A great How To guide for Online Privacy
The reality is, though we really shouldn’t be using this technology¹, we kind of have to. If you have a brain, you should be taking at least a few simple steps to secure your devices, and your activities, from the bad guys – whomever they happen to be today.. This PC Magazine resource can help, regardless your skill level, or device type (Yes, you Apple people need to read this too!)
* How to Stay Anonymous Online
“We live in a world of mass surveillance. Here’s how to stay anonymous online without ditching the internet entirely.” Read more..
If this information is nothing new to you, you can probably think of a few friends and relatives who really need to learn it..
¹ daily headlines like this, for example..
Copyright 2007-2019 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
Okay.. Let’s cast a critical eye..
At the bottom of an article about how, for a few bucks, ANY-one can buy a ‘kit’ and make their own Android Ransomware (see, Easy-to-Use Apps Allow Anyone to Create Android Ransomware Within Seconds) we are advised how to ‘stay safe’ from such unhappy things..
How to Protect Your Android Devices from Ransomware Attacks
In order to protect against such threats on mobile devices, you are recommended to:
- Always keep regular backups of your important data.
- Make sure that you run an active anti-virus security suite of tools on your machine.
- Avoid downloading apps from unknown sites and third-party app stores.
- Always pay close attention to the permissions requested by an app, even if it is downloaded from an official app store.
- Do not open any email attachments from unknown sources.
- Finally, browse the Internet safely.
And let’s analyze that advice with our critical eye:
- Always keep regular backups of your important data. Because it’s not a question of if you’ll get screwed, it’s a question of when.
- Make sure that you run an active anti-virus security suite of tools on your machine. No arguements. If it connects to the Internet you NEED this. But KNOW THIS: it’s only a semi-effective shield, NOT bulletproof armor.
- Avoid downloading apps from unknown sites and third-party app stores. Or even regular ‘stores’, as we’ve seen them get ‘poisoned’ already (Google Play Store, recently [see https://thehackernews.com/2017/08/android-ddos-botnet.html]). So let’s just change it to: Do NOT download apps.
[edit 9/18: and yet again. See this http://thehackernews.com/2017/09/play-store-malware.html.] - Always pay close attention to the permissions requested by an app, even if it is downloaded from an official app store. Utterly pointless to advise this. First of all no one will. Second, were ‘average people’ to start doing this, they’d have no clue what all that ‘tech jargon’ means. And 3rd, most apps don’t offer you any choices with ‘Permissions’ – if you want the app, you have to accept the ads and the spying. So let’s just use my #3 as our guide.
- Do not open any email attachments from unknown sources. Um. People who still do this have never read a tech article in their life. So they aren’t seeing this.Those who do (read articles) KNOW email is still a favorite way for the criminals to infect your machine. MY advice? Unless someone you know has told you, “I’m sending you a document”, don’t open it – period.
- Finally, browse the Internet safely. What? Great advice! Only one problem — there is no such thing. ( Um … I guess that translates to “don’t look at pron”?)
- Do not ‘jailbreak’ or ‘root’ your device. (Okay.. so I had to add one.)
* * *
Today’s quotable quote: “Lighten up, just enjoy life, smile more, laugh more, and don’t get so worked up about things.” ~ Kenneth Branagh
Copyright 2007-2017 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
How to erase yourself from the internet
Anyone thinking off ‘going off the grid’, this article is for you.
* Gallery: How to erase yourself from the internet
“Destroying your digital existence—it’s not easy
Fed up with social media? Sick and tired of hiding from identity thieves? It’s not easy to eliminate your online presence, but it can be done if you’re willing to put in the legwork.
Here are some tools, tips, and strategies for getting rid of your internet footprint.” View slideshow
Addenda: This article does not mention some other obvious things, such as –> NEVER own an ‘Internet-connected’ device/toy/gadget (such s a ‘smart tv’ or ‘Internet security camera’..)
Today’s quote: “Nothing you wear is more important than your smile.” ~ Connie Stevens
Copyright 2007-2017 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
If you are, or ever were, a Yahoo user, read this
Please note the date. And also please note, many of your ISP’s use Yahoo as their ‘engine’/email provider.. such as SBC/AT&T.
* Data on 1B Yahoo users stolen in second breach
“Data on one billion Yahoo users was likely stolen by an unauthorized third party in a data breach that occurred in August 2013, the company said in a Wednesday press release that also noted the breach is “likely distinct” from a breach previously disclosed in September.” Read more..
