<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-4713815208755702246</id><updated>2024-09-09T00:21:54.487-07:00</updated><category term="Computer Security"/><category term="security threats"/><category term="warning"/><category term="technology"/><category term="malware"/><category term="spam"/><category term="Technology News"/><category term="internet scam"/><category term="phishing"/><category term="scam"/><category term="trojan"/><category term="Buy of the Week"/><category term="email security"/><category term="news"/><category term="facebook"/><category term="deals"/><category term="email"/><category term="sales"/><category term="social engineering"/><category term="apple"/><category term="windows"/><category term="smartphone security"/><category term="os x"/><category term="microsoft"/><category term="android"/><category term="worm"/><category term="infographic"/><category term="twitter"/><category term="update"/><category term="virus"/><category term="Laptop Deals"/><category term="hp"/><category term="computer"/><category term="google"/><category term="hacks"/><category term="java"/><category term="mac"/><category term="dell"/><category term="tablet"/><category term="website security"/><category term="Computer Advice"/><category term="Printers"/><category term="lenovo"/><category term="privacy"/><category term="ios"/><category term="laptop"/><category term="symantec"/><category term="Desktop Deals"/><category term="Hyphenet Services"/><category term="Random"/><category term="adobe"/><category term="email scam"/><category term="Hyphenet"/><category term="cloud computing"/><category term="computer deals"/><category term="computer security news"/><category term="fake facebook apps"/><category term="identity theft"/><category term="internet security"/><category term="iphone"/><category term="printer"/><category term="cloud solutions"/><category term="hoax"/><category term="smartphone"/><category term="spyware"/><category term="wordpress"/><category term="419 scam"/><category term="Heartbleed Bug"/><category term="Syrian Electronic Army"/><category term="adware"/><category term="anonymous"/><category term="antivirus software"/><category term="blackberry"/><category term="cybersecurity"/><category term="password security"/><category term="Microsoft security"/><category term="Microsoft windows"/><category term="NSA"/><category term="OpenSSL"/><category term="amazon"/><category term="backdoor"/><category term="black friday spam"/><category term="botnets"/><category term="browser"/><category term="cisco"/><category term="cybercrime"/><category term="deal of the week"/><category term="eset"/><category term="facebook scam"/><category term="facebook scams"/><category term="firefox"/><category term="flash player"/><category term="heartbleed attack"/><category term="microsoft windows xp bugs"/><category term="open source"/><category term="operating system"/><category term="password encryption"/><category term="privacy concern"/><category term="ransomware"/><category term="scams"/><category term="security breach"/><category term="skype"/><category term="small business plans"/><category term="touchpad"/><category term="website hack"/><category term="windows 8"/><category term="windows xp"/><category term="windows xp ending"/><category term="windows xp support ending"/><category term="yahoo malware advertisement"/><category term="Cyber monday"/><category term="Linux servers"/><category term="Malicious Malware"/><category term="Mavericks"/><category term="ObamaCare"/><category term="Spam Attack"/><category term="USPS email"/><category term="USPS mail fraud"/><category term="USPS mail scams"/><category term="adobef"/><category term="android app"/><category term="android malware"/><category term="antivirus"/><category term="app"/><category term="bitcoin"/><category term="carbonite"/><category term="chrome"/><category term="cloud company"/><category term="cloud services"/><category term="computer network"/><category term="computer news"/><category term="computer technology"/><category term="cyber security"/><category term="cyberattack"/><category term="cyberscam"/><category term="ddos attack"/><category term="excel"/><category term="facebook hoax"/><category term="fraud"/><category term="gmail"/><category term="google play"/><category term="hashtags"/><category term="holidays"/><category term="ibm"/><category term="information security"/><category term="internet explorer"/><category term="internet safety"/><category term="ipad"/><category term="it security"/><category term="laser printer"/><category term="lexmark"/><category term="macintosh"/><category term="malware threats"/><category term="microsoft office"/><category term="mobile"/><category term="network security"/><category term="password protection"/><category term="passwords"/><category term="rootkit"/><category term="rustock"/><category term="scanner"/><category term="scareware"/><category term="social network"/><category term="software patch"/><category term="sony"/><category term="spam mail"/><category term="tech history"/><category term="tech industry"/><category term="viewsonic"/><category term="web browser"/><category term="windows xp support"/><category term="wordpress security"/><category term="zero day"/><category term="11-11-11"/><category term="3D games"/><category term="3D projectors"/><category term="AVG"/><category term="Acer"/><category term="Affordable Care Act"/><category term="Android Tablet"/><category term="Apple webcam"/><category term="BIOS"/><category term="BOTW"/><category term="Brandon Copley"/><category term="Californias most wanted"/><category term="Contracts Agreement"/><category term="Cybercrime Prevention Act Philippines"/><category term="EFF"/><category term="End User License Terms"/><category term="FYI"/><category term="Facebook Cybercrime"/><category term="Facebook Privacy"/><category term="Fruit spam"/><category term="Gmail account"/><category term="Gmail invite"/><category term="Google +"/><category term="Google Maps"/><category term="Google plus"/><category term="Grand S"/><category term="Health Scams"/><category term="Heartbleed"/><category term="HzO"/><category term="IT departments"/><category term="IaaS"/><category term="Instagram Spam"/><category term="Internet Explorer issues"/><category term="Java applet"/><category term="Linus/Cdorked.A"/><category term="Lixin Cheng"/><category term="Macbook pro air"/><category term="Marine Corps"/><category term="Microsoft rankings"/><category term="Nintendo Wii"/><category term="Nubia 5"/><category term="Operation Windigo"/><category term="PS4"/><category term="PSP Vita"/><category term="Philippines Cyber Crime Law"/><category term="Philippines Martial Law"/><category term="Play-i"/><category term="PlayStation"/><category term="President Obama"/><category term="SIM card"/><category term="SaaS"/><category term="Stop Online Privacy Act"/><category term="TPM chips"/><category term="Terms and Conditions"/><category term="Twitter Cybercrime"/><category term="UNIX servers"/><category term="Viber attacked"/><category term="Viber hacked"/><category term="ViewSonic projectors"/><category term="WiFi networks dangerous"/><category term="WiFi viruses"/><category term="Win64/Expiro"/><category term="Windigo"/><category term="XBox 360"/><category term="XBox One"/><category term="Yahoo shareholders"/><category term="ZTE"/><category term="Zbot/Zeus malware"/><category term="aaron swartz"/><category term="aaron&#39;s law"/><category term="ada lovelace"/><category term="add/remove programs"/><category term="adobe acrobat"/><category term="adobe breach"/><category term="adobe coldfusion"/><category term="adobe pdf"/><category term="adsence"/><category term="advanced fee scam"/><category term="adware help"/><category term="air gap computer security"/><category term="alex kibkalo"/><category term="all-in-one"/><category term="amar bose"/><category term="amazon cloud drive"/><category term="amazon malware"/><category term="amazon scams"/><category term="amazon shopping"/><category term="android apps"/><category term="android infographic"/><category term="android ransomware"/><category term="anti-spam law"/><category term="anti-virus"/><category term="anti-virus help"/><category term="antisec"/><category term="applications"/><category term="april 8th 2014"/><category term="ashton kutcher"/><category term="asus"/><category term="backup data"/><category term="ban"/><category term="barnaby jack"/><category term="bieber spam"/><category term="big screen tvs"/><category term="big screens"/><category term="bill gates"/><category term="binary"/><category term="bitcoin mt.gox"/><category term="bitdefender"/><category term="black hat security"/><category term="black hole exploit"/><category term="blackberry playbook"/><category term="blackhole exploit"/><category term="bluebox security"/><category term="botnet"/><category term="brother printer"/><category term="browser debugger"/><category term="browser extensions"/><category term="budget concerns"/><category term="budget trends"/><category term="buffer app"/><category term="business ethics"/><category term="business laptop"/><category term="business security"/><category term="buyback program"/><category term="cables"/><category term="celebrity"/><category term="celebrity hoax"/><category term="cheap projector"/><category term="child hackers"/><category term="child safety"/><category term="china"/><category term="chirpify"/><category term="christmas hoax"/><category term="cloud access"/><category term="cloud backup"/><category term="cloud drive"/><category term="cloud service"/><category term="cloud storage"/><category term="cloud-based"/><category term="cloudOn"/><category term="cognitive thinking"/><category term="color printer"/><category term="comic con 2013"/><category term="comic con san diego"/><category term="comic con scams"/><category term="comic con tickets"/><category term="compromised computer"/><category term="computer graphics"/><category term="computer hackers"/><category term="computer hacks"/><category term="computer infographic"/><category term="computer network security"/><category term="computer programmer"/><category term="computer scam"/><category term="computer scams"/><category term="computer science"/><category term="computer software"/><category term="computer technology predictions"/><category term="computer tips"/><category term="computer virus WiFi"/><category term="copywriters"/><category term="covered california"/><category term="cox"/><category term="currency"/><category term="cyber attack"/><category term="cyber crime"/><category term="cyber monday attacks"/><category term="cyber security tips"/><category term="cyberthreats"/><category term="dangerous IE issues"/><category term="data breach"/><category term="data security"/><category term="data theft"/><category term="deal"/><category term="dell laser printer"/><category term="dell laser printer B1260dn"/><category term="dell printer"/><category term="desktop"/><category term="digital currency bitcoin"/><category term="donkey kong"/><category term="doug engelbart"/><category term="drive-by-download"/><category term="electronic frontier foundation"/><category term="email spam"/><category term="email traffic"/><category term="encrypted passwords"/><category term="endpoint security"/><category term="eset security"/><category term="events"/><category term="excel 2013"/><category term="excel spreadsheets"/><category term="exchange online"/><category term="extension"/><category term="faceboo hoax"/><category term="facebook ads"/><category term="facebook advertisements"/><category term="facebook advertisers"/><category term="facebook alert"/><category term="facebook anniversary"/><category term="facebook apps"/><category term="facebook birthday"/><category term="facebook crooks"/><category term="facebook hoax 2014"/><category term="facebook hoax photos"/><category term="facebook like scams"/><category term="facebook malware"/><category term="facebook messages"/><category term="facebook phishing messages"/><category term="facebook phishing scam"/><category term="facebook pranks"/><category term="facebook scam alert"/><category term="facebook scammers"/><category term="facebook spam"/><category term="facebook sponsored advertisements"/><category term="facebook sponsors"/><category term="facebook video"/><category term="facebook&#39;s 10th anniversary"/><category term="fake antivirus messages"/><category term="fake apps"/><category term="fax spam"/><category term="file sharing"/><category term="filecoder"/><category term="firewall"/><category term="firewall protection"/><category term="flash"/><category term="foreign policy"/><category term="fourth amendment"/><category term="fragmentation"/><category term="free antivirus"/><category term="future of bitcoin"/><category term="game"/><category term="germs infographic"/><category term="get rid of pop-ups"/><category term="google ads"/><category term="google analytics"/><category term="google apps"/><category term="google chrome"/><category term="google drive"/><category term="google glass"/><category term="gorilla glass"/><category term="government shutdown"/><category term="hack"/><category term="hacked"/><category term="hackers"/><category term="hacking solutions"/><category term="hahmoud ahmadinejad"/><category term="hank asher"/><category term="hardware"/><category term="hardware firewalls"/><category term="hassan rouhani"/><category term="health insurance scams"/><category term="help"/><category term="hidden lynx"/><category term="hiroshi yamauchi"/><category term="hoax slayer"/><category term="hoax websites"/><category term="hoaxes"/><category term="holiday scams"/><category term="holiday shopping"/><category term="holiday spam"/><category term="hotmail"/><category term="hp laserjet"/><category term="hp printer"/><category term="https"/><category term="hybrid cloud"/><category term="iOS 6"/><category term="iOS 7"/><category term="iSight"/><category term="iTunes Agreement"/><category term="infected browser"/><category term="infographic scams"/><category term="information technology"/><category term="insecure apps"/><category term="instagram"/><category term="interactive tv"/><category term="intercloud"/><category term="internet"/><category term="internet explorer bug"/><category term="internet hoax"/><category term="internet safety tips"/><category term="internet spam"/><category term="internet technology"/><category term="investing"/><category term="ipad 2"/><category term="iphone 5s"/><category term="iran"/><category term="israel"/><category term="it security budget"/><category term="ivan sutherland"/><category term="joe montana"/><category term="justin bieber"/><category term="kaspersky"/><category term="kaspersky lab"/><category term="kelihos"/><category term="ken brill"/><category term="keylogger"/><category term="kindle"/><category term="kindle fire"/><category term="kyoto prize"/><category term="leaked information"/><category term="lenovo buys motorola"/><category term="lenovo iomega"/><category term="lenovo thinkpad"/><category term="lenovo&#39;s new purchase"/><category term="license"/><category term="like-farming scams"/><category term="linkedin"/><category term="macbook"/><category term="maintenance"/><category term="malicious spam"/><category term="malvertisement"/><category term="malware ads"/><category term="malware attack"/><category term="malware zeus trojan"/><category term="mark karpeles"/><category term="mark zuckerburg"/><category term="mary beard"/><category term="mavericks os x update"/><category term="mcafee"/><category term="metadata"/><category term="microsoft 365"/><category term="microsoft antivirus"/><category term="microsoft attack"/><category term="microsoft excel tricks"/><category term="microsoft leak"/><category term="microsoft office 2003 support ends"/><category term="microsoft office 365"/><category term="microsoft patch"/><category term="microsoft scam"/><category term="microsoft security patch"/><category term="microsoft short patch"/><category term="microsoft snooping"/><category term="microsoft support ends"/><category term="microsoft windows xp"/><category term="microsoft word"/><category term="microsoft xp ending"/><category term="mobile apps"/><category term="mobile security"/><category term="monitor"/><category term="motorola"/><category term="motorola smartphone"/><category term="motorola smartphones"/><category term="mozilla"/><category term="msn"/><category term="mt.gox"/><category term="multifunction printer"/><category term="multitasking"/><category term="mycloud"/><category term="myspace"/><category term="nancy pelosi"/><category term="nasdaq"/><category term="netgear"/><category term="new technology"/><category term="nigerian scam"/><category term="nigerian tourists"/><category term="norton"/><category term="office"/><category term="office 2003 support"/><category term="office365"/><category term="online security"/><category term="online shopping"/><category term="online technology"/><category term="open source development"/><category term="openstack"/><category term="operation aurora"/><category term="os"/><category term="outage"/><category term="palo alto networks"/><category term="patch"/><category term="paypal phishing scams"/><category term="paypal scam"/><category term="paypal transactions"/><category term="pc security"/><category term="phishing alert"/><category term="phishing scam"/><category term="phishing scams"/><category term="playbook"/><category term="plug-ins"/><category term="plugins"/><category term="pop-up windows"/><category term="popular celebrities"/><category term="popup blocker"/><category term="popup help"/><category term="powerpoint"/><category term="privacy act"/><category term="programs"/><category term="publishers clearing house scam"/><category term="quantum communications"/><category term="quantum computers"/><category term="quartz storage"/><category term="rackspace"/><category term="rackspace open source"/><category term="raw data"/><category term="ray dolby"/><category term="real-time"/><category term="referral"/><category term="release"/><category term="remote play"/><category term="repair"/><category term="report"/><category term="research in motion"/><category term="rim"/><category term="rosetta stone"/><category term="router"/><category term="safari"/><category term="safer internet day"/><category term="safer internet day 2014"/><category term="sale"/><category term="samsung"/><category term="samsung 840 evo"/><category term="samsung book 9"/><category term="samsung galaxy"/><category term="samsung galaxy round"/><category term="samsung smart tv"/><category term="scam alert"/><category term="scam infographic"/><category term="sd card hacks"/><category term="sd card malware"/><category term="sea attack"/><category term="security"/><category term="security essentials"/><category term="security protection"/><category term="semantec"/><category term="seo"/><category term="service"/><category term="sharp lcd tv"/><category term="shylock"/><category term="signs you&#39;ve been hacked"/><category term="sketchpad"/><category term="sky drive"/><category term="small business solutions"/><category term="smartwatch"/><category term="sms scam"/><category term="social media"/><category term="social media security"/><category term="softlayer"/><category term="software"/><category term="software development"/><category term="software exploits"/><category term="software firewalls"/><category term="software update"/><category term="source code breach"/><category term="space trojan"/><category term="sponsored advertisements"/><category term="spy tools"/><category term="spyware help"/><category term="sql injection"/><category term="steve jobs"/><category term="stolen identity"/><category term="sugarsync"/><category term="support ending"/><category term="support for xp"/><category term="target security breach"/><category term="targeted attacks"/><category term="tech infographic"/><category term="tech issues"/><category term="tech news"/><category term="tech problems"/><category term="tech support"/><category term="tech support scam"/><category term="tech support scams"/><category term="terrorist attacks"/><category term="the cloud"/><category term="threats"/><category term="time-warner"/><category term="tips"/><category term="trading"/><category term="trojan security"/><category term="trustinads.org"/><category term="tv"/><category term="twitter boycott"/><category term="twitter spam"/><category term="ukraine spam"/><category term="uninstall software"/><category term="unistall popup blocker"/><category term="unwanted popups"/><category term="video"/><category term="virustotal"/><category term="vmware"/><category term="vulnerability"/><category term="wall street"/><category term="walmart scams"/><category term="wayne green"/><category term="web"/><category term="webcam"/><category term="webcast"/><category term="websense"/><category term="website"/><category term="willis ware"/><category term="windows 8 leak"/><category term="windows 8.1"/><category term="windows xp bugs"/><category term="windows xp disaster"/><category term="women computer science"/><category term="world issues"/><category term="world tech issues"/><category term="world wide web"/><category term="worldwide tech"/><category term="worldwide tech issues"/><category term="www"/><category term="xerox"/><category term="xp ending"/><category term="yahoo malvertisement"/><category term="yahoo pirated sites"/><category term="yoga tablet"/><category term="youtube"/><category term="zero-day attack"/><category term="zero-day exploits"/><title type='text'>Hyphenet&#39;s IT Blog</title><subtitle type='html'>IT security news on the latest technology and the number one resource for your hardware and software needs.&#xa;&#xa;&#xa;Visit us at www.hyphenet.com</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://hyphenet.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://hyphenet.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Hyphenet</name><uri>http://www.blogger.com/profile/01596152977110049802</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>822</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-4713815208755702246.post-3036856951868972897</id><published>2014-07-18T14:13:00.000-07:00</published><updated>2014-07-18T14:13:17.404-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer news"/><category scheme="http://www.blogger.com/atom/ns#" term="Computer Security"/><category scheme="http://www.blogger.com/atom/ns#" term="computer tips"/><title type='text'>Top 10 Fixes for Common Computer Problems</title><content type='html'>&amp;nbsp;There are questions that are unanswerable for most when coming across issues with your PC.&lt;br /&gt;
&lt;br /&gt;

