What’s the difference between VPNs and Proxies and which Option is more secure?

If you are overseas somewhere and want to access your Facebook page…don’t be surprised if you can’t do this. In fact, you won’t even be able to get onto the Facebook site (or YouTube, for that matter), depending on what country that you are visiting. This is because some countries limit website access for their citizens.

4WYou can get around this with a VPN (virtual private network) or proxy server. However, they are not one and the same. Let’s look at the features of each.

VPN

  • A VPN does the so-called scrambling or encryption of data so that hackers can’t tell what you are doing. To put this another way, a VPN provides a “tunnel” through which your data goes. This tunnel cannot be penetrated. Your transmissions are hidden, unable to be viewed.
  • This protected data includes e-mail communications, login information, instant messages, which sites you visit, downloads and more.
  • A VPN is private communication over a public network and can be used on all types of devices.
  • A VPN will alter your IP address, making it seem that you are using your computer somewhere other than the country that prohibits access to Facebook. You can navigate Facebook with ease while visiting that country.

Proxy Server

  • This makes the user anonymous. The proxy server does the job of anonymizing. The server of the site you want to visit receives requests from this anonymous server. As a result, even if you are in that country that bans Facebook access, it will have no idea where you are located. Hence, you can get on Facebook.
  • Your data, transmissions, etc., however, are not hidden by any tunnel or scrambled (encrypted).
  • Therefore, with the proxy server, even though you can spend hours on Facebook or YouTube in that foreign country…any transmissions or activities you conduct can be intercepted by a hacker if you are using public Wi-Fi.

Now if you have a VPN with the proxy server, this solves that problem. Nobody will be able to snoop or steal data like your credit card information when you shop online.

However, there is no point in having both, when one can do the entire job: the virtual private network. Think of a VPN as having a built-in proxy server.

Hotshot Shield is a VPN that encrypts all of your online activities in that non-penetrable tunnel, while at the same time making it impossible for your location to be identified. You are essentially anonymous. Hotshot Shield works for both wireless and wired connections.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures.

College bound kids: protect your identity

The good old days were when today’s college kids’ parents lugged their typewriters into their dorm room, and they communicated to people via the phone on their room’s wall. Their biggest worry was someone stealing their popcorn maker. Nowadays, college kids need to beware of remote invasions by thieves.

http://www.dreamstime.com/stock-photos-identity-theft-red-words-binary-code-computer-monitor-image39907813Major educational institutions have reported numerous data breaches; they come from criminals but also result from professors being careless with laptops and students on open WiFi.

Why are colleges hotspots for hackers? There’s all sorts of users on insecure networks, not to mention a wealth of data. So it’s no longer just warning your kids not to walk the campus alone at night or to stay away from drugs and alcohol.

Students can have a tendency to reuse the same password—anything to make college life less hectic. All accounts should have a different password. And don’t use a password like GoSpartans. Make it nonsensical and full of different characters.

Social engineering. College kids can be easily tricked into making the wrong clicks. A malicious e-mail can pose, for instance, as something from the university. The student gets suckered into clicking on a link that then downloads the computer with malware. A student may be tricked into clicking on a “video link” to view something hot, only to instead download a virus.

Students should look for signs of a scam like bad grammar and spelling in the “official notice” and other suspicious things. Though it’s of utmost importance to have antivirus and antimalware, these won’t stop a thief from using the student’s credit card number after the student is tricked into giving it on a phony website.

College kids also have a tendency to go nuts on social media, posting continuous updates of their day-to-day actions. If the student’s Facebook page is chockfull of personal information, a crook who has the student’s e-mail address could use this information to figure out the student’s answer to security questions and then gain entry to their accounts. This is why two-factor authentication is so important. The thief can’t possibly bust into an account if they need a special one time PIN code with the password usually delivered via a text on their mobile.

Unprotected Wi-Fi. Not all campuses provide secure Wi-Fi, and the presence of antivirus, antiphishing, antispyware and firewalls don’t guarantee all levels of protection. To play it safe, students should never visit bank account sites, insurance carrier sites and other such sites while using public Wi-Fi. Better yet install Hotspot Shield to lock down and encrypt any unsecured WiFi.

Connection salad. Campuses are full of all sorts of connected devices, from phones and tablets to nutrition trackers and other gadgets. Everyone has a device, creating a hodgepodge of connections that puts students and everyone else on campus at risk for a data breach. These Internet of Things devices need their latest software updates and firmware updates. Keep them safe from physical theft too. Shut them off when not in use.

Password protect devices: We lose stuff and stuff gets stolen. While it is certainly more convenient to not password protect a mobile, laptop or tablet, it is also an identity waiting to be stolen. Everything needs a password and don’t share that password with anyone but parents. Because when you are sleeping some night, a drunk college dormate will come log in and start posing as you on social posting disparaging stuff that will last forever.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures.