RELATED: How to delete or protect your Yahoo account
“It’s time to seriously consider deleting your Yahoo account. Can’t? OK, here’s what you can do to protect it.” Read more..
* * *
I almost titled this article “Yahoo! Scores More Points”.. But didn’t as I don’t want people zeroing in their concern on Yahoo! This kind of thing happens all over the place, to most every company/organization sooner or later — because we’re using quite insecure technologies. You pretty much have to presume your ‘identity’ is already stolen. And you have to be darned reluctant (unwilling, as much as you able) to provide accurate information to any entity.
… it just keeps getting better and better ..
One billion people in a single hack.
This is why so few posts..
I see headlines like this everyday.
And nobody seems to care.
LATEST NEWS Nov 29, 2016
![]() |
Cyber Attack Knocks Nearly a Million Routers Offline Mirai Botnet is getting stronger and more notorious each day that passes by. The reason: Insecure Internet-of-things Devices. Last month, the Mirai botnet knocked the entire Internet offline for a few hours, crippling some of the world’s biggest and most popular websites. Now, more than 900,000 …
|
![]() |
San Francisco Metro System Hacked with Ransomware; Resulting in Free Rides Nothing is immune to being hacked when hackers are motivated. The same proved by hackers on Friday, when more than 2,000 computer systems at San Francisco’s public transit agency were apparently got hacked. San Francisco’s Municipal Transportation Agency, also known as MUNI, offered free rides on …
|
![]() |
Hacker who exposed Steubenville Rape Faces longer Prison term than Rapists Remember Steubenville High School Rape Case? In 2012, Steubenville (Ohio) high school’s football team players gang-raped an unconscious teenage girl from West Virginia and took photographs of the sexual assault. In December 2012, a member of the hacker collective Anonymous hacked into the …
|
![]() |
Researchers Show How to Steal Tesla Car by Hacking into Owner’s Smartphone New technology is always a little scary, so are Smart Cars. From GPS system and satellite radio to wireless locks, steering, brakes, and accelerator, today vehicles are more connected to networks than ever, and so they are more hackable than ever. It’s not new for security researchers to hack …
|
![]() |
Beware! Malicious JPG Images on Facebook Messenger Spreading Locky Ransomware If you receive an image file sent by someone, even your friend, on your Facebook Messenger, LinkedIn or any other social media platform, just DO NOT CLICK ON IT. Even JPG image file could eventually infect your computer with the infamous Locky Ransomware. Earlier this week, we reported a new … |
Worse, there’s too many people using computers who’ve never even heard of ‘ransomware’.
Well.. I’ve been pointing to important headlines such as these since 2007. Been doing my part. It’s up to you people to educate your friends and loved ones with the bleak picture. The handwriting’s on the wall, folks.
Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
Review: Best Internet Security Suites 2016
Folks, the guy I trust has published his product reviews for the all-important software category of Internet Security for 2016.
* Stay Safe With a Security Suite
“Using your computer for games and social media is fun; keeping it safe isn’t. A security suite can be your one-stop solution. We’ve tested almost four dozen of them, and these 10 get our highest recommendation.” Read more..
I cannot say often or fervently enough that one simply must do everything they can to protect themselves from the scumbuckets and nation-states who have ruined the Internet. It is a most dangerous place. Far worse than we can know. Do what you can!
(And that title should say “safer”, not “safe”. No product is bulletproof.)(And no product protects you from you. Careful what you click!)
* * *
Today’s quote: “It has been said that democracy is the worst form of government except all the others that have been tried.” ~ Winston Churchill
Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
Yahoo: Your Personal Info Stolen
If you use Yahoo! mail (or your ISP uses Yahoo Mail) you need to read this news item.
* Yahoo breach; at least 500 million accounts affected
“According to a company statement, stolen information may have included names, email address telephone numbers, birth dates, hashed passwords and, in some instances, encrypted or unencrypted security questions and answers.” Read more..
[ I think it’s safe to mentally remove the “may have” from that.. ]
Please forward this on to your friends and loved ones who use Yahoo! Mail. Tell ’em they need to change their passwords, and beware of suspicious “phishing” emails that sound like they know you..
And if you don’t know what “phishing” is by now.. please stop using the Internet.
Today’s quote: “The best argument against democracy is a five-minute conversation with the average voter.” ~ Winston Churchill
Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.