8.7 C
London
Wednesday, September 20, 2017
Home Tags Disposable

Tag: disposable

143 million now face identity theft threat, so here's what to do if you're one of them.
Zeiss provides an effective way to clean and preserve valuable optics. Whether used with camera lenses, eyeglasses, sunglasses, telescopes, or spotting scopes, these non-abrasive pre-moistened wipes are safe and effective.

These ammonia-free wipes are appropriate for anti-reflective coatings and may also be used to clean laptop, GPS, tablet, or cell phone screens without leaving streaks.

Designed for a single use, these wipes come in individual disposable packets.  The wipes are highly rated on Amazon, where it currently averages 4.7 out of 5 stars (read reviews).
Its typical list price of $29.99 has been reduced 13% to $25.99 for a pack of 400. See the discounted Lens Cleaning Wipes now on Amazon.To read this article in full or to leave a comment, please click here
17 were stuck together and 10 others were floating around.
We get behind the wheel (or handlebars) of some unusual vehicles in Nashville.
Security vendor improves its Silo disposable web browser technology, making it easier for organizations to deploy.

Lazarus Under The Hood

Today we'd like to share some of our findings, and add something new to what's currently common knowledge about Lazarus Group activities, and their connection to the much talked about February 2016 incident, when an unknown attacker attempted to steal up to $851M USD from Bangladesh Central Bank.
Forget disposable batteries and keep the action going with the Xbox One Play & Charge Kit. Recharge while you play or afterwards, even when your Xbox is in standby. The long-lasting rechargeable battery fully charges in under 4 hours. Compatible with the original Xbox One Wireless controller and the new white Xbox Wireless Controller. The typical list price of $24.99 has been reduced 25% to $18.74. See the discounted Xbox One Play and Charge Kit on Amazon.To read this article in full or to leave a comment, please click here
Zeiss provides an effective way to clean and preserve valuable optics. Whether used with camera lenses, eyeglasses, sunglasses, telescopes, or spotting scopes, these non-abrasive pre-moistened wipes are safe and effective.

These ammonia-free wipes are appropriate for anti-reflective coatings and may also be used to clean laptop, GPS, tablet, or cell phone screens without leaving streaks.

Designed for a single use, these wipes come in individual disposable packets.  The wipes are highly rated on Amazon, where it currently averages 4.7 out of 5 stars (read reviews).
Its typical list price of $29.99 has been reduced 27% to $21.99 for a pack of 400. See the discounted Lens Cleaning Wipes now on Amazon.To read this article in full or to leave a comment, please click here
Zeiss provides an effective way to clean and preserve valuable optics. Whether used with camera lenses, eyeglasses, sunglasses, telescopes, or spotting scopes, these non-abrasive pre-moistened wipes are safe and effective.

These ammonia-free wipes are appropriate for anti-reflective coatings and may also be used to clean laptop, GPS, tablet, or cell phone screens without leaving streaks.

Designed for a single use, these wipes come in individual disposable packets.  The wipes are highly rated on Amazon, where it currently averages 4.7 out of 5 stars (read reviews).
Its typical list price of $29.99 has been reduced 23% to $22.99 for a pack of 400. See the discounted Lens Cleaning Wipes now on Amazon.To read this article in full or to leave a comment, please click here
Analysts today gave mixed reviews to Microsoft's new security model for its Edge browser, labeling it as both a landmark move and an attempt to mask the underlying problems of Windows that the company has refused to address. "This is one of those ideas...
Not long ago, the sharing economy seemed to take over. Privacy was dead, and no one cared.

That was until revelations about government spying and worse came to light.

Today, it seems just as many people are sharing...but many do so with more caution. For some of us, the need to go truly anonymous is more important than ever.

But when you go to a service online and its first three choices for signup are to use your existing Google, Facebook, or Twitter account credentials, it's almost like a subtle background check. Other services—like Google—expect you to share a phone number and older email address—to sign up (and if not at initial signup, you'll need them for activations later).
So you're not exactly hiding your tracks. What do you do if you want to set up an email address that is completely secret and nameless, with no obvious connection to you whatsoever, but you don't necessarily want the hassle of (or have the chops for) setting up your own servers? This goes beyond just encrypting messages.

Anyone can do that with a Web-based email like Gmail by using a browser extension like Secure Mail by Streak.

For desktop email clients, GnuPG (Privacy Guard) or EnigMail is a must. But those don't hide who sent the message. Here are the services you should use to create that truly nameless, unidentifiable email address.

But be sure to use your powers for good. First Step: Browse Anonymously Your Web browser is tracking you.
It's that simple.

Cookies, and so-called unstoppable "super cookies" know where you've been and what you've done and they're willing to share.
Sure, it's mostly about making sure you see targeted ads, but that's not much consolation for those looking to surf in private. Your browser's incognito/private mode can only do so much—sites are still going to record your IP address, for example. If you want to browse the Web anonymously (and use that private time to set up an email), you need not only a virtual private network, but also the Tor Browser, a security-laden, Mozilla-based browser from the Tor Project.
If you don't know about Tor, it's what used to be called The Onion Router; it's all about keeping you anonymous by making all the traffic you send on the Internet jump through so many servers, people on the other end can't begin to know where you really are.
It'll take longer to load a website than it would with Firefox or Chrome, but that's the price of vigilance. The Tor Browser is available in 16 languages, for Windows, Mac OS, and Linux.
It's self-contained and portable, meaning it'll run off a USB flash drive if you don't want to install it directly.
It's totally free.

