Are you using a D-Link wireless router in your home or business, D-Link has released a firmware upgrade for several popular router models to fix a security vulnerability that would allow remote access and DNS spoofing. By changing the DNS settings on a router, an attacker can forward your traffic to a proxy server where your communications could be monitored for useful content, as well as redirecting your to malware-laden websites, ...Continue Reading →
Tuesday Mar 31 was World Backup Day. Wednesday April 1 was April Fool’s Day. Any chance there is a connection?
Time to get of the dime and set up your computer to backup your important data, files, pictures, business records, Quickbooks data, etc. All it takes a failed hard drive, theft, fire, tornado, or other natural or man-made disaster and all your important digital assets are gone. Our favorite solution is Carbonite.
Go one – you can do it!
“Never trust a computer you can’t throw out a window.” – Steve Wozniak, co-creator of the Apple computer
I just started reading a book from 1999, written by Ray Kurweil called The Age of Spiritual Machines. This book explores the consequences of our technological changes as they relate to AI or Artificial Intelligence, sometimes called “the Singularity,” and the future of the human race in the age of self-aware machines. We have all see the “Terminator” movie series, with its ...Continue Reading →
Thanks to Joe Soucheray and his radio show’ “Garage Logic” I learned that animator Chuck Jones of Looney Tunes fame had rules for this staff to follow when creating the story arc for a Road Runner cartoon. Back in the day, when there were only 3 broadcast networks, a public broadcast network, and maybe an independent local channel, (that’s right kiddies ...Continue Reading →
I was reading an article on Sophos about the Anthem Healthcare breach, and putting this information together with some other articles I have read recently, and this question came to mind: what personal information is the worst to lose? In the Anthem breach, people lost information that included their “names, dates of birth, member ID/social security numbers, addresses, phone numbers, email ...Continue Reading →
We have alerted our readers to many of the approach vectors that are used by cyber-criminals to gain network access, tactics such as phishing and spearphishing, drive-by downloads from compromised websites, installing remote access Trojan horse software, and the like. Sometimes the easiest way to get the network credentials you need is simply to ask for them. One of the methods that have been increasing is impersonating IT staff, either by email, or directly via a phone call. We ...Continue Reading →
Is it time to change your password? Now that security researcher Alex Holden, of Hold Security in Milwaukee has uncovered a huge trove of stolen user credentials on the Dark Net, you might as well assume that yours are in this mammoth collection.
Alex Holden was born in the Ukraine, and his current surname is not the one he was given at birth. But he discovered that Russian cyber-criminals had gathered 542 million email addresses and 1.2 billion unique email and ...Continue Reading →
Bloatware, crapware, trialware, PUPs Potentially Unwanted Programs) This stuff fills up our hard drive and usually has a component that starts automatically when we reboot our computer. With all this unnecessary stuff running in the background, your computer runs slower. And a lot of this stuff pushes advertising, either as pop-up, search redirects, or on the web pages we are viewing. Where does all this stuff come from?
If you bought your computer at retail, much of this stuff comes preinstalled. ...Continue Reading →
“Just because you’re paranoid, it doesn’t mean they are not out to get you.”
Since Edward Snowden’s revelations about the domestic surveillance activities of the NSA and other US and foreign government agencies, it turns out that many people have changed their online and telephone communication behavior. accord to a recent post on Sophos:
Continue Reading →
“Out of those surveyed who are at least somewhat aware of the NSA’s surveillance programs (30% of adults), 34% have taken at least one step to ...