Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

Probably my last post here.

October 19, 2018 Posted by | cloud computing, computers, consumer electronics, Cyberwarfare, gadgets, Internet, Internet of Things, privacy, security, tech | Leave a comment

You are the problem

And you don’t care.

My ‘Must Read of the Month’.

Lotta words to read here. But it’s important you know – and think.

* Your forgotten IoT gadgets will leave a disastrous, toxic legacy

With IoT devices increasingly a part of the real, physical world, something needs to be done to avoid disaster in the event of a cyberattack against connected systems.Read more..

* * *

Today’s quote:

Copyright 2007-2017 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

 

October 13, 2017 Posted by | advice, computers, consumer electronics, cyber crime, Cyberwarfare, hackers, Internet, Internet of Things, News, security, tech | Leave a comment

This is why so few posts..

I see headlines like this everyday.

And nobody seems to care.

LATEST NEWS Nov 29, 2016

Cyber Attack Knocks Nearly a Million Routers Offline

Mirai Botnet is getting stronger and more notorious each day that passes by. The reason: Insecure Internet-of-things Devices. Last month, the Mirai botnet knocked the entire Internet offline for a few hours, crippling some of the world’s biggest and most popular websites. Now, more than 900,000 …

Read More
Twitter Facebook LinkedIn

San Francisco Metro System Hacked with Ransomware; Resulting in Free Rides

Nothing is immune to being hacked when hackers are motivated. The same proved by hackers on Friday, when more than 2,000 computer systems at San Francisco’s public transit agency were apparently got hacked. San Francisco’s Municipal Transportation Agency, also known as MUNI, offered free rides on …

Read More
Twitter Facebook LinkedIn

Hacker who exposed Steubenville Rape Faces longer Prison term than Rapists

Remember Steubenville High School Rape Case? In 2012, Steubenville (Ohio) high school’s football team players gang-raped an unconscious teenage girl from West Virginia and took photographs of the sexual assault. In December 2012, a member of the hacker collective Anonymous hacked into the …

Read More
Twitter Facebook LinkedIn

Researchers Show How to Steal Tesla Car by Hacking into Owner’s Smartphone

New technology is always a little scary, so are Smart Cars. From GPS system and satellite radio to wireless locks, steering, brakes, and accelerator, today vehicles are more connected to networks than ever, and so they are more hackable than ever. It’s not new for security researchers to hack …

Read More
Twitter Facebook LinkedIn

Beware! Malicious JPG Images on Facebook Messenger Spreading Locky Ransomware

If you receive an image file sent by someone, even your friend, on your Facebook Messenger, LinkedIn or any other social media platform, just DO NOT CLICK ON IT. Even JPG image file could eventually infect your computer with the infamous Locky Ransomware. Earlier this week, we reported a new …

Read more..

Worse, there’s too many people using computers who’ve never even heard of ‘ransomware’.

Well.. I’ve been pointing to important headlines such as these since 2007. Been doing my part. It’s up to you people to educate your friends and loved ones with the bleak picture. The handwriting’s on the wall, folks.

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

November 29, 2016 Posted by | cellular, cloud computing, computers, consumer electronics, cyber crime, Cyberwarfare, e-mail, gadgets, hackers, Internet, News, tech | 6 Comments

Today’s ‘Must Read’

Folks, not only does everyone need to read this article, but pass it along to their friends and family.

* How your connected home or office is a gift for hackers, criminals, and cyber spies

The Internet of Things needs to learn how to secure devices — and fast.Read more..

[ Note: I also highly recommend clicking on some of the embedded articles.. Like, the Snowden one.. ]

Related articles: (In my way of thinking..)

* Britain has passed the ‘most extreme surveillance law ever passed in a democracy’

The law forces UK internet providers to store browsing histories — including domains visited — for one year. Not only that, the law also gives the intelligence agencies the power to hack into computers and devices of citizens.Read more..

* Distracted minds: 3 tips to disconnect from tech and increase productivity

Adam Gazzaley, neurologist and author of The Distracted Mind: Ancient Brains in a High-Tech World, explains how multitasking damages focus, and offers advice for workplace productivity.Read more..

.. But the truth is, no one’s going to read those. And no one’s going to change their thinking or behavior. I’m wasting my time.

* * *

Today’s quote:No act of kindness, no matter how small, is ever wasted.” ~ Aesop

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

November 17, 2016 Posted by | advice, computers, consumer electronics, cyber crime, Cyberwarfare, gadgets, hackers, Internet, Internet of Things, mobile, networking, News, privacy, security, tech | , , , , , , , | 2 Comments

Own an Android? Read this!

It just keeps getting better and better..

* Pre-installed Backdoor On 700 Million Android Phones Sending Users’ Data To China

Do you own an Android smartphone? You could be one of those 700 Million users whose phone is secretly sending text messages to China every 72 hours. You heard that right. Over 700 Million Android smartphones contain a secret ‘backdoor’ that surreptitiously sends all your text messages, call log, contact list, location history, and app data to China every 72 hours.” Read more..

This is why you don’t let your enemy build your stuff.. And it’s as predictable as the sunrise. It might sound paranoid, but it wouldn’t surprise me if this (type thing) isn’t on every device made there (maybe dormant) and it’s why I won’t buy Lenovo.

November 16, 2016 Posted by | advice, Android, cellular, consumer electronics, cyber crime, Cyberwarfare, gadgets, News, privacy, security | Leave a comment

iPhone owner be aware (alert)

iPhone owners need to look at this.

* Apple releases “important security update” for iPhone after spyware discovery

They would have been able to turn on his iPhone’s camera and microphone to record Mansoor and anything nearby, without him being wise about it. They would have been able to log his emails and calls — even those that are encrypted end-to-end. And, of course, they would have been able to track his precise whereaboutsRead more..

I hope Apple owners no longer think they’re immune from this “viruses” stuff… ‘cuz they ain’t. If it has an operating system, it can be ‘hacked’.

Today’s quote:Life is full of beauty. Notice it. Notice the bumble bee, the small child, and the smiling faces. Smell the rain, and feel the wind. Live your life to the fullest potential, and fight for your dreams.” ~ Ashley Smith

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

August 25, 2016 Posted by | Apple, cellular, consumer electronics, cyber crime, Cyberwarfare, hackers, hardware, iPhone, mobile, News, security | , , , , , , , , , | Leave a comment

Best read in a while..

This article is the most interesting ‘techy’ piece I’ve seen in a bit…

* The Good and the Terrifying Things at Black Hat 2016

Car hacks, cash-spewing ATMs, Apple’s special blenders, and computers generating Taylor Swift songs were just a few of the things at Black Hat 2016.Read more..

*     *     *

Today’s quote:Any idiot can face a crisis – it’s day to day living that wears you out.” ~ Anton Chekhov

Beware of being ‘worn out’ folks. Take good care of yourselves. Get rest. Do what you have to for your emotional, spiritual, psychological, as well as your physical ‘well-being’.

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

August 10, 2016 Posted by | cloud computing, computers, consumer electronics, cyber crime, Cyberwarfare, hackers, Internet, Internet of Things, mobile, News, privacy, ransomware, security, tech | , , , , , | Leave a comment