT|CC

500+ Android apps found containing program that can download spyware plug-in

'...More than 500 mobile apps on Google Play were recently discovered containing an advertising software development kit capable of downloading malicious plug-ins that can spy on Android users' call histories, researchers from mobile security company Lookout have reported.....'

FACEBOOK AWARDS $100K TO RESEARCHERS FOR CREDENTIAL SPEARPHISHING DETECTION METHOD

"...A group of researchers recently identified a real-time way to detect credential spearphishing attacks in enterprise settings. The discovery net the researchers $100,000 last week from Facebook, which awards money as part of its annual Internet Defense Prize partnership with USENIX Association..."
Survey: Cloud security concerns linger, but not enough to stop adoption

ď..Organizations are increasingly willing to migrate their applications, data and processes to the cloud in spite of lingering security concerns, according to a new survey of Canadian senior-level IT practitioners by security and cloud solutions provider Scalar Decisions...Ē
10 Google Docs tips you should know

."...Google Docs is a hugely popular cloud-based productivity suite. And it is much more full-featured than you may think. These 10 great Google Docs tips, including how to collaborate on a Google Doc, will help you get the most out of the software...."

 
Notice Board
  Training and Awareness Programmes - August  2017
  
DateEventVenue

Brought to you by: