Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

Warning: Critical Patch for Windows Issued

Oh, yes.. more of the same. Act now and protect yourself. * Microsoft releases emergency patch for all versions of Windows

The flaw, affecting Windows Vista, 7, 8, and 8.1, can allow a hacker to take over a machine.” Read more..

And when I went to Start>Windows Update, I saw this new item..

wu

No, thanks. I never want the first version of any thing.

Other news: More Items Like This * UCLA Health hit by hack; medical data on 4.5 million people exposed

The LA-based university health system says the data stolen was not encrypted.Read more..

[Silly me! I thought there were laws making such PII mandatory-encrypted.. ]

*     *     *

Today’s quote:Tolerance is giving to every other human being every right that you claim for yourself.” ~ Robert Green Ingersoll Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories. Make yours great ones. Ones to be proud of.

July 20, 2015 Posted by | advice, computers, cyber crime, hackers, Internet, Microsoft, News, PC, security, tech, Windows, Windows 10, Windows 7, Windows 8 | , , , , , , , | 2 Comments

Passwords worth real gold

A quick ‘must read’ for you today.

Russian hackers show who values passwords

As I’ve said here before, it is time end-users realize their personal data has value, including username and password. For those who can’t calculate that value, know that Facebook didn’t develop a $189 billion market cap harvesting corn on Farmville. That cap was built on personal data willingly provided by its end-users.Read more..

[note: “end user” is Geekspeak for you and me – computer users.]

Today’s quote:It’s not the size of the dog in the fight, it’s the size of the fight in the dog.” ~ Mark Twain

Copyright 2007-2014 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
And please, never forget – one person can make a difference.
Find a way to make someone’s day today.
(Best advice I ever heard? Don’t sweat the small stuff.)

August 8, 2014 Posted by | advice, cloud computing, consumer electronics, cyber crime, hackers, Internet, News, passwords, privacy, security, tech | , , , , , | Leave a comment

Why Did 9,000 Porny Spambots Descend on This San Diego High Schooler?

Folks, a rather interesting read to recommend to you today.

Why Did 9,000 Porny Spambots Descend on This San Diego High Schooler?

A voyage into the strange underworld of spambots, shady marketing, and non-human intelligence.Read more..

[… “non-human intelligence” … I think we need a new term. ]

Today’s quote:When angry, count to four; when very angry, swear.” ~ Mark Twain

Copyright 2007-2013 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

November 26, 2013 Posted by | cyber crime, hackers, Internet, News, privacy, security | , , , , , | Leave a comment

The Most Important News You Didn’t Read About

Folks, this started happening in 2009, and you won’t know it unless you read certain InfoSec (ultra Geeky) blogs – today. 

Wonder what else of National Security Threat Level Red they’re not telling us? (Can’t p.o. the Chinese, man. They own our money (cuz we by cheap plastic crap from the Dollar Store/Wal Mart/etc.).)

* Chinese Hackers Steal Info from top secret U.S military data

QinetiQ, a UK-based defense contractor suffers humiliation as intelligence officials confirmed that China was able to steal the U.S. classified documents and pertinent technological information all this because of QinetiQ’s faulty decision-making. QinetiQ North America (QQ) a world leading defense technology and security company providing satellites, drones and software services to the U.S …Read more..

And for a more detailed report: Hackers Turned Defense Contractor QinetiQ Into Intelligence Playground For three years, digital thieves linked to China stole intellectual property and defense information from the U.K.-based firm.

For more than three years, hackers linked to China thoroughly compromised U.K.-based QinetiQ, a firm that bills itself as “a world leading defense technology and security company,” to steal intellectual property and sensitive defense information, according to reports of the incident.” Read more..

I put two up there ‘cuz this is.. kinda huge. (Make no mistake: these “hackers” are a unit in the PLA.)

Can’t say nothing ’bout that Internet-thingy that might shake consumer confidence, either. A handful of folks (like, 15 – two dozen) are making too much money.

So forget I mentioned it. But remember, not everyone in the “world wide” plays nice.

Related: The Cyber-Dam Breaks: Sensitive Army database of U.S. dams compromised; Chinese hackers suspected

The compromise of the U.S. Army Corps of Engineers’ National Inventory of Dams (NID) is raising new concerns that China is preparing to conduct a future cyber attack against the national electrical power grid, including the growing percentage of electricity produced by hydroelectric dams.” Read more..

Unrelated: Beware of fake Facebook security page phishing scam

Trend Micro has spotted a malware sample, TSPY_MINOCDO.A, which targets Facebook users. The malware redirects users to a spoofed page of the social network and claims to be part of the site security check feature, even showing the tagline “Security checks help keep Facebook trustworthy and free of spam”. Users eager to log into Facebook may fall victim to this ruse.Read more...

Can’t say I didn’t warn ‘ya.

Today’s quote: When Mozart was composing at the end of the eighteenth century, the city of Vienna was so quiet that fire alarms could be given verbally, by a shouting watchman mounted on top of St. Stefan’s Cathedral. In twentieth-century society, the noise level is such that it keeps knocking our bodies out of tune and out of their natural rhythms. This ever-increasing assault of sound upon our ears, minds, and bodies adds to the stress load of civilized beings trying to live in a highly complex environment.” ~ Steven Halpern

Copyright 2007-2013 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

May 4, 2013 Posted by | cyber crime, Cyberwarfare, hackers, Internet, Internet scam, News, security | , , , , , , , , , , , , , , , | Leave a comment

And Yet More Bad News About The Tech…

Some recent headlines you should might want to consider…

* Guess what? Your favorite websites are more likely to serve malware than p0rn sites

A new report may change your perception of websites and malware. Michael P. Kassner ferrets out what Cisco is excited about.Read more..

