Post
Topic
Board Beginners & Help
Merits 1 from 1 user
Re: How to secure your wallet from scammer
by
EXPool
on 02/02/2019, 19:57:36 UTC
⭐ Merited by Crypto-DesignService (1)
4. Install Anti Virus in your device
Anti virus is very useful to secure your wallet in your computer

If you handle wallet on PC I would recommend secure it not only with anti-virus.

Simple security guide Grin:

  • Don't open, click or run suspicious files, links, and programs. Rule of thumb: if you are not expecting it, it is suspicious.
  • Don't open suspicious files, email attachments, or archived documents, if you do not completely trust the source they are originating from. Send unwanted emails to spam folder before reading – files or links from people you don't know should be treated as malicious by default. Verify file origin by the means other than media used to receive it. For example, if you have received a Word document via email, contact the sender by an Instant Messenger or by phone and verify the reason for sending it. The most risky file types are: Any executable files: exe, com, bat, ps1, swf, jar etc. MS Office documents, especially with macros: doc/docx/docm, xls/xslx/xslm etc. PDF documents: pdf. Vector graphics with embedded code: svg. Archives of these files, especially password-protected.
  • Sometimes it's hard to tell malicious files from legitimate ones under time pressure. Use Virustotal to verify any file by scanning it by more than 50 antiviruses at the same time. While it is much more efficient than scanning files offline, consider the fact that you need to disclose the file to a third party. https://virustotal.com
  • Don't open suspicious URL links, especially those pointing to web-sites you don't normally visit. 
  • Be careful with pop-ups in your browser, applications and operating system. Always read pop-up messages and don't 'accept' anything in a hurry. 
  • Do not insert flash drives, CD/DVD, external HDDs etc. into your computer unless you explicitly trust their origin. There are techniques of hacking into your computer before you open files on a flash drive and way before your antivirus scans them. If you found it outside or inside the office, if you received it by mail or delivery, if a stranger gives it to you asking to print out a document or just open attach it to a PC – it is likely to be malicious. Only trust your own devices and proceed with caution when dealing with devices received from people you work with or otherwise collaborate.
  • Don't use pirated software. Don't run or install software downloaded from untrusted sources. This includes torrents and other peer-to-peer networks. This especially includes keygen and cracking tools that require administrator privileges to run. Morals or ethics have nothing to do with it: it is just totally insecure. First, trojaning the distribution and putting it online 'for free' is a known way of hacking into systems and it happens much more often than we'd like. Second, pirated software can rarely be kept up to date with security patches that just don't arrive to your system. Messing with 'activations' and re-activations just isn't worth it and the risks of not updating software are unacceptable.
  • Turn on Auto-Update in your Windows OS. For more details refer to the official FAQ: https://support.microsoft.com/en-us/help/12373/windows-update-faq
  • Make sure your Windows Update is configured to check for updates for all Microsoft products, including MS Office. https://www.winhelp.us/configure-automatic-updates-in-windows.html
  • Update third party software regularly or automatically. For that, use Flexera (formerly Secunia) PSI or an equivalent tool that checks your third party applications for updates and allows you to update them automatically. http[Suspicious link removed]rasoftware.com/enterprise/products/software-vulnerability-management/personal-software-inspector/
  • Turn on AppStore auto-updates as recommended by Apple: https://support.apple.com/kb/PH25371
  • Turn on your MS Office Auto-Update in macOS as recommended by Microsoft: https://support.office.com/en-us/article/Check-for-Office-for-Mac-updates-automatically-bfd1e497-c24d-4754-92ab-910a4074d7c1
  • Use Homebrew to keep your third party apps up to date. You can easily find many tools you already use in Homebrew: $ brew search vlc $ brew search wireshark $ brew search gpgtools etc. To install Homebrew, follow the official guide: http://brew.sh
  • You can use Full Disk Encryption feature of your OS to protect the data at your laptop or PC from theft or loss. FDE is a free feature on Linux, macOS, and Windows Pro.
  • Use trusted end-to-end encrypted communications for private/confidential data. End-to-end encryption ensures that no one other than you and your recipient can access the conversation. The means of encrypting email end-to-end are PGP or GPG, or S/MIME. End-to-end encrypted Instant Messengers are Signal, WhatsApp, iMessage, Viber, Threema. Facebook Messenger, Google Allo, and Telegram have 'secret chats' that may be seen as more secure than default mode.
  • To protect your traffic data and metadata from network sniffing, use VPN. You can choose from many VPN services providers, such as proXPN or OpenVPN AS. You can install and maintain your own VPN server as well. Always use corporate VPN when working with business data remotely. proXPN https://secure.proxpn.com OpenVPN https://openvpn.net How to setup your own VPN server: https://www.digitalocean.com/community/tutorials/openvpn-access-server-centos