Security 11 – Two Factor Authentication

Two factor authentication is the next tool in our arsenal of being secure. After you have changed your passwords, now take the next step to secure it. While each service requires a different set up, the big names all use Google Authenticator. We think once you get this procedure in your workflow, you will be happy knowing you are really safe online.

Word of Warning: Please give yourself enough time to set this up. The first time is scary. Once you set it up, losing your second factor or your password will make your life extremely difficult. Remember you are trying to prevent impostors from accessing your information.

Show Notes:
Google Authenticator | Play | iTunes | Windows Phone
Y
ubico | Yubikey
L
astPass | Set Up 2FA
Google Accounts | Set Up
L
ist of Sites with 2FA | Evan Hahn

Security 10 – Home Sweet Secure Home

The migration home is generally a good time for everyone. You get to spend time with your family and friends; unless you know the computer. If you are good with the computer, you know this is the time of year where everyone asks you to quickly look at their computer, and fix their printer. On today’s show we present to you some stuff you can do on your travels back home. This may cost you some money, but at the end of the day you will be happy with the time you will save.

Show Notes:
First step – Backup:
Two Backup Hard Drives – One to setup with a backup service, and one for you to have. Any USB external hard drive will do.
Dropbox: Online backup for important need to have files.
Carbonite – Offsite, Online Backup

Second Step – Software
Patches – Windows Update
Windows Security Essentials
Ninite – Free, Ad Free Programs

Third Step – Remote Desktop
TeamViewer
Logmein

Security 09 – NSA Ate My Elf (Part 2 of Many)

It is that time of the month again, where we need to recap that last few weeks of NSA leaks. First, we tackle the AT&T meta data grab. Basically, no phone calls are private, and there is no expectation of privacy.

Then we talk about an interesting story about public wifi where garbage cans are scanning phone signals to determine demographic data.

Finally, we discuss how the NSA workers are using their work time to catch terrorists in World of Warcraft.

Show Notes:
http://business.time.com/2013/12/09/att-to-shareholders-no-nsa-snooping-data-for-you/

http://www.zdnet.com/microsoft-us-government-is-an-advanced-persistent-threat-7000024019/#

http://www.theguardian.com/world/2013/dec/09/nsa-spies-online-games-world-warcraft-second-life?CMP=twt_gu

http://www.cbsnews.com/news/uk-bars-trash-cans-from-tracking-people-with-wi-fi/

Security 08 -Privacy and Google Glass

A student of Chaim’s asked if I could answer some privacy related questions regarding glass. Of course we can, and of course we can ask Tom, another glass explorer, what he thinks. While not a security episode per see, we do talk about privacy and advocacy.

Show Notes:

1. The biggest concern regarding the Google Glasses is its privacy concern. Since you have the glasses are there any noticeable privacy issues which concern you?

2. Why do you think society is so paranoid about the Google Glass “creep factor” when there are devices out there that also do many of the same things?

3. There is also a lot of talk about Google being able to aggregate even more information on its users with the Glasses. What do you think about this?

4. If you could give a suggestion to Google, regarding fixing some of the privacy concerns with the Google Glasses, what would they be?

5. Do you think Google Glasses will ever become a widely adopted technology, just as smartphones are today? If so, why? And if not, what will it take for this to happen?

6. Businesses, such as bars, have already started to ban the Google Glasses. What do you think about this? Is it ok?

7. Lastly, after having the Google Glasses, would you recommend them to the general public to buy or is it not worth it?

Security 07 – What’s A Yubico?

After we helped you create strong passwords, the next thing you will want is a second factor of authentication. I know we didn’t cover it, but we want to introduce you to the Yubikey. Yubikey is this little USB key looking device that is amazingly well built, and has one feature. It puts a random string of characters to authenticate you against various devices.

We are joined by John Salter, COO of Yubico, to discuss all the great things Yubico and the Yubikey are doing. Please listen, comment, and let us know what you think.

They have been gracious enough to give us a coupon code for you to use on their holiday pack. The holiday pack includes a Standard Black Yubikey, Neo, and Nano for $99. With our code, you get $15 off to use until Tuesday, December 3rd.  Direct Link

At checkout use the code: insecurity
This is good until Tuesday, December 3rd.

Show Notes:
Yubico | https://yubico.com | @yubico | Facebook | Google Plus
Yubico Store | https://store.yubico.com
Cypto and Use Cases | https://opensource.yubico.com
Holiday Pack | Store