Many people look at their devices and have no idea how to start fixing the problem.&lt;br /&gt;
&lt;br /&gt;

This article from PC World will provide you with helpful tips to deal
 with your computer obstacles and resolve issues regarding blue screen, 
slow run times, and recovery &amp;amp; backup.&lt;br /&gt;
&lt;br /&gt;

Per PC Advisor/&lt;br /&gt;
&lt;br /&gt;

From backups to BSODs, Lincoln Spector lists the top 10 tips he gathered from the past two years of Answers Line letters.&lt;br /&gt;
&lt;br /&gt;

&lt;div class=&quot;wp-caption alignright&quot; id=&quot;attachment_15642&quot; style=&quot;width: 310px;&quot;&gt;
&lt;a href=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/03/The-Target-Security-Breach-What-to-Do-Right-Now-to-Protect-Your-Credit.jpg&quot;&gt;&lt;img alt=&quot;Security-Fixes-for-Computer-Problems&quot; class=&quot;wp-image-15642 size-medium&quot; height=&quot;171&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/03/The-Target-Security-Breach-What-to-Do-Right-Now-to-Protect-Your-Credit-300x171.jpg&quot; title=&quot;Top-10-Fixes-for-Computer-Problems&quot; width=&quot;300&quot; /&gt;&lt;/a&gt;&lt;div class=&quot;wp-caption-text&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;wp-caption-text&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: #38761d;&quot;&gt;Top 10 Fixes for Computer Problems&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;wp-caption-text&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
Here are 10 Answer Line articles from the last two years that every Windows user should read.&lt;br /&gt;
&lt;br /&gt;

&lt;strong&gt;1. Attack of the Blue Screen of Death&lt;/strong&gt;&lt;br /&gt;

You’re working on an important project, and suddenly your &lt;span class=&quot;__pl_inactive&quot; data-index=&quot;65&quot;&gt;screen&lt;/span&gt;
 displays nothing but white text against a blue background. If it 
happens once, you curse, reboot, and hope for the best. But if you’re 
getting these BSODs frequently, you’ve got a problem that needs fixing.&lt;br /&gt;
&lt;br /&gt;

Brewski13 had such a problem, and I &lt;a href=&quot;http://www.pcworld.com/article/258876/attack_of_the_blue_screen_of_death.html&quot; rel=&quot;nofollow&quot;&gt;provided advice&lt;/a&gt; for diagnosing, and hopefully fixing, the underlying cause.&lt;br /&gt;
&lt;br /&gt;

&lt;strong&gt;2. How to recover deleted files&lt;/strong&gt;&lt;br /&gt;

Now you see them, now you don’t. Files are like that sometimes.&lt;br /&gt;
&lt;br /&gt;

So where are they? Are you sure you don’t have a backup somewhere? 
Files can hide in the Recycle Bin and “empty” sectors of your hard 
drive, even if you’ve deleted them.&lt;br /&gt;
&lt;br /&gt;

Megan Aitken’s partner lost “a load of &lt;span class=&quot;__pl_inactive&quot; data-index=&quot;74&quot;&gt;photos&lt;/span&gt;.” I walked her, and other readers, through &lt;a href=&quot;http://www.pcworld.com/article/2147668/how-to-recover-deleted-files.html&quot; rel=&quot;nofollow&quot;&gt;the steps toward recovery&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;

&lt;strong&gt;3. Introduction to backup&lt;/strong&gt;&lt;br /&gt;

I don’t get a lot of questions about backup. I sure get a lot from people who &lt;em&gt;should&lt;/em&gt; have backed up, though.&lt;br /&gt;
&lt;br /&gt;

Scarcely a week goes by without at least one &lt;span class=&quot;__pl_inactive&quot; data-index=&quot;72&quot;&gt;email&lt;/span&gt;
 from a terrified reader with a crashed disk or an overwritten file. I 
remember a grad student who lost a laptop with all the notes for his 
dissertation.&lt;br /&gt;
&lt;br /&gt;

Rickaber asked the right question. Before disaster hit, he wanted someone to explain &lt;a href=&quot;http://www.pcworld.com/article/2043692/introduction-to-backup.html&quot; rel=&quot;nofollow&quot;&gt;the basics of backing up&lt;/a&gt;. I was happy to oblige.&lt;br /&gt;
&lt;br /&gt;

&lt;strong&gt;4. Protect your privacy while you browse&lt;/strong&gt;&lt;br /&gt;

What once sounded like paranoia is now common sense. Steve asked for 
safe and secure ways to access the Internet without being tracked by 
crooks, corporations, and governments.&lt;br /&gt;
&lt;br /&gt;

While there’s no such thing as complete,&amp;nbsp; perfect privacy or &lt;span class=&quot;__pl_inactive&quot; data-index=&quot;70&quot;&gt;security&lt;/span&gt;,
 you can use plenty of tricks to provide a reasonable degree of 
anonymity. You can use your browser’s private mode, then supplement that
 mode with the right add-ons. You can also replace that browser with one
 designed to keep your real self a secret.&lt;br /&gt;
&lt;br /&gt;

When Steve asked, &lt;a href=&quot;http://www.pcworld.com/article/2142381/protect-your-privacy-while-you-browse.html&quot; rel=&quot;nofollow&quot;&gt;I explained the options.&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;

&lt;strong&gt;5. Speed up a slow PC without buying new hardware&lt;/strong&gt;&lt;br /&gt;

If a once-fast &lt;span class=&quot;__pl_inactive&quot; data-index=&quot;57&quot;&gt;computer&lt;/span&gt;
 has slowed to a crawl, you can’t really blame the hardware. Sure, you 
can speed things up by adding RAM, upgrading the CPU, or replacing the 
hard drive with an SSD. But none of those solutions–all of which cost 
money–address the underlying problem. Your hardware isn’t necessarily 
underpowered. It’s probably just overloaded.&lt;br /&gt;
&lt;br /&gt;

