Preventing a Honan-style Security Breach

I have already posted the truly frightening story about how Mat Honan had his identity stolen and the criminals used his accounts to wipe his Apple laptop, iPad, and iPhone and hack his Twitter account for spamming.

PCWorld has a terrific article on how to harden your own security environment to prevent the same thing from happening to you.  Some of the great ideas are summarized below, but I recommend that you take a minute to read ...

Continue Reading →
0

Is the End Near for Anti-Virus?

I read a disturbing article on Tech Republic about how the advent of polymorphous and encrypted malware programs are making traditional signature based anti-virus products ineffective.  Basically, malware writers are using sophisticated encryption techniques to keep their products from being detected, and are writing them in such a way that the encryption key is unique for every computer that it installs itself on.

Traditional anti-virus programs rely on something called signatures.  A signature is basically a uniquely identifying ...

Continue Reading →
0

30 minute Windows 8 Preview Video

So if you are wondering if Windows 8 is for you, or if you want to know what is different in Windows 8, take 30 minutes to watch this video from Tek Syndicate on YouTube.

I am still trying to figure out if Windows 8 is the “next big thing” or if it will suffer the fate of Windows Vista.  It is a major change in the user experience.  Not more start button and task bar.

On the plus side, ...

Continue Reading →
0

Apple Malware “NetWierd” Steals Passwords

A rather poorly written malware application for Apple equipment has been offered for sale on the Internet by malware writers who hope to sell it to other cyber-criminals.  once installed on your Mac, it sets up a connection with a server in the Netherlands, which provides remote access, command and control functions.  It also looks through the password cache of your web browsers, looking for passwords to your online accounts.  For a more complete report see the article on Continue Reading →

0

The Problem of Easy Passwords

I just read an article on Ars Technica that gave me the willies.  This is a longer article that explains why passwords are failing to do the job anymore, even longer, more difficult passwords that contain upper and lower case letters, numbers and symbols. 

This little beauty shown below uses the graphics processing units of 8 AMD Radeon graphics cards to crack passwords.  At $12,000, it ain’t cheap, but it can process the entire key space of 8 ...

Continue Reading →
0

Microsoft Updates Logo

It has been 25 years since Microsoft introduced the 4 color waving flag logo with Windows 95.  They have announced plans to update it in conjunction with the release of Windows 8.  The new logo is shown below.

Microsoft new logo

While this log is still quite similar to the previous version, it shares the same tiled look as the Windows 8 user interface.  You can see the short video on YouTube or read ...

Continue Reading →
0

Using the TOR Network to Stay Anonymous Online

In an article post from Tech Gurus’ Moyo Ogunjale, where he discusses the issue of searching the deep web or hidden web, he goes into some detail on how to use the TOR Network not only to search for the hidden web, to to communicate anonymously online.

The TOR network stands for The Onion Router, and is named presumably because as you peel back the layers looking for the identity of the user, you just get another layer.  The ...

Continue Reading →
0
Page 249 of 278 «...220230240247248249250251...»