10 Easy Ways to hide from spies

Who would have ever thought that that marvelous invention, the smartphone, as well as your tablet and PC, would give you cause for concern about hiding from spies? And when I say spies I mean anyone who has a vested interest in your information whether that is governments foreign or domestic or a spouse, employer, marketer or just some freaky weirdo.

11D Today’s technological conveniences also act as portals through which the spies can gain access to your personal information. As a security analyst, I’ve come up with the following:

Easy Ways You Can Hide Your Data from the spies

  1. Use a VPN (virtual private network) such as Hotspot Shield VPN when online. This way your data traffic is encrypted—and thus difficult to detect by spies or any hackers, whether you use a phone, computer or tablet. Data transmission may still occur due to ads, but the VPN will put a stifling effect on it.
  1. Use Tor. You can hide from mass and corporate surveillance with a Tor installation—which the National Security Agency does not like—because it works.
  1. While playing games put your mobile device into airplane mode (which suspends data transmission). You don’t need to be online to play all games. Being offline means your personal data can’t be transmitted.
  1. HTTPS! Install HTTPS Everywhere, a browser plugin for Chrome, Firefox and Opera. It’s free, though currently not available for smartphones. HTTPS means security on the visited web site.
  1. Post on social media only when you’re connected with your password-protected, secure workplace or home Wi-Fi. And in some cases you may need to post via computer, not your smartphone!
  1. Hard drive encryption. A person who uses your computer or mobile will not be able to copy its data if you have an encrypted hard drive. Local storage can be encrypted on the latest versions of Windows, Macs, iOS and Android.
  1. Turn off cellular data connections. Unless you absolutely must know every single e-mail that’s coming in when you’re out and about, switch off the cellular data. Check your e-mail only when you’re on a secure network.
  1. Turn off the GPS and Wi-Fi on your mobile device. GPS, Wi-Fi and geolocation can pinpoint your location fast. Keep them off unless you need them (lost in the wilderness?). To turn off geolocation, start with your apps that take photos, then do the rest. Then you won’t have to worry about government agents finding you.
  1. Dumb down. Your phone, that is. If you’re really concerned about privacy, ditch the smartphone and use a “dumb” phone also known as a “feature phone”. Though even a simple cellphone can be used as a tracking device, it makes it hard for anyone to get your location and data since you can’t get on social media or play online games with a dumb phone.
  1. Never open e-mails with a blank subject line. Though your spacey friend may neglect to type into the subject line, a blank subject field can also mean a virus waiting to make its move. If the sender is familiar, send them a newly created message asking if they just sent you something with a blank subject line.

So there you have it: 10 ways that pretty much work to keep hidden from the spies and all other snoops.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures.

School WiFi Often Open and Insecure

2W

Many elementary, middle and high schools are offering WiFi, and of course colleges and universities provide it as well. Some provide the networks with a required login access, and for others it’s open, unencrypted and free for anyone to jump on.

Traditionally, when we think “login,” we believe that also means encrypted and secure. However, logging in with a user name and password doesn’t necessarily mean it’s a secure network. Traffic on many networks requiring a login is unencrypted, which means anyone who connects to the network with the right “sniffing” tools can see others’ information.

When connecting to a network that requires a login credential, the easiest way to tell if that network has encryption is to pull up the list of wireless networks from your control panel and simply hover over each with your mouse (or right click) to show its properties. Any network labeled WPA or WP2 has encryption. If it’s labeled WEP, it also has encryption, but at a substandard level that is hackable.

Want to be safe? Use a private VPN! Logging into public WiFi without any encryption puts all your information at risk. Install a wireless VPN such as Hotspot Shield. Hotspot Shield VPN is a great option that protects your entire web surfing session, securing your connection on both your home internet network and on public internet networks (both wired and wireless). Hotspot Shield’s internet security solution protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads, etc.) are secured through HTTPS—the protected internet protocol.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures. For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247.

