Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

A great How To guide for Online Privacy

The reality is, though we really shouldn’t be using this technology¹, we kind of have to. If you have a brain, you should be taking at least a few simple steps to secure your devices, and your activities, from the bad guys – whomever they happen to be today.. This PC Magazine resource can help, regardless your skill level, or device type (Yes, you Apple people need to read this too!)

* How to Stay Anonymous Online

We live in a world of mass surveillance. Here’s how to stay anonymous online without ditching the internet entirely.Read more..

If this information is nothing new to you, you can probably think of a few friends and relatives who really need to learn it..

¹ daily headlines like this, for example..

Copyright 2007-2019 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

September 4, 2019 Posted by | advice, browsers, computers, consumer electronics, cyber crime, e-mail, hackers, how to, Internet, security, tech | 1 Comment

Okay.. Let’s cast a critical eye..

At the bottom of an article about how, for a few bucks, ANY-one can buy a ‘kit’ and make their own Android Ransomware (see, Easy-to-Use Apps Allow Anyone to Create Android Ransomware Within Seconds) we are advised how to ‘stay safe’ from such unhappy things..

How to Protect Your Android Devices from Ransomware Attacks

In order to protect against such threats on mobile devices, you are recommended to:

  1. Always keep regular backups of your important data.
  2. Make sure that you run an active anti-virus security suite of tools on your machine.
  3. Avoid downloading apps from unknown sites and third-party app stores.
  4. Always pay close attention to the permissions requested by an app, even if it is downloaded from an official app store.
  5. Do not open any email attachments from unknown sources.
  6. Finally, browse the Internet safely.

And let’s analyze that advice with our critical eye:

  1. Always keep regular backups of your important data. Because it’s not a question of if you’ll get screwed, it’s a question of when.
  2. Make sure that you run an active anti-virus security suite of tools on your machine. No arguements. If it connects to the Internet you NEED this. But KNOW THIS: it’s only a semi-effective shield, NOT bulletproof armor.
  3. Avoid downloading apps from unknown sites and third-party app stores. Or even regular ‘stores’, as we’ve seen them get ‘poisoned’ already (Google Play Store, recently [see https://thehackernews.com/2017/08/android-ddos-botnet.html]). So let’s just change it to: Do NOT download apps.
    [edit 9/18:
    and yet again. See this http://thehackernews.com/2017/09/play-store-malware.html.]
  4. Always pay close attention to the permissions requested by an app, even if it is downloaded from an official app store. Utterly pointless to advise this. First of all no one will. Second, were ‘average people’ to start doing this, they’d have no clue what all that ‘tech jargon’ means. And 3rd, most apps don’t offer you any choices with ‘Permissions’ – if you want the app, you have to accept the ads and the spying. So let’s just use my #3 as our guide.
  5. Do not open any email attachments from unknown sources. Um. People who still do this have never read a tech article in their life. So they aren’t seeing this.Those who do (read articles) KNOW email is still a favorite way for the criminals to infect your machine. MY advice? Unless someone you know has told you, “I’m sending you a document”, don’t open it – period.
  6. Finally, browse the Internet safely. What? Great advice! Only one problem — there is no such thing. ( Um … I guess that translates to “don’t look at pron”?)
  7. Do not ‘jailbreak’ or ‘root’ your device. (Okay.. so I had to add one.)

* * *

Today’s quotable quote:Lighten up, just enjoy life, smile more, laugh more, and don’t get so worked up about things.” ~ Kenneth Branagh

Copyright 2007-2017 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

August 28, 2017 Posted by | advice, Android, cellular, consumer electronics, cyber crime, e-mail, gadgets, Google, hackers, Internet, mobile, News, privacy, security | , , , , , | Leave a comment

This is why so few posts..

I see headlines like this everyday.

And nobody seems to care.

