How to Secure Your (Easily Hackable) Smart Home

As more devices and appliances with Internet capabilities enter the market, protecting those devices from hackers becomes critical. Unfortunately, many of these non-computer, non-smartphone devices — from toilets to refrigerators to alarm systems — weren't built with security in mind.

So what can someone who's already bought one of these devices do? When it comes to the so-called Internet of Things and the connected home, it's best to proactively secure the home network. There is no antivirus software for a smart TV, but you can protect your Wi-Fi network so hacking the TV doesn’t become a backdoor into your home.
 

How to make your connected home more secure

Here are some steps to protect your home network and the gadgets connected to it.

Secure the wireless network. The old Wired Equivalent Privacy (WEP) protocol is still widely used, but it is weak and easily compromised. Make sure the home wireless network is instead protected by the Wi-Fi Protected Access II (WPA2) protocol and a strong, complex password.

Give your Wi-Fi network an obscure name, or SSID, that doesn't give attackers personal information they can use in social-engineering attempts. For instance, don't call it "[Your Name] House." Instead, call it something random, such as "FBI Surveillance Van."

Disable guest network access entirely, and to be strict about who — or what — can get on the network.

Create two different Wi-Fi networks if your router can handle multiple SSIDs. Trey Ford, global security strategist at security company Rapid7, suggests one network for computers, tablets and smartphones used for online banking, shopping and general Web activity; another network can be for smart devices.

Good password management is essential. Neither network equipment (such as routers and switches) nor newfangled gadgets (such as smart TVs) should use default factory-set administrator passwords. Change each admin password to something suitably strong and complex, and regularly change them going forward. When possible, usernames should be also changed to make it even harder for attackers to brute-force their way in.

Firewall the network, either with a stand-alone appliance or software that ships with the router, to restrict incoming connections.

Most networked IoT devices include information about the ports, network protocols and IP addresses used in the owner's guide or the support website. Set the firewall to allow traffic on those specific ports and no others. Port restrictions will cut down on opportunistic network-probing attempts.
 

Security tips beyond the network

Once the network is secure, examine each IoT device you own— and what it is doing. Disable remote-management access and other powerful network tools if they won't be used.

Install security software wherever possible, such as on mobile devices used to control IoT devices. If attackers can access a smart garage-door opener or a smart thermostat via a malicious Android app instead of by hacking the device directly, they will go with the easier option.

Check manufacturers' websites for firmware updates on a regular basis, as Internet of Things companies can be slow to patch vulnerabilities and push out updates. Install each update right away. Updating the firmware is particularly important for networking gear such as firewalls and routers.

Pay attention to brands. Consumers expect smart-device vendors to take proper steps to secure the platform, Martincavage noted. But if the manufacturers don't take security seriously, or claim the underlying platform is "hacker-proof," be wary. Better-known brands are less likely to risk their reputations this way, he said.

Know the Risks Before You Invest in Cryptocurrencies

It’s not just bitcoin. There are now hundreds of cryptocurrencies, which are a type of digital currency, on the market. They’ve been publicized as a fast and inexpensive way to pay online, but many are now also being marketed as investment opportunities. But before you decide to purchase cryptocurrency as an investment, here are a few things to know:

  • Cryptocurrencies aren’t backed by a government or central bank. Unlike most traditional currencies, such as the dollar or yen, the value of a cryptocurrency is not tied to promises by a government or a central bank.
     
  • If you store your cryptocurrency online, you don’t have the same protections as a bank account. Holdings in online “wallets” are not insured by the government like U.S. bank deposits are.
     
  • A cryptocurrency’s value can change constantly and dramatically. An investment that may be worth thousands of dollars on Tuesday could be worth only hundreds on Wednesday. If the value goes down, there’s no guarantee that it will rise again.
  • Nothing about cryptocurrencies makes them a foolproof investment. Just like with any investment opportunity, there are no guarantees.
  • No one can guarantee you’ll make money off your investment. Anyone who promises you a guaranteed return or profit is likely scamming you. Just because the cryptocurrency is well-known or has celebrities endorsing it doesn’t mean it’s a good investment.
  • Not all cryptocurrencies or the companies behind them are the same. Before you decide to invest in a cryptocurrency, look into the claims the company is making. Do an internet search with the name of the company and the cryptocurrency with words like review, scam, or complaint. Look through several pages of search results.