Gamersim17 complained that his &lt;span class=&quot;__pl_inactive&quot; data-index=&quot;62&quot;&gt;PC&lt;/span&gt; was “moving extremely slowly and not performing like it should.” I &lt;a href=&quot;http://www.pcworld.com/article/2058086/speed-up-a-slow-pc-without-buying-new-hardware.html&quot; rel=&quot;nofollow&quot;&gt;provided advice&lt;/a&gt; for identifying and removing the software that slowed it down.&lt;br /&gt;
&lt;br /&gt;

&lt;strong&gt;6. Is one antivirus program really better than two?&lt;/strong&gt;&lt;br /&gt;

Arcticsid made the mistake of installing one antivirus program on a new &lt;span class=&quot;__pl_inactive&quot; data-index=&quot;62&quot;&gt;PC&lt;/span&gt; that already had another.&lt;br /&gt;
&lt;br /&gt;

Running two antivirus programs is a bit like mixing a fine, vintage 
Cabernet with breakfast cereal. Each is good in its own right, but the 
combination may have unpleasant side effects.&lt;br /&gt;
&lt;br /&gt;

&lt;a href=&quot;http://www.pcworld.com/article/2034141/one-antivirus-program-is-better-than-two.html&quot; rel=&quot;nofollow&quot;&gt;My original article&lt;/a&gt; explains the issues and offers a better way to get a second opinion on your system’s health.&lt;br /&gt;
&lt;br /&gt;

&lt;strong&gt;7. How to securely wipe sensitive files–or your entire hard drive&lt;/strong&gt;&lt;br /&gt;

When you delete a file, the &lt;span class=&quot;__pl_inactive&quot; data-index=&quot;73&quot;&gt;data&lt;/span&gt;
 doesn’t actually go away–even after you’ve emptied the Recycle Bin. The
 actual bits remain written on the drive until some other disk activity 
writes over them. Even when you format a drive, the files are still 
there for those who want and know how to read them.&lt;br /&gt;
&lt;br /&gt;

That’s good news if you’ve lost some files. It’s not so great if you 
truly want a file to go away, or if you’re giving away an old &lt;span class=&quot;__pl_inactive&quot; data-index=&quot;62&quot;&gt;PC&lt;/span&gt; and to want make sure that your private records won’t be accessible. You have to take special steps to protect yourself.&lt;br /&gt;
&lt;br /&gt;

I give Rommel &lt;a href=&quot;http://www.pcworld.com/article/2039796/how-to-securely-wipe-sensitive-files-or-your-entire-hard-drive.html&quot; rel=&quot;nofollow&quot;&gt;advice&lt;/a&gt; on how to remove files so that no one can get them.&lt;br /&gt;
&lt;br /&gt;

&lt;strong&gt;8. An obscenely slow Internet connection when you’re paying for a fast one&lt;/strong&gt;&lt;br /&gt;

Interronator was paying Time Warner for 20mbps Internet service, but was only getting about 0.7.&lt;br /&gt;
&lt;br /&gt;

&lt;a href=&quot;http://www.pcworld.com/article/2363680/fcc-looking-into-internet-peering-complaints-from-netflix-consumers.html&quot; rel=&quot;nofollow&quot;&gt;Almost no one gets the Internet performance that their ISP advertises&lt;/a&gt;, but the difference between advertised and real speed should be reasonably close.&lt;br /&gt;
&lt;br /&gt;

Is the fault in your equipment, or is your &lt;a href=&quot;http://www.pcworld.com/article/2151483/report-u-s-internet-providers-allow-congestion-and-want-cash-to-clear-it-up.html&quot; rel=&quot;nofollow&quot;&gt;ISP to blame&lt;/a&gt;? I provide &lt;a href=&quot;http://www.pcworld.com/article/2025053/answer-line-an-obscenely-slow-internet-connection-when-youre-paying-for-a-fast-one.html&quot; rel=&quot;nofollow&quot;&gt;step-by-step diagnostics&lt;/a&gt; to help you identify the bottleneck.&lt;br /&gt;
&lt;br /&gt;

&lt;strong&gt;9. How to archive files so they’ll stay around for years&lt;/strong&gt;&lt;br /&gt;

Nothing lasts forever, but you want at least some of your files to 
last a very long time. So it was no surprise when Daisky asked about 
making family &lt;span class=&quot;__pl_active&quot; data-index=&quot;74&quot;&gt;photos&lt;/span&gt; available to future generations.&lt;br /&gt;
&lt;br /&gt;

No one is really sure how long you can archive digital files so that 
your great-grandchildren will enjoy them. In fact, no one is really sure
 if it’s possible.&lt;br /&gt;
&lt;br /&gt;

If you follow &lt;a href=&quot;http://www.pcworld.com/article/2079424/how-to-archive-files-so-theyll-stay-around-for-years.html&quot; rel=&quot;nofollow&quot;&gt;my suggestions&lt;/a&gt;,
 you’ll increase the odds of preserving your precious digital memories. 
But you won’t really be sure of your success for a few decades.&lt;br /&gt;
&lt;br /&gt;

&lt;strong&gt;10. Actually, you do need to share your passwords&lt;/strong&gt;&lt;br /&gt;

As I just said, nothing lasts forever. And that includes you and me.&lt;br /&gt;
&lt;br /&gt;

When we die, loved ones will need access to our bank accounts, email accounts, and the encrypted parts of our &lt;span class=&quot;__pl_active&quot; data-index=&quot;59&quot;&gt;computers&lt;/span&gt;.
 So, despite the generally good advice about not sharing passwords, 
there is one big exception. You must find someone you can trust with 
that information, and make sure they can access your various passwords.&lt;br /&gt;
&lt;br /&gt;

By Lincoln Spector&lt;br /&gt;
PCA&lt;br /&gt;
&lt;a href=&quot;http://www.pcadvisor.co.uk/how-to/software/3525656/top-10-fixes-for-common-pc-problems-the-best-of-pcworlds-answer-line/&quot; target=&quot;_blank&quot; title=&quot;PCA&quot;&gt;http://www.pcadvisor.co.uk/how-to/software/3525656/top-10-fixes-for-common-pc-problems-the-best-of-pcworlds-answer-line/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Related posts:&lt;/h3&gt;
&lt;a class=&quot;yarpp-thumbnail&quot; href=&quot;http://www.hyphenet.com/blog/watch-out-for-malware-in-fake-iphone-5-emails/&quot; title=&quot;Watch Out for Malware in Fake iPhone 5 Emails&quot;&gt;
&lt;img alt=&quot;Fake iPhone 5 GS Email&quot; class=&quot;attachment-yarpp-thumbnail wp-post-image&quot; height=&quot;118&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2011/10/iphone-5gs.png&quot; width=&quot;120&quot; /&gt;&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;Watch Out for Malware in Fake iPhone 5 Emails&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;&amp;nbsp;&lt;/span&gt;
&lt;a class=&quot;yarpp-thumbnail&quot; href=&quot;http://www.hyphenet.com/blog/symantec-confirms-reports-of-stolen-leaked-norton-antivirus-source-code/&quot; title=&quot;Symantec Confirms Reports of Stolen &amp;amp; Leaked Norton Antivirus Source Code&quot;&gt;
&lt;img alt=&quot;Symantec Endpoint Protection&quot; class=&quot;attachment-yarpp-thumbnail wp-post-image&quot; height=&quot;120&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2012/01/symantec-endpoint-protection.png&quot; width=&quot;120&quot; /&gt;&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;Symantec Confirms Reports of Stolen &amp;amp; Leaked Norton Antivirus Source Code&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;&amp;nbsp;&lt;/span&gt;
&lt;a class=&quot;yarpp-thumbnail&quot; href=&quot;http://www.hyphenet.com/blog/tweets-from-public-twitter-accounts-to-be-used-for-market-research-purposes/&quot; title=&quot;Tweets from Public Twitter Accounts to be Used for “Market Research Purposes”&quot;&gt;
&lt;img alt=&quot;Rich Twitter bird&quot; class=&quot;attachment-yarpp-thumbnail wp-post-image&quot; height=&quot;101&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2012/02/rich-twiter-bird.png&quot; width=&quot;120&quot; /&gt;&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;Tweets from Public Twitter Accounts to be Used for “Market Research Purposes”&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;


&lt;a class=&quot;yarpp-thumbnail&quot; href=&quot;http://www.hyphenet.com/blog/celebrity-email-hacker-pleads-guilty-reminds-us-of-online-account-safety/&quot; title=&quot;Celebrity Email Hacker Pleads Guilty, Reminds Us of Online Account Safety&quot;&gt;&lt;img alt=&quot;Christopher Chaney&quot; class=&quot;attachment-yarpp-thumbnail wp-post-image&quot; height=&quot;70&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2012/03/Christopher-Chaney.jpg&quot; width=&quot;120&quot; /&gt;&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;Celebrity Email Hacker Pleads Guilty, Reminds Us &lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hyphenet.blogspot.com/feeds/3036856951868972897/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hyphenet.blogspot.com/2014/07/top-10-fixes-for-common-computer.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/3036856951868972897'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/3036856951868972897'/><link rel='alternate' type='text/html' href='http://hyphenet.blogspot.com/2014/07/top-10-fixes-for-common-computer.html' title='Top 10 Fixes for Common Computer Problems'/><author><name>Hyphenet</name><uri>http://www.blogger.com/profile/01596152977110049802</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4713815208755702246.post-3169914125046021851</id><published>2014-07-09T12:01:00.000-07:00</published><updated>2014-07-09T12:01:08.003-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="apple"/><category scheme="http://www.blogger.com/atom/ns#" term="donkey kong"/><category scheme="http://www.blogger.com/atom/ns#" term="tech history"/><title type='text'>This Day in Tech History: July 9</title><content type='html'>&lt;h2&gt;
Gil Amelio Ousted from Apple&lt;/h2&gt;
&lt;a href=&quot;http://www.hyphenet.com/blog/day-tech-history-july-9/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;gil-amelio&quot; class=&quot;alignleft wp-image-16469 size-full&quot; height=&quot;213&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/07/amelio.jpeg&quot; title=&quot;gil-amelio&quot; width=&quot;237&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Today in tech history on July 9, 1997,&amp;nbsp; Apple Computer announced the resignation of Gil Amelio as CEO.&lt;br /&gt;

Amelio was ousted by the board of directors and his departure paved the way for Steve Jobs to re-take command of Apple.&lt;br /&gt;
&lt;br /&gt;

It was the ousting of&amp;nbsp; Amelio who brought Mr.Jobs back into &lt;a href=&quot;http://thisdayintechhistory.com/02/04/apple-acquires-next-steve-jobs-returns-to-apple/&quot; target=&quot;_blank&quot; title=&quot;Apple purchases NeXT&quot;&gt;Apple by purchasing Jobs’ company NeXT&lt;/a&gt; .&lt;br /&gt;

NeXT was used as a basis for the Mac operating system.&lt;br /&gt;

&lt;br /&gt;

&lt;h3&gt;
Donkey Kong and Mario’s Birthday&lt;/h3&gt;
&lt;a href=&quot;http://www.hyphenet.com/blog/day-tech-history-july-9/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;donkey_kong&quot; class=&quot;alignright wp-image-16470&quot; height=&quot;361&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/07/donkey_kong.gif&quot; title=&quot;donkey_kong&quot; width=&quot;316&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
On July 9, 1981, the two most famous character video games were released for sale.&lt;br /&gt;
&lt;br /&gt;

Donkey Kong, created by Nintendo, a Japanese playing card and toy company turned into an enthusiastic video game developer.&lt;br /&gt;
&lt;br /&gt;

The game took off in the North American market.&lt;br /&gt;
&lt;br /&gt;

The video game had challenges with acquiring a license to create a video game based on the Popeye character.&lt;br /&gt;
&lt;br /&gt;

Nintendo decided to create a game depicting the characteristics and constant battle between Popeye and Bluto.&lt;br /&gt;
&lt;br /&gt;

Donkey Kong is named after the game’s villain, which is a&amp;nbsp; pet gorilla that has gone rogue.&lt;br /&gt;
&lt;br /&gt;

The game’s original hero was called Jumpman, but then renamed Mario, 
once the game became popular and Nintendo decided to use the character 
in future games.&lt;br /&gt;
&lt;br /&gt;

The similarity between Donkey Kong and King Kong landed Nintendo with a lawsuit.&lt;br /&gt;
&lt;br /&gt;

Because Kong, is a common Japanese slang for gorilla, the lawsuit was ruled in favor of Nintendo.&lt;br /&gt;
&lt;br /&gt;

