I am a new iPad user.
My PC has an antivirus and a firewall. Is my IPAD as safe as my PC since it does not seem to be protected by any software.
I am a new iPad user.
My PC has an antivirus and a firewall. Is my IPAD as safe as my PC since it does not seem to be protected by any software.
On a secure network you should be okay. But forget about it at your local fast food or coffee joint, or any other public WiFi site.
I am a new iPad user.
My PC has an antivirus and a firewall. Is my IPAD as safe as my PC since it does not seem to be protected by any software.
As long as the banking site is using a secure session (https://....), I don't see why using a public wifi would be an issue. The data including login and password is all encrypted before it is sent to the bank.
Firesheep, IRC, intercepted your credentials as they were being sent to the router, before https had anything to do with it.
And I just read a report that aliens from the planet Zaarg are reading our thoughts ...I just read a report that since the computers are made in China, there's some corrupt stuff going on where the people there stick phishing stuff in Windows before it gets overseas.
On a secure network you should be okay. But forget about it at your local fast food or coffee joint, or any other public WiFi site.
Might be wise to clear your cache, cookies, and history after each banking session. I do, just to keep my paranoia in check.![]()
Force Quitting To force an application to quit, Apple recommends that you bring the app you want to quit to the foreground. Then press and hold the sleep/wake button for several seconds, until the Slide to Power Off control appears. Release the sleep/wake button and hold down the Home button for another 7-10 seconds. Your screen will flash briefly and you will return to the main iOS 4 Springboard home page with its icons. This method works for all operating systems from iPhone OS 3 forward, and is the preferred method listed in the iOS 4 documentation.
Removing the Application from the Recents List There's actually a much simpler approach for quitting apps, and that's to use your recent app list. Double-click the home button to display the recently accessed applications. Press and hold any of the icons shown, then navigate to the application you want to quit and tap the red circled minus button. This sends a signal to the application in question that allows it to quit. The application will be re-added to the recents list the next time you launch it.
As long as the banking site is using a secure session (https://....), I don't see why using a public wifi would be an issue. The data including login and password is all encrypted before it is sent to the bank.
- Check the digital certificate of websites, such as banks and paypal, by clicking the lock icon to see if the certificate belongs to the right organization. This prevents login credentials from being stolen via sophisticated MITM attacks. ARP poisoning/MITM attacks can be detected using a utility such as Mocha.
- Always manually navigate to the logins of encrypted security sensitive websites and never login to these websites from links in emails, email attachments, instant messages, & etc even if the certificate appears to be legitimate. This prevents login credentials from being stolen via advanced phishing techniques that use cross-site scripting.
- Enable Mac OS X to use the CRL and OCSP to provide protection from invalidated digital certificates. The settings to enable system-wide use of the CRL and OCSP are accessible via Keychain Access. On the "Certificates" pane in the Preferences of Keychain Access, set the following:
Online Certificate Status Protocol (OCSP): Best Attempt
Certificate Revocation List (CRL): Best Attempt
Priority: OCSP
This is good advice.
On an iPad there is not way to manually view and verify the digital certificate as far as I know. This leaves the connection liable to sophisticated man-in-the-middle attacks where the encryption is stripped and the connection is redirected to a spoofed website.
The following information from my "Mac Security Suggestions" link is important in relation to online banking.
Some users notice issues when CRL is set to "Best Attempt." This does not have to be set as it is only a backup for OCSP.
Much of these tips can't be done on a iPad. But, much of these risks are mitigated via only online banking on a secured wireless network with no unknown users.
This is pretty much why I create my own hotspot like I posted above. I've seen my cousin do a MIM at a hotel just playing around. He's no techie either but he does know how to download the tools and watch a few videos online that show how it's done
the only concievable way to capture your credientials would be a very complex and highly targeted man-in-the-middle attack which might takes weeks to decrypt.
As long as it uses https, feel free to bank anywhere, cellular or wifi. The encryption tunnel will be secure.
This is incorrect.
If the attacker has spoofed the bank's website and the user is unable to verify the digital certificate, the connection made will appear encrypted eventhough it is not. Then, the attacker mimics an error on the page after the user attempts to login and exposes their login credentials. No need to decrypt the data.
The work would be spoofing the websites. Once that is done, then just camp out a public wifi network to collect login credentials. On a large public network, login credentials could be collected in profitable volumes over not that long of a duration.
Yes, but...
Read my posts, I never said iOS was insecure. In fact, I provided a link stating the exact opposite. All I am saying is that iOS users have a more difficult task avoiding certain types of attacks.
Also, spoofing a website is different than hacking a website.
http://www.thoughtcrime.org/software/sslstrip/
And you said 'no but' and named a targeted and highly sophisticated man in the middle attack with added spoofing.
This leaves the connection liable to sophisticated man-in-the-middle attacks where the encryption is stripped and the connection is redirected to a spoofed website.
the only concievable way to capture your credientials would be a very complex and highly targeted man-in-the-middle attack which might takes weeks to decrypt.
As long as it uses https, feel free to bank anywhere, cellular or wifi. The encryption tunnel will be secure.