White House and FBI Point Finger at North Korean Hackers – How safe are you?

As the story unfolds, the ripples from the hacking of Sony Entertainment’s internet servers are spreading wider and wider. Now the President has come out and confirmed that the communist regime in North Korea is behind the hacking. It is assumed that the company was targeted because of an unflattering movie called “The Interview” which depicts the death of Kim Jong Un, the despotic leader of the beleagured country.

Of real interest to all Americans is the fact that this primitive, impoverished country is capable of such sophisticated hacking techniues. It appears the “black hat” hackers (so-called because they’re the bad guys, just like in classic Western movies of the 30s and 40s) dug deep into the Sony email accounts and produced many that proved embarrasing to senior management. They also hacked upcoming movie footage and poked around in the company’s archives.

As we have been saying for years, your online safety is only as good as your online defenses, and they need to be very sophisticated these days.

Some helpful tips to avoid getting hacked

1. HTTPS Everywhere is an add-on for Chrome, Firefox and Opera that ensures that whenever you visit a site that offers data encryption, you’re using it.

You can check whether a site offers encryption by looking at the address in your browser and seeing whether it begins with “https”, as opposed to “http” or “www” (the “S” stands for “secure”). The extension can be downloaded for free from the Electronic Frontier Foundation.

2. Software. Don’t download software from the web unless you trust the source. Always update the software security patches when Windows, Google, or Apple send them out.

3. Tape over your camera when you’re not using it to stop hackers watching you at home.

4. Use the TOR web browser to surf the web. It bounces around servers all over the world and makes life difficult for hackers. Get it free here.

5. Secure your email with GPG file and email encryption. Windows users download here. Mac here.

6. Leave your smartphone in another room. Hackers can listen in through the internal mic.

If you’re concerned about your online — and offline — privacy, check out Lee Bellinger’s Ultimate Guide to Low Profile Living.

The Founders clearly envisioned a free society with the right to privacy — but what they did not envision was the myriad of new ways in which technology now permits snoops and government bureaucrats to peer into and disrupt the private lives of citizens. We’ve exposed all the latest secrets on government spying, in a big way. Newly updated! Lee Bellinger’s Ultimate Guide to Low Profile Living offers 253 cutting edge strategies to help you reclaim and defend your privacy. Click here for details.


FREE Report. How to survive a major power outage

x