A Single-Character Message Can Crash Any Apple iPhone, iPad Or Mac

Only a single character can crash your iPhone and block access to the Messaging app in iOS as well as popular apps like WhatsApp, Facebook Messenger, Outlook for iOS, and Gmail.

First spotted by Italian Blog Mobile World, a potentially new severe bug affects not only iPhones but also a wide range of Apple devices, including iPads, Macs and even Watch OS devices running the latest versions of their operating software.

Like previous 'text bomb' bug, the new flaw can easily be exploited by anyone, requiring users to send only a single character from Telugu—a native Indian language spoken by about 70 million people in the country.

Once the recipient receives a simple message containing the symbol or typed that symbol into the text editor, the character immediately instigates crashes on iPhones, iPads, Macs, Apple Watches and Apple TVs running Apple's iOS Springboard.

Apps that receive the text bomb tries to load the character, but fails and refuses to function properly until the character is removed—which usually can be done by deleting the entire conversation.

The easiest way to delete the offending message is by asking someone else to send a message to the app that is crashing due to the text bomb. This would allow you to jump directly into the notification and delete the entire thread containing the character.

The character can disable third-party apps like iMessage, Slack, Facebook Messenger, WhatsApp, Gmail, and Outlook for iOS, as well as Safari and Messages for the macOS versions.

Apple was made aware of the text bomb bug at least three days ago, and the company plans to address the issue in an iOS update soon before the release of iOS 11.3 this spring.

The public beta version of iOS 11.3 is unaffected.

Since so many apps are affected by the new text bomb, bad people can use the bug to target Apple users via email or messaging or to create mass chaos by spamming the character across an open social platform.

Why Manufacturers Should Be Mindful of Cybersecurity

World trade in manufactured goods more than doubled between 2000 and 2014 – from $4.8 trillion to $12.2 trillion. It is this tremendous growth that has made the manufacturing industry more prone to cyberattacks.

A 2017 study showed that 40 percent of manufacturing companies in the U.S. were affected by cyber incidents in the past 12 months and 38 percent of those impacted suffered damages in excess of $1 million. The manufacturing industry now ranks second in the most attacked industries for cybercrime, next to health care. While health care cybercriminals target the personal information of people, manufacturing cybercriminals are mostly after intellectual property. From 2016 data, Verizon reports 94 percent of cyberattacks is credited to espionage, making the industry the top target for spies.

Cybersecurity, therefore, becomes a high priority for manufacturers everywhere. Cybersecurity is defined as “the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this”. Simply put, a strong cybersecurity system protects a company’s assets from cyber threats and cyberattacks to ensure business operations run effectively.

These attacks are aimed towards acquisition of critical manufacturing information through malware installations. Stolen information may be used as ransom, withholding manufacturing processes in exchange for money. In this case, the business may be partially compromised or completely paralyzed, leaving manufacturers no choice but to retrieve stolen the data for business to resume.

Information may also be stolen due to business rivalry: compromising competitors’ operations or developing stolen data without the expense and years of product research and development. Some cyberattacks are even committed out of revenge.

No matter the motive, cybersecurity must be taken seriously. Protect your company’s assets by performing some preventive measures.

  1. Conduct IT risk assessments yearly to identify possible sources of threats. This way, the company can increase security where systems may be vulnerable.
  2. Perform annual penetration tests to identify systems’ weaknesses so improvements can be made accordingly.
  3. Update security features based on new threats.
  4. Drive increased awareness of cybersecurity with employees. Early detection of cyberattacks and the appropriate steps of action must be disseminated to everyone working for the company.
  5. Conduct data backup and recovery of the most critical information in case of successful cyberattacks.

Automated manufacturing equipment also helps protect the company from threats and attacks. Keep in mind that the company’s confidential data is crucial to the business and must be given utmost priority and high security.

The Best Free Office Software of 2018

Everyone needs reliable office software, and some of the very best suites are completely free – whatever operating system you use. Here, we've put the very best free office software suites through their paces – both downloadable desktop software and browser-based applications – so you can pick the one that's best for you.

LibreOffice

If you're used to Microsoft Office, you'll pick up LibreOffice in no time

1. LibreOffice

Everything you could want from an office suite, fully compatible with Microsoft formats and totally free to use – even commercially

LibreOffice is so good, you'll wonder why you ever paid for office software. It's compatible with all Microsoft document formats, and has almost every feature you'll find in the latest versions of Word, PowerPoint and Excel.

