Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

Yet another major theft..

Just one more example of why we’re fools to keep using this tech.

Image-I-Nation supply chain breach exposes data of major credit agencies’ customers

Image-I-Nation Technologies, Inc., which provides hosting services and software to consumer reporting agencies like Equifax, Experian and TransUnion, experienced a supply chain breach that left users’ personal information exposed for as long as two weeks.

This breach disclosure highlights just how little control individuals have over the security and location of their personal data..Read more..

February 14, 2019 Posted by | computers, consumer electronics, cyber crime, hackers, Internet, News, privacy, security, tech | , , , , , , , , | Leave a comment

Eating my words :( — Uninstall Web of Trust now

Folks, long time readers may remember, years ago now (decades in computer years) I recommended a ‘safe surfing’ browser add-on. A tech news headline – arrived today – has me regretting that.

* ‘Web Of Trust’ Browser Add-On Caught Selling Users’ Data — Uninstall It Now

Browser extensions have become a standard part of the most popular browsers and essential part of our lives for surfing the Internet. But not all extensions can be trusted. One such innocent looking browser add-on has been caught collecting browsing history of millions of users and selling them ..” Read more…

[ NOTE: even if you never heard of WoT, reading the article is a good education on the kind of spying the tech companies have been doing. ]

My love affair with technology is officially over.

Today’s quote:The best preparation for tomorrow is doing your best today.” ~ H. Jackson Brown, Jr.

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

November 8, 2016 Posted by | advice, browsers, computers, Internet, News, privacy, tech | , , , , , | Leave a comment

Yahoo: Your Personal Info Stolen

If you use Yahoo! mail (or your ISP uses Yahoo Mail) you need to read this news item.

* Yahoo breach; at least 500 million accounts affected

According to a company statement, stolen information may have included names, email address telephone numbers, birth dates, hashed passwords and, in some instances, encrypted or unencrypted security questions and answers.Read more..

[ I think it’s safe to mentally remove the “may have” from that.. ]

Please forward this on to your friends and loved ones who use Yahoo! Mail. Tell ’em they need to change their passwords, and beware of suspicious “phishing” emails that sound like they know you..

And if you don’t know what “phishing” is by now.. please stop using the Internet.

Today’s quote:The best argument against democracy is a five-minute conversation with the average voter.” ~ Winston Churchill

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

September 23, 2016 Posted by | advice, cyber crime, e-mail, hackers, Internet, News, privacy, security | , , , , , , , , , , | Leave a comment

It’s Identity Theft Season: How To Protect Yourself

Folks, here is another article containing advice we all need to be doing — particularly now.

* Identity scams are up this tax season: How to protect yourself

The bad guys are out in force this tax season, so be especially careful with your personal ID information. Follow these proactive steps.” Read more..

* * *

Today’s quote:The best thing to do when you find yourself in a hurting or vulnerable place is to surround yourself with the strongest, finest, most positive people you know.” ~ Kristin Armstrong

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

April 8, 2016 Posted by | advice, cyber crime, Internet, News, security, tech | , , , , , , | Leave a comment

Sunday Items

Folks, a few things worthy of your attention:

* Data Breach Day — Patreon (2.3M), T-Mobile (15M) and Scottrade (4.6M) — HACKED!

This week, three high-profile data breaches took place, compromising personal and sensitive details of millions of people. Telecommunication giant T-Mobile Crowdfunding website Patreon US brokerage firm Scottrade In T-Mobile’s case, its credit application processor Experian was hacked, potentially exposing highly sensitive details of 15 Million people who applied for its service in the …” Read more..

Related: How to Freeze Credit Report To Protect Yourself Against Identity Theft

If your Social Security number gets hacked in any data breaches, including recently hacked T-Mobile, then there’s a way to prevent hackers from misusing your identity (i.e. identity theft). The solution here is that you can institute a security freeze at each of the three credit bureaus, Equifax, Experian, or TransUnion. Once frozen, nobody will be allowed to access your credit report, ... ” Read more..

Today’s Interesting Image (SB #208):

Click on image to see more by this artist

Click on image to see more by this artist

“Ellis clan” by Homini:), courtesy of Flickr Commons.

Today’s quotable quote: “Positive thinking will let you do everything better than negative thinking will.” ~ Zig Ziglar

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

October 4, 2015 Posted by | advice, cyber crime, hackers, how to, Internet, News, security | , , , , , , , , , , , , , , , , , | Leave a comment

Tips for Safe Online Job Hunting

Recent events have made me decide to repost an important prior article.

A reader wrote in with a simply terrific question, asking about our modern way of finding employment. I think the answers are important.

Q:Paul:

I was laid off earlier this summer and have been looking for new employment since day one of my termination. The method for job search is now the Internet. You no longer can knock on doors and submit resumes and fill out application in person.
My question to you is, I have filled out numerous applications online and a number of companies ask for the last 4 digits of your social security number, and some will ask also ask for your month and day but not year of your birth.
I can understand if they are asking for a cell number, and some other standard information.
How can you tell if these are legitimate job sites or persons who are looking for quick score of your personnel information?

