Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

News from the security (encryption) frontlines..

Some important (time sensitive) items for you today.

TrueCrypt Shut Down; What to Use Now to Encrypt Your Data

If you use TrueCrypt to encrypt your data, you need to switch to a different encryption software to protect your files, and even whole hard drives.” Read more..

How To Remove CryptoLocker Ransomware And Protect Against GameOver Zeus While The Botnet Is Temporarily Down

Find out how to scan for and remove the Cryptolocker ransomware malware now, while the Gameover Zeus botnet has temporarily gone down.Read more..

[Related: CryptoLocker Ransomware Information Guide and FAQ This is kinda important, as there really is no happy solution for Cryptolocker.]

* Some Antivirus Tools Wildly Effective Against Zero-Day Malware

Detecting zero-day threats, meaning malware or malware variants that have never been seen before, is extremely difficult. New tests reveal which antivirus products perform best against these threats.Read more..

*     *     *

Today’s quote:Believe you can and you’re halfway there.” ~ Theodore Roosevelt

Copyright 2007-2014 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
And please, never forget – one person can make a difference.
Find a way to make someone’s day today.
(Best advice I ever heard? Don’t sweat the small stuff.)

June 4, 2014 Posted by | computers | , , , , , , , , , , | Leave a comment

If you build it, they will come

lapel-pin-US-flag

lapel-pin-US-flag

An item for you thinkers out there..

* Cryptocurrency mining malware discovered on surveillance DVRs

Johannes Ullrich, dean of research with the SANS Technology Institute, posted on Monday that DVRs made by Hikvision, a video surveillance products and solutions supplier headquartered in China, were found to contain malware that mined for Bitcoins.Read more..

What are the implications here?

(Puts a twist on the meaning of “Made in China” a bit, too, doesn’t it? But you should know that already: remember the “infected digital picture frames” [circa 2008] ? )

*     *     *

Other tech: What you should know about Windows 8.1 Update

The soon-to-be-released Windows 8.1 Update brings minor improvements that favor those using a mouse — in other words, most Win8 users.

Anyone currently on Windows 8.1 will want the update; those who still haven’t made the Modern plunge won’t be impressed.Read more..

[ This actually does eliminate my main beefs about Win8. But I won’t be switching – it’s Win 7 for me still.]

Today’s free software:  IObit  PCtransfer

To find a best solution to safely and thoroughly transfer data for XP users, IObit newly releases PCtransfer. It is a free, light, and portable data transfer tool that provides users with an easy and secure way to backup and restore data with one click. PCtransfer especially supports bookmarks and favorites backup on Internet Explorer 6 and 7, and also allows user to quickly select and backup the third-party programs and settings. PCtransfer not only helps user to transfer data from Windows XP system to new systems but also provide assistance to users for moving data to a new PC.”

Today’s quote:The real problem is not whether machines think but whether men do.” ~ B. F. Skinner

(I think he meant “humans”, or “people”, but..)

Copyright 2007-2014 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
And please, never forget – one person can make a difference.
Find a way to make someone’s day today.
(Best advice I ever heard? Don’t sweat the small stuff.)

April 3, 2014 Posted by | advice, computers, consumer electronics, cyber crime, free software, hackers, Internet, Microsoft, News, PC, security, software, tech, Windows 8 | , , , , , , , , , , , , , , | Leave a comment

Target. (And More.)

By now, you’ve probably heard of the “Target Breach”. (A “breach” is when a hacker has broken in and stolen stuff.) And you’ve heard it was bigger than first reported.. Here’s more news:

Customers paying the price after Target breach

Three weeks after news broke that 40 million accounts of Target shoppers were breached in a widespread hack, some customers of smaller banks are beginning to feel the repercussions.Read more..

Target estimates breach affected up to 110 million

The massive data heist at Target stores across the country was more massive than previously revealed, with the retailer saying at least 70 to 110 million customers were hit — making it one of the largest security breaches of its kind.Read more..

* Baby-faced teen suspected in Target data breach that hit 110M

Security company IntelCrawler posted these Web images of a 17-year-old Russian it says may be the architect of the malware that hacked up to 110 million Target customers, and of online chats (left) it used to track him.Read more..

