Beware Pop-Up Security Alert Scam

I have been getting a lot of calls about this one, and I finally was able to get a screen print of the message.  When this happens to you – DO NOT CALL the provided number.  You will end up allowing them to connect remotely and then they will convince you to spend $300 to fix the problem.  You do not really have a problem, until you make the call.  To fix this, read to the bottom.

Continue Reading →

0

Sunday Funnies: Overcoming Negative Reviews

On of the banes of the Internet for a small business is getting a single negative review that makes your otherwise great business look bad.  I’ve always told my clients to face it head on; leave the review up, but provide a backstory about what you did to resolve the issue.  If someone didn’t like your stuff, and complain online, you need to let everyone know you refunded their money, or whatever you did to try and recover for this ...

Continue Reading →
0

Google Enhances Spam Filtering

spamThere are really two stories here.  The first is about how your Gmail account should become smarter about what you consider to be SPAM, as well as what you consider to be desirable email.  We are talking about a system actually learning your personal individual preferences over time.  For instance, I get a lot of email newsletters and marketing emails in my ...

Continue Reading →
0

Baby You Can Hack My Car

This spring I bought a new Kia Forte that came with a whole lot of electronic goodies including Bluetooth synchronization, voice command, and driver programmable features galore.  And evidently, the potential to be hacked.

This is old news now, but security researchers were able to hack a Jeep Cherokee through the on-board Internet connectivity feature called “UConnect.”

“They were able to change the temperature of the air conditioning, turn on the windshield wipers and blast the wiper fluid to blur the ...

Continue Reading →
0

No More Secrets

Hacker movies are one of my favorite genres, and have been for a long time.  Go figure.  One of my favorites from the “olden days” is the 1992 movie “Sneakers.”  In this movie Robert Redford and his merry band of cybersecurity testers are tasked with the recovery of a mysterious “black box” which basically can solve for any type of encryption that was in use at that time.  At one point in the movie the blind hacker discovers ...

Continue Reading →
0

Tor Story 2

This is the second of a three-part series of articles about TOR.  On Monday we took a look at the surprising origins of the TOR network.  Today we will be taking a look at how TOR works.

HOW TOR WORKS

To use TOR, a person just needs to go to The TOR Project , and download an install the TOR web browser. Then it makes sense to read the TOR warning document. The rules include:

  • Use the TOR browser
  • Don’t torrent ...
Continue Reading →
0

Tor Story 1

TORlogoTOR or The Onion Router is one of the greatest anonymizer services available on the Internet, and allows anyone to use the Internet without revealing their source IP address, and through that, their location. Yet as recently as last November, when the FBI took down the Silk Road server and arrested its operator , and Interpol followed up with the seizure of 400 Dark Web marketplace sites and the arrest ...

Continue Reading →
0

Data and Goliath by Bruce Schneier – A Review

I finished Bruce Schneier’s latest contribution to the realm of corporate and governmental surveillance. This book is a great read if you want to understand just who IS spying on you. Turns out it is not just the NSA, but big corporations are collecting all data they can on customers and potential customers, and this information is sold and exchanged. Then there is the unholy alliance between corporate American and Big Government surveillance.

At the end, he recommended solutions in the ...

Continue Reading →
0
Page 57 of 61 «...3040505556575859...»