4 Ways to Share Paid Hotspots

There are a number of scenarios you might be in where friends, family and colleagues need to jump on a (read: your) wireless connection, but they’d rather not pay a connection fee. So if you have the goods right in front of you and they can connect for free, they may buy you a cookie. Here’s how to be a good pal and earn their gratitude and occasional baked goods:

  1. MiFi ($50-$170 for the device and $50 monthly): There are a number of devices, data cards or USB plugins available through the major phone carriers that offer fast mobile internet speeds for up to 10 WiFi-enabled devices, including laptops, tablets, e-readers or music players. Many are powered by your laptop, while others stay charged up to 12 hours before recharging.
  2. Mobile phone tethering (free to $60 monthly): Tethering is when you use your phone as a hotspot. While iPhones, BlackBerrys, Windows Phones and Androids all offer tethering, not all phones support it. Still, most carriers offer tethering on most of their smartphones; some phones offer tethering through an application, while others go through the phone’s settings. Search out the term “tethering” and the name of your phone to determine your options.
  3. Pocket router ($30): At about the size of your thumb, the Asus WL-330NUL is the world’s smallest pocket router. Whenever you’re traveling or simply at a cafe, getting online becomes so easy as all your devices can use this USB-stick-sized router. Whether only WiFi or wired LAN is available, the pocket router creates your own private network and allows speedy cross-device communication, making it extra useful in staying connected anywhere.
  4. Virtual hotspot with your laptop (free to $30): There are two programs that work very well: Thinix WiFi Hotspot and Connectify. Connectify Hotspot lets you share your computer’s internet connection with other devices over WiFi. As long as your computer is online, your other nearby devices—and those of your friends and colleagues—will be, too.

Each of these connectivity options should contain a degree of encryption on its own. However, a virtual private network, such as Hotspot Shield VPN, is a free option that can encrypt all your wireless communications.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures. For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247.

Streamlined ‘Passpoint’ WiFi coming

WiFi connects us everywhere, such as in parks, subways, airplanes, coffee shops and public WiFi hotspots. The WiFi Alliance says there are more than a million hotspots worldwide, and a report by market research company Informa Telecoms and Media (Informa.com) reports that Wifi hotspot numbers are set to grow to 5.8 million globally in the next four years.

4WWhile all this wonderful WiFi is everywhere, there are issues with seamless connectivity and security that can be alleviated with cooperation from the larger ISPs and device manufacturers. Right now, public WiFi is wide open and vulnerable to wireless sniffers. Without a virtual private network like Hotspot Shield VPN, the data on your wireless devices are vulnerable to criminals.

According to the Wi-Fi Alliance, Wi-Fi CERTIFIED Passpoint™ will transform the way users connect to WiFi hotspot networks by making the process of finding and getting access to the right network seamless. It also provides user connections with WPA2™ security protection, enabling you to feel confident that your data is safe. Mobile devices that are certified for Passpoint, such as handsets and tablets, can still be used in existing hotspots. However, when you are in a Passpoint-enabled hotspot, you’ll discover a newly smooth connectivity experience.

An added benefit to seamless WiFi means less data usage on a carrier’s 3/4G network. With carriers pretty much nixing unlimited data use, consumers are finding they have to upgrade their data plans so they don’t go over their limit. With Passpoint, data usage will go down when WiFi connections happen effortlessly.

This is all great news for millions of people now using their wireless digital devices exclusively. But always keep in mind that no matter what you are using—a laptop, tablet, reader or mobile phone—wireless is inherently insecure and until Passpoint becomes as ubiquitous, a VPN such as Hotspot Shield VPN is as an essential layer of defense for your wireless devices.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures. For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247.

Location-based GPS Services are Risky

It’s pretty simple: Your mobile’s global positioning system (GPS) functionality allows location-based services to locate and publish information about your whereabouts on various applications and within the code of photos posted online. Various applications allow you to “check in” using your mobile and share your whereabouts with the world. These applications tap into your device’s GPS longitude and latitude data.

GPS certainly can be useful, such as with directions or when trying to find a local restaurant, but letting the world know where you are and where you aren’t every minute of the day is a little insane to me.

For example, when your location is broadcast on social networks, anyone can see it. An example is when you check into a hotel while on vacation. Thieves can see you’re not home, do an online search for your home address and burgle your house. Not cool.

Adults, teens and some kids use these services to meet up, but what could happen if your child’s exact location fell into the wrong hands? Parents now have to be particularly vigilant if their children use location-based services.

Freaky stalkers use GPS to track their victims. A stalker may not necessarily be a stranger but instead a family member, ex-boyfriend or ex-girlfriend using his or her personal access to manually turn on GPS tracking.

Always be aware of an application’s policy and access permissions. GPS data is also used in geotagging, which tracks exactly where photos and videos are taken by including data in the image file that records locations.

Many of us are unaware of this tracking feature, even though sharing images online has become immensely popular. Websites such as Facebook, Instagram, Flickr and YouTube are filled with pictures and videos that include location information. Always keep in mind this is personal information that you may be sharing inadvertently.

By using a VPN (virtual private network) appsuch as Hotspot Shield VPN, your mobile’s IP address is masked; this confuses some of the functionality in geotagging. So if you’re going to go without it, think before you turn on GPS and start snapping pictures to post.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures. For Robert’s FREE ebook text- SECURE Your@emailaddress -to 411247.

