Tablet Security Tips

It was reported that tablet shipments were estimated to be nearly 73 million units in 2011.  If you have one of those 73 million tablets or are preparing to purchase a tablet, remember, security starts at "home" with you, the tablet owner. 
To protect your investment, keep these basic Tablet Security Tips in mind.
Microsoft MVP, Consumer Security
Take a walk through the "Security Garden" -- Where Everything is Coming up Roses!
Twitter: http://twitter.com/SecurityGarden
Security Information and Malware Removal @LandzDown Forum

@Corrine,
Any good software to recommend for tablets which enables GPS tracking if the device is stolen? Would prefer freeware without subscribing to any services but if need to pay for it then I don't mind too.
Thanks =D
*Non Lenovo employee*
I have a Y2P (i5) ... Feel free to ping me if you want me to test some applications with your Y2P if you have the same model. I don't mind keep doing recovery on it if needed .... =)

Similar Messages

  • Looking for security tips about webhosting app

    We want to use an XServe for hosting some of our clients' websites. These should have web and ftp services only (maybe webmail) as well as able to install their own CGIs (or run ours).
    So far (and with the help of the forum here I managed to set up the server. However before taking over the first websites, I generally wanted to know if there are any security issues to consider when intending such an application.
    So some things I'm still unsure with when setting up a user regarding security:
    (1)
    Each user I create is automatically assigned to the group 20 (shortname "staff"). Should I made any changes here ? Must the user be part of other groups ?
    (2)
    Should I set the login shell for these users to "none" or doesn't it play a role ?
    (3)
    Which application has the "Info" section for each user at the WGM ? Is it just for information ?
    (4)
    How can I prevent a user logging in to the server by telnet or ssh ? Currently I have configured our router to block traffic on ports 22 and 23 and this works quite well. But isn't there a more radical solution (beside disabling these ports in the server firewall) ?
    Any other advise or security tips for protecting the server is welcome and appreciated.

    1. I would probably set it up so each of your clients has it's own group.
    Although, I don't know the specifics of your setup.
    Why is this recommended seen security aspects ?
    Users have only access by ftp/mail services, anything else is disabled.
    2. A shell is required for FTP access. So unfortunatly this is not an option.
    Strange that Apple likes to give each user that requires ftp also shell access in the way that they can log in via terminal - or is their command set limited to only viewing files, creating directories and changing permissions ?
    Anyway, since we disabled the ports for ssh in our router I think that we are on the safe side here. Or can you think of a tricky user that finds a way to work around this ? I don't think, but better asking the experts before a hacker shows that it is possible
    4. The info tab in WGM is to populate the associated fields in the LDAP DB.
    Okay, then we leave this out, since users have not access to the server in a way that they can use the address book.
    May I add another question:
    How safe is it to enable the webmail feature for users ? Are there any known bugs or security holes ?

  • How to UNINSTALL "Kaspersky Tablet Security"

    To whom it may concern, really...
    ALL Toshiba Thrives (8, 16, and 32GB models) come with Kaspersky Tablet Security preinstalled and with 30 days free to try it.  I did activate the trial to see if it was better than my favorite AV.  It is not.  Big disapointment.
    The problem is:  my favorite antivirus will not install until Kaspersky is UNinstalled.
    The bigger problem is:  KASPERSKY TABLET SECURITY cannot be uninstalled... no matter what I try.
    Acording to an email received from Kaspersky, it is Toshiba who does not allow the software to be unsintalled since it was them who "pre" insalled it, and they said to contact Toshiba about it.
    At many forums they recommend to "root" the tablet, but, I like the way it is.
    Toshiba, HOW DO I UNINSTALL KASPERSKY?  I need to install my own antivirus.
    Is this a way to force consumer to buy Kaspersky?
    I WILL RETURN MY TOSHIBA THRIVE IF KASPERSKY CANNOT BE REMOVED.

