Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

This is interesting…

This is for those of you who still think hackers are gifted, and bored, teenagers..
(Please, put on your thinking caps.)

* Cybercriminals offer bogus fraud insurance services

Security researchers from Trusteer have spotted a clever new technique used by cybercriminals interested in optimizing their malicious campaigns in an attempt to earn more revenue.Read more..

I am not surprised by this. And I have to give the blackhats their ‘props’ for creative thinking. (It’s a bit like a gang of thieves forming their own rent-a-cop company..)

But, really, what I want to say here is, if you do not want to become a victim you really do need to do your research, think before you click, and exercise a healthy “paranoid common sense” when online.

Because they are out to get you.

Think of it this way: back in the olden days, before 1995, you pretty much only had to worry about the bad guys who lived in your city/town. And you had your local cops there protecting you.

Now, the Internet has invited the whole world’s criminals into your home — and there aren’t any cops AT ALL. ¹
Just you.
(Those in the know liken the web to the “Wild, wild, West”.)

Update: Yes, that computer in Berlin is still merrily spewing out hundreds of spam comments a day (just to this blog.. think of how many others it is annoying.. and then think of the electricity used to send those 1’s and 0’s) as the owner is still unaware they are hacked (aka “pwned”).

Today’s free download: Think it might be possible that you have been ‘botted’ (aka “pwned”) like that person in Berlin? One tool to help you find out is the free RUBotted from Trend Micro.. recently improved.

RUBotted monitors your computer for potential infection and suspicious activities associated with bots. Bots are malicious files that enable cybercriminals to secretly take control of your computer. Upon discovering a potential infection, RUBotted will identify and clean them with HouseCall.

Related: Infographic: How cyber-secure are public companies?

The infographic below, courtesy of Veracode, presents a pretty sobering look at how well public companies are doing with cybersecurity.Read more..

(How well??? I think that should have been written “How poorly”. You are counting on them to keep your info safe.. Right? Take a look at the reality..)

Attention: Did you cast your vote? If you haven’t already, please participate in my most recent “real life survey” — won’t take but 22 seconds of your time! Too Much Time Online?

Today’s quote:Being in control of your life and having realistic expectations about your day-to-day challenges are the keys to stress management, which is perhaps the most important ingredient to living a happy, healthy and rewarding life.” ~ Marilu Henner

Though – thankfully!!! – there are some “whitehats” out there, and people, including our government, are finally taking cybercrime (and cyberwar) seriously.. what I mean is there really has been no law enforcement, and what laws have been passed have been toothless. IMHO. )

Copyright 2007-2012 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

May 10, 2012 - Posted by | advice, computers, cyber crime, Internet | , , ,

2 Comments »

  1. The results to your poll are interesting.
    I’ve been offline for a couple of days, but there was a time when that was unheard of.
    Both sides of the issue are quite clear to me now.
    I understand why nearly 40% think there is no such thing as “too many hours”. Particularly for developers.
    Thanks for the post. I hope folks continue to vote…

    Like

    Comment by kstinman | May 10, 2012 | Reply

    • kstinman,
      I am going to repost the poll in hopes that more will participate.. and bite my tongue in the meantime..

      Like

      Comment by techpaul | May 10, 2012 | Reply


Post your Comment/Question

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: