Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

Okay.. Let’s cast a critical eye..

At the bottom of an article about how, for a few bucks, ANY-one can buy a ‘kit’ and make their own Android Ransomware (see, Easy-to-Use Apps Allow Anyone to Create Android Ransomware Within Seconds) we are advised how to ‘stay safe’ from such unhappy things..

How to Protect Your Android Devices from Ransomware Attacks

In order to protect against such threats on mobile devices, you are recommended to:

  1. Always keep regular backups of your important data.
  2. Make sure that you run an active anti-virus security suite of tools on your machine.
  3. Avoid downloading apps from unknown sites and third-party app stores.
  4. Always pay close attention to the permissions requested by an app, even if it is downloaded from an official app store.
  5. Do not open any email attachments from unknown sources.
  6. Finally, browse the Internet safely.

And let’s analyze that advice with our critical eye:

  1. Always keep regular backups of your important data. Because it’s not a question of if you’ll get screwed, it’s a question of when.
  2. Make sure that you run an active anti-virus security suite of tools on your machine. No arguements. If it connects to the Internet you NEED this. But KNOW THIS: it’s only a semi-effective shield, NOT bulletproof armor.
  3. Avoid downloading apps from unknown sites and third-party app stores. Or even regular ‘stores’, as we’ve seen them get ‘poisoned’ already (Google Play Store, recently [see https://thehackernews.com/2017/08/android-ddos-botnet.html]). So let’s just change it to: Do NOT download apps.
    [edit 9/18:
    and yet again. See this http://thehackernews.com/2017/09/play-store-malware.html.]
  4. Always pay close attention to the permissions requested by an app, even if it is downloaded from an official app store. Utterly pointless to advise this. First of all no one will. Second, were ‘average people’ to start doing this, they’d have no clue what all that ‘tech jargon’ means. And 3rd, most apps don’t offer you any choices with ‘Permissions’ – if you want the app, you have to accept the ads and the spying. So let’s just use my #3 as our guide.
  5. Do not open any email attachments from unknown sources. Um. People who still do this have never read a tech article in their life. So they aren’t seeing this.Those who do (read articles) KNOW email is still a favorite way for the criminals to infect your machine. MY advice? Unless someone you know has told you, “I’m sending you a document”, don’t open it – period.
  6. Finally, browse the Internet safely. What? Great advice! Only one problem — there is no such thing. ( Um … I guess that translates to “don’t look at pron”?)
  7. Do not ‘jailbreak’ or ‘root’ your device. (Okay.. so I had to add one.)

* * *

Today’s quotable quote:Lighten up, just enjoy life, smile more, laugh more, and don’t get so worked up about things.” ~ Kenneth Branagh

Copyright 2007-2017 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

August 28, 2017 Posted by | advice, Android, cellular, consumer electronics, cyber crime, e-mail, gadgets, Google, hackers, Internet, mobile, News, privacy, security | , , , , , | Leave a comment

Just don’t download any apps..

Guys, I have long told people, if you don’t absolutely need it, don’t install it (and you sure as shooting don’t need five media players..). Well now there’s even more reason to repeat that advice.

* More than 1,000 Spyware Apps Found On Android App Stores

If you think you are downloading apps from Google Play Store and you are secure, then watch out! Someone has managed to flood third-party app stores and Google Play Store with more than a thousand malicious apps, which can monitor almost anything a user does on their mobile device from silently …” Read More..

Update: 500+ Android apps found containing program that can download spyware plug-in

More than 500 mobile apps on Google Play were recently discovered containing an advertising software development kit capable of downloading malicious plug-ins that can spy on Android users’ call histories.. Apps using the ad SDK, a product called Igexin, were downloaded over 100 million times by Android device owners before Google removed these programs from its store..Read more..

Tell your friends.

Addenda: I have been asked my thoughts on Wikileaks and the (alleged) CIA hacking tools (such as this one, posted today) often enough now that I think I should mention them here.. please don’t think the CIA are the only folks who can do/are doing these ‘exploits’. They basically copied from the hackers. These things are possible because all our devices/technologies are inherently, fundamentally, insecure. (Don’t believe me? Read this.)

* * *

Today’s quote:I am thankful the most important key in history was invented. It’s not the key to your house, your car, your boat, your safety deposit box, your bike lock or your private community. It’s the key to order, sanity, and peace of mind. The key is ‘Delete.'” ~ Elayne Boosler

Copyright 2007-2017 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

August 11, 2017 Posted by | advice, Android, cellular, consumer electronics, cyber crime, gadgets, Google, hackers, Internet, mobile, News, security, tech | , , , , , , , , , , , , | Leave a comment

The wackiest, weirdest gadgets of CES 2017

Folks, in case you don’t know, The Consumer Electronics Show is where companies bring out new technology products.. it’s a chance to look into the future. And also a chance to see what the big brains think we (the ‘average consumer’) want.. or will want someday.

Not only do I NOT want any of this.. I really wish they weren’t developing it. Half of it has kinda scary implications.. But, here you go –> Your glimpse into the future is here:

* The wackiest, weirdest gadgets of CES 2017

I really hope zero people buy any of that. Ever.

But you know people will.

Because they’re.. well.. humans.

Today’s quote:How wonderful it is that nobody need wait a single moment before starting to improve the world.” ~ Anne Frank

Copyright 2007-2017 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

January 9, 2017 Posted by | computers, consumer electronics, gadgets, hardware, News, tech | , , , , , , , | 2 Comments

This is why so few posts..

I see headlines like this everyday.

And nobody seems to care.