Donkey Kong successfully helped Nintendo become one of the dominant companies in the video game market.&lt;br /&gt;

&lt;br /&gt;

&lt;strong&gt;Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at&amp;nbsp;&lt;a href=&quot;https://twitter.com/hyphenet&quot; target=&quot;_blank&quot;&gt;@hyphenet&lt;/a&gt;,&amp;nbsp;&amp;nbsp;&lt;a href=&quot;http://www.facebook.com/hyphenet&quot; target=&quot;_blank&quot;&gt;“Like” us&lt;/a&gt;&amp;nbsp;on Facebook or add us to your circle on&amp;nbsp;&lt;a href=&quot;https://plus.google.com/105656426700111853818/posts&quot;&gt;Google+&lt;/a&gt;.&lt;/strong&gt;&lt;br /&gt;

&lt;br /&gt;

&lt;strong&gt;References:&lt;/strong&gt;&lt;br /&gt;

Brown, Marcel&lt;br /&gt;
&lt;a href=&quot;http://thisdayintechhistory.com/07/09/gil-amelio-ousted-from-apple/&quot; target=&quot;_blank&quot; title=&quot;This Day In Tech History, July 9, &quot;&gt;This Day in Tech History&lt;/a&gt;&lt;br /&gt;
&lt;cite&gt;http://thisdayintechhistory.com/07/09/gil-amelio-ousted-from-apple/&lt;/cite&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Related posts:&lt;/h3&gt;
&lt;a class=&quot;yarpp-thumbnail&quot; href=&quot;http://www.hyphenet.com/blog/did-you-see-apple-co-founder-steve-wozniak-in-line-for-the-iphone-4s/&quot; title=&quot;Did you see Apple Co-Founder Steve Wozniak in Line for the iPhone 4S?&quot;&gt;
&lt;img alt=&quot;Apple Co-Founder Steve Wozniak&quot; class=&quot;attachment-yarpp-thumbnail wp-post-image&quot; height=&quot;96&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2011/10/steve-wozniak.jpg&quot; width=&quot;120&quot; /&gt;&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;Did you see Apple Co-Founder Steve Wozniak in Line for the iPhone 4S?&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;&amp;nbsp;&lt;/span&gt;

&lt;br /&gt;
&lt;a class=&quot;yarpp-thumbnail&quot; href=&quot;http://www.hyphenet.com/blog/fake-ipads-being-sold-in-southern-states/&quot; title=&quot;Fake iPads Being Sold in Southern States&quot;&gt;&lt;img alt=&quot;Pic of Fake iPad Being Sold in iPad Gas Station Scam&quot; class=&quot;attachment-yarpp-thumbnail wp-post-image&quot; height=&quot;67&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2011/11/fake-ipad-picture-frame-wrapped-in-black-duct-tape.jpg&quot; width=&quot;120&quot; /&gt;&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;Fake iPads Being Sold in Southern States&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;&amp;nbsp;&lt;/span&gt;
&lt;a class=&quot;yarpp-thumbnail&quot; href=&quot;http://www.hyphenet.com/blog/what-tech-gadgets-top-the-holiday-wishlist-for-2011-infographic/&quot; title=&quot;Which Tech Gadgets Top the Holiday Wishlist for 2011? [INFOGRAPHIC]&quot;&gt;
&lt;img alt=&quot;All We Want for Christmas 2011&quot; class=&quot;attachment-yarpp-thumbnail wp-post-image&quot; height=&quot;120&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2011/11/tech-holiday-wishlist.jpg&quot; width=&quot;35&quot; /&gt;&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;Which Tech Gadgets Top the Holiday Wishlist for 2011? [INFOGRAPHIC]&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;&amp;nbsp;&lt;/span&gt;
&lt;a class=&quot;yarpp-thumbnail&quot; href=&quot;http://www.hyphenet.com/blog/new-mac-trojan-exploiting-same-patched-java-vulnerability-as-flashback/&quot; title=&quot;New Mac Trojan Exploiting Same [Patched] Java Vulnerability as Flashback&quot;&gt;
&lt;img alt=&quot;Apple Warning&quot; class=&quot;attachment-yarpp-thumbnail wp-post-image&quot; height=&quot;120&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2012/02/apple-warning.png&quot; width=&quot;86&quot; /&gt;&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;New Mac Trojan Exploiting Same [Patched] Java &lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hyphenet.blogspot.com/feeds/3169914125046021851/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hyphenet.blogspot.com/2014/07/this-day-in-tech-history-july-9.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/3169914125046021851'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/3169914125046021851'/><link rel='alternate' type='text/html' href='http://hyphenet.blogspot.com/2014/07/this-day-in-tech-history-july-9.html' title='This Day in Tech History: July 9'/><author><name>Hyphenet</name><uri>http://www.blogger.com/profile/01596152977110049802</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4713815208755702246.post-7390287190435486916</id><published>2014-07-07T09:55:00.002-07:00</published><updated>2014-07-07T09:56:27.190-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="anti-spam law"/><category scheme="http://www.blogger.com/atom/ns#" term="microsoft"/><category scheme="http://www.blogger.com/atom/ns#" term="microsoft patch"/><title type='text'>Microsoft Patch Inconsistencies</title><content type='html'>&lt;a href=&quot;http://www.hyphenet.com/blog/microsoft-patch-inconsistancies/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Microsoft-Patch&quot; class=&quot;border: 1px solid #fff alignleft wp-image-16449&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/07/Microsoft-logo1-300x184.jpg&quot; height=&quot;157&quot; title=&quot;Microsoft-Patch&quot; width=&quot;255&quot; /&gt;&lt;/a&gt;

It&#39;s been a busy week for Microsoft.

The email patch on Tuesday was stopped by Microsoft, then they changed their mind.

The Redmondians (Microsoft&#39;s headquarters ) sent out &lt;a href=&quot;http://seclists.org/microsoft/2014/q2/27&quot; target=&quot;_blank&quot; title=&quot;Microsoft Security Notifications - Seclists&quot;&gt;a decree&lt;/a&gt; last Friday stating that email notifications of security advisories are coming to a stop on July 1st.

The decree mentions &quot;changing governmental policies concerning the insurance of automated electronic messaging&quot;.

This new Canadian anti-spam law takes effect on July 1st.

The announcement is as followed:
&lt;br /&gt;
&lt;blockquote&gt;
&lt;blockquote&gt;
&lt;tt&gt;Notice to IT professionals:&lt;/tt&gt;&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;tt&gt;As of July 1, 2014, due to changing governmental policies concerning the issuance of automated electronic messaging, Microsoft is suspending the use of email notifications that announce the following:&lt;/tt&gt;&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;tt&gt;* Security bulletin advance notifications &lt;/tt&gt;&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;tt&gt;* Security bulletin summaries &lt;/tt&gt;&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;tt&gt;* New security advisories and bulletins&lt;/tt&gt;&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;tt&gt;* Major and minor revisions to security advisories and bulletins&lt;/tt&gt;&lt;/blockquote&gt;
&lt;/blockquote&gt;
The new law attempts to rid of annoying spam email, it is required to consent for a commercial business to communicate through email, text message and social media messages.

Canada&#39;s moving from email opt-OUT to email opt-IN.

Penalties stated in the notice say, if your business sends a notice of a special sale to someone who only signed up for an e-newsletter, and the party complains then:
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Your business may be fined up to $10,000,000&lt;/li&gt;
&lt;li&gt;Your CEO, and each officer, may be fined up to $1,000,000&lt;/li&gt;
&lt;li&gt;Your Marketing Agency may be fined up to $10,000,000&lt;/li&gt;
&lt;li&gt;You, as an individual, may be fined $10,000&lt;/li&gt;
&lt;/ul&gt;
Canada couldn&#39;t understand how Microsoft could be misreading the law like this.

Neil Schwartzman, executive director of the Coalition Against Unsolicited Commercial Email (CAUCE), and CASL accommodates emails concerning warranty and product safety and security alerts.  This means Microsoft&#39;s security advisories would be exempt.
&lt;br /&gt;
&lt;blockquote&gt;
He quotes Schwartzman:
&lt;br /&gt;
&lt;blockquote&gt;
&lt;tt&gt;I am at a complete and total loss to understand how the people in Redmond made such an apparently panicked decision ... This is the first company I know of that’s been that dumb.&lt;/tt&gt;&lt;/blockquote&gt;
CAUCE board member Jeff Williams, a former group program manager at Microsoft’s Malware Protection Center, told Krebs that Microsoft’s decision likely could be attributed to having come out of a tough choice rather than a lack of legal understanding or grey matter:
&lt;br /&gt;
&lt;blockquote&gt;
&lt;tt&gt;I can imagine the discussion and wondering among the lawyers and [Microsoft] whether they should try to get hundreds of millions of opt-ins before June 30 or if they should change the way they share info. I’m sure it wasn’t an easy decision, but I wouldn’t call it an overreaction.
&lt;/tt&gt;&lt;/blockquote&gt;
But, fear not, Microsoft has now performed a restart on its security notifications. A spokesperson told Brian Krebs late yesterday that Microsoft will be re-starting its emails early in July.
&lt;br /&gt;
&lt;blockquote&gt;
&lt;tt&gt;On June 27, 2014, Microsoft notified customers that we were suspending Microsoft Security Notifications due to changing governmental policies concerning the issuance of automated electronic messaging. We have reviewed our processes and will resume these security notifications with our monthly Advanced Notification Service (ANS) on July 3, 2014.&lt;/tt&gt;

[via: NakedSecurity]&lt;/blockquote&gt;
&lt;/blockquote&gt;
We stay up-to-date on patches and notifications, stay tunes with us for more updates!

&lt;b&gt;Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at &lt;a href=&quot;https://twitter.com/hyphenet&quot; target=&quot;_blank&quot;&gt;@hyphenet&lt;/a&gt;,  &lt;a href=&quot;http://www.facebook.com/hyphenet&quot; target=&quot;_blank&quot;&gt;“Like” us&lt;/a&gt; on Facebook or add us to your circle on &lt;a href=&quot;https://plus.google.com/105656426700111853818/posts&quot;&gt;Google+&lt;/a&gt;.&lt;/b&gt;

&lt;b&gt;Referenced:&lt;/b&gt;

