Terms of Use For FixedByVonnie

By proceeding to access fixedByVonnie.com, you expressly acknowledge, and agree to, all of the following:

fixedByVonnie.com is a personal website and blog owned by Security Plus Pro LLC, which is being presented for informational purposes only. The views on this website are solely those of the website owner (and not those of any employer or of any professional associations affiliated with the website owner).  Any views expressed in this website and any information presented on this website, or in any of its blog entries, should not be relied on for any purpose whatsoever other than as the personal opinions of the website owner.  The website owner expressly disclaims any and all liability for any information presented on this site.  The owner of this website and its blog posts shall not be held liable, and shall be held harmless, for any errors or omissions in any information or representations contained in this website, or in any of its blog entries.  The website owner also expressly disclaims any liability for the current or future availability of any such information. The website owner makes no representations as to the accuracy or completeness of any information on this website or which may be found by following any link on this website. The website owner shall not be held liable for any losses, injuries, damages, claims, or causes of action, from the display or use of any information on this website or in any of its blog entries. If you use the information on this website, or on any of its blog entries, you do so solely at your own risk.

Two ways to respond to the recent CIA and Vault7 Wikileaks exposures - fixedByVonnie

Two ways to respond to the recent CIA and Vault7 Wikileaks exposures

In case you’ve been living in a cave without electricity for a few days, on March 7th, 2017, WikiLeaks leaked a collection of almost 9,000 documents allegedly from the CIA related to a project known as Vault7.  The CIA issued an official response on its website the following day.

Assuming the exposed documents actually do originate from the CIA, according to the NY Times, the document dump contains voluminous details on:

  • Wi-Fi networks
  • How to crash targeted computers
  • How to steal passwords using the autosuggestion feature built into IE

The Vault 7 collection also purportedly includes slides that suggest the CIA was able to leverage Samsung Smart TV’s to covertly record conversations even when the display and LED lights were off.

Let’s just say the stuff contained in the CIA leak is terrifying and it was partially what prompted me to post a few practical steps you can take to respond to this recent revelation.

But before we get started I just wanted to take a moment to say that the media often has a propensity to sensationalize things like this.  When everyone is in a frenzy it’s easy to believe almost every bit of scary intel you hear about the Wikileak documents.  Your best bet is to view the media’s comments with a critical eye, don’t overreact and instead take basic security precautions like the ones I’ll share now.

Can the CIA see your stuff?

Maybe, maybe not.  I don’t know but that misses the point.

To be honest you are asking the wrong question.  If you’re not a terrorist, evil foreign diplomat, sex trafficking drug lord or some other bad person doing bad things using technology then you shouldn’t worry about the CIA hacking into your stuff.

I mean just think about it.

Why would the CIA target you?

Of all people – you?

Unless you’re up to no good there’s really nothing to worry about and if you are doing bad illegal things online then the CIA should target and find you (and I hope they do!)

But kidding aside, if you are truly paranoid – here are a few things you can do to protect yourself online:

1 Turn off your devices when not in use

TAPE-WEBCAM-large570

  • Disable Wi-Fi when you’re not surfing the web.
  • Unplug your smart TV when you’re done watching “Designated Survivor” (man I love that show).
  • Place some masking tape over your webcam when it’s not in use

If you don’t have a smart TV or webcam then well you’re even safer!

The key here is to turn it off when you’re done.  Follow that rule of thumb and you’ll be fine.

2 Stay patched up

Creating-a-patch-management-policy

One of the easiest and quickest ways to get your machine hacked is by using legacy software.

No one, I repeat no one should be using Windows XP by now.  You should already know that.  If you are – shame on you! You should have upgraded to Windows 10 – it’s way more secure and it’s time to get out of the stone ages and on track with 2017.

Most “hacks” are made possible by lazy or uniformed users who don’t install the latest updates or install software from untrusted sources.

For example, never download common applications from any site that isn’t the manufacturer’s website.

  • Don’t download Mozilla Firefox from download.com.
  • Don’t downloaded pirated software or torrents.

Just don’t do it.

Stay safe, stay smart and pay attention.  Keeping your machine current on updates is one of the easiest ways to prevent your system from being hacked.

Conclusion

The only people that should fear being targeted by the CIA are people who need to be targeted by the CIA!

Nation-state actors, terrorists and anyone threatening the national security of the U.S. should worry about being tracked and hacked because that’s what the CIA is here for.  For the ordinary home users like you and me we should be more worried about clicking phishing links or downloading malware from an unsavory site.

So stay patched up, use common sense and always take the media’s articles with a grain of salt.  Whenever you feel a deep sense of surprise or shock in your gut, always hold that feeling in abeyance and ask yourself:

Why do I feel this way?

Put your judgement on the table while you struggle to figure out what’s going on because most (not all) but most of the time when all the facts are in you may realize it wasn’t as serious or as relevant to you as you thought.

About

Connect with Vonnie on Twitter

Posted in Desktops, Laptops, News, Security, Smartphones, Tablets Tagged with: , , ,
  • Mike

    Thank you so much for these wonderful Posts and all the best for your future. I hope to see more posts from you. Instagram pva accounts
    PVA Instagram accounts

  • Mike
  • The Hummer H2 travels an average of 11 to 12 miles per gallon (MPG). The car gets up to 13 MPG on the highway and 10 MPG in the city.

  • Angela Faught

    The best and top rating SUVs, sedans, coupes, Scooters, Motorcycles, car magazine, convertibles, minivans, hybrids, and future bikes model collection with photos.

  • xiaoxia

    Thanks for sharing. Happy to be able to share LOL Beans with you. This is a great online game that is storming the gaming world. There are many reasons why this game is so popular: 3D graphics, free, and the important thing is that you can compete with other gamers, not just play against the automatic computer. Have you joined this game yet? If not, save the link to your computer and let me know what you think.

  • Janet Kemp

    Recently, the CIA lost control of the majority of its hacking arse including more malware, viruses, trojans, weaponized “zero day” exploits, malware remote …

  • Brian Barber

    WikiLeaks’ latest release details what it claims is the CIA’s hacking more activities, including compromising phones, TVs, cars and becoming an …

  • Katrina Whitley

    WikiLeaks had also shown, quite recently, a willingness to be a mouthpiece for foreign intelligence services: in 2016, the site had released …