Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

Really, really creepy use of tech …

Folks, if you put your thinking caps on, and read this article, (as I recommend you do) you just might start wondering if something isn’t really, really wrong.

And maybe think twice before buying that “smart” toaster, or “voice activated” remote control…

* Ottawa sex toy maker We-Vibe sued for ‘secretly collecting’ its customers’ intimate habits

It has come to our attention that the company was actually recording specific information about her and other individuals usage of the device. That would include when it’s on, how long it’s being used for, what settings it’s on, the temperature of the device …” Read more..

Thank you, Dear Reader, for bringing this story to my attention.

And if that doesn’t do it, maybe this will:

* Hackers take Remote Control of Tesla’s Brakes and Door locks from 12 Miles Away

Next time when you find yourself hooked up behind the wheel, make sure your car is actually in your control. Hackers can remotely hijack your car and even control its brakes from 12 miles away. Car hacking is a hot topic. Today many automobiles companies have been offering vehicles with the …Read more..

* * *

Today’s quote:Courage is what it takes to stand up and speak; courage is also what it takes to sit down and listen.” ~ Winston Churchill

And, yes. I know I said “really, really” twice.

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

September 20, 2016 Posted by | advice, consumer electronics, gadgets, hackers, Internet of Things, News, privacy, security, tech | , , , , , , , , , , , | Leave a comment

More happy news for your Friday

(I hope you didn’t eat at a Wendy’s recently..)

Absolutely none of this should surprise you.

First up:
* Hackers Can Steal Your ATM PIN from Your Smartwatch Or Fitness Tracker

As your day-to-day apparel and accessories are turning into networked mobile electronic devices that attach to your body like smartwatch or fitness band, the threat to our personal data these devices collect has risen exponentially.Read more..

(There are Privacy concerns with those dang things too, BTW.)

And..
* Flaw Allows Attackers to Remotely Tamper with BMW’s In-Car Infotainment System

The Internet of things or connected devices are the next big concerns, as more Internet connectivity means more access points which mean more opportunities for hackers. When it comes to the threat to Internet of Things, Car Hacking is a hot topic. Since many automobiles companies are offering..Read more..

* This Android Hacking Group is making $500,000 per day

The bad news for affected Android users is that Hummer is extremely difficult if not impossible to get rid of, because the Trojan takes control of the phone at admin level, making it impossible for traditional antivirus tools to uninstall Hummer.

The dangerous part: It is impossible to delete the Trojan through a factory reset due to the fact Hummer comes equipped with up to 18 different separate rooting exploits that allow it to root itself on a phone..Read more..

( Infecting a million phones each day…!!! )

And last but not least..
* Over 1000 Wendy’s Restaurants Hit by Credit Card Hackers

The Popular fast-food restaurant chain Wendy’s on Thursday admitted that a massive cyber attack had hit more than 1,000 of its restaurants across the country. The burger chain did not speculate how many people may have been affected, though it did confirm that the hackers were able to steal its …” Read more..

So.. let’s see if I can come up with a good quote after all that news..

Today’s quote:Life is a mirror and will reflect back to the thinker what he thinks into it.” ~ Ernest Holmes

(And I’m thinkin’ it’s time to Just Say No to our current tech… All of us.)


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

July 8, 2016 Posted by | advice, Android, cloud computing, computers, consumer electronics, hackers, Internet, Internet of Things, mobile, News, privacy, rootkits, security, software, tech | , , , , , , , , , , , , , , , , , , , | Leave a comment

While I was away…

Let’s take a look at some of the recent headlines in Tech. (In no particular order..)

* FCC privacy rules can’t stop ‘gold rush’ in personal data

The flourishing ‘surveillance capitalism’ that profits from selling consumers’ personal data will be little affected by the new rules.Read More..

* Malvertising Campaign Hits Top Websites to Spread Ransomware

Hackers are always in search for an elite method to create loopholes in the cyberspace to implement the dark rules in the form of vulnerability exploitation. Top Trustworthy sites such as The New York Times, BBC, MSN, AOL and many more are on the verge of losing their face value as a …” Read more..

* Warning — Hackers can Silently Install Malware to Non-Jailbroken iOS Devices

Hard time for mobile phone users! Just recently, two severe vulnerabilities in Qualcomm Snapdragon chip and Stagefright were spotted on the Android platform, affecting more than a Billion and Millions of devices respectively. And now: Hackers have discovered a new way to install malicious apps ..” Read more..

* Apple users, beware: First live ransomware targeting Macs …

Security researchers have discovered what they believe to be the first-ever ransomware attack targeted at Apple users that actually made it out …” Read more..

* Android Trojan infiltrates mobile firmware, Trend Micro apps

An Android Trojan which displays unwanted ads and installs nuisance software on mobile devices has been discovered in the firmware of smartphones and in popular Android applications, according to researchers.Read more..

[ “firmware” is chip-level coding, which comes into play when you first power up, but before the operating system (and therefore, any ‘anti-virus’) launches. ]

* The 18 scariest computer viruses of all time (slideshow)

And, there’s also Apple vs the F.B.I., and other delightful stories… But.. none of them are happy.

