Tuesday Tidbits
* Online dating services: Risking more than a broken heart
“People looking for companionship are trusting online services more than ever. Is that trust misplaced? Michael Kassner looks for the privacy and security gaps in online dating.” Read more..
* Hacking now responsible for most of exposed records
Until last year, lost and stolen laptops were to blame for the largest percentage of breach types. Now, hacking has claimed the top spot.Computer intrusion was responsible for 83 percent of the total reported exposed records in 2011 and a third of the total breaches, according to the year-end “Data Breach Intelligence” report from Risk Based Security, affiliated with the Open Security Foundation, which chronicles security incidents.
Last year saw nearly 368 million records breached, the highest ever, and the all-time tally sits at 1.3 billion, according to the report, released last week. The previous high was 191 million records in 2009.” Read more..
And we trust these machines? (And the people running them?) Why should I try to protect my PII when some clown in a data center is going to cough it all up for me??
“Breached” is Geek for “stolen by a hacker”.
* Patient data available on Google, Yahoo due to security mishap
“The health records of more than 30,000 patients at five California hospitals may have been publicly accessible via search engines due to improper server configurations.” Read more..
“Mishap”? Is that what you’d call it?
* Why big business is dealing with big security concerns
“Businesses are forced to implement specific security mandates even if they don’t support their actual security goals.” Read more..
* Could the Internet collapse?
“Here’s the good news — a total collapse of the Internet would be almost impossible. The Internet isn’t a magic box with an on/off switch. It’s not even a physical thing. It’s a collection of physical things and it’s constantly changing. The Internet isn’t the same entity from one moment to the next — machines are always joining or leaving the Internet.” Read more..
(I guess whoever wrote that never heard of Conficker..)
* It Could Still Happen To You: 2011’s Top Android Malware Threats
“Juniper’s Mobile Threats Report identifies more than a half-dozen of the more serious Android malware attacks in 2011.” Read more..
Happy reading! (It’s not depressing. Really!)
Bonus!:
… AOL support …
Wow.
Think they’re targeting a certain type of computer user?
Today’s quote: “The unexamined life is not worth living.” ~ Socrates
Copyright 2007-2012 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
February 28, 2012 Posted by techpaul | advice, computers, Internet, News, tech | aol support has sent you a message | 8 Comments
• About Tech Paul
I am a Retired computer & network technician. I used to think the machines were pretty cool. Now I don’t.
They’re anything but.
I regularly posted how-to’s and tricks & tips and general computing advice here starting in 2007. (Use the Search tool to find answers. But be aware, many are rather dated.) Sometimes I answered (your) specific questions in an article if I believed the answer was generally helpful to “everyone”. All the writing you see was my own, typos and all. There always is/was an implied “IMHO” in what you see here.
Note: You are responsible for using this blog and its content. I am in no way liable for any losses caused by user error, viruses and/or other malware, hardware or software failure, or any other conceivable reason.
-
Recent Posts
- Merry Christmas
- Just one reason I walked away..
- Use a cellphone? Read this
- A great How To guide for Online Privacy
- “Medicaid Database Department” phone scam
- Yet another major theft..
- How to erase yourself from the Internet
- Accept these two realities
- Remove yourself from people search sites and erase your online presence
- 12 Simple Steps..
Blogroll
- * 100 Incredibly Useful and Interesting Web Sites
- * 15 Mobile Security Tools (smart phones/tablets)
- * AnandTech
- * Best Antivirus 2018 (comparison)
- * Best Free Antivirus 2018 (comparison)
- * Best Free Software
- * Best Internet Security Suites 2016
- * CNet's Security & Antivirus Center
- * Cult of Mac
- * CyberSafe (Kids) – How To Talk To Your Kids (Video Learning)
- * How to erase yourself from the Internet
- * How to remove yourself from Internet search results and hide your identity
- * How To Stay Anonymous Online
- * iLounge
- * Laptop Magazine (part of Tom's Guide)
- * Online Safety and Privacy Education
- * Paul Thurrott's SuperSite for Windows
- * Practical advice for greater online safety
- * Practical Advice for Parents: Computer Use
- * Pulp Tech
- * startpage (the world's most private search engine)
- * The Verge
- * TNW (The Next Web.com)
- * TWiT.TV
- * What's On My PC?
- * Z – MORE READING RECO'S
- How to stop Google from tracking you
Visitors to date
- 4,163,005
-
-
Pages
Recent Comments
Previous Tips & Answers (aka Search This Site)
-
Or use keyword(s)
A Winner’s Blueprint for Achievement
BELIEVE while others are doubting.
PLAN while others are playing.
STUDY while others are sleeping.
DECIDE while others are delaying.
PREPARE while others are daydreaming.
BEGIN while others are procrastinating.
WORK while others are wishing.
SAVE while others are wasting.
LISTEN while others are talking.
SMILE while others are frowning.
COMMEND while others are criticizing.
PERSIST while others are quitting.~ William Arthur Ward