    Get your receipt ready.
    Toshiba has proven that they will not remove this software from the system partition, which is why you need to root to uninstall it. 
    So yeah, I had to remove it because with kapersky installed, it kept crashing and locking me out. Where root got me the ability. Honestly, you don't even need to do a full root. you just need to delete the software apk from your device. But since the term rooting is a bit obscure, all you really need to do is unlock your system partition.
    - Signature Starts Now -
    I don't work for Toshiba, so please consider my advice Free; like Open Source.
    *OH HAIZ! I rooted teh Thrives*
    - End Signature -

  • Lion security tips?

    Hi.
    With the famous "flashgate", I am bit worried about OS X security...
    Is there any must-to-follow security tips that are needed to know?
    I download software from trusted websites and Mac App Store.
    I'm thinking about Safari and system preferences.
    Thank you!

    If you need to install Java do so with this: Java for OS X Lion 2012-003. It includes all the malware protection software needed to protect from the Flashback trojans. Also, see:
    Helpful Links Regarding Flashback Trojan
    A link to a great User Tip about the trojan: Flashback Trojan User Tip
    A related link in the tip to a checker: Malware Checker Dowload Link
    A Google search can reveal a variety of alternatives on how the remove the trojan should your computer get infected. This can get you started.
    For now I recommend the User Tip from etressoft to detect and remove:
    Checking for and removing the "Flashback" trojan
    Kaspersky Flashback Trojan Site:Flashback Trojan Detection and Removal
    Also see Apple's article About Flashback malware.

  • Norton Tablet Security ?

    Hello folks,
    I just read about a product called "Norton Tablet Security".   Its supposed to protect against Loss, theft and online threats on the iPad.
    Is this product really necessary?  Is the iPad that unsafe?

    Not for an iPad, and the Norton product is not even available for iOS devices. Android and Windows tablets are less secure due to the much more open methods of obtaining apps for those devices, so malware protection is much more important. While it's not impossible for malware to get onto an iPad, it's much more difficult, unless you jailbreak your iPad, since Apple monitors apps in the iTunes Store for any such issues.
    As for loss, Apple offers the Find My iPad service for free that would duplicate the loss prevension function of the Norton product. It's not an absolute protection (no software can be sinc regardless of the device any software solution can be removed), but in the event of losing your iPad it might help.
    Regards.
    Message was edited by: varjak paw

  • Ecatt network security tips

    Hi gurus,
    We're using ecatt between Solman and our Development instance ECC Server. Everything works fine, using RFC TRUSTED.
    The next step is:
    - Connect our QAS instance ECC Server (SOX environment) with our Solman instance. But our BASIS team asked me about security actions to prevent our ECC Server QAS instance from being accessed from systems but Solman.
    So, my question is:
    - Is it possible to define some configurations in my ECC Server QAS instance that allow only our Solman to connect it?
    Thanks in advance.
    Warlei Figueiredo

    Check this documentation below.
    http://service.sap.com/solutionmanager => Media Library  => How-To Documents => SAP Solution Manager in a High Security Infrastructure

  • Security tips for a noob.

    What can I do to a fresh Arch install for maximum security? I want to use a mail-client (I'm not sure which one yet) and I also ssh into a machine with sensitive data, and I have a wireless only connection.
    What apps should I install/configure to stop someone from using my wireless connection against me?

    of course WPA can be cracked enough publications about this can be found on the net, reason why was moved to WPA2 and eventually to WPA2-RADIUS.
    Caused by weakness of pre-shared key.
    in contrast to WEP, attacks against WPA with pre-shared key do not require a large amount of collected packets. You can perform it being in the range of AP.
    Succesful attack against WPA-PSK requires capturing  the four-way EAPOL handshake.
    Simply wait for legitimate EAPL handshake to be transmitted and capture it run offline dictionary attack. Anything below 21 characters can be cracked in reasonable time.
    WPA2-RADIUS has no known vulnerabilities.
    Last edited by broch (2008-05-05 13:27:38)

  • X-series tablets: Felt tips for the pen?

