{"id":8657,"date":"2014-03-05T17:52:17","date_gmt":"2014-03-05T22:52:17","guid":{"rendered":"http:\/\/www.opensource.im\/?p=8657"},"modified":"2014-03-05T17:52:17","modified_gmt":"2014-03-05T22:52:17","slug":"security-lessons-from-rsa","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/security-lessons-from-rsa.php","title":{"rendered":"Security lessons from RSA"},"content":{"rendered":"<p><p>  Stay safe online with these recommendations from IT and Crypto  professionals at RSA, the premier security conference.<\/p>\n<p>    The RSA Conference, the flagship meetup for cryptography,    information security, and IT experts from around the world,    just wrapped on Feb. 28. I attended panels, talked to    professionals about security, and learned a couple of new    lessons about personal protection in the age of big data.  <\/p>\n<p>    There were a lot of lessons from RSA, most of them concerning    IT Professionals. Some were about enterprise-level security,    and a few were on the relationship of government and big data.    But what can the average consumer cull from these discussions?    Read on, and take control of your online security and digital    privacy.  <\/p>\n<p>    Hackers are no more evil than the average netizens, nor are    they loners. Hackers have their own social communities around    their illicit activities. Whether they're trying to make money    off stolen data (cyber-criminal), taking a stance (hacktivist),    or just keeping tabs (surveillance), hackers have turned    hacking into a business, and data is their sole interest. Most    hackers work together to pull off sophisticated attacks, mostly    on organizations, companies, government sites, or other hacking    groups.  <\/p>\n<p>    If your info is out there for the taking, then be ready to call    your credit card company at a moment's notice. But present them    with a little difficulty, and they might just go after another,    softer target. It is a numbers game after all. So create    tougher passwords (Longer is always better!), get a two-step    authentication system, edit out personal info from your    Facebook\/Google+ pages, and don't tweet things that can be used    to phish data.  <\/p>\n<p>    Keep your passwords safe with these apps:  <\/p>\n<p>    Unlike proprietary software, open-source software has the    benefit of letting users customize their own security    privileges and allows anyone to look into the source code and    report any vulnerabilities or flaws.  <\/p>\n<p>    Always try to get the latest updates for any programs you may    have, even the ones you don't often use (even Flash). Patches    are designed to cover security flaws and remove abuse    potential. Introduce a little open-source software to your    life, and find open alternatives to your favorite programs. A    good way to start is by checking out these trusted open-source apps.  <\/p>\n<p>    Additional open-source apps:  <\/p>\n<p>    Remove apps that you no longer use but never bothered to    delete. Uninstallers like Revo or    IObit can    make cleanup easier. Do you really need 20 Chrome Extensions or    ten different MP3 converters?  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/download.cnet.com\/8301-2007_4-57619935-12\/security-lessons-from-rsa\/?part=rss&subj=software&tag=title\/RK=0\/RS=LWLxOUyehvpZUJlnqSFZ6RR4sSo-\" title=\"Security lessons from RSA\">Security lessons from RSA<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Stay safe online with these recommendations from IT and Crypto professionals at RSA, the premier security conference. The RSA Conference, the flagship meetup for cryptography, information security, and IT experts from around the world, just wrapped on Feb. 28<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-8657","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/8657"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=8657"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/8657\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=8657"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=8657"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=8657"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}