More happy news for your Friday
(I hope you didn’t eat at a Wendy’s recently..)
Absolutely none of this should surprise you.
First up:
* Hackers Can Steal Your ATM PIN from Your Smartwatch Or Fitness Tracker
“As your day-to-day apparel and accessories are turning into networked mobile electronic devices that attach to your body like smartwatch or fitness band, the threat to our personal data these devices collect has risen exponentially.” Read more..
(There are Privacy concerns with those dang things too, BTW.)
And..
* Flaw Allows Attackers to Remotely Tamper with BMW’s In-Car Infotainment System
“The Internet of things or connected devices are the next big concerns, as more Internet connectivity means more access points which mean more opportunities for hackers. When it comes to the threat to Internet of Things, Car Hacking is a hot topic. Since many automobiles companies are offering..” Read more..
* This Android Hacking Group is making $500,000 per day
“The bad news for affected Android users is that Hummer is extremely difficult if not impossible to get rid of, because the Trojan takes control of the phone at admin level, making it impossible for traditional antivirus tools to uninstall Hummer.
The dangerous part: It is impossible to delete the Trojan through a factory reset due to the fact Hummer comes equipped with up to 18 different separate rooting exploits that allow it to root itself on a phone..” Read more..
( Infecting a million phones each day…!!! )
And last but not least..
* Over 1000 Wendy’s Restaurants Hit by Credit Card Hackers
“The Popular fast-food restaurant chain Wendy’s on Thursday admitted that a massive cyber attack had hit more than 1,000 of its restaurants across the country. The burger chain did not speculate how many people may have been affected, though it did confirm that the hackers were able to steal its …” Read more..
So.. let’s see if I can come up with a good quote after all that news..
Today’s quote: “Life is a mirror and will reflect back to the thinker what he thinks into it.” ~ Ernest Holmes
(And I’m thinkin’ it’s time to Just Say No to our current tech… All of us.)
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
Finally! A few items of interest.
After a dry spell, I found some attention-worthy items.
* Hell no, we won’t pay: How technology transformed our perception of value
“What does this culture and technology of anti-spendism mean for the future consumption and valuation of goods and services?” Read more..
That (above) is the main “should read”. Here are a few others that might also interest you.
* Aereo ruled illegal by Supreme Court; must pay copyright fees
“The future of Internet TV was decided by the U.S. Supreme Court. And it didn’t go in cordcutters’ favor.” Read more..
[ Surprised? ]
* Hackonomics: Cybercrime’s cost to business
“How much does getting hacked actually cost a business? Looking closely at the cyber black market’s cost factors is worrying, but offers insight into keeping crime’s cost low.” Read more..
[ Sure. For as long as the cost is low enough.. we can ignore it! ]
This will depress you (but you better know it): HackingTeam tool makes use of mobile malware targeting all major platforms
“Researchers have uncovered troubling details about a mobile surveillance service provided by HackingTeam, an Italian seller of monitoring software.” Read more..
[ Sorry for putting TWO ‘must reads’ in one article.. ]
Related: iOS Safer Than Android? Maybe Not
“Common wisdom holds that iOS is inherently secure and Android is inherently vulnerable. But a new study by Marble Security found that Android and iOS devices pose equal security challenges.” Read more..
Sometimes I think (and then other times, I’m quite certain) the lunatics are running the asylum.
Today’s quote: “Never ascribe to malice that which can adequately be explained by incompetence.” ~ Napoleon
Copyright 2007-2014 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
And please, never forget – one person can make a difference.
Find a way to make someone’s day today.
(Best advice I ever heard? Don’t sweat the small stuff.)
Something to think about….
Sometimes.. a new paint job just doesn’t cover up the fact your car is still a clunker..
Attackers Divert Bank Phone Calls to Cover Tracks
(You really should read this – it’ll open your eyes – but I warn you.. the state of things is depressing. But, facts is facts, as they say.)
Researchers at Trusteer uncover banking malware that steals telephone information to help attackers re-route calls from banks alerting customers to fraud.
“A new version of a sneaky piece of banking malware has been armed with a new feature to help attackers cover their tracks. According to Trusteer, certain new configurations of Ice IX – a modified variant of the Zeus platform – are capturing telephone account information belonging to their victims. The goal is to enable the attackers to divert calls from banks that are intended for the customer to telephones controlled by the attacker…
In one attack observed by researchers at Trusteer, the malware stole the victim’s user ID and password as well as their secret question answer, date of birth and account balance at login. In the second phase of the attack, the victim is asked to update their home, mobile and work telephone information and select the name of their service provider from a…” Read more..
Yes folks, the “cyber mafia” is sophisticated, and .. to quote a certain Congressperson, “the biggest threat to National Security we are facing”.
You should read that article – learn about “man-in-the-browser” and then think about it.. IMHO. But, sorry to depress you. They are out to get you, so please, let’s use a little “paranoid common sense” out there.
On a lighter note..