Vaas, Lisa
&lt;a href=&quot;http://nakedsecurity.sophos.com/2014/07/01/microsoft-stops-patch-tuesday-emails-blames-canada-then-does-a-u-turn/&quot; target=&quot;_blank&quot; title=&quot;NakedSecurity - Microsoft Stops Patch Tuesday Emails, Blames Canada, Then Does U-Turn &quot;&gt;Microsoft stops Patch Tuesday emails, blames Canada, then does U-turn&lt;/a&gt;
&lt;cite&gt;http://nakedsecurity.sophos.com/2014/07/01/microsoft-stops-patch-tuesday-emails-blames.../&lt;/cite&gt;
&lt;i&gt;Published: July 1, 2014&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Related posts:&lt;/h3&gt;
&lt;h3&gt;
&amp;nbsp;&lt;/h3&gt;
&lt;a class=&quot;yarpp-thumbnail&quot; href=&quot;http://www.hyphenet.com/blog/microsoft-drops-windows-xp-protect-now/&quot; title=&quot;Microsoft drops Windows XP, protect yourself now!&quot;&gt;
&lt;img alt=&quot;Microsoft-XP-2013-End-of-Support&quot; class=&quot;attachment-yarpp-thumbnail wp-post-image&quot; height=&quot;120&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/04/Microsoft-XP-2013-End-of-Support-120x120.png&quot; width=&quot;120&quot; /&gt;&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;Microsoft drops Windows XP, protect yourself now!&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;&amp;nbsp;&lt;/span&gt;
&lt;a class=&quot;yarpp-thumbnail&quot; href=&quot;http://www.hyphenet.com/blog/windows-updates-failing-to-install-try-using-windows-troubleshooter/&quot; title=&quot;Windows Updates Failing to Install? Try Using Windows Troubleshooter&quot;&gt;
&lt;img alt=&quot;Windows Update, Y U NO INSTALL UPDATES?!&quot; class=&quot;attachment-yarpp-thumbnail wp-post-image&quot; height=&quot;120&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2012/06/windows-update-y-u-no.png&quot; width=&quot;120&quot; /&gt;&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;Windows Updates Failing to Install? Try Using Windows Troubleshooter&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;&amp;nbsp;&lt;/span&gt;
&lt;a class=&quot;yarpp-thumbnail&quot; href=&quot;http://www.hyphenet.com/blog/nsa-spying/&quot; title=&quot;Microsoft, Apple, Google and Facebook tighten grip on NSA spying&quot;&gt;
&lt;img alt=&quot;google-yahoo-censorship&quot; class=&quot;attachment-yarpp-thumbnail wp-post-image&quot; height=&quot;120&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2013/12/src.adapt_.480.low_-120x120.jpg&quot; width=&quot;120&quot; /&gt;&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;Microsoft, Apple, Google and Facebook tighten grip on NSA spying&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;&amp;nbsp;&lt;/span&gt;
&lt;a class=&quot;yarpp-thumbnail&quot; href=&quot;http://www.hyphenet.com/blog/windows-xp-ending-preparation/&quot; title=&quot;Windows XP is ending, are you prepared?&quot;&gt;
&lt;img alt=&quot;xp-support&quot; class=&quot;attachment-yarpp-thumbnail wp-post-image&quot; height=&quot;120&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/03/xp-support-120x120.jpg&quot; width=&quot;120&quot; /&gt;&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;Windows XP is ending, are you &lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hyphenet.blogspot.com/feeds/7390287190435486916/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hyphenet.blogspot.com/2014/07/microsoft-patch-inconsistencies.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/7390287190435486916'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/7390287190435486916'/><link rel='alternate' type='text/html' href='http://hyphenet.blogspot.com/2014/07/microsoft-patch-inconsistencies.html' title='Microsoft Patch Inconsistencies'/><author><name>Hyphenet</name><uri>http://www.blogger.com/profile/01596152977110049802</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4713815208755702246.post-5182254672564807417</id><published>2014-07-07T09:52:00.000-07:00</published><updated>2014-07-07T09:52:59.255-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="email scam"/><category scheme="http://www.blogger.com/atom/ns#" term="fraud"/><category scheme="http://www.blogger.com/atom/ns#" term="publishers clearing house scam"/><category scheme="http://www.blogger.com/atom/ns#" term="scam alert"/><title type='text'>Publishers Clearing House Scam Alert</title><content type='html'>&lt;a href=&quot;http://www.hyphenet.com/blog/publishers-clearing-house-scam-alert/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;publishers-clearing-house-scam&quot; class=&quot;aligncenter wp-image-16440&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/06/vert_org_gray.png&quot; height=&quot;295&quot; title=&quot;publishers-clearing-house-scam&quot; width=&quot;531&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Everyone wants to win the lottery!&amp;nbsp; There’s a dream within all of us 
that wins a ginormous amount of money or a major sweepstakes.&lt;br /&gt;
&lt;br /&gt;
Sometimes people get too caught up in the idea of becoming a millionaire and lose touch with reality.&lt;br /&gt;
&lt;br /&gt;
There’s something about the chance of winning something great that gets us to fantasize the possibility of it really happening.&lt;br /&gt;
&lt;br /&gt;
This is an avenue that con artists take advantage of.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.hyphenet.com/blog/publishers-clearing-house-scam-alert/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Publishers-Clearing-House-Scam-Email&quot; class=&quot;aligncenter wp-image-16441&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/06/lrg-Publishers-Clearing-House-media-4e5308213c94b.jpg&quot; height=&quot;331&quot; title=&quot;Publishers-Clearing-House-Scam-Email&quot; width=&quot;574&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Often, Publishers Clearing House, a legitimate business, is used as bait.&lt;br /&gt;
&lt;br /&gt;
The multi-million dollar giveaway from Publishers Clearing House are 
among the highest paying sweepstakes that receives millions of entries 
weekly.&lt;br /&gt;
&lt;br /&gt;
So how do you know if you are entering into a legitimate sweepstakes or a scam?&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;If you receive an email, telephone call, or bulk mail letter saying 
that you’ve won a big prize, it’s a scam.&amp;nbsp; If you actually won anything 
from PCH, you would receive a certified or express letter or get an in 
person visit!&lt;/li&gt;
&lt;li&gt;Receiving a check does not mean it’s a valid.&amp;nbsp; It’s nothing more than a piece of paper.&lt;/li&gt;
&lt;li&gt;Never trust anyone asking you to send them money.&amp;nbsp; PCH will not ask you to send them money in order to receive money.&lt;/li&gt;
&lt;/ul&gt;
Here are a few emails received from the fake PCH:&lt;br /&gt;
&lt;blockquote&gt;
“I just received a notice in the mail supposedly from 
Publishers Clearing House. They are saying that I have won a 
sweepstakes. Is this real?”&lt;br /&gt;
“I received a win letter along with a check from Publishers Clearing House to cover expenses. Did I really win?”&lt;br /&gt;
“Publishers Clearing House keeps calling and saying I’ve won 
$100,000,000. They say I have to pay 1% in taxes before they release the
 prize. What should I do?”&lt;/blockquote&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;iframe frameborder=&quot;0&quot; height=&quot;330&quot; scrolling=&quot;no&quot; src=&quot;http://eplayer.clipsyndicate.com/embed/iframe?aspect_ratio=3x2&amp;amp;auto_start=0&amp;amp;pf_id=12175&amp;amp;rel=3&amp;amp;show_title=0&amp;amp;va_id=5190397&amp;amp;volume=8&amp;amp;windows=1&quot; width=&quot;425&quot;&gt;&lt;/iframe&gt;

&lt;br /&gt;
&lt;a href=&quot;http://www.pch.com/&quot; target=&quot;_blank&quot; title=&quot;Publishers Clearing House&quot;&gt;You can go directly to the site to get more tips&amp;nbsp; from PCH.com here.&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at&amp;nbsp;&lt;a href=&quot;https://twitter.com/hyphenet&quot; target=&quot;_blank&quot;&gt;@hyphenet&lt;/a&gt;,&amp;nbsp;&amp;nbsp;&lt;a href=&quot;http://www.facebook.com/hyphenet&quot; target=&quot;_blank&quot;&gt;“Like” us&lt;/a&gt;&amp;nbsp;on Facebook or add us to your circle on&amp;nbsp;&lt;a href=&quot;https://plus.google.com/105656426700111853818/posts&quot;&gt;Google+&lt;/a&gt;.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
Lawrence, Shelby&lt;br /&gt;
&lt;a href=&quot;http://www.arklatexhomepage.com/story/d/story/publishers-clearing-house-scam-alert/22714/OE31-X8c_0qO1uhIbMNpMA&quot; target=&quot;_blank&quot; title=&quot;Publishers Clearing House Scam Alert - ArkLaTex&quot;&gt;Publishers Clearing House Scam Alert – ArkLaTex&lt;/a&gt;&lt;br /&gt;
&lt;cite&gt;http://www.arklatexhomepage.com/story/d/story/publishers-clearing-house-scam…&lt;/cite&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Related posts: &lt;/h3&gt;
&lt;a class=&quot;yarpp-thumbnail&quot; href=&quot;http://www.hyphenet.com/blog/hoax-alert-facebook-to-start-charging-membership-fees/&quot; title=&quot;Hoax Alert: Facebook to Start Charging Membership Fees?&quot;&gt;
&lt;img alt=&quot;Facebook Charging Grid Hoax&quot; class=&quot;attachment-yarpp-thumbnail wp-post-image&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2011/09/facebook-charging-grid.gif&quot; height=&quot;45&quot; width=&quot;120&quot; /&gt;&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;Hoax Alert: Facebook to Start Charging Membership Fees?&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&lt;a class=&quot;yarpp-thumbnail&quot; href=&quot;http://www.hyphenet.com/blog/even-nigerian-scammers-admit-advanced-fee-schemes-are-all-lies-and-deceit/&quot; title=&quot;Even Nigerian Scammers Admit Advanced Fee Schemes Are All “Lies and Deceit”&quot;&gt;
&lt;img alt=&quot;Mmm.. SPAM.&quot; class=&quot;attachment-yarpp-thumbnail wp-post-image&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2011/12/spam-can.jpg&quot; height=&quot;90&quot; width=&quot;120&quot; /&gt;&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;Even Nigerian Scammers Admit Advanced Fee Schemes Are All “Lies and Deceit”&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;&amp;nbsp;&lt;/span&gt;
&lt;a class=&quot;yarpp-thumbnail&quot; href=&quot;http://www.hyphenet.com/blog/paypal-transaction-declined-phishing-scam/&quot; title=&quot;PayPal Transaction Declined Phishing Scam&quot;&gt;
&lt;img alt=&quot;paypal-transaction-declined-phishing-1&quot; class=&quot;attachment-yarpp-thumbnail wp-post-image&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/02/paypal-transaction-declined-phishing-1-120x120.jpg&quot; height=&quot;120&quot; width=&quot;120&quot; /&gt;&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;PayPal Transaction&amp;nbsp;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://hyphenet.blogspot.com/feeds/5182254672564807417/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hyphenet.blogspot.com/2014/07/everyone-wants-to-win-lottery-theres.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/5182254672564807417'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/5182254672564807417'/><link rel='alternate' type='text/html' href='http://hyphenet.blogspot.com/2014/07/everyone-wants-to-win-lottery-theres.html' title='Publishers Clearing House Scam Alert'/><author><name>Hyphenet</name><uri>http://www.blogger.com/profile/01596152977110049802</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4713815208755702246.post-8376846647034557560</id><published>2014-06-25T17:03:00.000-07:00</published><updated>2014-06-25T17:03:31.565-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="antivirus"/><category scheme="http://www.blogger.com/atom/ns#" term="Computer Security"/><category scheme="http://www.blogger.com/atom/ns#" term="computer security news"/><category scheme="http://www.blogger.com/atom/ns#" term="password encryption"/><title type='text'>Top 10 Tips for Computer Security</title><content type='html'>&lt;span class=&quot;edit-link&quot;&gt;&lt;/span&gt;                    
     
     &lt;br /&gt;
&lt;div class=&quot;entry-content&quot;&gt;
          
&lt;a href=&quot;http://www.hyphenet.com/blog/top-10-tips-computer-security/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;computer-virus&quot; class=&quot;alignright size-medium wp-image-16435&quot; height=&quot;202&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/06/computer-virus-300x202.jpg&quot; width=&quot;300&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Being in the &lt;em&gt;Internet Age&lt;/em&gt;, we use computers to pay bills online, go shopping, take college courses, and endlessly entertain ourselves.&lt;br /&gt;
&lt;br /&gt;
Before you allow the computer to consume your whole life, take the necessary steps to ensure your finances stay personal.&lt;br /&gt;
&lt;br /&gt;

&lt;ol&gt;
&lt;li&gt;&amp;nbsp;Use passwords for protection&lt;/li&gt;
&lt;li&gt;Get your guard up&lt;/li&gt;
&lt;li&gt;Up the ‘anti’ with software&lt;/li&gt;
&lt;li&gt;Run scans to stay current&lt;/li&gt;
&lt;li&gt;Take wireless precautions&lt;/li&gt;
&lt;li&gt;Pump up password protocol&lt;/li&gt;
&lt;li&gt;Watch out for attachments and downloads&lt;/li&gt;
&lt;li&gt;Avoid going public&lt;/li&gt;
&lt;li&gt;Watch your phones and PDAs&lt;/li&gt;
&lt;li&gt;Clean up your computer&lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
These are all ‘best practices’ for technical security precautions.&lt;br /&gt;
&lt;br /&gt;

Following these precautions will help you keep your data and personal
 information safe.&amp;nbsp; Be sure to never run your computer as administrator 
unless you must do so for a specific task.&lt;br /&gt;
&lt;br /&gt;

Maintain your software and be sure to run updates on your device.&lt;br /&gt;
&lt;br /&gt;

By backing up your data frequently, you protect your files and 
hinders your operating system from crashing.&amp;nbsp;&amp;nbsp;&amp;nbsp; This will also prevent 
hardware failure and virus attacks.&lt;br /&gt;
&lt;br /&gt;

&lt;strong&gt;Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at&amp;nbsp;&lt;a href=&quot;https://twitter.com/hyphenet&quot; target=&quot;_blank&quot;&gt;@hyphenet&lt;/a&gt;,&amp;nbsp;&amp;nbsp;&lt;a href=&quot;http://www.facebook.com/hyphenet&quot; target=&quot;_blank&quot;&gt;“Like” us&lt;/a&gt;&amp;nbsp;on Facebook or add us to your circle on&amp;nbsp;&lt;a href=&quot;https://plus.google.com/105656426700111853818/posts&quot;&gt;Google+&lt;/a&gt;.&lt;/strong&gt;&lt;br /&gt;