The suite contains six programs to cover every common office task: Writer, Calc, Impress, Draw, Math and Base. The last three are tools you won't find in many other free office suites, and are designed for vector diagrams, mathematical functions and databases, respectively. The latter is particularly useful; free alternatives to Microsoft Access are hard to find.

LibreOffice is an open source project maintained by a huge and enthusiastic community of volunteers constantly working to improve stability and add new features. There's a great selection of extensions and templates to make it even more flexible, and it's free for businesses as well as home users.

LibreOffice is a fork of Apache OpenOffice, and the two are extremely similar, but we’d opt for LibreOffice thanks to its more frequent update schedule and more modern interface.

LibreOffice is available for Windows, Mac and Linux, but there are no official mobile versions available except for a document viewer for Android.

Divider

Google Docs Sheets and Slides

Provided you have a stable internet connection, Google offers an excellent free office toolkit

2. Google Docs, Sheets and Slides

For working across platforms and sharing documents, Google's excellent collection of online office apps is hard to beat

If you work collaboratively, or switch between a PC and a Mac, Google Docs, Sheets and Slides should be your first port of call.

For anyone who's already deep into the Android/Google ecosystem, this suite will be a natural choice. The three key tools run happily in any web browser, and are available as mobile apps for Apple and Android devices.

Google's free office suite doesn't offer the advanced tools you'll find in desktop software like LibreOffice (there are no pivot tables, for example, and there's no database tool) but everything is laid out in a clear, logical way and all your files will be saved and synced automatically so you don't have to worry about transfers and backups.

The chief disadvantage of Docs, Sheets and Slides is that opening files created using other office software is a cumbersome process and files aren't always converted perfectly.

This is partly because Google's office tools use web fonts rather than ones stored locally on your device, and partly because Microsoft documents sometimes contain features not supported by Google. If that's a deal breaker for you, read on...Divider

Microsoft Office Online

Like the look of Google's suite, but need native support for Microsoft documents? Office Online is for you

3. Microsoft Office Online

Microsoft is taking the fight to Google with slimmed-down versions of all its usual applications, available to use free online

 Microsoft's desktop software carries a subscription fee, but the company has noticed the threat posed by G Suite and created its own set of free online apps.

Microsoft Office Online looks and works just like its desktop equivalent, and although advanced tools like pivot tables are out of reach, but aren’t offered by Google either.

If you generally use Microsoft document formats, Office Online is a brilliant choice. Unlike Google's free office suite, it doesn't need to convert your files before you can work on them, and you can share them easily through your Microsoft OneDrive account. Just log in using your Microsoft account (the same one you use to log into Windows 10) and you're ready to go.

There's a version of Office Online for Chrome, plus mobile editions of Office for iOS and AndroidDivider

WPS Office Free

Each application in WPS Office Free has a ribbon-based design very similar to Microsoft Office

4. WPS Office Free

A feature-packed free office suite for Windows, Linux and Android

 WPS Office Free is a slimmed down version of a premium office suite, but you'd hardly know it. Each of its three programs looks just as slick as the latest versions of Word, Excel and PowerPoint, and is packed with just as many features.

File format support is excellent, and you can save your work in native Microsoft formats for easy sharing with Office users. There's no database software, but WPS Office comes with an excellent free PDF reader that's a great replacement for Windows' built-in app.

There's the occasional ad, but these are few and far between. They certainly won't get in the way of your work, and you'll easily forget that everything in this suite is completely free.

There are versions of WPS Office Free for Windows and Linux systems, as well as apps for Android devices, but Apple device users will need to look elsewhere.Divider

SoftMaker FreeOffice

If you find Microsoft Office's ribbon interface awkward to navigate, you'll like SoftMaker FreeOffice's more straightforward approach

5. SoftMaker FreeOffice 2016

A free version of a premium suite, with most pro features intact

Like WPS Office Free, SoftMaker FreeOffice provides analogs for Microsoft Word, Excel and PowerPoint (TextMaker, PlanMaker and Presentations respectively).

As with all the free office suites in this roundup, there's support for Microsoft file formats from 1997 onwards. It also offers effortless conversion to both PDF and Epub formats, which is a welcome addition.

Unfortunately, some key features are exclusive to the premium version of the software. Some of these (like tabbed browsing) are nice to have but non-essential, but the lack of a thesaurus is a real drawback for anyone who writes on a regular basis.

FreeOffice doesn't look quite as smart as WPS Office, but if you dislike the Microsoft ribbon and find it unintuitive then you'll prefer the slightly more old fashioned approach to navigation.