Today’s quote: “I like nonsense, it wakes up the brain cells. Fantasy is a necessary ingredient in living, it’s a way of looking at life through the wrong end of a telescope. Which is what I do, and that enables you to laugh at life’s realities.” ~ Theodore Geisel (aka “Dr. Seuss”)
Copyright 2007-2011 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
Service Pack 1 and Polite Phishing. OddJob & Meow.
Service Pack Released. Holdouts can migrate to Windows 7 now.
Last night my Win7 machine told me that there were Updates available. So, like I always do, I clicked to view the details. I noticed that one of the “Important” updates was not checked. So I looked closer and saw that it was indeed the awaited first Service Pack, which rumors had said was coming soon.
I placed a check in the checkbox, and clicked “Install”. Because Service Packs are good things. And I have been testing IE 9, so I let that upgrade to the new “Release Candidate” as well.
After a twice rebooting install, which went smoothly, my upgrades were in, and my Windows 7 machine was now 72 times faster and three times shinier. Yay!
Okay. You know I’m kidding.. right? “Service Packs” sometimes do bring new features to the operating system, but generally are simply a collection (a “pack”) of security patches and bug fixes. There is an old saying in the Geek world – Do Not Buy Until The First Service Pack Is Released.
That’s good advice. Generally speaking, you do not want Version 1.0 of anything. You want the next version.. the one where most of the bugs have been found and fixed. I have been telling people that Windows 7 is an exception to that Rule – being already remarkably stable and bug free. However, if you have been waiting, SP1 is now here.
So what is in the first Windows 7 Service Pack (aka SP1)? I quote, “Win 7 SP1 sports a little nip here and a roll-up tuck there — but there’s not a single significant enhancement to Win7.”
Woody Leonhard wrote a great piece for Windows Secrets that sums things up in a nutshell: What you need to know about Windows 7 SP1
* For those who have trouble with this Update (or.. Updates in general), see Microsoft notes Windows Update “inconsistencies,” provides fix
Cybercriminals try the polite approach:
I ask non-regular readers to note the attachment ‘paperclip’, and to trust me when I say that it is a clear signal that you do NOT want to do anything with this email except delete it — opening the email will put you on the Global Sucker List. And opening the attachment…. probably worse.
And I believe that regular readers will know that “Please confirm your identity” translates to “Please hand me your identity”.
Related?
“A new banking trojan targeting U.S. customers has the ability to keep online account sessions open after customers believe they have logged off, enabling criminals to surreptitiously steal money, according to researchers at web security firm Trusteer.
Eastern European cybercrooks are using the trojan, dubbed “OddJob” by researchers, to attack banking customers in the United States, Poland and Denmark…“
Learn more here, Trojan steals session IDs, bypasses logout requests
Too kewel not to post:
A reader shared with me a photo. I am not a “cat person”, but one look at this fellow…
and I had to smile. One ‘cool cat’ there.
Have a great day everyone!
Copyright 2007-2011 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
Download Danger – the “Trojan”
“That’s a very important concept to grasp: an antivirus does not protect you from yourself, it helps protect you from the Internet..”
The Trojan Horse was a tale from the Trojan War. It was the stratagem that allowed the Greeks finally to enter the city of Troy. But the term “Trojan Horse” has come to mean any trick that causes a target to invite a foe into a securely protected bastion or place, and is now often associated with “malware” computer programs presented as useful or harmless in order to induce the user¹ to install and run them ².
¹ “the user” = you
The best part about the Trojan method (from the cyber-criminal’s perspective) is that the user¹ willingly clicks the “Install” (or “Run”) which bypasses any protections they may have — firewall, antivirus, “security suite”.
(That’s a very important concept to grasp: antivirus does not protect you from yourself, it helps protect you from the Internet.)
So where do you run into software downloads that are actually Trojans?
A: Sadly, in the current state of our un-policed Internet, just about anywhere.. but some places to download are safer than others (and some even strive to be 100% safe).
* If you use a peer-to-peer (“torrents”) file-sharing approach to getting free programs, movies, and music – such as LimeWire or BitTorrent – it is not a question of “if”, it is a question of “when”. That Lady Gaga Song you downloaded may very well have had a virus attached. (Please don’t write and tell me how you’ve stolen property with file sharing for years and never been infected..)
* Reputable download sites (aka “trustworthy”): there are several, but when I need to download something, I generally go to download.com, majorgeeks, or filehippo.
² update: That description is from Wikipedia. A man I admire very much wrote and provided me with this clarification on what is a Trojan: “Historically, a Trojan horse attack is accomplished by the perpetrator providing the victim directly or indirectly with a useful computer program (the Horse) that may perform its intended purpose or not but also contains instructions (the soldiers hidden inside) to perform harmful actions for the benefit of the perpetrator. A variation is a program (the horse) that inserts (patches) computer instructions (the soldiers) into some other existing program to perform the harmful acts.“
* * *
Also – I never click “Run” on a download, but instead select “Save”, and save the file to my desktop. Then I scan it with my antivirus. And, if ‘clean’, then I double-click it to launch the setup/install.