&lt;br /&gt;

&lt;strong&gt;References:&lt;/strong&gt;&lt;br /&gt;
Allebrand, Cheryl&lt;br /&gt;
&lt;a href=&quot;http://www.bankrate.com/finance/financial-literacy/10-tips-to-computer-security-1.aspx&quot; target=&quot;_blank&quot; title=&quot;BankRate - 10 Security Tips&quot;&gt;10 tips to computer security – Bankrate&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;cite&gt;http://www.bankrate.com/finance/financial-literacy/10-tips-to-computer-security…&lt;/cite&gt;&lt;br /&gt;

&lt;a href=&quot;https://kb.iu.edu/d/akln&quot; target=&quot;_blank&quot; title=&quot;Indiana University - Best Practices for Computer Security&quot;&gt;Best practices for computer security – Indiana University&lt;/a&gt;&lt;br /&gt;
&lt;cite&gt;https://kb.iu.edu/d/akln&lt;/cite&gt;</content><link rel='replies' type='application/atom+xml' href='http://hyphenet.blogspot.com/feeds/8376846647034557560/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hyphenet.blogspot.com/2014/06/top-10-tips-for-computer-security.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/8376846647034557560'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/8376846647034557560'/><link rel='alternate' type='text/html' href='http://hyphenet.blogspot.com/2014/06/top-10-tips-for-computer-security.html' title='Top 10 Tips for Computer Security'/><author><name>Hyphenet</name><uri>http://www.blogger.com/profile/01596152977110049802</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4713815208755702246.post-4952773513193006833</id><published>2014-06-23T14:07:00.001-07:00</published><updated>2014-06-23T14:07:50.057-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cyberscam"/><category scheme="http://www.blogger.com/atom/ns#" term="email scam"/><category scheme="http://www.blogger.com/atom/ns#" term="USPS email"/><category scheme="http://www.blogger.com/atom/ns#" term="USPS mail fraud"/><category scheme="http://www.blogger.com/atom/ns#" term="USPS mail scams"/><title type='text'>USPS Email Scam</title><content type='html'>&lt;a href=&quot;http://www.hyphenet.com/blog/usps-email-scam/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;USPS-Email-scam&quot; class=&quot;aligncenter wp-image-16428 size-full&quot; height=&quot;330&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/06/USPS-Email-660x330.png&quot; title=&quot;USPS-Email-scam&quot; width=&quot;660&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
A USPS email scam leads users to malicious computer malware.&lt;br /&gt;
&lt;br /&gt;

A woman has claimed that she cant get rid of the malware that was put
 on her computer from a bogus U.S. Postal Service email came through.&lt;br /&gt;
&lt;br /&gt;

The woman received an email with a shipping label link in it.&amp;nbsp; She 
clicked on the link for the shipping label and realized she may have 
done something wrong.&amp;nbsp; With the uneasy feeling of potentially clicking 
on something that isn’t trusted, she ran a computer scan and found that 
her device was infected with a data-stealing virus from the bogus link.&lt;br /&gt;
&lt;br /&gt;

The woman said she received an email from &lt;a href=&quot;https://www.usps.com/&quot; target=&quot;_blank&quot; title=&quot;USPS&quot;&gt;USPS.com&lt;/a&gt; claiming that a package could not be delivered to her residence.&lt;br /&gt;
&lt;br /&gt;

&lt;blockquote&gt;
“Your parcel has arrived at May 24, 2014. Courier was unable to deliver the parcel to you,” stated the email.&lt;br /&gt;

“Print your label and show it in the nearest post office to get a parcel.”&lt;/blockquote&gt;
&lt;br /&gt;
The email had the link, “&lt;span style=&quot;color: navy;&quot;&gt;Print Shipping Label&lt;/span&gt;” to get the proper package identification, displayed at the bottom.&lt;br /&gt;
&lt;br /&gt;

The real USPS email states that they do not contact customers via email if a package could not be delivered.&lt;br /&gt;
&lt;br /&gt;

USPS is aware of this scam along with others like it.&amp;nbsp; They have 
posted a warning on their website cautioning customers about the 
situation.&lt;br /&gt;
&lt;br /&gt;

Clicking the link activates a virus, which can steal personal 
information like user names, passwords, and other private data stored on
 your computer.&lt;br /&gt;
&lt;br /&gt;

If you receive this email, delete the message and report the spam at abuse@usps.gov.&lt;br /&gt;
&lt;br /&gt;

This marketing scam has already been uncovered by the Postal 
Inspection Service where fraudsters mask themselves as USPS employees 
and calling residents requesting D.O.B. along with SSN for package 
deliveries.&lt;br /&gt;
&lt;br /&gt;

Always check suspicious emails for; poor grammar, spelling errors, funny formats, and security symbols in the url.&lt;br /&gt;
&lt;br /&gt;

The email received by residents, states that a parcel has arrived 
“at” May 24th.&amp;nbsp; Also, the sender information on the “From” line for the 
email address states “donotreply?id85@kestrelgymnastics.co.uk, not a 
USPS.com.&lt;br /&gt;
&lt;br /&gt;

It is advised for anyone who received on of these scam email to 
forward it to spam2uspis.gov.&amp;nbsp; Or recipients may call the postal 
inspection service at 1-877-876-2455.&lt;br /&gt;

&lt;br /&gt;

&lt;strong&gt;Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at&amp;nbsp;&lt;a href=&quot;https://twitter.com/hyphenet&quot; target=&quot;_blank&quot;&gt;@hyphenet&lt;/a&gt;,&amp;nbsp;&amp;nbsp;&lt;a href=&quot;http://www.facebook.com/hyphenet&quot; target=&quot;_blank&quot;&gt;“Like” us&lt;/a&gt;&amp;nbsp;on Facebook or add us to your circle on&amp;nbsp;&lt;a href=&quot;https://plus.google.com/105656426700111853818/posts&quot;&gt;Google+&lt;/a&gt;.&lt;/strong&gt;&lt;br /&gt;

&lt;br /&gt;

&lt;strong&gt;References:&lt;/strong&gt;&lt;br /&gt;
Marquez, Homer&lt;br /&gt;
&lt;a href=&quot;http://www.myplainview.com/news/article_4679a566-e6a4-11e3-b32a-001a4bcf887a.html&quot; target=&quot;_blank&quot; title=&quot;MyPlainview&quot;&gt;Fake USPS email leads to malware – MyPlainview&lt;/a&gt;&lt;br /&gt;
&lt;cite&gt;http://www.myplainview.com/news/article_4679a566-e6a4-11e3-b32a-001a4bcf887a.html&lt;/cite&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;yarpp-related&quot;&gt;
&lt;h3&gt;
Related posts:&lt;/h3&gt;
&lt;div class=&quot;yarpp-thumbnails-horizontal&quot;&gt;
&lt;a class=&quot;yarpp-thumbnail&quot; href=&quot;http://www.hyphenet.com/blog/dont-click-links-in-your-american-express-forgotten-user-id-spam/&quot; title=&quot;Don’t Click Links in “Your American Express Forgotten User ID” Spam&quot;&gt;
&lt;img alt=&quot;American Express&quot; class=&quot;attachment-yarpp-thumbnail wp-post-image&quot; height=&quot;90&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2012/05/american-express.png&quot; width=&quot;120&quot; /&gt;&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;Don’t Click Links in “Your American Express Forgotten User ID” Spam&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;yarpp-thumbnails-horizontal&quot;&gt;
&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;yarpp-thumbnails-horizontal&quot;&gt;
&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;&amp;nbsp;&lt;/span&gt;
&lt;a class=&quot;yarpp-thumbnail&quot; href=&quot;http://www.hyphenet.com/blog/fake-facebook-cancellation-account-email-links-to-malware-posing-as-adobe-flash-update/&quot; title=&quot;Fake Facebook Cancellation Account Email Links to Malware Posing as Adobe Flash Update&quot;&gt;
&lt;img alt=&quot;Facebook Square Icon&quot; class=&quot;attachment-yarpp-thumbnail wp-post-image&quot; height=&quot;120&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2012/05/facebook-icon.png&quot; width=&quot;120&quot; /&gt;&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;Fake Facebook Cancellation Account Email Links to Malware Posing as Adobe Flash Update&lt;/span&gt;&lt;/a&gt;&amp;nbsp; &lt;/div&gt;
&lt;div class=&quot;yarpp-thumbnails-horizontal&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;yarpp-thumbnails-horizontal&quot;&gt;
&lt;a class=&quot;yarpp-thumbnail&quot; href=&quot;http://www.hyphenet.com/blog/aicpa-spam-malware-attack/&quot; title=&quot;AICPA Spam Threatens to Revoke License, Launches Malware Attack&quot;&gt;&lt;img alt=&quot;AICPA&quot; class=&quot;attachment-yarpp-thumbnail wp-post-image&quot; height=&quot;120&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2012/08/aicpa-spam-warning.png&quot; width=&quot;120&quot; /&gt;&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;AICPA Spam Threatens to Revoke License, Launches Malware Attack&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;yarpp-thumbnails-horizontal&quot;&gt;
&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;yarpp-thumbnails-horizontal&quot;&gt;
&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;&amp;nbsp;&lt;/span&gt;
&lt;a class=&quot;yarpp-thumbnail&quot; href=&quot;http://www.hyphenet.com/blog/citibank-spam-lead-to-malware/&quot; title=&quot;Citibank Spam Luring Users into Drive-by-Download Attacks&quot;&gt;
&lt;img alt=&quot;Citibank&quot; class=&quot;attachment-yarpp-thumbnail wp-post-image&quot; height=&quot;120&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2012/12/citi-bank.png&quot; width=&quot;120&quot; /&gt;&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;Citibank Spam Luring Users into Drive-by-Download Attacks&lt;/span&gt;&lt;/a&gt;
&lt;/div&gt;
&lt;img alt=&quot;YARPP&quot; src=&quot;http://yarpp.org/pixels/a398802f50accaa367845b322f511c42&quot; /&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hyphenet.blogspot.com/feeds/4952773513193006833/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hyphenet.blogspot.com/2014/06/usps-email-scam.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/4952773513193006833'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/4952773513193006833'/><link rel='alternate' type='text/html' href='http://hyphenet.blogspot.com/2014/06/usps-email-scam.html' title='USPS Email Scam'/><author><name>Hyphenet</name><uri>http://www.blogger.com/profile/01596152977110049802</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4713815208755702246.post-414205991343528997</id><published>2014-06-19T16:53:00.000-07:00</published><updated>2014-06-19T16:54:51.521-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="amazon"/><category scheme="http://www.blogger.com/atom/ns#" term="amazon shopping"/><category scheme="http://www.blogger.com/atom/ns#" term="chirpify"/><category scheme="http://www.blogger.com/atom/ns#" term="hashtags"/><category scheme="http://www.blogger.com/atom/ns#" term="online shopping"/><category scheme="http://www.blogger.com/atom/ns#" term="twitter"/><title type='text'>Start using hashtags when shopping online</title><content type='html'>&lt;span class=&quot;edit-link&quot;&gt;&lt;/span&gt;                    
     