Even Facebook has a Tor-secure address to protect the location of users—and let users get access in places where the social network is illegal or blocked, like China.

An estimated 1 million people use it.

There are also a version for getting Tor access to Facebook on Android devices. Don't get the impression that Tor is utterly perfect and will keep you 1,000 percent anonymous.

The criminals behind the Silk Road, among others, tried that and failed.

But it's a lot more secure than openly surfing.
It took law enforcement agencies with a lot of resources to get those bad guys. Anonymous Email You can set up a relatively anonymous Gmail account, you just have to lie like a bathroom rug.

That means creating a full Google account, but not providing Google your real name, location, birthday, or anything else they can use when you sign up (while using a VPN and the Tor Browser, naturally). You will eventually have to provide Google some other identifying method of contact, such as a third-party email address or a phone number. With a phone, you could use a burner/temp number; use an app like Hushed or Burner or buy a pre-paid cell phone and lie through your teeth when asked for any personal info. (Just know that even the most "secure" burner has its limits when it comes to keeping you truly anonymous.) As for that third-party email, there are anonymous email services you can use, so why use Gmail at all? The Electronic Frontier Foundation (EFF) says it's smart to use a different email provider from your personal account if you crave anonymity—that way you're less likely to get complacent and make a compromising mistake. Note that you also should use an email service that supports secure sockets layer, or SSL, encryption.

That's the basic encryption used on a Web connection to prevent casual snooping, like when you're shopping at Amazon. You'll know it's encrypted when you see HTTPS in the URL, instead of just HTTP. Or a lock symbol shows up on the address bar or status bar.

The big three webmail providers (Gmail, Yahoo Mail, and Outlook.com) all support HTTPS.

Get the HTTPS Everywhere extension for Firefox, Chrome, Opera, and on Android, to ensure that websites default to using the protocol. That's great for Web surfing, but neither HTTPS nor VPN is enough to stay hidden when emailing. You know that. Pseudonyms in email (like anonguy55@gmail.com) aren't enough, either. Just one login without using Tor means your real IP address is recorded.

That's enough for you to be found (if the finder can get your provider to give up some records).

That's how General Petraeus got nailed. The point is, once you've gone this far, there's no reason to go back. Use a truly anonymous Web-based mail service to send your messages. Here are some of the best. Hushmail Recommended by the EFF and others, Hushmail's entire claim to fame is that it's Web-based, easy to use, doesn't do advertising, and has built-in encryption between members. Of course, to get all that, you have to pay for it, starting at $49.99 per year for 10GB of online storage.

There is a free version with 25MB of storage.

Businesses can use it for $5.99 per user per month, and they get their own domain name (though then you need to obfuscate your info for the Whois database). Note that Hushmail has turned over records to the feds before, and its terms of service state you can't use it for "illegal activity," so they're not going to fight court orders.

But at least they're honest about it up front. Hide My Ass! Anonymous Email Hide My Ass is a well-liked private VPN service that makes it a breeze for users to access content blocked at their location, not to mention providing a much higher level of privacy (hence the name).

Base price is $4.99 a month; the price goes down if you pay for multiple months at a time. HMA's Anonymous Email service is not just for VPN customers. You get an address @hmamail.com that can be set to last 24 hours, one week, one month, six months, or 12 months.

There's a countdown clock to indicate just how long you have left when reading messages.

At signup, it does ask for your existing email address, so HMA can send it a note when you get a message on the anonymous account, but it's not required.

The interface won't win any awards—Hushmail's is infinitely nicer—but it gets the job done. Note that this is for receiving only; you can't send a message out. HMA also has iOS and Android apps that provide secure mobile connections, plus privatized SMS texts and chat services with other HMA users. Guerrilla Mail Guerilla Mail provides disposable, temporary email.

Technically, the address will exist forever, and never be used again.

Any messages received at the address, accessible at guerrillamail.com, only last one hour. You get a totally scrambled email address that's easily copied to the clipboard.

There's an option to use your own domain name as well, but that's probably not keeping you under the radar. Guerrilla Mail is the perfect way to create an email address to sign up for a different, more permanent-yet-anonymous email address, or to send a quick, anonymous email instantly—no signup required. You can even attach a file if it's less than 150MB in size, or use it to send someone your excess bitcoins.

Coupled with the Tor browser, Guerilla Mail makes you practically invisible. Mailinator Mailinator's free, disposable email has a slick interface, but you probably don't even need it. Whenever you're asked for an email, just make up a name and stick @mailinator.com at the end.

Then visit the site, enter the name, and you'll see if it's received any messages. No signup required, though you can sign in with a Google account. Here's the problem.
If someone else comes up with the same name, then you both get access to the messages received.

There are no passwords.