** A Chance To Win A Valuable Prize! **
The folks at Genie-soft have generously donated five licenses for Genie Timeline Professional 2.0 to me, to award to my readers. So I am going to do a random drawing contest from folks who “enter”.Genie Timeline is a program that creates “backup copies” of the files and settings on your computer. With Timeline, you do not have to be “computer savvy”, and you can set-it-and-forget-it. Timeline constantly monitors your file system, automatically, for you.To enter the drawing, please see: Software License Giveaway: Genie Timeline Professional
Copyright 2007-2010 © “Tech Paul” (Paul Eckstrom). All Rights Reserved. post to jaanix.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
Share this post : | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Deja Vu All Over Again.. Skype Says It Found A Trojan…
Folks, criminals are once again using Skype to send phishing “chats” in an attempt to defraud you, and get you to click poisoned links. So, I am re-posting this article. It is the exact same ruse I first warned of in early 2008, but (again) the name has changed.
This criminal attack will reappear every so often (roughly every 90 days) with a slightly different name and URL… It is a classic scareware attack. They just send it to all the Skype users whose name starts with A.. then to the B’s.. etc.
Chat Message Scares Reader Into Installing Malware
Yesterday a Skype chat window opened on my machine, and presented me with a dire warning from someone named “Software Update”, “Registry Scan Online®”, “OnlineUpdate.org”, Today’s flavor (I think it was “OnlineRegistry®”..). It said that “WINDOWS REQUIRES IMMEDIATE ATTENTION” and, it provided me with a solution.
(Click on image to see large version)
Please, folks, tell me you have spotted this for what it is. Please tell me that you knew –instantly– that this is a cybercrime attempt; that it is Phraud-ulent.
Please tell me that you know what will happen if the link provided in this message is clicked; and, please, please, please tell me you would never click the link.
Just in case you aren’t sure:
* “Software Update”, “Registry Scan Online ®”, Today’s flavor, doesn’t exist.
* “http://www.onlinemonitor.info”, “http://www.registryscan.com”, Today’s flavor, is not registered in ARIN (the registry of Internet addresses).
* clicking the link will allow scripts to run, and/or take you to a poisoned Website which will install malware on your machine, or/and it may take you to a site that will sell you a rogue anti-spyware program
(please read my article, Is that antispyware program really spyware).
* Microsoft DOES NOT alert you via Instant Messaging. No legitimate company does. Period. Ever!
This is a classic example of a hacker’s attempt to get you to click their link.
All of this so they can rip you off. It’s these cyber-criminal’s full time job.
Please point your less-savvy friends and family to this article and educate them to the dangers of spam (unsolicited) messages and tell them– NEVER CLICK THE LINK. (Yes, I am shouting. 2010 is days away, and I still have to say this everyday.. Sigh.)
[Note: while this article directly references the (VoIP client) Skype, you may see this type of thing in other Instant Messaging/Chat programs, and social networking communications.]
[addenda: Peter Parkes (Skype Blogger) wrote and asked me to remind my readers to, quote, “Please report users who send these messages to abuse@skype.net – that will help us to block them where appropriate.”]
Today’s free downloads(s): I have assembled on my Website a collection of links to the best free anti-malware programs to help you prevent infection.. and clean up if you’ve been infected. To see them, click here.
Copyright 2007-2010 © Tech Paul. All Rights Reserved. post to jaanix.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox click here, or to subscribe in your RSS reader, click here. <<
Share this post : | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
The Trojan Horse was a tale from the Trojan War…
The Trojan Horse was a tale from the Trojan War. It was the stratagem that allowed the Greeks finally to enter the city of Troy. But the term “Trojan Horse” has come to mean any trick that causes a target to invite a foe into a securely protected bastion or place, and is now often associated with “malware” computer programs presented as useful or harmless in order to induce the user¹ to install and run them.
¹ “the user” = you
The best part about the Trojan method (from the cybercriminal’s perspective) is that the user¹ willingly clicks the “Install” (or “Run”) which bypasses any protections they may have — firewall, antivirus, “security suite”.
(That’s a very important concept to grasp: antivirus does not protect you from yourself, it helps protect you from the Internet.)
So where do you run into software downloads that contain Trojans?
A: Sadly, in the current state of our un-policed Internet, just about anywhere.. but some places to download are safer than others (and some even strive to be 100% safe).
* If you use a peer-to-peer (“torrents”) file-sharing approach to getting free programs, movies, and music – such as LimeWire or BitTorrent – it is not a question of “if”, it is a question of “when”. (Please don’t write and tell me how you’ve stolen property with file sharing for years and never been infected..)
* Reputable download sites (aka “trustworthy”): there are several, but when I need to download something, I generally go to download.com, majorgeeks, or filehippo.
Also – I never click “Run” on a download, but click “Save”, and save the file to my desktop. Then I scan it with my antivirus. And then I double-click it to launch the setup/install.
Copyright 2007-2010 © Tech Paul. All rights reserved. post to jaanix
Share this post : | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |