How to Fight ISIS Online

We may control the Air, but the enemy controls the airwaves (Media).

Ghost Sec Speaks with “24′ News Group

The Electronic battle against al Daash terrorist is open to everyone to participate and unleash the campaigns capabilities. It is able to clamp down on the media arm of ISIS … Continue reading

May 23, 2015 · Leave a comment

8 Security Practices to Use in Your Employee Training and Awareness Program

This might be hard to believe, but it is true: 59 percent of data breaches are happening not because of some smart hacker who wants to do harm to your company but because of your own employees.

In order to stop these incidents, you have to focus on two things (other than investing in new technology): set your internal processes and procedures correctly, and train your employees and make them aware of the security threats. In this article, I’ll focus on the second issue, which topics to include in your security training and awareness program.

The suggestions below are applicable regardless of whether your employees are using smartphones or computers, or if they’re using their own devices or company equipment.
1) Authentication

Of course, your employees must use complex passwords, and must never tell these passwords to anyone.

This is because if their computer, laptop, smartphone, or any other device gets stolen, not only will the thief control all the data on this device – he will also be able to penetrate your company network and create havoc with your company data.

The best practice is to use special software called password managers because with such software, your employees will need to remember only one complex password, while the password manager will remember all the others. And the good thing is that one and the same password manager can be used for all the employee’s devices.

Further, for most important services like email and file sharing, your employees should use even more advanced techniques like two-factor authentication – such techniques are available for free these days from most of the cloud providers, and offer a higher level of security, even if the passwords get compromised.

These two-factor authentication systems can work together with a phone (by sending a text message to a legitimate user) or with special USB keys – without them, access to the account would not be allowed.
2) Network connection

Unfortunately, wireless connections have proved to be very unsafe. For example, your employees should avoid Bluetooth whenever possible because it has proved to be the easiest to break.

May 4, 2015 · 1 Comment

Do not use Platinum Hide IP try ZenMate

Protect Your Identity
Anonymous web surfing enables you to prevent identity thieves from stealing your identity or other personal information, and keep your computer safe from hacker attacks or other risks.

Choose IP Country and Check IP
Proxy lists of many countries are enabled and you decide to select one country from the Choose IP Country window. You can check the current IP address directly.

Send Anonymous Emails
Send anonymous emails through any web based mail system such as Gmail, Hotmail, etc.

Get Unbanned from Forums and Blocked Websites
Change your IP address and then you can get yourself unbanned from any forums or other blocked websites that have ever banned you.

April 4, 2015 · 1 Comment

Member of The Internet Defense League