LATEST NEWS Nov 29, 2016

Cyber Attack Knocks Nearly a Million Routers Offline

Mirai Botnet is getting stronger and more notorious each day that passes by. The reason: Insecure Internet-of-things Devices. Last month, the Mirai botnet knocked the entire Internet offline for a few hours, crippling some of the world’s biggest and most popular websites. Now, more than 900,000 …

Read More
Twitter Facebook LinkedIn

San Francisco Metro System Hacked with Ransomware; Resulting in Free Rides

Nothing is immune to being hacked when hackers are motivated. The same proved by hackers on Friday, when more than 2,000 computer systems at San Francisco’s public transit agency were apparently got hacked. San Francisco’s Municipal Transportation Agency, also known as MUNI, offered free rides on …

Read More
Twitter Facebook LinkedIn

Hacker who exposed Steubenville Rape Faces longer Prison term than Rapists

Remember Steubenville High School Rape Case? In 2012, Steubenville (Ohio) high school’s football team players gang-raped an unconscious teenage girl from West Virginia and took photographs of the sexual assault. In December 2012, a member of the hacker collective Anonymous hacked into the …

Read More
Twitter Facebook LinkedIn

Researchers Show How to Steal Tesla Car by Hacking into Owner’s Smartphone

New technology is always a little scary, so are Smart Cars. From GPS system and satellite radio to wireless locks, steering, brakes, and accelerator, today vehicles are more connected to networks than ever, and so they are more hackable than ever. It’s not new for security researchers to hack …

Read More
Twitter Facebook LinkedIn

Beware! Malicious JPG Images on Facebook Messenger Spreading Locky Ransomware

If you receive an image file sent by someone, even your friend, on your Facebook Messenger, LinkedIn or any other social media platform, just DO NOT CLICK ON IT. Even JPG image file could eventually infect your computer with the infamous Locky Ransomware. Earlier this week, we reported a new …

Read more..

Worse, there’s too many people using computers who’ve never even heard of ‘ransomware’.

Well.. I’ve been pointing to important headlines such as these since 2007. Been doing my part. It’s up to you people to educate your friends and loved ones with the bleak picture. The handwriting’s on the wall, folks.

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

November 29, 2016 Posted by | cellular, cloud computing, computers, consumer electronics, cyber crime, Cyberwarfare, e-mail, gadgets, hackers, Internet, News, tech | 6 Comments

Today’s ‘Must Read’

Folks, not only does everyone need to read this article, but pass it along to their friends and family.

* How your connected home or office is a gift for hackers, criminals, and cyber spies

The Internet of Things needs to learn how to secure devices — and fast.Read more..

[ Note: I also highly recommend clicking on some of the embedded articles.. Like, the Snowden one.. ]

Related articles: (In my way of thinking..)

* Britain has passed the ‘most extreme surveillance law ever passed in a democracy’

The law forces UK internet providers to store browsing histories — including domains visited — for one year. Not only that, the law also gives the intelligence agencies the power to hack into computers and devices of citizens.Read more..

* Distracted minds: 3 tips to disconnect from tech and increase productivity

Adam Gazzaley, neurologist and author of The Distracted Mind: Ancient Brains in a High-Tech World, explains how multitasking damages focus, and offers advice for workplace productivity.Read more..

.. But the truth is, no one’s going to read those. And no one’s going to change their thinking or behavior. I’m wasting my time.

* * *

Today’s quote:No act of kindness, no matter how small, is ever wasted.” ~ Aesop

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

November 17, 2016 Posted by | advice, computers, consumer electronics, cyber crime, Cyberwarfare, gadgets, hackers, Internet, Internet of Things, mobile, networking, News, privacy, security, tech | , , , , , , , | 2 Comments

Own an Android? Read this!

It just keeps getting better and better..

* Pre-installed Backdoor On 700 Million Android Phones Sending Users’ Data To China

Do you own an Android smartphone? You could be one of those 700 Million users whose phone is secretly sending text messages to China every 72 hours. You heard that right. Over 700 Million Android smartphones contain a secret ‘backdoor’ that surreptitiously sends all your text messages, call log, contact list, location history, and app data to China every 72 hours.” Read more..

This is why you don’t let your enemy build your stuff.. And it’s as predictable as the sunrise. It might sound paranoid, but it wouldn’t surprise me if this (type thing) isn’t on every device made there (maybe dormant) and it’s why I won’t buy Lenovo.

November 16, 2016 Posted by | advice, Android, cellular, consumer electronics, cyber crime, Cyberwarfare, gadgets, News, privacy, security | Leave a comment

Really, really creepy use of tech …

Folks, if you put your thinking caps on, and read this article, (as I recommend you do) you just might start wondering if something isn’t really, really wrong.

And maybe think twice before buying that “smart” toaster, or “voice activated” remote control…

* Ottawa sex toy maker We-Vibe sued for ‘secretly collecting’ its customers’ intimate habits

It has come to our attention that the company was actually recording specific information about her and other individuals usage of the device. That would include when it’s on, how long it’s being used for, what settings it’s on, the temperature of the device …” Read more..

Thank you, Dear Reader, for bringing this story to my attention.

And if that doesn’t do it, maybe this will:

* Hackers take Remote Control of Tesla’s Brakes and Door locks from 12 Miles Away

Next time when you find yourself hooked up behind the wheel, make sure your car is actually in your control. Hackers can remotely hijack your car and even control its brakes from 12 miles away. Car hacking is a hot topic. Today many automobiles companies have been offering vehicles with the …Read more..

* * *

Today’s quote:Courage is what it takes to stand up and speak; courage is also what it takes to sit down and listen.” ~ Winston Churchill

And, yes. I know I said “really, really” twice.

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

September 20, 2016 Posted by | advice, consumer electronics, gadgets, hackers, Internet of Things, News, privacy, security, tech | , , , , , , , , , , , | Leave a comment