Uh, oh..
* U.K. spy agencies plan to install Web snooping ‘black boxes’

U.K. intelligence agencies are planning to install surveillance ‘black boxes’ on phone networks and ISP servers that utilize deep packet inspection to monitor Web traffic—including Facebook, Twitter, and Skype, among others.Read more..

[“the power of the state to monitor every aspect of our lives“.. That really shouldn’t surprise anyone. Think about what your ISP sees.. ]

Related..
* The Year of Being Watched

The FBI is reading David Petraeus’s email. Apple wants to help you find your phone, and your browser knows what kind of underwear you prefer. Welcome to the new paradigm of privacy: There isn’t any.Read more..

[This one is highly reco’d… and the comments are interesting too.]

And yippee yahoo..
* Federal Reserve Hit by Hackers

The Federal Reserve is the latest government agency to be hit by a cyber attack.” Read more..

Last but certainly not least..
* NY Times Hack Is Tip of a Cyber Iceberg

Last week’s reports that the Chinese government hacked into The New York Times were just the tip of the iceberg.Read more..

A Tool Kit:
* Staying Private on the New Facebook

Facebook is a personal vault that can contain photos of your firstborn, plans to bring down your government and, occasionally, a record of your indiscretions.

It can be scoured by police officers, partners and would-be employers. It can be mined by marketers to show tailored advertisements.

And now, with Facebook’s newfangled search tool, it can allow strangers, along with “friends” on Facebook, to discover who you are, what you like and where you go.Read more..

(I’m so *freakin’* glad I never signed up..!)

Lot of “food” for you thinkers out there. Have a happy day.

Today’s quotes:

* “Before we work on artificial intelligence why don’t we do something about natural stupidity?” ~ Steve Polyak

* “…but it is better to learn wisdom late than never to learn it at all.” ~ Arthur Conan Doyle, (Sherlock Holmes) The Man with the Twisted Lip

Copyright 2007-2013 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

February 7, 2013 Posted by | advice, cloud computing, computers, cyber crime, Cyberwarfare, hackers, Internet, News, security, tech | , , , , , , , , , , , , , , , , , , | 1 Comment

You might want to know… And Friday Fun

If you have ever used the Nationwide Insurance company, or their website..

* Personal info of 1m compromised in Nationwide breach

The FBI is investigating a breach at Nationwide Insurance, where hackers recently accessed the sensitive information of about one million people, including policy and non-policy holders.Read more ..

[reminder: “breach” is geekspeak for “a hacker broke in”.]

If you “download”, Torrent, or “share” music, software, or videos.. you have a little more time.

* ISP piracy alert system now expecting early-2013 launch

The rollout of a piracy alert system backed by several major internet service providers (ISPs) has been pushed back to early next year.

* ISPs can slow or suspend web use under anti-piracy program

No surprise..

* Cloud decisions are no longer in the IT department’s hands – the suits have taken over

“A new report has revealed that decisions around cloud are increasingly being made by people outside IT departments.Read more..

(History shows how well things work once the beancounters take control of something.. [and there’s good reason it is a derogatory term.] Trying to get the suits to comprehend anything remotely IT-related, and budgeted, is one of the oldest headaches in the biz [ref: Dilbert character “pointy-haired boss“.])

Friday Fun Video (sing along if you like..)

Today’s quote:Doing what little one can to increase the general stock of knowledge is as respectable an object of life, as one can in any likelihood pursue.” ~ Charles Darwin

Copyright 2007-2012 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

November 30, 2012 Posted by | cloud computing, computers, cyber crime, hackers, Internet, News | , , , | 3 Comments

Cybersecurity and Cybercrime: 2012 in Review

(And Congrats to Buster Posey!)

Folks, another brief slideshow I think you should see.

A year in cybersecurity and cybercrime: 2012 review

During the year, we have seen the destruction of SOPA and PIPA but the emergence of CISPA and similar laws around the world, a growing trend in hacks and scams, an explosion in malware, and states committing cyberwarfare on their friends and foes. Here’s a run-down of what happened in 2012.” See the (14 slides) slideshow here.

.. funny … they didn’t mention all the big data “breaches” (nor the “corporate espionage”) … but, still, take a look.

Related: Reports: Obama Signs Classified Cybersecurity Directive

President Obama has reportedly signed a classified directive establishing guidelines to protect the nation’s computer networks.Read more..

[Reactions in the InfoSec community are mixed.. It’s a good read.]

Kinda’ Sorta’ related: 2012 in Review: Tech Turkeys of the Year

And now, for your reading pleasure, the very worst from the tech world in 2012.Read more..

Apropos of nuttin at all: I liked Buster Posey from Day One. And while no one player makes a team a champion team, I think few could argue that the S.F. Giants would not be where they are without this kid. Congratulations, Mr. Posey! Buster Posey is voted NL MVP

The National League Most Valuable Player award voters came to the same conclusion that any Giants-watcher had to reach in 2012: This team would not have gone far without its 25-year-old catcher and leader.” Read more..

[I like it when – against all odds – good things happen to good people.]

Today’s quote:There are three things which are real: God, human folly, and laughter. The first two are beyond our comprehension. So we must do what we can with the third.” ~ John F. Kennedy

Copyright 2007-2012 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

November 16, 2012 Posted by | cyber crime, hackers, Internet, News, security | , , , , , , , , | Leave a comment