After Target breach, Homeland Security warns retailers

Investigators probing the recent holiday season cyberattack are warning retailers about sophisticated malware that potentially affected a large number of stores.” Read more..

Target breach notifications are a perfect example of what not to do …

It’s bad enough that Target allowed more than 100 million accounts to be compromised, but the retailer’s response to the breach is an exercise …Read more..

The “Internet of things” … well… it’s making a few people rich.

Is anyone else ready – YET – to call ‘cybercrime’ a national (better yet, global) security issue? If not, what’s it going to take?

In other news: I’ve busted the tail – twice. And today, broke a wing off. At this rate, my Hobbyzone Champ is going to be a piece of flying duct tape..

*     *     *

Today’s quote:If one advances confidently in the direction of his dreams, and endeavors to live the life which he has imagined, he will meet with success unexpected in common hours.” ~ Henry David Thoreau

Copyright 2007-2014 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

January 18, 2014 Posted by | advice, cloud computing, computers, cyber crime, hackers, Internet, News, tech | , , , , , | 2 Comments

Everyday cybercrime — and what you can do about it

Folks, here is an “educational” Ted Talks video I think everyone should see. I hope you will forward this on to your less-savvy friends and family (and urge them to watch it).

Today’s quote:It is curious that physical courage should be so common in the world and moral courage so rare.” ~ Mark Twain

Copyright 2007-2013 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

September 17, 2013 Posted by | advice, computers, cyber crime, hackers, Internet, security, tech | , , , , , , , , | 2 Comments

Poll Results: How Much Time Online Is “Too Much”.

Let me start out today with a little reminiscing. When I was a young man, long ago, before Pong, and helmet laws, a fella told me a few words of wisdom. He said, “if everyone you meet tells you that you have a tail, then – as impossible as it sounds – you better wake up to the fact that you do have a tail.

I didn’t really get what he was trying to say. I don’t think.

This feels like a subject change, but it’s not: a short while ago I posted a poll, which readers could “vote” on. The poll asked how many hours a day, spent in front of a computer, online, would constitute “too many” — a possible “problem”. (See, Too Much Time Online?)

I included “there is no such thing” as a voting choice.

To save you a click, let me sum up the results. The answer “there is no such thing” (as too many hours online) was the clear “winner” (and had twice as many votes as it’s nearest competitor -> 4 hours). I will also say that not enough people participated in this poll for the numbers to really mean anything. But I found it curious/interesting none the less.

While the poll was open, I refrained from commenting. I will do so now.

First, I was not surprised by this result. And too, in a way, the poll had the same inherent flaw you would have if you asked ” how many beers/day is too many?” and let active drunkards participate. (You would see answers like “650”.)

Yes, IMHO there is – indeed – such a number as “too many hours”. I don’t know what that number might be (and I suspect it varies) but I refer you to my little parable from my youth (above).

If your husband/wife/significant other has told you, more than once, you are spending too much time “playing at the computer”, well, then, dangit, you may very well have a tail.
(If you have been “dumped” because you sat at the ‘puter too much, then there’s no guesswork.. you do have a tail.)

Have you failed to complete homework because that arena match was so wicked awesome it didn’t end until 5:45 a.m.? Like.. more than a few times? And now Teacher wants to see you after school?
You may have a tail.

Do you talk to people you have never actually met more than you do your family (assuming you have one..) ?
Tail.

Is your online activity causing your bank account balance to be too low to meet your month’s obligations? Has this happened before?
Tail!

If people close to you are always complaining  (because they just don’t “get it”) about your ‘puter time, well, my opinion, I think maybe, it’s you who does not “get it”.

.. now, I am not going to start using words like “addiction”. And only you can decide if there’s a problem (and if so, how serious a one). Nor am I going to offer any solutions for you. I am just a repair technician. But I do talk to people. I know a few who say it was the Internet that caused their divorce. And I have heard more than one parent complain about how the kids never look up from their devices…

(I think the measuring stick here is “neglect”.)

I do have two items for you — if this topic interests you at all, that is. (And please note, they use “addiction”, not me..)