Today’s quote:Happiness is when what you think, what you say, and what you do are in harmony.” ~ Mahatma Gandhi

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

March 22, 2016 Posted by | advice, Android, Apple, cellular, cloud computing, computers, consumer electronics, cyber crime, Cyberwarfare, hackers, Internet, iPhone, News, Phishing, phraud, privacy, ransomware, security, software, tech | , , , , , , , , , , , , , | Leave a comment

Everyday cybercrime — and what you can do about it

Folks, here is an “educational” Ted Talks video I think everyone should see. I hope you will forward this on to your less-savvy friends and family (and urge them to watch it).

Today’s quote:It is curious that physical courage should be so common in the world and moral courage so rare.” ~ Mark Twain

Copyright 2007-2013 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

September 17, 2013 Posted by | advice, computers, cyber crime, hackers, Internet, security, tech | , , , , , , , , | 2 Comments

The Most Important News You Didn’t Read About

Folks, this started happening in 2009, and you won’t know it unless you read certain InfoSec (ultra Geeky) blogs – today. 

Wonder what else of National Security Threat Level Red they’re not telling us? (Can’t p.o. the Chinese, man. They own our money (cuz we by cheap plastic crap from the Dollar Store/Wal Mart/etc.).)

* Chinese Hackers Steal Info from top secret U.S military data

QinetiQ, a UK-based defense contractor suffers humiliation as intelligence officials confirmed that China was able to steal the U.S. classified documents and pertinent technological information all this because of QinetiQ’s faulty decision-making. QinetiQ North America (QQ) a world leading defense technology and security company providing satellites, drones and software services to the U.S …Read more..

And for a more detailed report: Hackers Turned Defense Contractor QinetiQ Into Intelligence Playground For three years, digital thieves linked to China stole intellectual property and defense information from the U.K.-based firm.

For more than three years, hackers linked to China thoroughly compromised U.K.-based QinetiQ, a firm that bills itself as “a world leading defense technology and security company,” to steal intellectual property and sensitive defense information, according to reports of the incident.” Read more..

I put two up there ‘cuz this is.. kinda huge. (Make no mistake: these “hackers” are a unit in the PLA.)

Can’t say nothing ’bout that Internet-thingy that might shake consumer confidence, either. A handful of folks (like, 15 – two dozen) are making too much money.

So forget I mentioned it. But remember, not everyone in the “world wide” plays nice.

Related: The Cyber-Dam Breaks: Sensitive Army database of U.S. dams compromised; Chinese hackers suspected

The compromise of the U.S. Army Corps of Engineers’ National Inventory of Dams (NID) is raising new concerns that China is preparing to conduct a future cyber attack against the national electrical power grid, including the growing percentage of electricity produced by hydroelectric dams.” Read more..

Unrelated: Beware of fake Facebook security page phishing scam

Trend Micro has spotted a malware sample, TSPY_MINOCDO.A, which targets Facebook users. The malware redirects users to a spoofed page of the social network and claims to be part of the site security check feature, even showing the tagline “Security checks help keep Facebook trustworthy and free of spam”. Users eager to log into Facebook may fall victim to this ruse.Read more...

Can’t say I didn’t warn ‘ya.

Today’s quote: When Mozart was composing at the end of the eighteenth century, the city of Vienna was so quiet that fire alarms could be given verbally, by a shouting watchman mounted on top of St. Stefan’s Cathedral. In twentieth-century society, the noise level is such that it keeps knocking our bodies out of tune and out of their natural rhythms. This ever-increasing assault of sound upon our ears, minds, and bodies adds to the stress load of civilized beings trying to live in a highly complex environment.” ~ Steven Halpern

Copyright 2007-2013 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

May 4, 2013 Posted by | cyber crime, Cyberwarfare, hackers, Internet, Internet scam, News, security | , , , , , , , , , , , , , , , | Leave a comment

Cybersecurity and Cybercrime: 2012 in Review

(And Congrats to Buster Posey!)

Folks, another brief slideshow I think you should see.

A year in cybersecurity and cybercrime: 2012 review

During the year, we have seen the destruction of SOPA and PIPA but the emergence of CISPA and similar laws around the world, a growing trend in hacks and scams, an explosion in malware, and states committing cyberwarfare on their friends and foes. Here’s a run-down of what happened in 2012.” See the (14 slides) slideshow here.

.. funny … they didn’t mention all the big data “breaches” (nor the “corporate espionage”) … but, still, take a look.

Related: Reports: Obama Signs Classified Cybersecurity Directive

President Obama has reportedly signed a classified directive establishing guidelines to protect the nation’s computer networks.Read more..

[Reactions in the InfoSec community are mixed.. It’s a good read.]

Kinda’ Sorta’ related: 2012 in Review: Tech Turkeys of the Year

And now, for your reading pleasure, the very worst from the tech world in 2012.Read more..

Apropos of nuttin at all: I liked Buster Posey from Day One. And while no one player makes a team a champion team, I think few could argue that the S.F. Giants would not be where they are without this kid. Congratulations, Mr. Posey! Buster Posey is voted NL MVP

The National League Most Valuable Player award voters came to the same conclusion that any Giants-watcher had to reach in 2012: This team would not have gone far without its 25-year-old catcher and leader.” Read more..

[I like it when – against all odds – good things happen to good people.]

Today’s quote:There are three things which are real: God, human folly, and laughter. The first two are beyond our comprehension. So we must do what we can with the third.” ~ John F. Kennedy

Copyright 2007-2012 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

November 16, 2012 Posted by | cyber crime, hackers, Internet, News, security | , , , , , , , , | Leave a comment