There's also no sending possible.
Its FAQ states if you get an email from Mailinator, it's a guaranteed forgery.

This one is for quick service signups only, and only with the most obfuscated, obscure name you can come up with. Of course, you can pay $29/month if you want to get a 10MB storage inbox that is private just for you. Hide-Your-Email.com You don't get interfaces as simple as this very often. With no signup required, you enter the email name you want for an @pidmail.com address you can hand out.

The messages sent to it immediately show up.
It's that simple, though it's not for sending messages. You can reserve the address of your choice with a password, again at no cost to you. Email On Dek There's a two-step process to getting a free email for receiving messages at Email On Deck, but only because step one is a CAPTCHA to make sure you're a human being, not a Web-based robot.
It randomly assigns you an obfuscated email address (like "cynthia@l7b2l48k.com"). You can click a button to get assigned another, but they're all temporary. You don't want to use this service if you plan to ever use the address assigned beyond, say, an hour or two. TorGuard Email TorGuard is another global VPN service.

This one goes for around $9.95/month to start.

The service also provides a separate Anonymous Email, with service from free (10MB offshore storage) all the way up to $49.95/year service with unlimited storage.

They all have secure G/PGP encryption of mail and no ads. TrashMail.com TrashMail.com isn't just a site, but also a browser extension for Google Chrome and Firefox, so you don't even have to visit the site.

Create a new email from a number of domain options, and TrashMail.com will forward it to your regular address for the lifespan of the new address, as determined by you.

The only limit is how many forwards you can get; to go unlimited, you pay $12.99 a year.

The site provides a full address manager interface so setup as many addresses as you like to stay anonymous and ubiquitous.
Secure browsers, VPNs, protected email apps, and mobile security apps are just tip of iceberg, Flashpoint report shows. An analysis of activity on the Dark Web shows that jihadist groups are taking advantage of a wider range of technology tools and secure services than generally assumed for propaganda and communication purposes. Researchers from security vendor Flashpoint recently examined data obtained from what they described as primary sources from the Deep and Dark Web to understand how those affiliated with terror groups maintain online presences without being detected. The analysis showed that jihadist groups rely on six broad categories of digital tools and services to maintain an online presence, obscure their tracks from law enforcement, to proselytize, and to communicate with each other.

The tools include secure browsers like Tor, proxy services and virtual private networks (VPNs) such as CyberGhost VPN, protected email services, and encrypted chat and messenger tools. “Jihadists enact stringent online security measures starting with the World Wide Web’s most fundamental portal: browsers,” the Flashpoint report observed. Unlike a majority of online users who access the Web with browsers like Chrome, Safari, and Firefox, those involved in terror activities tend to use either the Tor browser or the VPN-equipped Opera browser -- both of which offer a way for users to browse relatively securely without easily revealing their IP addresses. They tend to combine the use of secure browsers with VPN tools such as F-Secure Freedome and CyberGhostVPN to make it more difficult from law enforcement to keep tabs on their online activities, the Flashpoint report said. When it comes to email services, pro-ISIS and Al-Qaida affiliated groups tend to use a slew of protected email services to try and remain under the law enforcement radar.

Among the email services that are popular among such groups are Hush-Mail; ProtonMail, an encrypted email service developed by researchers at CERN and MIT; and GhostMail, an encrypted email service from Switzerland. Services that offer temporary, disposable email accounts without requiring users to register for an account are also popular. One example is YOPmail, a service that was used by Al-Qaida in Yemen to release a video of a terror attack on the office of French satirical newspaper Charlie Hebdo last January, Flashpoint said. Black Hat’s CISO Summit Aug 2 offers executive-level insights into technologies and issues security execs need to keep pace with the speed of business.

Click to register.
Applications that allow terror groups to use mobile devices relatively securely are also apparently very popular on the Dark Web. Jihadist groups rely heavily on mobile technologies to communicate and stay in touch with others. But they appear acutely aware of the risks involved in using mobile devices and are leveraging a variety of tools to make it harder for law enforcement to monitor them, Flashpoint said.

Among such tools are Fake GPS, which provides a false physical location when users are using certain apps like Facebook; ISHREDDER Pro for permanently deleting files; and AFWall, an open source firewall for mobile devices. Besides the tools, jihadists also appear to be getting plenty of support and advice on how to use technology safely, from tech savvy peers. In one case documented in the Flashpoint report, a member of a jihadist forum distributed best practices and guidelines for using Tor.
In another incident, a forum member released a manual offering details on how to mask IP addresses and browse anonymously using CyberGhost VPN.

The advice covered weaknesses in VPN technology and workarounds for addressing them, like using a particular software tool to hide a computer’s disk serial number when browsing.  Meanwhile, a jihadist organization known as Horizons released a multi-episode series on the secure use of mobile devices for jihadist purposes on Telegram, an encrypted communications platform. “Jihadists’ reliance on technology for survival pushes the jihadist community to constantly learn, adapt, and advance through various technological tools,” Flashpoint said in its report. “[Their] unrelenting drive to adapt and conceal their online operations presents unique challenges to monitoring them.” Related stories:   Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ...
View Full Bio More Insights