I have run into a few sites that offer jobs that seem to good to be true, once you contact them, they ask for up front money. A legitimate job site will not ask for any money. If they get paid it is from the employer.

Thanks for all you great information and keep up the good work,

A: I would like to applaud your awareness. Identity Thieves (and other scammers) are not only posting phony job listings, but whole websites. They are taking advantage of our desire (desperation?) and the supplicant nature of the job seeker.

  • Identity theft is one of the fastest growing crimes in America.
  • Depending where you look, the stats say someone’s ‘identity’ is being stolen every second, or once every three seconds. (Either one. Where’s the outrage?)
  • This isn’t something that “happens to other people”: cybercrime is big business, costing our economy over a hundred billion a year. That we know about.

I have written many articles on cybercrime, as well as ID Theft. I won’t repeat myself here (but encourage you to use my ‘keyword’ Search widget). I will focus in on the sentence I highlighted in bold — how can you tell if it’s a real job opportunity?

Well, the short version is: you can’t, always. There is no magic formula. You simply must apply a double dose of “paranoid common sense”. And apply a protective self-policy. Because, yes, you will have entered a predator’s favorite hunting ground.

These scammers will post positions on legitimate employment-seeking websites. And those sites will make an effort to find and remove the scam postings. Do they succeed? Yes. Allatime always 100%? Instantly? Don’t make me laugh. These crooks post new ones as fast as their old ones are taken down. Faster.
The online classified services simply aren’t as equipped to try to sift out the bogus, having neither the budget, staff, tools, or.. motivation. You should apply a triple dose of “paranoid common sense” in the classifieds.

(My questioner points out that some ask for month and day, but not year of D.O.B.. Why? Because your year is published in tons of places. The crooks will simply research, then add two and two… With the amount of info about us already posted online, the crooks don’t have to research too much, or gain too many tidbits, to pose as you.)

A protective self-policy – Cyber Safe Resume: Let me remind you of a few early postings. The second one directly relates to this subject..
Identity Thieves Want Your Resume
Cyber-safe Resume Gets Noticed
A Top Site for Finding Work

All are great supplements to this article, and if you are currently seeking employment, well worth your time (it helps they are short, ha!).

Here’s one more: Scams & Schemes in Work and Employment Services

Review the following websites for additional recommendations on how to proactively protect your identity:

(You may also want to consider investing in an ID “protection service, such as, LifeLock.)

I know you want the job, and don’t want to do anything that will jeopardize your chances.. or get your application tossed before it’s even read, but in this world, today, you really have to leave the box blank, or put in “I will provide this to a real person, but not in this online form.” If you only click one link here today.. click this one: Cyber-safe Resume Gets Noticed.

Research the company using a search engine. Call them and ask them, when you have doubts and concerns. (And understand, the scammers will post phone #s, and answer them too. The con is not restricted to ‘online only’.)

I do wish you a speedy and successful job search. (And no, I don’t live under a rock. I know it is dang tough out there. But don’t add to your troubles by becoming an ID Theft victim.)

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

March 4, 2015 Posted by | advice, cyber crime, Internet, privacy, security | , , , , , , , , , , , | Leave a comment

“Shadow Profiles” and “zombie apocolypse” — business as usual?

There have been several tech news headlines of late that everyone should be aware of, so you may want to “forward” (some of) these to friends and family..

You probably already know about Verizon (a cellular provider [a big one]) and the gov’t, but did you hear about Facebook’s “shadow profiles”? (if you didn’t think the Internet companies were doing this ‘profiles’ stuff, you must’ve had your head in the sand like the ostrich. It’s why it’s called “The Information Age”!)

Anger mounts after Facebook’s ‘shadow profiles’ leak in bug

Facebook said Friday it fixed a bug that exposed contact info for over six million accounts. The admission revealed its ‘shadow profile’ data collection activities, and users are furious.

The personal information leaked by the bug is information that had not been given to Facebook by the users – it is data Facebook has been compiling on its users behind closed doors, without their consent.UPDATED. Read more..

[note: If you only read one of these, read this one; and, the Comments are a good read in themselves, too .. if you’ve time. (Even better today..[Thurs]).]

New plan to stop leaks: Squeal on your cubicle mate who may or may not be a whistleblower

An investigative report shows the Obama administration’s insider threat program is far more expansive, and troubling, than even critics had thought.Read more..

*  The approaching datacenter zombie apocalypse

 “If IBM’s recent workforce rebalancing act is any indication of future trends, then we’re going to see an awful lot of vacant datacenter space and vacant datacenter jobs.Read more..

More users than ever experiencing phishing attack attempts (87% increase..)

* and last but not least.. Dangerous waters..

*     *     *

Today’s quote:I am glad I’ve never used a Facebook app or allowed Facebook access to my contacts in any way whatsoever. (Yay paranoia.)” ~ Violet Blue

[note: it’s the “yay paranoia” part I liked best.]

Copyright 2007-2013 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

Yippee yahoo.

June 25, 2013 Posted by | cloud computing, computers, consumer electronics, cyber crime, Cyberwarfare, hackers, Internet, News, privacy, security, tech | , , , , | 2 Comments