     &lt;br /&gt;
&lt;div class=&quot;entry-content&quot;&gt;
&lt;a href=&quot;http://www.hyphenet.com/blog/start-using-hashtags-shopping-online/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;amazon-twitter-hashtag&quot; class=&quot;alignright wp-image-16399 size-medium&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/06/amazon-twitter-300x148.jpg&quot; height=&quot;148&quot; title=&quot;amazon-twitter-hashtag&quot; width=&quot;300&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Amazon, the online e-commerce giant, wants you to begin using hashtags when shopping on their website.&lt;br /&gt;
&lt;br /&gt;
The company’s new hashtag &lt;b&gt;#AmazonCart&lt;/b&gt; and &lt;b&gt;#AmazonBasket&lt;/b&gt; rolled out last month with mediocre popularity.&lt;br /&gt;
&lt;br /&gt;
This is designed to make it easy to add items to your shopping cart without leaving your Twitter feed.&lt;br /&gt;
&lt;br /&gt;
This new hashtag shopping tactic is a way to attract new, socially 
savvy, consumers to spend more time on the Twitter smartphone app.&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote&gt;
“Twitter offers a great environment for our customers to 
discover product recommendations from artists, experts, brands and 
friends,” said an Amazon spokeswoman.&lt;/blockquote&gt;
&lt;br /&gt;
Making purchases through Twitter may come off as not going together, 
but it is just another way the Internet is changing our shopping habits.&lt;br /&gt;
&lt;br /&gt;
This isn’t the first account of social media integrating with online 
shopping.&amp;nbsp; In 2012, Facebook started to let users send each other actual
 gifts through the timeline.&lt;br /&gt;
&lt;br /&gt;
This method didn’t last long, nor was it popular.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.hyphenet.com/blog/start-using-hashtags-shopping-online/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;AmazonCart-Hashtag&quot; class=&quot;aligncenter wp-image-16401 size-full&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/06/amazoncart1.png&quot; height=&quot;578&quot; title=&quot;AmazonCart-Hashtag&quot; width=&quot;592&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Chinese social network &lt;i&gt;&lt;span style=&quot;color: green;&quot;&gt;Weibo&lt;/span&gt;&lt;/i&gt;, which is the Chinese version of Twitter, launched a “buy” button last year.&lt;br /&gt;
&lt;br /&gt;
This was done with the partnership of an e-commerce company &lt;span style=&quot;color: green;&quot;&gt;&lt;i&gt;Alibaba&lt;/i&gt;&lt;/span&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.hyphenet.com/blog/start-using-hashtags-shopping-online/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Online-Shopping-Hashtags&quot; class=&quot;alignright wp-image-16398 size-medium&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/06/1399313585-amazon-new-twitter-hashtag-shopping-cart-300x191.jpg&quot; height=&quot;191&quot; title=&quot;Online-Shopping-Hashtags&quot; width=&quot;300&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;span style=&quot;color: green;&quot;&gt;Chirpify&lt;/span&gt;&lt;/i&gt; is another 
similar shopping campaign on Twitter that allows brands and agencies to 
leverage social channels through hashtags.&amp;nbsp; They have been in business 
for two years now.&lt;br /&gt;
&lt;br /&gt;
Many businesses create campaigns with ‘Action hashtags’ to trigger accelerated internet marketing.&amp;nbsp; &lt;b&gt;#Win a free t-shirt!&lt;/b&gt;,&amp;nbsp;&lt;b&gt; #$25GiftCard&lt;/b&gt;, or &lt;b&gt;#EnterToWin&lt;/b&gt;.&lt;br /&gt;
&lt;br /&gt;
#AmazonCart will send an item to a cart, the @MyAmazon&amp;nbsp; account sent 
from Twitter, will automatically respond to the action hashtag tweets 
delivering 3,357 tweets replying to the action hashtag #AmazonCart.&lt;br /&gt;
&lt;br /&gt;
Amazon’s official Twitter accounts have promoted hashtags and brands through this means.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.hyphenet.com/blog/start-using-hashtags-shopping-online/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Chirpify-Hashtags&quot; class=&quot;aligncenter wp-image-16400&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/06/bub_chirpify_02.jpeg&quot; height=&quot;775&quot; title=&quot;Chirpify-Hashtags&quot; width=&quot;600&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Amazon and Twitter have partnered to strengthen their mobile social network and sales conversions.&lt;br /&gt;
&lt;br /&gt;
Consumers are increasingly spending time on their phones instead of 
PCs.&amp;nbsp; It just makes sense for Amazon to campaign with Twitter.&amp;nbsp; 78% of 
Twitter users access their site through a mobile device.&lt;br /&gt;
&lt;br /&gt;
Amazon is campaigning for not only mobile users but also for the 
power of social media to advertise and make people want to buy more, 
according to CRT Capital Group Analyst Neil Doshi.&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote&gt;
“Amazon has a very strong mobile presence, that is a 
tailwind for its e-commerce business,” he said. “Using Twitter just 
shows that Amazon is willing to use social mobile experiences to drive 
more sales. But, we wonder how many Twitter users would use this 
feature, as it might be a new way to shop.”&lt;/blockquote&gt;
&lt;br /&gt;
This is a chance for Amazon to change the perception of social 
shopping.&amp;nbsp;&amp;nbsp; Across the board, convenience, speed, and mobility will 
improve any business.&lt;br /&gt;
&lt;br /&gt;
Would you purchase through #AmazonCart from Twitter?&amp;nbsp; Do you think 
this will help or hurt shopping carts?&amp;nbsp; Please leave your comments 
below!&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at&amp;nbsp;&lt;a href=&quot;https://twitter.com/hyphenet&quot; target=&quot;_blank&quot;&gt;@hyphenet&lt;/a&gt;,&amp;nbsp;&amp;nbsp;&lt;a href=&quot;http://www.facebook.com/hyphenet&quot; target=&quot;_blank&quot;&gt;“Like” us&lt;/a&gt;&amp;nbsp;on Facebook or add us to your circle on&amp;nbsp;&lt;a href=&quot;https://plus.google.com/105656426700111853818/posts&quot;&gt;Google+&lt;/a&gt;.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;References:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.cnet.com/news/why-amazon-wants-you-to-use-twitter-hashtags-to-shop/&quot; target=&quot;_blank&quot; title=&quot;C|Net - Why Amazon wants you to use Twitter hashtags to shop&quot;&gt;Why Amazon wants you to use Twitter hashtags to shop – C|Net&lt;/a&gt;&lt;br /&gt;
&lt;cite&gt;http://www.cnet.com/news/why-amazon-wants-you-to-use-twitter-hashtags-to-shop/&lt;/cite&gt;&lt;br /&gt;
&lt;i&gt;Published: May 6, 2014&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Related posts:&lt;/h3&gt;
&lt;a class=&quot;yarpp-thumbnail&quot; href=&quot;http://www.hyphenet.com/blog/phishing-page-offers-fake-security-app-to-facebook-users/&quot; title=&quot;Phishing Page Offers Fake Security App to Facebook Users&quot;&gt;
&lt;img alt=&quot;Facebook Square Icon&quot; class=&quot;attachment-yarpp-thumbnail wp-post-image&quot; height=&quot;120&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2012/05/facebook-icon.png&quot; width=&quot;120&quot; /&gt;&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;Phishing Page Offers Fake Security App to Facebook Users&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;&amp;nbsp;&lt;/span&gt;
&lt;a class=&quot;yarpp-thumbnail&quot; href=&quot;http://www.hyphenet.com/blog/divide-between-it-and-end-user/&quot; title=&quot;Close the divide between your IT department and end user.&quot;&gt;
&lt;img alt=&quot;enduser_computing-landing-pg_shutterstock_91847048&quot; class=&quot;attachment-yarpp-thumbnail wp-post-image&quot; height=&quot;120&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/04/enduser_computing-landing-pg_shutterstock_91847048-120x120.jpg&quot; width=&quot;120&quot; /&gt;&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;Close the divide between your IT &lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hyphenet.blogspot.com/feeds/414205991343528997/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hyphenet.blogspot.com/2014/06/start-using-hashtags-when-shopping.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/414205991343528997'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/414205991343528997'/><link rel='alternate' type='text/html' href='http://hyphenet.blogspot.com/2014/06/start-using-hashtags-when-shopping.html' title='Start using hashtags when shopping online'/><author><name>Hyphenet</name><uri>http://www.blogger.com/profile/01596152977110049802</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4713815208755702246.post-1257842798160985210</id><published>2014-06-18T11:44:00.000-07:00</published><updated>2014-06-18T11:44:25.330-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="android app"/><category scheme="http://www.blogger.com/atom/ns#" term="android malware"/><category scheme="http://www.blogger.com/atom/ns#" term="google play"/><category scheme="http://www.blogger.com/atom/ns#" term="smartphone security"/><title type='text'>WARNING: Chinese Smartphones Contain Built-In Android Malware</title><content type='html'>&lt;span style=&quot;color: green;&quot;&gt;There is a Chinese clone of the Samsung smartphone that steals personal data using a virus disguised as Google Play!&lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.hyphenet.com/blog/warning-chinese-smartphones-contain-built-android-malware/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;chinese-android-malware&quot; class=&quot;aligncenter wp-image-16387 size-full&quot; height=&quot;222&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/06/CV-android.jpg&quot; title=&quot;chinese-android-malware&quot; width=&quot;300&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;
A Chinese Android smartphone that is selling on &lt;strong&gt;Amazon&lt;/strong&gt;, &lt;strong&gt;eBay&lt;/strong&gt; and other online stores have been found to contain a virus that pretends to be the &lt;span style=&quot;color: green;&quot;&gt;Google Play Store&lt;/span&gt;.&lt;br /&gt;
&lt;br /&gt;

This virus steals the user’s data when logged onto the bogus store.&lt;br /&gt;
&lt;br /&gt;

The &lt;strong&gt;Star N9500&lt;/strong&gt;, is resemblance to the Samsung’s 
Galaxy S4 Android smartphone.&amp;nbsp; It is manufactured in China but the phone
 is sold through resellers located in Belfast and Hong Kong.&lt;br /&gt;
&lt;br /&gt;

The Trojan is known&amp;nbsp; as “&lt;span style=&quot;color: green;&quot;&gt;Uupay.D&lt;/span&gt;“,
 its disguised as the Google Play Store.&amp;nbsp; It is pre-installed on the 
Android smartphone with no way to be removed by the user, according to 
German security company G Data.&lt;br /&gt;
&lt;br /&gt;

&lt;span style=&quot;color: green;&quot;&gt;G Data&lt;/span&gt; has analyzed one of the smartphones purchased directly from the factory in China and verified its vulnerability.&lt;br /&gt;
&lt;br /&gt;

The scary aspect of this, is that online criminals have full access to these smartphones.&lt;br /&gt;
&lt;br /&gt;

&lt;h2&gt;
All Access&lt;/h2&gt;
The malware attached to these Androids, steal personal data from the 
phone and sends it to an anonymous server located in China.&amp;nbsp; This 
Android malware is also capable of installing additional applications or
 viruses without the user’s knowledge.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.hyphenet.com/blog/warning-chinese-smartphones-contain-built-android-malware/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;malware-phones&quot; class=&quot;alignright wp-image-16388 size-medium&quot; height=&quot;168&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/06/malware-phones-300x168.jpg&quot; title=&quot;malware-phones&quot; width=&quot;300&quot; /&gt;&lt;/a&gt;&lt;br /&gt;

&lt;br /&gt;
&lt;br /&gt;
The only thing users see is an app with the Google Play Store icon in
 the running process.&amp;nbsp; The virus enables criminals to track the location
 of the smartphone, intercept and record phone calls, make purchases and
 send premium text messages without the user’s permission.&amp;nbsp; All 
completely discrete and disguised.&lt;br /&gt;
&lt;br /&gt;

The authentic phone usually costs £500 while the Chinese smartphones 
are going for £120.&amp;nbsp; Users are noticing reviews on this product range 
from one to five stars.&amp;nbsp; Although, they are complaining about the poor 
quality and noticing the phone starts to break down after a couple of 
months.&lt;br /&gt;
&lt;br /&gt;

The device is offered with an extensive list of accessories which 
includes a second battery, car charging adapter and second cover.&lt;br /&gt;
&lt;br /&gt;

&lt;blockquote&gt;
The low price of a smartphone with such a wide range of 
features is a criminal tactic, according to Geschkat, a product manager 
at G Data.&lt;/blockquote&gt;
&lt;br /&gt;
&lt;strong&gt;Buyers Beware:&amp;nbsp; &lt;/strong&gt;Cheap offers online that seem tempting should make buyers suspicious.&amp;nbsp; There is no such thing as free.&lt;br /&gt;
&lt;br /&gt;

&lt;strong&gt;Android&lt;/strong&gt; accounted for 97% of the malware targeted at
 mobile devices last year.&amp;nbsp; This is an increase of 20% a year, according
 to data from a security firm&lt;span style=&quot;color: green;&quot;&gt; F-Secure&lt;/span&gt;.&lt;br /&gt;
&lt;br /&gt;

Even though this malware is already installed onto these devices from
 the Google Play store, it accounts for only 0.1% of malware.&lt;br /&gt;
&lt;br /&gt;

Malware from these Android’s can’t be blamed for all accounts.&lt;br /&gt;
&lt;br /&gt;

The majority of all malware is downloaded from third-party app stores including the Chinese stores &lt;strong&gt;Baidu&lt;/strong&gt; and &lt;strong&gt;Anzhi&lt;/strong&gt;, where access to Google Play is restricted.&lt;br /&gt;
&lt;br /&gt;