5 Mobile Internet Security Lessons

Do these things every day religiously and you will be more secure using your mobile devices:

  1. Be careful on social sites: When logging on via mobile, know that among Facebook’s billion users, thousands or hundreds of thousands of criminals are out there too and targeting its users. Hackers are creating viruses that specifically target Android users on Twitter, LinkedIn and YouTube on wired and wireless connections.
  2. Beware of keyloggers that steal online passwords and take over accounts of your friends so they can send out malicious links that will have a good chance of being clicked. Scams like these prompt you to click malicious links. Mobile versions of social sites make it easy to post content and status updates and make it especially easy to click before you think.
  3. Change up your passwords: Don’t use the same password for your accounts. If a criminal gets your Facebook password and email address, he will try it on other sites. Use different user names and passwords on your different accounts, especially on accounts where you keep personal information, credit cards, bank account data and so on. Use a mobile password manager to help yourself out.
  4. Protect yourself wirelessly: Attacks on PCs work the same on mobiles, so if you use a laptop to connect to a free WiFi or a mobile, you are equally vulnerable. Install a virtual private network such as Hotspot Shield VPN that allows you to tunnel in through a protected internet connection.
  5. Keep software up to date. Automatically update programs on every device you own, including your smartphone and tablet. Outdated operating systems, software and antivirus are useless against new attacks.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures. For Robert’s FREE ebook text- SECURE Your@emailaddress -to 411247.

5 Tips to Becoming Digitally Secure

Your digital life and your physical life coexist like land and sky which meet at the horizon all day and night. This means while you are present here on the ground, you also exist online. Coming to terms with this reality will help you make better decisions about securing that online self.

  1. Get device proficient: On a laptop, desktop, Mac, tablet, or smartphone, figure out what you’re doing. Take the time to learn enough about your electronics to become an expert on them.
  2. Become socially savvy: Use your devices to communicate socially. Keep in mind that online is forever. Consider that years from now, that information could be damaging or embarrassing. Assume everything you post is public and will be searchable forever, even with the strongest privacy settings available.
  3. Google your online reputation: Search your name and see what’s being said. There are plenty of websites that know who you are and mention you in some fashion. Creating your online persona socially will help establish your online presence.
  4. Invest in security: It’s not just your PCs—your identity, hardware and software are being targeted by criminals 24/7/365. Use common sense and know that if it looks too good to be true, it probably is. Today’s tools can insulate you from many criminal tactics and even help you locate a missing device. Whenever using free wireless, know that chances are someone is snooping on your communications. Get a VPN (Virtual Private Network)to protect your digital communications.
  5. Use effective passwords: “Princess” and “123456” are not strong passwords. Combine uppercase and lowercase letters with numbers and other characters.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures. For Robert’s FREE ebook text- SECURE Your@emailaddress -to 411247.

Where You’ll Get Hacked

Criminal hackers are targeting large enterprises and breaching millions of records every year. They are also targeting small mom-and-pop operations that don’t have the security budgets the big companies do. But you and I, the lowly consumer, are also being targeted because many of us are clueless when it comes to information security.

Some unfortunate and frankly unsurprising statistics:

  • 98%: credit cards being the primary data type stolen by criminal hackers in 2011 and 2012
  • 12.6 million: victims of identity theft in 2012
  • 3 seconds: how often someone becomes a victim of identity theft
  • $21 billion: financial losses to identity theft in 2012
  • 7%: percentage of American households falling victim to identity theft in 2012
  • 47%: hacker attacks using remote access, perhaps in the form of a Trojan that compromises a username or password, or by a victim giving up passwords in a phishing attack that gives hackers back-door access to a network or PC.
  • 1%: data compromised as a result of physical theft of a device. If that device isn’t password protected and/or encrypted, the information is up for grabs.
  • 72%: victims of a mock phishing scam who believed their friend was sending them a fraudulent link. This tells me people are too trusting.
  • 19%: home/office WiFi users who still use WEP encryption, which is very hackable. Use WPA2, which is much more secure.
  • 89%: public WiFi that is unsecured. So any time you use public WiFi, use Hotspot Shield VPN.
  • 10%: amount of spam that’s virus laden

Capture

2

How do you protect yourself from this mess?

  1. Create strong passwords using letters (uppercase/lowercase) and numbers.
  2. Use a secure updated browser and only plug in personal information when it reads HTTPS (S means it’s secure) in the address bar.
  3. Disable autorun, which can automatically download and install software—including malware.
  4. When using public WiFi, disable sharing and use a VPN to encrypt your online traffic.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures. For Robert’s FREE ebook text- SECURE Your@emailaddress -to 411247.