Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

Senate anti-encryption bill is itself a threat to national security

Folks, a must read:

* Senate anti-encryption bill is itself a threat to national security

The proposed Burr-Feinstein anti-encryption bill would put every American at risk of being spied on by foreign nations, hackers, or even the next US president.”

It’s the bill that has everyone up in arms. In the wake of the dispute between Apple and the FBI over encryption, Congress has weighed in with its long-awaited response, and it was the definition of what people didn’t want.Read more..

Typical of politicians lately… :/
[ write your congress critter, folks! ]

* * *

Today’s quote:Believe in yourself! Have faith in your abilities! Without a humble but reasonable confidence in your own powers you cannot be successful or happy.” ~ Norman Vincent Peale

ATTN: Susan with the Dell Studio Laptop –> I need your proper email address

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

April 15, 2016 Posted by | cyber crime, Cyberwarfare, hackers, Internet, News, privacy, security | 1 Comment

Today’s ‘Must Read’

Folks, here’s an article I recommend everybody reads.. even those who are ‘not techies’. (Especially those..)

* How one hacker exposed thousands of insecure desktops that anyone can remotely view

Imagine being given the keys to the internet. One minute you could be looking at a building’s air conditioning panel, a pharmacist’s inventory, and a Windows programmer’s console, and the next minute it’s a school administrator’s email inbox, and a touch-screen toilet customer satisfaction monitor (which, sadly isn’t a joke).Read more..

[ read it and find out why the weakest link in the chain is us.. ]

*     *     *

Today’s quote:Yesterday is not ours to recover, but tomorrow is ours to win or lose.” ~ Lyndon B. Johnson

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

March 29, 2016 Posted by | cloud computing, computers, cyber crime, Cyberwarfare, hackers, Internet, Internet of Things, News, security, tech | , , , , , , , , , , , , | Leave a comment

While I was away…

Let’s take a look at some of the recent headlines in Tech. (In no particular order..)

* FCC privacy rules can’t stop ‘gold rush’ in personal data

The flourishing ‘surveillance capitalism’ that profits from selling consumers’ personal data will be little affected by the new rules.Read More..

* Malvertising Campaign Hits Top Websites to Spread Ransomware

Hackers are always in search for an elite method to create loopholes in the cyberspace to implement the dark rules in the form of vulnerability exploitation. Top Trustworthy sites such as The New York Times, BBC, MSN, AOL and many more are on the verge of losing their face value as a …” Read more..

* Warning — Hackers can Silently Install Malware to Non-Jailbroken iOS Devices

Hard time for mobile phone users! Just recently, two severe vulnerabilities in Qualcomm Snapdragon chip and Stagefright were spotted on the Android platform, affecting more than a Billion and Millions of devices respectively. And now: Hackers have discovered a new way to install malicious apps ..” Read more..

* Apple users, beware: First live ransomware targeting Macs …

Security researchers have discovered what they believe to be the first-ever ransomware attack targeted at Apple users that actually made it out …” Read more..

* Android Trojan infiltrates mobile firmware, Trend Micro apps

An Android Trojan which displays unwanted ads and installs nuisance software on mobile devices has been discovered in the firmware of smartphones and in popular Android applications, according to researchers.Read more..

[ “firmware” is chip-level coding, which comes into play when you first power up, but before the operating system (and therefore, any ‘anti-virus’) launches. ]

* The 18 scariest computer viruses of all time (slideshow)

And, there’s also Apple vs the F.B.I., and other delightful stories… But.. none of them are happy.

Today’s quote:Happiness is when what you think, what you say, and what you do are in harmony.” ~ Mahatma Gandhi

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

March 22, 2016 Posted by | advice, Android, Apple, cellular, cloud computing, computers, consumer electronics, cyber crime, Cyberwarfare, hackers, Internet, iPhone, News, Phishing, phraud, privacy, ransomware, security, software, tech | , , , , , , , , , , , , , | Leave a comment

Items to be aware of

Folks,
I do have some reading reco’s for you.

* Windows 10 bumps up support-call traffic

“.. the volume of calls has been about double that of previous Windows releases. Most of the support questions “focused on problems with usability and a desire to revert [to Windows 7 or 8], instead of how to use the new OS,Read more..

