Posts tagged “security”.

Security Incident

becloudWho deals in Belgium with security incidents?

The Centre for Cybersecurity Belgium (CCB) is the central authority for cybersecurity in Belgium:

Companies can get help from “The Cyber Security Coalition” and should contact to report a security incident.

Individuals can get security advice from (French and Dutch only).

Victims of misleading practices, fraud or swindle in Belgium can report their case on


Protection of Privacy in Belgium is addressed by CBPL.



Out phishing

outfishingFraudsters frequently use tactics such as fake phone calls, texts and emails to obtain your information, perhaps claiming to represent your bank, your utility companies, or even the police. To maintain your personal and financial security, be sure to be on your guard for:

Vishing: a telephone call from someone claiming to represent your bank, intended to coerce you into sending your money to another account or handing over cash/cards.

Phishing: an email, which looks like it’s from us, designed to trick you into providing personal and financial information.

Smishing (SMS phishing): a text message, which looks like it is from us, designed to trick you into providing personal and financial information by calling a number or clicking a link.


• Be wary of unsolicited requests for your personal information, such as usernames, passwords or bank details.

• If a phone call seems suspicious, don’t be afraid to hang up and call your bank on a known number – use a different phone line where possible.

• If an email looks suspicious, do not click on links or download documents.

• If you have suspicions regarding a text message claiming to be from the bank, call your bank on a known number to check before acting on it.

Safer browsing on the Internet

privacy-cookiesSafer browsing on the Internet

If you are concerned about the ´behind the scenes´ of your Internet access, you may apply the following changes on your network:

– use DNS servers that block sites hosting malware, phishing schemes, and scams:

guidelines for using alternative DNS servers can be found on WikiLeaks

a list of Free & Public DNS Servers is published by

– install tools to detect and protect against web page trackers (scripts, pixels, and other elements):

here is a list of Browser Extensions that Protect Your Privacy

use Ghostery to control page trackers

Check your pc or mac for IP leaks and see what your give away on information: IP/DNS Detection.

VISTA and Chrome with McAfee Bitdefender

VISTA and Chrome with McAfee Bitdefender

Chrome traffic may be blocked by Bitdefender. Check the McAfee Firewall settings in that case and reset the firewall rules.

To reset the firewall rules open BitDefender, switch it to Expert View from the Options button then go to the Firewall tab -> Programs and click on the ‘Reset Rules‘ button. Confirm when asked to reset the rules then restart the PC. The first time you run Chrome again, the Firewall should set a new rule and let the traffic flow.

Microsoft Outlook 2007 with GMAIL and AVAST

Microsoft Outlook 2007 with GMAIL and AVAST

Since both GMAIL and AVAST (Anti-Virus) both use SSL, you need to tweak the account settings in Microsoft Outlook to make your authentication work.

Read the post on the Avast forum for the steps to undertake.

In summary:

use the standard settings for a gmail account in Outlook and configure the SSL settings for a gmail account in Avast

WindowsRecovery Rogue

WindowsRecovery Rogue

To remove the ‘WindowsRecovery’ Trojan Horse virus, follow the instructions from Tigzy that are published on the

Is it safe?

Is it safe?

No matter the OS platform you selected, a good Anti-Virus scanner is necessary when you connect to the Internet. This especially applies when you exchange information with attachments. Always keep the virus scanner up-to-date. It’s good practice to, at least once a week, check for virus definition updates ! Check my ‘Best of Breed Software‘ page for freeware anti-virus scanners.

Do not participate in the computer virus histeria, rather consult a security guru or an expert. Beware of a hoax, many people like you to panic and to forward unproductive and alarming messages. Before you spread the news first find out the truth and check sites like Hoax-Slayer. Although much safer than a PC, also MACs need protection. Some folks (at give good advice for Mac OS users.

Finally, if you have gone through these recommendations, you can check if all is safe with GRC’s Shields Up.


Good security advice and news also comes from The Cyber Security becloudCoalition for companies and for individuals in Belgium.

meldpuntVictims of misleading practices, fraud or swindle in Belgium can report their case on

Commission for the Protection of Privacy
Rue de la Presse 35, 1000 Brussels

Please observe that the preferred languages for contacting the Privacy Commission are Dutch and French.

Companies should contact to report a security incident.

Latest information from Trend Micro is shown on the bottom of this page. Finally, if you have gone through these recommendations, you can check if all is safe with GRC’s Shields Up.



Netgear WPN802v2 – invalid security certificate

Using Firefox 3.0.x to connect to the Netgear Wireless Accesspoint WPN802v2, may fail due to an invalid security certificate error (see picture below):

Alert: <ip address> uses an ivalid security certificate

When this error occurs, you won’t be able to connect to the admin interface of the Wireless Accesspoint. I managed to fix this by creating a security exception in the Firefox Certificate Manager:

Select in ‘Tools‘ from the Menu bar, ‘Options’:

Select in the ‘Advanced’ tab – the ‘Encryption’ tab. Next, select ‘View Certificates‘.

In the Certificates Manager, select the ‘Servers’ tab. Next, select ‘Add Exception

Enter the IP Address of the Wireless Access Point in the ‘Add Security Exception’ window and select the ‘Get Certificate‘ button.

The Certificate Status will be displayed.

Select ‘Confirm Security Exception‘ and exit the Certificate Manager.

You should now be able to logon the Admin interface.

Data Backup and Archive in a Small Office or Home Office (SoHo) environment.

backupData Backup and Archive in a Small Office or Home Office (SoHo) environment.

The difference between a backup and an archive is the retention. A backup will serve for short term recovery or system restore after a failed installation. Typically, you make a backup before installing software that alters data and or system files. An archive serves to store copies of information for a long time. Keeping a copy of your data on an extra drive will safeguard it from disk crashes or any other loss of systems.

The success of a good backup and archiving policy depends on your data organization. The more pc’s you have, the bigger the challenge to keep track of all your data. Here are some basic rules to keep control of your electronic information storage.

1) Keep your original data in centralized folders. Categorize your data (music, pictures, videos, invoices, contracts, letters, etc.) and use separate folders (as suggested by windows). Some folders change more frequently than others and some files are more important than others.

2) Use a simple backup and restore tool to perform the backup and archive jobs. Do not use software that creates proprietary files, because this creates a dependency on the software and the operating system to restore information. Use a tool that stores the files without compression and that maintains the directory structure (e.g. SyncBack for windows). This way you can access your copied data directly, without the use of any tool.

3) Use external drives to copy your data to (usb or firewire attached). Select reliable products for your archive drives and avoid systems that require proprietary drivers. You may opt to use a (different) drive for each of the category of data: music, pictures, etc.

4) Make at least once a month a full backup of your data. In case proprietary file formats are used, keep a copy of the software that is needed to read those files on a future safe medium (cd-rom or hard drive – try to avoid zip drives or floppy drives).

5) In case of an archive, keep the copies of your data in a remote place. Holding archives under the same roof will not help in case of a fire or a burglary. These days, small format external drives can easily be stored in a (locked) office desk or a bank safe.

Privacy and Security

Privacy and Security

You should be concerned about your Privacy on the Internet. Anti-Virus protection is not the only safety net, your mail messages expose a lot about you.

To keep your messages and files confidential, while sending them over the Internet, you can use PGP or S/Mime.

For more information refer to: