Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

The Most Important News You Didn’t Read About

Folks, this started happening in 2009, and you won’t know it unless you read certain InfoSec (ultra Geeky) blogs – today. 

Wonder what else of National Security Threat Level Red they’re not telling us? (Can’t p.o. the Chinese, man. They own our money (cuz we by cheap plastic crap from the Dollar Store/Wal Mart/etc.).)

* Chinese Hackers Steal Info from top secret U.S military data

QinetiQ, a UK-based defense contractor suffers humiliation as intelligence officials confirmed that China was able to steal the U.S. classified documents and pertinent technological information all this because of QinetiQ’s faulty decision-making. QinetiQ North America (QQ) a world leading defense technology and security company providing satellites, drones and software services to the U.S …Read more..

And for a more detailed report: Hackers Turned Defense Contractor QinetiQ Into Intelligence Playground For three years, digital thieves linked to China stole intellectual property and defense information from the U.K.-based firm.

For more than three years, hackers linked to China thoroughly compromised U.K.-based QinetiQ, a firm that bills itself as “a world leading defense technology and security company,” to steal intellectual property and sensitive defense information, according to reports of the incident.” Read more..

I put two up there ‘cuz this is.. kinda huge. (Make no mistake: these “hackers” are a unit in the PLA.)

Can’t say nothing ’bout that Internet-thingy that might shake consumer confidence, either. A handful of folks (like, 15 – two dozen) are making too much money.

So forget I mentioned it. But remember, not everyone in the “world wide” plays nice.

Related: The Cyber-Dam Breaks: Sensitive Army database of U.S. dams compromised; Chinese hackers suspected

The compromise of the U.S. Army Corps of Engineers’ National Inventory of Dams (NID) is raising new concerns that China is preparing to conduct a future cyber attack against the national electrical power grid, including the growing percentage of electricity produced by hydroelectric dams.” Read more..

Unrelated: Beware of fake Facebook security page phishing scam

Trend Micro has spotted a malware sample, TSPY_MINOCDO.A, which targets Facebook users. The malware redirects users to a spoofed page of the social network and claims to be part of the site security check feature, even showing the tagline “Security checks help keep Facebook trustworthy and free of spam”. Users eager to log into Facebook may fall victim to this ruse.Read more...

Can’t say I didn’t warn ‘ya.

Today’s quote: When Mozart was composing at the end of the eighteenth century, the city of Vienna was so quiet that fire alarms could be given verbally, by a shouting watchman mounted on top of St. Stefan’s Cathedral. In twentieth-century society, the noise level is such that it keeps knocking our bodies out of tune and out of their natural rhythms. This ever-increasing assault of sound upon our ears, minds, and bodies adds to the stress load of civilized beings trying to live in a highly complex environment.” ~ Steven Halpern

Copyright 2007-2013 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

May 4, 2013 Posted by | cyber crime, Cyberwarfare, hackers, Internet, Internet scam, News, security | , , , , , , , , , , , , , , , | Leave a comment

And Yet More Bad News About The Tech…

Some recent headlines you should might want to consider…

* Guess what? Your favorite websites are more likely to serve malware than p0rn sites

A new report may change your perception of websites and malware. Michael P. Kassner ferrets out what Cisco is excited about.Read more..

Uh, oh..
* U.K. spy agencies plan to install Web snooping ‘black boxes’

U.K. intelligence agencies are planning to install surveillance ‘black boxes’ on phone networks and ISP servers that utilize deep packet inspection to monitor Web traffic—including Facebook, Twitter, and Skype, among others.Read more..

[“the power of the state to monitor every aspect of our lives“.. That really shouldn’t surprise anyone. Think about what your ISP sees.. ]

Related..
* The Year of Being Watched

The FBI is reading David Petraeus’s email. Apple wants to help you find your phone, and your browser knows what kind of underwear you prefer. Welcome to the new paradigm of privacy: There isn’t any.Read more..

[This one is highly reco’d… and the comments are interesting too.]

And yippee yahoo..
* Federal Reserve Hit by Hackers

The Federal Reserve is the latest government agency to be hit by a cyber attack.” Read more..

Last but certainly not least..
* NY Times Hack Is Tip of a Cyber Iceberg

Last week’s reports that the Chinese government hacked into The New York Times were just the tip of the iceberg.Read more..

A Tool Kit:
* Staying Private on the New Facebook

Facebook is a personal vault that can contain photos of your firstborn, plans to bring down your government and, occasionally, a record of your indiscretions.

It can be scoured by police officers, partners and would-be employers. It can be mined by marketers to show tailored advertisements.

And now, with Facebook’s newfangled search tool, it can allow strangers, along with “friends” on Facebook, to discover who you are, what you like and where you go.Read more..

(I’m so *freakin’* glad I never signed up..!)

Lot of “food” for you thinkers out there. Have a happy day.

Today’s quotes:

* “Before we work on artificial intelligence why don’t we do something about natural stupidity?” ~ Steve Polyak

* “…but it is better to learn wisdom late than never to learn it at all.” ~ Arthur Conan Doyle, (Sherlock Holmes) The Man with the Twisted Lip

Copyright 2007-2013 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

February 7, 2013 Posted by | advice, cloud computing, computers, cyber crime, Cyberwarfare, hackers, Internet, News, security, tech | , , , , , , , , , , , , , , , , , , | 1 Comment

Clash of the Titans: China vs Google

Unless you live in a cave, you probably know that much todo is being made over a recent “hacking” incident – China hacked into some dissidents’ Gmail accounts, and Google responded by threatening to pull out of China.

While a threat is not the same thing as an act (at least, in most countries..), this event does have some very real implications and is worthy of your attention. (For instance, it underscores the inherent fatal flaw of “cloud computing“.) The best article on this topic I found so far is by ZDNet Editor in Chief Larry Dignan.

Assessing Google’s showdown with China: Does it make sense?

On the surface, Google’s threat to shut down its China operations after a cyberattack on its infrastructure looks like sheer business lunacy. How can the search giant give up on the world’s biggest growth market? It’s easier than you’d think.

Please click here to read the entire item.

[note: For those who are curious, it is my humble opinion that Google absolutely has to learn from this attack; and do what ever it has to do to maintain its current level of user trust.]

Copyright 2007-2010 © Tech Paul. All rights reserved.jaanix post to jaanix

Share this post :

January 15, 2010 Posted by | Google, Internet, News, tech | , , , | 4 Comments

Boycotting the Olympics

Folks, I am boycotting the Olympics this year. I am a bit curious as to how Tech–for Everyone readers are feeling about the games being held in China and so I’ve created a very brief survey. 
Click Here to take survey

I will post the results a little later on.

August 8, 2008 Posted by | Internet | , , , , | 2 Comments