    Has anybody tried the hard felt tips for the Wacom pen to prevent scratching the screen?
    Or! Perhaps found another alternative nib that doesn't scratch the screen?
    I just got my screen replaced (bright dots on it...), and it just looks too good to have a protector on. I used to have a Photodon protector, but ended up scratching (the keyboard and I...) it in the long run.
    Cheers,
    .k
    http://vanhavirta.fi/

    DUTCHvanAtlanta wrote:
    Shipping for my order has just been delayed for a week and a half.  If this happens again, it may become necessary to cancel this thing.
    I hope Lenovo computers are better than their order system.  After receiving notice that the ship date had been postponed from 6 Jan to 17 Jan, it shipped on 8 Jan.  I hope they have their manufacturing act together better than how they handle orders.  Their order system seems like it's a http://en.wikipedia.org/wiki/Chinese_fire_drill being directed by the Keystone Kops.
    Moderator edit: Changed year in subject to 2012.

  • Needing Top Notch Security Tips & Padlock Icons explained*??*

    Ok im trying to make my bb bulletproof after a recent HACK. Any suggestions are welcome with open arms Before hand I had noticed on my curve 9300  that even when locked &idle a small black open padlock icon appeared on the screen, anyone any idea what that actually means? Help pls

    congrats to all

  • Urgent- Lost Ipad- please advise with security tips!

    Hi,
    My boyfriend just lost his ipad- he thinks he left it on a plane and it doesn't seem to have been handed in.
    It doesn't have a sim card in it- and I don't think it's registered with Apple at all, so there's probably no way to block it?
    It didn't have a passcode on it!!
    He had two mail accounts set up in the mail app. He's obviously really concerned whoever found it will be able to access his mail. If he logs in to gmail on the web browser and changes his password will that mean that whoever has the ipad can no longer access his mail accounts in the mail app?
    Any help v. gratefully appreciated!
    Thanks.

    ****!
    suggest he IMMEDIATELY changes ALL his passwords.
    this is where the iPad falls down badly......if it was 3G it has an IME number which Apple should have developed to have a 'knockout' facility at least accessing 3G which means that if it was sold on the buyer would be suspicious.
    it is not justbthe loss of the iPad itself, that you can really kick yourself for...... But it's the worry aboutnwhat info is left on the machine.
    The Appleology brigade will preach that the password protection should have been ON but why doesn't Apple have the facility to lock a reported stolen pad at upgrade.....the tech is there but is there a will!

  • Nokia 770 tablet questions

    Got mine today along with thousands of others as Expansys selling them by the bucketload!! Two problems:-
    i) Bluetooth - cannot get it to see my Orange SPV E650 - is the phone too new? Phone no see tablet/tablet no see phone.
    ii) How do the rubber supports in the box fit and hold the tablet securely? Otherwise they make good nose and ear picks!
    Expect lots of questions from lots of people - got to get in quick!
    Doug

    I'd like to use the 770 as a bridge from my wifi router to my sound system to stream internet radio (Live365.com, music.aol.com, etc.)
    1) Can the headphone output jack of the 770 be connected to the aux input of my amplifier? I already do this with an external CD player with no problems.
    2) Since it will be left "on" for hours at a time, is there an external power supply that could be substituted for the battery when the 770 is used in this mode?
    3)If there isn't one available, can the battery charger be left connected during operation? Would this harm the unit or reduce the life of the battery?
    4) If I have a spare battery, can it be recharged when not installed in the 770?
    5) As a VOIP device, does the 770 have a external microphone input jack (either monaural or stereo), similar to the headphone output jack? This would allow "hands free" use.
    6) If some of the above functions/options are not possible nor available on the existing model, is Nokia considering including them as product improvements?
    The other features of the product make it much more interesting to me than a simple wireless audio device, even if it costs more.
    Thanks to anyone who can help!

  • Screen Security not Working

    Hi,
    I have the sleep time set to 1 minute (Settings -> Display)
    and my Screen Security settings as follows:
    Screen lock = Password
    Automatically lock = 5 seconds after sleep
    Power button instantly locks = not checked
    If i leave my tablet untouched, it goes to sleep (after 1 minute) but if I double press the screen anytime after that (eg. 10 minutes) it opens staight up to where it was left.
    IT DOES NOT NEED PASSWORD or any other security to open,
    Is there another setting I've missed, or is there a problem with the tablets security software ?

