Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

14 Tips to be safer on Public Wi-Fi (‘hotspots’)

A couple reading reco’s for mobile Internet users.

* 14 Public Wi-Fi Hotspot Security Tips You Need

Sometimes you need it so bad, you don’t care if it is clean or dirty. You don’t care who has been there before or what viruses they’ve left behind. I speak, of course, of public Wi-Fi hotspots, aka honeypots for weak-willed souls desperate for a sense of connection. Look, it’s okay to connect to strange networks. Just use protection, cover your tracks, and follow PCMag’s 14 Tips for Public Hotspot Security. Be safe out there.” Read more..

I disagree with what the author wrote there a bit.. it’s really not ‘okay’ to use public wi-fi.. (that’s why I put ‘safer’ where the Industry puts ‘safe’) but I know you’re going to. One of the main reasons is “53 percent can’t tell a secure network from an insecure one.”
That’s so shockingly stupid clueless in 2017 .. do we need to remove these devices from the hands of the masses?

* * *

Today’s quote:A paranoid is someone who knows a little of what’s going on.” ~ William S. Burroughs

Copyright 2007-2017 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

August 17, 2017 Posted by | advice, cellular, computers, consumer electronics, how to, Internet, mobile, privacy, security | , , , , , , , | Leave a comment

Just don’t download any apps..

Guys, I have long told people, if you don’t absolutely need it, don’t install it (and you sure as shooting don’t need five media players..). Well now there’s even more reason to repeat that advice.

* More than 1,000 Spyware Apps Found On Android App Stores

If you think you are downloading apps from Google Play Store and you are secure, then watch out! Someone has managed to flood third-party app stores and Google Play Store with more than a thousand malicious apps, which can monitor almost anything a user does on their mobile device from silently …” Read More..

Update: 500+ Android apps found containing program that can download spyware plug-in

More than 500 mobile apps on Google Play were recently discovered containing an advertising software development kit capable of downloading malicious plug-ins that can spy on Android users’ call histories.. Apps using the ad SDK, a product called Igexin, were downloaded over 100 million times by Android device owners before Google removed these programs from its store..Read more..

Tell your friends.

Addenda: I have been asked my thoughts on Wikileaks and the (alleged) CIA hacking tools (such as this one, posted today) often enough now that I think I should mention them here.. please don’t think the CIA are the only folks who can do/are doing these ‘exploits’. They basically copied from the hackers. These things are possible because all our devices/technologies are inherently, fundamentally, insecure. (Don’t believe me? Read this.)

* * *

Today’s quote:I am thankful the most important key in history was invented. It’s not the key to your house, your car, your boat, your safety deposit box, your bike lock or your private community. It’s the key to order, sanity, and peace of mind. The key is ‘Delete.'” ~ Elayne Boosler

Copyright 2007-2017 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

August 11, 2017 Posted by | advice, Android, cellular, consumer electronics, cyber crime, gadgets, Google, hackers, Internet, mobile, News, security, tech | , , , , , , , , , , , , | Leave a comment

You just gotta love it…

* Loss from cybercrime exceeded $1.3B in 2016, FBI report

“The financial loss from cybercrime in the U.S. exceeded $1.3 billion in 2016, a rise of 24 percent, according to a new report issued by the Federal Bureau of Investigation’s Internet Crime Complaint Center (IC3).” Read more..

And remember gang –> that’s ONLY what was reported to the FBI. Think “tip of the iceberg”. (And, only USA losses.. How much global?)

* Google Gets Record-Breaking $2.7 Billion Fine for Manipulating Search Results

Google has just lost its biggest regulatory battle! Google has been hit with a record-breaking $2.7 billion (€2.42 billion) fine by the European antitrust officials for unfairly manipulating search results since 2008. After a lengthy seven-year investigation that was launched in 2010..Read more..

.. “since 2008” .. HA! Try, “since Google”. And don’t think Google’s going to pay that fine — the advertisers are. Be smart. Bail out now people.