LATEST NEWS Nov 29, 2016

Cyber Attack Knocks Nearly a Million Routers Offline

Mirai Botnet is getting stronger and more notorious each day that passes by. The reason: Insecure Internet-of-things Devices. Last month, the Mirai botnet knocked the entire Internet offline for a few hours, crippling some of the world’s biggest and most popular websites. Now, more than 900,000 …

Read More
Twitter Facebook LinkedIn

San Francisco Metro System Hacked with Ransomware; Resulting in Free Rides

Nothing is immune to being hacked when hackers are motivated. The same proved by hackers on Friday, when more than 2,000 computer systems at San Francisco’s public transit agency were apparently got hacked. San Francisco’s Municipal Transportation Agency, also known as MUNI, offered free rides on …

Read More
Twitter Facebook LinkedIn

Hacker who exposed Steubenville Rape Faces longer Prison term than Rapists

Remember Steubenville High School Rape Case? In 2012, Steubenville (Ohio) high school’s football team players gang-raped an unconscious teenage girl from West Virginia and took photographs of the sexual assault. In December 2012, a member of the hacker collective Anonymous hacked into the …

Read More
Twitter Facebook LinkedIn

Researchers Show How to Steal Tesla Car by Hacking into Owner’s Smartphone

New technology is always a little scary, so are Smart Cars. From GPS system and satellite radio to wireless locks, steering, brakes, and accelerator, today vehicles are more connected to networks than ever, and so they are more hackable than ever. It’s not new for security researchers to hack …

Read More
Twitter Facebook LinkedIn

Beware! Malicious JPG Images on Facebook Messenger Spreading Locky Ransomware

If you receive an image file sent by someone, even your friend, on your Facebook Messenger, LinkedIn or any other social media platform, just DO NOT CLICK ON IT. Even JPG image file could eventually infect your computer with the infamous Locky Ransomware. Earlier this week, we reported a new …

Read more..

Worse, there’s too many people using computers who’ve never even heard of ‘ransomware’.

Well.. I’ve been pointing to important headlines such as these since 2007. Been doing my part. It’s up to you people to educate your friends and loved ones with the bleak picture. The handwriting’s on the wall, folks.

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

November 29, 2016 Posted by | cellular, cloud computing, computers, consumer electronics, cyber crime, Cyberwarfare, e-mail, gadgets, hackers, Internet, News, tech | 6 Comments

Review: Best Internet Security Suites 2016

Folks, the guy I trust has published his product reviews for the all-important software category of Internet Security for 2016.

* Stay Safe With a Security Suite

Using your computer for games and social media is fun; keeping it safe isn’t. A security suite can be your one-stop solution. We’ve tested almost four dozen of them, and these 10 get our highest recommendation.Read more..

I cannot say often or fervently enough that one simply must do everything they can to protect themselves from the scumbuckets and nation-states who have ruined the Internet. It is a most dangerous place. Far worse than we can know. Do what you can!

(And that title should say “safer”, not “safe”. No product is bulletproof.)(And no product protects you from you. Careful what you click!)

* * *

Today’s quote:It has been said that democracy is the worst form of government except all the others that have been tried.” ~ Winston Churchill

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

September 28, 2016 Posted by | advice, anti-spyware, antivirus, computers, cyber crime, e-mail, firewall, hackers, Internet, security, software, tech | , , , , , , , , , , , | Leave a comment

Yahoo: Your Personal Info Stolen

If you use Yahoo! mail (or your ISP uses Yahoo Mail) you need to read this news item.

* Yahoo breach; at least 500 million accounts affected

According to a company statement, stolen information may have included names, email address telephone numbers, birth dates, hashed passwords and, in some instances, encrypted or unencrypted security questions and answers.Read more..

[ I think it’s safe to mentally remove the “may have” from that.. ]

Please forward this on to your friends and loved ones who use Yahoo! Mail. Tell ’em they need to change their passwords, and beware of suspicious “phishing” emails that sound like they know you..

And if you don’t know what “phishing” is by now.. please stop using the Internet.

Today’s quote:The best argument against democracy is a five-minute conversation with the average voter.” ~ Winston Churchill

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

September 23, 2016 Posted by | advice, cyber crime, e-mail, hackers, Internet, News, privacy, security | , , , , , , , , , , | Leave a comment