* There’s an online addiction assessment test you can take if you have suspicions/concerns about how much time you or a loved one is spending online.

* Internet Addiction and Internet Sex (This is a good read [from my Blogroll].)

*     *     *

No intro needed: Report: Android Malware Growing Exponentially

 “Android devices are being heavily targeted by hackers and malware producers.Read more..

*     *     *

Today’s quote:What you get free costs too much.” ~ Jean Anouilh

Copyright 2007-2012 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

May 22, 2012 Posted by | Android, computers, Internet, tech | , , , , , , , | 3 Comments

Something to think about….

Sometimes.. a new paint job just doesn’t cover up the fact your car is still a clunker..

Attackers Divert Bank Phone Calls to Cover Tracks

(You really should read this – it’ll open your eyes – but I warn you.. the state of things is depressing. But, facts is facts, as they say.)

Researchers at Trusteer uncover banking malware that steals telephone information to help attackers re-route calls from banks alerting customers to fraud.

A new version of a sneaky piece of banking malware has been armed with a new feature to help attackers cover their tracks. According to Trusteer, certain new configurations of Ice IX – a modified variant of the Zeus platformare capturing telephone account information belonging to their victims. The goal is to enable the attackers to divert calls from banks that are intended for the customer to telephones controlled by the attacker

In one attack observed by researchers at Trusteer, the malware stole the victim’s user ID and password as well as their secret question answer, date of birth and account balance at login. In the second phase of the attack, the victim is asked to update their home, mobile and work telephone information and select the name of their service provider from a…” Read more..

Yes folks, the “cyber mafia” is sophisticated, and .. to quote a certain Congressperson, “the biggest threat to National Security we are facing”.

You should read that article – learn about “man-in-the-browser” and then think about it.. IMHO. But, sorry to depress you. They are out to get you, so please, let’s use a little “paranoid common sense” out there.

On a lighter note..

Today’s quote:I like nonsense, it wakes up the brain cells. Fantasy is a necessary ingredient in living, it’s a way of looking at life through the wrong end of a telescope. Which is what I do, and that enables you to laugh at life’s realities.” ~ Theodore Geisel (aka “Dr. Seuss”)

Copyright 2007-2011 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


February 2, 2012 Posted by | hackers, Internet, News, security | , , , , , , , , | Leave a comment

7 Links Challenge, And More Reco’s

Yesterday I received a “challenge” from a fellow tech writer…which is a bit out of the ordinary, to say the least.

Sadly, I do not have time today to respond to that challenge – but I will just ASAP. In the meantime, for a good read (and to find out what the *heck* I’m talking about) please see: The “My 7 Links Challenge” at What’s On MY PC.

Other items: (aka “quick reading reco’s”)

It’s time for Microsoft to come clean over the Metro UI

Microsoft has kept us in suspense for long enough and it’s now time for the Redmond behemoth to come clean as to what users can expect from the next-generation Windows.Read more..

How to keep your face out of LinkedIn ads

After all this talk about Google’s new privacy policy and Facebook’s Timeline, people are now waking up to the fact that LinkedIn too may be making use of your information in ways you don’t want.Read more..

Facebook sues Adscend Media for malware and spam

Facebook and the state of Washington have filed separate lawsuits against Adscend Media, alleging the company was responsible for spreading malware and for stealing personal information from Facebook users.Read more..

Macworld 2012: The Island of Misfit Toys

Macworld 2012 had a sexy nightlife alter ego but the daytime persona of an event still struggling for identity.Read more..

Most cyber security experts believe cyber arms race is on

More than half of of global security experts believe that an arms race is already taking place in cyber space, according to McAfee.” Read more..

A chance to win a CPU or graphics card: Share your opinions for a chance to win some cool AMD hardware

Great AMD hardware to give away!Read more..

Okay. Out of time. Have a great day everybody!

Today’s quote:Common sense is instinct. Enough of it is genius.” ~ George Bernard Shaw

Copyright 2007-2011 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


January 31, 2012 Posted by | computers, Internet, News, tech | , , , , , , , , , | 3 Comments