* Judy Android malware unleashes massive attack on Google Play Store (NOTE! it wasn’t an ‘attack’.. the criminal hackers ‘poisoned’ the site with infected apps.)

When it comes to apps for mobile devices, InfoSec experts will always recommend downloading from official vendors like the Google Play Store or the Apple App Store. While these sites are much more stringent in their standards for malicious app prevention, there are always exceptions (which require the consumer to use common sense).Read more..

OMG. Too funny. “require people use common sense” ..!

Sad part is.. that ‘attack’ netted tons of cash with automated click fraud (do you advertise? Look up the term ‘click fraud’ NOW!)

ALERT: New Petya ransomware variant attacking computers worldwide

Following the high profile WannaCry attack merely a month ago, we have detected another ransomware outbreak that is spreading rapidly across the globe. It appears to be a new variant of the known Petya ransomware, also known as Petna, and it has already affected many high profile companies and government institutions across Europe and currently shows no sign of slowing down.Read more..

And: Six quick facts to know about today’s global ransomware attack

This is what you need to know — right now.Read more..

* * *

* And you better believe — my ‘page views’ will take yet another hit for posting this.

Today’s quote:In view of the fact that God limited the intelligence of man, it seems unfair that He did not also limit his stupidity.” ~ Konrad Adenauer

Copyright 2007-2017 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

June 27, 2017 Posted by | advice, cyber crime, Google, hackers, Internet, News, phraud, security, tech | , , , , , , , , , , , , , , , , | 2 Comments

Start over

This is not “news”, but this ‘news article’ is why I’ve been saying –> scrap it ALL. Start over.

This time with security/privacy in mind.

To understand this, you need to know that “vulnerabilities” means “insecure computer code”. You need to note the idea “being found” and think “tip of the iceberg”, and you have to understand that NONE of the ‘computer languages’ are even designed to be secure. Were a ‘Programmer’ to try to write a hacker-proof ‘app’, they couldn’t because the Language, and the “libraries’ it uses are weak. Anywho.. bringing you this stuff is killing my ratings, but here’s the evidence .. um, article:

* ‘Unrelenting’ rise in vulnerabilities, Risk Based Security reports

We are on track for another record-breaking year in the pace of vulnerability disclosures, said a new report from Risk Based Security.Read more..

*     *     *

Today’s quote:No matter what people tell you, words and ideas can change the world.” ~ Robin Williams

Copyright 2007-2017 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

May 30, 2017 Posted by | computers, consumer electronics, cyber crime, hackers, Internet, News, privacy, security, software, tech | 5 Comments

Today’s ‘Must Read’

Folks, not only does everyone need to read this article, but pass it along to their friends and family.

* How your connected home or office is a gift for hackers, criminals, and cyber spies

The Internet of Things needs to learn how to secure devices — and fast.Read more..

[ Note: I also highly recommend clicking on some of the embedded articles.. Like, the Snowden one.. ]

Related articles: (In my way of thinking..)

* Britain has passed the ‘most extreme surveillance law ever passed in a democracy’

The law forces UK internet providers to store browsing histories — including domains visited — for one year. Not only that, the law also gives the intelligence agencies the power to hack into computers and devices of citizens.Read more..

* Distracted minds: 3 tips to disconnect from tech and increase productivity

Adam Gazzaley, neurologist and author of The Distracted Mind: Ancient Brains in a High-Tech World, explains how multitasking damages focus, and offers advice for workplace productivity.Read more..

.. But the truth is, no one’s going to read those. And no one’s going to change their thinking or behavior. I’m wasting my time.

* * *

Today’s quote:No act of kindness, no matter how small, is ever wasted.” ~ Aesop

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

November 17, 2016 Posted by | advice, computers, consumer electronics, cyber crime, Cyberwarfare, gadgets, hackers, Internet, Internet of Things, mobile, networking, News, privacy, security, tech | , , , , , , , | 2 Comments