* NSA whistleblower: No software is ‘safe from surveillance’

A former NSA official said the agency has “more resources” for surveillance than the average user can ever hope to defend against.Read more..
[I like the final sentence.]

Best for last: How Microsoft’s data case could unravel the US tech industry

The case, if lost, could see a mass exodus of international customers from the US cloud.Read more..

[Regardless of surveillance, or “data ownership” legalities. IMHO you should not trust the “cloud”. Period. Businesses? Forget it. Yet.. it keeps snow-balling..]

*    *     *

Today’s quote:My favorite parable for living a positive and influential life is the Golden Rule: ‘Do unto others what you would have them do unto you.‘” ~ Tony Oller

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

November 12, 2015 Posted by | cloud computing, computers, cyber crime, Cyberwarfare, hackers, Internet, Microsoft, News, privacy, security, software, tech, upgrading, Windows 10 | Leave a comment

I may start surfing with Chrome…

I won’t use Google’s Chrome browser; but this headline has me considering switching to it. (I hope the other browsers will do the same.)

* Google boots China’s main digital certificate authority CNNIC

Google says a future update in Chrome will remove trust for all certificates from China’s main root certificate authority.Read more..

And yet more good news:
* Inexpensive table-top robots will disrupt light manufacturing

Collaborative robots for light industry are coming along at precisely the right moment. They’re primed for quick adoption, and that means big changes for small- and mid-sized manufacturers.” Read more..

[ .. I think “disrupt” has now come to mean “eliminate all jobs”. ]

* Lebanon Believed Behind Newly Uncovered Cyber Espionage Operation

Middle East, US, and other targets hit in nearly three-year-old ‘Volatile Cedar’ cyber attack campaign.Read more..

Best for last * Healthcare Is Ignoring Cyber Risk Intel, Academia Even Worse

For all of 2013 and 2014, the healthcare sector was abuzz with cyber activity invisible to most. As the weeks rolled by, the cyber event data collected and analyzed by our analytic data warehouse increasingly brought an image into sharp focus — and it was beginning to look a lot like an active radar console of the skies over Iraq circa 1991.” Read more..

*     *     *

Today’s quote:The average dog is a nicer person than the average person.” ~ Andy Rooney

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

April 2, 2015 Posted by | browsers, computers, consumer electronics, cyber crime, Cyberwarfare, Google, Internet, News, tech | , , , , , , | Leave a comment

It’s about time!!!

Talk about waking up to danger years after the war is already lost..

* US declares cybercrime a ‘national emergency’, threatens sanctions against hackers, online espionage

Sanctions will hit cyber criminals where it hurts – in the pocket – says the White House.Read more..

But.. better late than never.. right?

Wonder how/if that’ll affect relations with China.. or, since they own us, and manufacture all our goods, they’ll get a pass? (Since we know they’re major actors.)

(Sounds good, but good luck with that.)

Kinda related: No free pass for Google

Google’s vaunted “Do no evil’’ credo is taking a beating. Leaked documents show that Federal Trade Commission investigators wanted to sue the search giant on antitrust charges, but the push melted away into modest changes after Google executives made numerous trips to the White House.Read more..

Today’s quote:Life is mostly froth and bubble,
Two things stand like stone.
Kindness in another’s trouble,
Courage in your own
.” ~ Adam Lindsay Gordon

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

April 1, 2015 Posted by | computers, cyber crime, Cyberwarfare, Google, hackers, Internet, News, security, tech | , , , , , , , , , , , , | Leave a comment

Android Games and Apps Giveaway

For a limited time, Amazon is giving away some paid apps for free.

click on image

click on image

which may be worth a look-see. Click on the image to see today’s batch of freebies. (There’ll be a different assortment each day of the giveaway.)

* Someone told me today is the first day of Spring.
Which, if it’s true, is good news to me.
And I always vote For good news.

This Just In: China reveals existence of cyber warfare hacking teams

The country has finally admitted to the existence of units dedicated to cyber warfare.Read more..

[May as well admit it. There’s no one who didn’t already know …] [Still, an important read.] [And in this case, “cyber warfare” includes espionage.]

Today’s quote:We buy things we don’t need with money we don’t have to impress people we don’t like.” ~ Dave Ramsey

Paul’s Tip: Don’t be like that. Be smart.

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

March 20, 2015 Posted by | Android, Cyberwarfare, free software, Internet, News | , , , , , , , | Leave a comment