Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

Just one reason I walked away..

One of today’s delightful headlines.. Rather ordinary, sadly.

* Unsecured server exposes 4 billion records, 1.2 billion people

Two security researchers have uncovered four billion records on 1.2 billion people on an unsecured Elasticsearch server impacting what is estimated to be hundreds of millions of people.Read more..

Yes. That’s “billion”. 1,200,000,000

By the time the masses wake up, it’s always far, far too late.

Copyright 2007-2019 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

November 25, 2019 Posted by | computers, cyber crime, hackers, Internet, News, privacy, security, tech | , , , , , , | 2 Comments

Yet another major theft..

Just one more example of why we’re fools to keep using this tech.

Image-I-Nation supply chain breach exposes data of major credit agencies’ customers

Image-I-Nation Technologies, Inc., which provides hosting services and software to consumer reporting agencies like Equifax, Experian and TransUnion, experienced a supply chain breach that left users’ personal information exposed for as long as two weeks.

This breach disclosure highlights just how little control individuals have over the security and location of their personal data..Read more..

February 14, 2019 Posted by | computers, consumer electronics, cyber crime, hackers, Internet, News, privacy, security, tech | , , , , , , , , | Leave a comment

14 Tips to be safer on Public Wi-Fi (‘hotspots’)

A couple reading reco’s for mobile Internet users.

* 14 Public Wi-Fi Hotspot Security Tips You Need

Sometimes you need it so bad, you don’t care if it is clean or dirty. You don’t care who has been there before or what viruses they’ve left behind. I speak, of course, of public Wi-Fi hotspots, aka honeypots for weak-willed souls desperate for a sense of connection. Look, it’s okay to connect to strange networks. Just use protection, cover your tracks, and follow PCMag’s 14 Tips for Public Hotspot Security. Be safe out there.” Read more..

I disagree with what the author wrote there a bit.. it’s really not ‘okay’ to use public wi-fi.. (that’s why I put ‘safer’ where the Industry puts ‘safe’) but I know you’re going to. One of the main reasons is “53 percent can’t tell a secure network from an insecure one.”
That’s so shockingly stupid clueless in 2017 .. do we need to remove these devices from the hands of the masses?

* * *

Today’s quote:A paranoid is someone who knows a little of what’s going on.” ~ William S. Burroughs

Copyright 2007-2017 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

August 17, 2017 Posted by | advice, cellular, computers, consumer electronics, how to, Internet, mobile, privacy, security | , , , , , , , | Leave a comment

Just don’t download any apps..

Guys, I have long told people, if you don’t absolutely need it, don’t install it (and you sure as shooting don’t need five media players..). Well now there’s even more reason to repeat that advice.

* More than 1,000 Spyware Apps Found On Android App Stores

If you think you are downloading apps from Google Play Store and you are secure, then watch out! Someone has managed to flood third-party app stores and Google Play Store with more than a thousand malicious apps, which can monitor almost anything a user does on their mobile device from silently …” Read More..

Update: 500+ Android apps found containing program that can download spyware plug-in

More than 500 mobile apps on Google Play were recently discovered containing an advertising software development kit capable of downloading malicious plug-ins that can spy on Android users’ call histories.. Apps using the ad SDK, a product called Igexin, were downloaded over 100 million times by Android device owners before Google removed these programs from its store..Read more..

Tell your friends.

Addenda: I have been asked my thoughts on Wikileaks and the (alleged) CIA hacking tools (such as this one, posted today) often enough now that I think I should mention them here.. please don’t think the CIA are the only folks who can do/are doing these ‘exploits’. They basically copied from the hackers. These things are possible because all our devices/technologies are inherently, fundamentally, insecure. (Don’t believe me? Read this.)

* * *

Today’s quote:I am thankful the most important key in history was invented. It’s not the key to your house, your car, your boat, your safety deposit box, your bike lock or your private community. It’s the key to order, sanity, and peace of mind. The key is ‘Delete.'” ~ Elayne Boosler

Copyright 2007-2017 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

August 11, 2017 Posted by | advice, Android, cellular, consumer electronics, cyber crime, gadgets, Google, hackers, Internet, mobile, News, security, tech | , , , , , , , , , , , , | Leave a comment

Review: Best Internet Security Suites 2016

Folks, the guy I trust has published his product reviews for the all-important software category of Internet Security for 2016.

* Stay Safe With a Security Suite

Using your computer for games and social media is fun; keeping it safe isn’t. A security suite can be your one-stop solution. We’ve tested almost four dozen of them, and these 10 get our highest recommendation.Read more..

I cannot say often or fervently enough that one simply must do everything they can to protect themselves from the scumbuckets and nation-states who have ruined the Internet. It is a most dangerous place. Far worse than we can know. Do what you can!

(And that title should say “safer”, not “safe”. No product is bulletproof.)(And no product protects you from you. Careful what you click!)

* * *

Today’s quote:It has been said that democracy is the worst form of government except all the others that have been tried.” ~ Winston Churchill

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

September 28, 2016 Posted by | advice, anti-spyware, antivirus, computers, cyber crime, e-mail, firewall, hackers, Internet, security, software, tech | , , , , , , , , , , , | Leave a comment

Yahoo: Your Personal Info Stolen

If you use Yahoo! mail (or your ISP uses Yahoo Mail) you need to read this news item.

* Yahoo breach; at least 500 million accounts affected

According to a company statement, stolen information may have included names, email address telephone numbers, birth dates, hashed passwords and, in some instances, encrypted or unencrypted security questions and answers.Read more..

[ I think it’s safe to mentally remove the “may have” from that.. ]

Please forward this on to your friends and loved ones who use Yahoo! Mail. Tell ’em they need to change their passwords, and beware of suspicious “phishing” emails that sound like they know you..

And if you don’t know what “phishing” is by now.. please stop using the Internet.

Today’s quote:The best argument against democracy is a five-minute conversation with the average voter.” ~ Winston Churchill

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

September 23, 2016 Posted by | advice, cyber crime, e-mail, hackers, Internet, News, privacy, security | , , , , , , , , , , | Leave a comment

Apple owners — 5 quick security tweaks

Folks, if you upgraded to iOS 10 on your iPhone and/or iPad (and it didn’t brick your device) please read, and follow, this brief How To tutorial article.

* Five security settings in iOS 10 you should immediately change

These tweaks will lock down your iPhone or iPad to protect your privacy.Read more..

[ I suggest doing that even if you don’t believe there’s any such thing as Privacy anymore.. ]

* * *

Today’s quote:Two persons cannot long be friends if they cannot forgive each other’s little failings.” ~ Jean de la Bruyere

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

September 14, 2016 Posted by | Apple, cellular, computers, consumer electronics, gadgets, how to, Internet, iPhone, Portable Computing, privacy, security, software | , , , , , , , , , | Leave a comment