    OK - it's happened again.
    I'm not doing anything unusual. Mail, web browsing, sykpe & hangout messaging / conference.
    I went to use it after putting it down for a while and found I didn't need password. I left it overnight in standby and again it didn't require password.
    Reboot again now and password is being requested.
    If the tablet cannot be trusted to invoke it's security lockout its no good to me.
    Please advise whether I should return to shop under warranty ?

  • Hiding the web start security popup

    Dear friends,
    a simple question: if I sign my WS app with a comercial ceriticate from Verysign, it will eliminate that popup alerting the user about security tips ?
    i.e., I don�t want the system ask the user about the certificate.. the same behaviour as the browser facing a Verisign ceritifed web site

    No, Even with purchased valid certificate user must be asked if they want to grant trust your app.
    Verisign can only gaurentee who you are, not if you are testworthy.
    /Andy
    PS: less scarry security dialogs are comming in 1.5.0_06

  • Cant unistall mobile security n97?

    Can anybody tell me how I can unistall trend Micro Mobiler security as it doesnt seem to work at all and when I tru to unistall it just hangs at the removing stage? Doesnt seem to be doing any harm but dont want software on their I dont need.

    Hello Arvan903,
    If Norton Mobile Security came as preinstalled with your tablet, you can only disable it. You can completely remove it if you are rooted. A similar thread for your reference:
    https://forums.lenovo.com/t5/Idea-Android-based-Tablets/Preinstalled-Norton-Tablet-Security-on-Lenov...
    Hope this helps.
    Thanks!
    Harry
    Norton Support

  • Is it really necessary not to have admin rights for security reasons

    I was told that i need to create a second admin account then log into that, then from there take away my admin privileges.. so I would not be an admin so computer will be much safer.
    Which i did
    But then so many passwords all the time.. need to insert the admin password for so many things and it is annoying it is like vista which i don't like at all.
    is this really important to keep computer secure?
    what are your leopard security tips?

    anteros27 wrote:
    I was told that i need to create a second admin account then log into that, then from there take away my admin privileges.. so I would not be an admin so computer will be much safer.
    Which i did
    But then so many passwords all the time.. need to insert the admin password for so many things and it is annoying it is like vista which i don't like at all.
    what are your leopard security tips?
    You should have left your original account alone and created a second non-admin user account for day-to-day use. Any non-system apps you need, etc, you can install in the new account.
    It's not easy switching horses in mid-stream so to speak, but it is safer than always using the computer as an administrator.
    If you use Fast Switching, you can quickly access the original account anytime you wish.
    is this really important to keep computer secure?
    Yes. Security should come before convenience.
    Again, you are getting all this requests for passwords because you changed you main account rather than creating a new one.
    Browse this thread
    http://discussions.apple.com/thread.jspa?threadID=1798675&tstart=0
    Message was edited by: nerowolfe

Maybe you are looking for

  • How can i make a web VI using web UI buider

    Hi, I have installed a web UI builder and now i'm trying to get rid of it by going through tutorials. My biggest problem is i'm unable to understand the concept making web pages, And my+ requirement is I have a servo motor and by running this motor p

  • HELP! Finder and other applications keep crashing after application install

    Okay, this was probably not a good idea considering I did not read that it was only for snow leopard... but I downloaded the Metalik theme from Julien Sagot's webpage (http://juliensagot.com/). Now, when I logged out and logged back into my account,

  • HTTP Status 500 Bug might be difficult.

    form action="myGroupRegistration" method="post" name="GroupRegistration" id="GroupRegistration"> the web.xml file in WEB-INF is the following <?xml version="1.0" encoding="ISO-8859-1"?> <!DOCTYPE web-app PUBLIC "-//Sun Microsystems, Inc.//DTD Web App

  • HP 7110 on 10.6.2

    Was called in to help someone with new iMac and 10.6.2 who has an HP 7110. I downloaded the latest drivers from the HP site. They were labeled as only being for OS X up to 10.4. I installed and reinstalled the driver five or six times. HP installer h

  • ORDres created for the compnent in MD04 list

    Hi all, I have created one fert and raw material and independent requirements in md61 for fert material. I ran the MRP run and planned order is created for fert material and purchase requestion for component. I converted  PR to PO and done migo for t