Have you come across these phones?&amp;nbsp; We’d love to hear from you, please leave your comments below!&lt;br /&gt;

&lt;br /&gt;

&lt;strong&gt;References:&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;

Gibbs, Samuel&lt;br /&gt;
&lt;a href=&quot;http://www.theguardian.com/technology/2014/jun/18/chinese-smartphone-samsung-amazon-ebay-malware-google-play&quot; target=&quot;_blank&quot; title=&quot;Chinese smartphone on sale on Amazon and eBay contains built-in malware - TheGuardian&quot;&gt;Chinese smartphone on sale on Amazon and eBay contains built-in malware – TheGuardian&lt;/a&gt;&lt;br /&gt;
&lt;cite&gt;http://www.theguardian.com/technology/2014/jun/18/chinese-smartphone-samsung-amazon-ebay-malware-google-play&lt;/cite&gt;&lt;br /&gt;
&lt;i&gt;Published: June 18, 2014&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Related posts:&lt;/h3&gt;
&lt;a class=&quot;yarpp-thumbnail&quot; href=&quot;http://www.hyphenet.com/blog/compromised-sites-serving-android-malware-via-drive-by-downloads/&quot; title=&quot;Compromised Sites Serving Android Malware via Drive-by-Downloads&quot;&gt;
&lt;img alt=&quot;Drive-by-Downloads Targeting Android&quot; class=&quot;attachment-yarpp-thumbnail wp-post-image&quot; height=&quot;120&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2012/05/malware-targeting-android.gif&quot; width=&quot;115&quot; /&gt;&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;Compromised Sites Serving Android Malware via Drive-by-Downloads&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;&lt;/span&gt; &lt;a class=&quot;yarpp-thumbnail&quot; href=&quot;http://www.hyphenet.com/blog/researchers-find-more-android-malware-some-send-expensive-sms-others-steal-data/&quot; title=&quot;Researchers Find More Android Malware: Some Send Expensive SMS, Others Steal Data&quot;&gt;&lt;img alt=&quot;Android KO&#39;d&quot; class=&quot;attachment-yarpp-thumbnail wp-post-image&quot; height=&quot;120&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2012/07/android-ko.jpg&quot; width=&quot;120&quot; /&gt;&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;Researchers Find More Android Malware: Some Send Expensive SMS, Others Steal Data&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;&amp;nbsp;&lt;/span&gt;
&lt;a class=&quot;yarpp-thumbnail&quot; href=&quot;http://www.hyphenet.com/blog/android-trojan-can-partake-in-ddos-attacks-send-sms-spam/&quot; title=&quot;Android Trojan Can Partake in DDoS Attacks, Send SMS Spam&quot;&gt;
&lt;img alt=&quot;evil-android-man&quot; class=&quot;attachment-yarpp-thumbnail wp-post-image&quot; height=&quot;120&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2012/07/evil-android-man.png&quot; width=&quot;83&quot; /&gt;&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;Android Trojan Can Partake in DDoS Attacks, Send SMS Spam&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&lt;a class=&quot;yarpp-thumbnail&quot; href=&quot;http://www.hyphenet.com/blog/candy-crush-saga-mobile-adware/&quot; title=&quot;Watch Out for Mobile Adware Posing as Candy Crush Saga Apps&quot;&gt;
&lt;img alt=&quot;Candy Crush Saga&quot; class=&quot;attachment-yarpp-thumbnail wp-post-image&quot; height=&quot;120&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2013/03/candy-crush-120x120.png&quot; width=&quot;120&quot; /&gt;&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;Watch Out for Mobile Adware &lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hyphenet.blogspot.com/feeds/1257842798160985210/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hyphenet.blogspot.com/2014/06/warning-chinese-smartphones-contain.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/1257842798160985210'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/1257842798160985210'/><link rel='alternate' type='text/html' href='http://hyphenet.blogspot.com/2014/06/warning-chinese-smartphones-contain.html' title='WARNING: Chinese Smartphones Contain Built-In Android Malware'/><author><name>Hyphenet</name><uri>http://www.blogger.com/profile/01596152977110049802</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4713815208755702246.post-1496599703544165851</id><published>2014-06-16T12:06:00.000-07:00</published><updated>2014-06-16T12:06:28.961-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="facebook hoax"/><category scheme="http://www.blogger.com/atom/ns#" term="facebook scams"/><category scheme="http://www.blogger.com/atom/ns#" term="internet scam"/><category scheme="http://www.blogger.com/atom/ns#" term="scams"/><title type='text'>‘Prayers for Likes’ Facebook Scam</title><content type='html'>Pictures of sick babies circulate through social media sites, especially through Facebook.&lt;br /&gt;
&lt;br /&gt;

These images are of sick children, less fortunate families, and persons with deformities.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.hyphenet.com/blog/prayers-likes-facebook-scam/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Facebook and Microsoft&quot; class=&quot;alignright wp-image-10075 size-medium&quot; height=&quot;198&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2013/06/facebook_microsoft-300x198.png&quot; title=&quot;Facebook and Microsoft&quot; width=&quot;300&quot; /&gt;&lt;/a&gt;&lt;br /&gt;

&lt;br /&gt;
Specifically, a sick baby with hospital equipment in the background 
which claims that liking the image equates to a prayer for the child 
while sharing equates to one hundred prayers.&lt;br /&gt;
&lt;br /&gt;

The disgraceful scam is designed to accumulate likes for a Facebook Page and promote the Page for more shares.&lt;br /&gt;
&lt;br /&gt;

The image of the baby was stolen from a personal Facebook profile and is being circulated without the baby’s parents permission.&lt;br /&gt;
&lt;br /&gt;

This is how most Facebook scams work.&amp;nbsp; Pictures are distributed and 
not authorized to be shared, then stolen from its rightful owners.&lt;br /&gt;
&lt;br /&gt;

Tragically, the baby in the picture passed away only two weeks after she was born.&lt;br /&gt;
&lt;br /&gt;

The message continued to circulate, causing great distress to the baby’s family.&lt;br /&gt;
&lt;br /&gt;

If you see messages like this on Facebook, please do not like or share it.&lt;br /&gt;
&lt;br /&gt;

&lt;h2&gt;
Analysis&lt;/h2&gt;
Like farming and sharing messages will not help the baby or the 
baby’s family in any way.&amp;nbsp; The message is just a tic in the long branch 
of sick baby hoaxes that falsely claim that you can help a baby by 
liking or sharing the message.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.hyphenet.com/blog/prayers-likes-facebook-scam/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;prayers-for-likes-facebook-scam&quot; class=&quot;alignleft wp-image-16370 size-medium&quot; height=&quot;300&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/06/prayers-for-likes-facebook-scam-1-225x300.jpg&quot; title=&quot;prayers-for-likes-facebook-scam&quot; width=&quot;225&quot; /&gt;&lt;/a&gt;&lt;br /&gt;

&lt;br /&gt;
Some messages claim that money will be donated in exchange for liking
 or sharing.&amp;nbsp; Others declare that liking and sharing equates to prayers 
for the child.&lt;br /&gt;
&lt;br /&gt;

The people who create these messages are driven by greed and selfishness.&lt;br /&gt;
&lt;br /&gt;

This precious baby passed away April 2014, just weeks after she was born.&lt;br /&gt;
&lt;br /&gt;

Whether or not you believe that prayers will help, the real intention of this scam is not pure.&lt;br /&gt;
&lt;br /&gt;

Facebook has removed some of these messages and continues to take them down in a timely manner.&lt;br /&gt;
&lt;br /&gt;

Although, there have been numerous reports, there are still some messages that continue to circulate with no action taken.&lt;br /&gt;
&lt;br /&gt;

If you see scams&amp;nbsp; like this, please report them to Facebook as soon as possible.&lt;br /&gt;
&lt;br /&gt;

Report a scam:&lt;br /&gt;
&lt;br /&gt;

&lt;a href=&quot;https://www.facebook.com/help/344403945636114/&quot; target=&quot;_blank&quot; title=&quot;Report a Facebook scam&quot;&gt;https://www.facebook.com/help/344403945636114/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;

&lt;a href=&quot;http://facecrooks.com/Internet-Safety-Privacy/How-to-report-a-Facebook-scam.html/&quot; target=&quot;_blank&quot; title=&quot;Facecrooks&quot;&gt;http://facecrooks.com/Internet-Safety-Privacy/How-to-report-a-Facebook-scam.html/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;

What Facebook scams have you come across lately?&amp;nbsp; Please share your 
experience and help us take control over these cruel messages.&lt;br /&gt;
&lt;br /&gt;

&lt;strong&gt;Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at &lt;a href=&quot;https://twitter.com/hyphenet&quot; target=&quot;_blank&quot;&gt;@hyphenet&lt;/a&gt;, &lt;a href=&quot;http://www.facebook.com/hyphenet&quot; target=&quot;_blank&quot;&gt;“Like” us&lt;/a&gt; on Facebook or add us to your circle on &lt;a href=&quot;https://plus.google.com/105656426700111853818/posts&quot;&gt;Google+&lt;/a&gt;.&lt;/strong&gt;&lt;br /&gt;

&lt;br /&gt;
&lt;strong&gt;References:&lt;/strong&gt;&lt;br /&gt;

&lt;br /&gt;
&lt;a href=&quot;http://www.hoax-slayer.com/prayers-for-likes-facebook-scam.shtml&quot; target=&quot;_blank&quot; title=&quot;Hoax-Slayer&quot;&gt;‘Prayers for Likes’ Facebook Sick Baby Scam – Hoax-Slayer&lt;br /&gt;
&lt;cite&gt;http://www.hoax-slayer.com/prayers-for-likes-facebook-scam.shtml&lt;/cite&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://hyphenet.blogspot.com/feeds/1496599703544165851/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hyphenet.blogspot.com/2014/06/prayers-for-likes-facebook-scam.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/1496599703544165851'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/1496599703544165851'/><link rel='alternate' type='text/html' href='http://hyphenet.blogspot.com/2014/06/prayers-for-likes-facebook-scam.html' title='‘Prayers for Likes’ Facebook Scam'/><author><name>Hyphenet</name><uri>http://www.blogger.com/profile/01596152977110049802</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4713815208755702246.post-9136801994129472534</id><published>2014-06-13T10:56:00.003-07:00</published><updated>2014-06-13T10:57:36.300-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="interactive tv"/><category scheme="http://www.blogger.com/atom/ns#" term="microsoft"/><category scheme="http://www.blogger.com/atom/ns#" term="tech history"/><category scheme="http://www.blogger.com/atom/ns#" term="tech news"/><category scheme="http://www.blogger.com/atom/ns#" term="time-warner"/><category scheme="http://www.blogger.com/atom/ns#" term="tv"/><title type='text'>This Day In Tech History: June 13, 2014</title><content type='html'>&lt;span class=&quot;edit-link&quot;&gt;&lt;/span&gt;                    
     
     &lt;br /&gt;
&lt;div class=&quot;entry-content&quot;&gt;
&lt;div class=&quot;wp-caption alignright&quot; id=&quot;attachment_16362&quot; style=&quot;width: 310px;&quot;&gt;
&lt;a href=&quot;http://www.hyphenet.com/blog/day-in-tech-history-june-13-2014/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;June 13, 1993:  Microsoft and Time-Warner Release Interactive TV&quot; class=&quot;wp-image-16362 size-full&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/06/ht_microsoft_cc_120823_wg1.jpg&quot; height=&quot;168&quot; title=&quot;microsoft&quot; width=&quot;300&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
In 1993, Microsoft teamed up with Tele-communications and Time Warner to begin the innovative “Interactive TV”.&lt;br /&gt;
&lt;br /&gt;
Consumers were able to purchase products right through the set during a show.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.hyphenet.com/blog/day-in-tech-history-june-13-2014/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;http://www.hyphenet.com/blog/day-in-tech-history-june-13-2014/&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6eNXBlFr-YlOKqREwjDaxUNaA7zvpQPVzXvBM2-0hDGVIdpZjcumUTuEag78Wm-wH34eOdwq7BrskA_a1VGS-fuM5vS5kGIiubj6T8mo2vcfo_gjCSdgRLswSwxmrf3MKHtaByiwmZe5U/s1600/tv-teddy.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
iTV would give users a Digital Set Top Box so the users could use and browse, then go back and continue to watch the video.&lt;br /&gt;
&lt;br /&gt;
The iTV connected to a telephone to let you know who is calling and also allowed you to receive a SMS.&lt;br /&gt;
&lt;br /&gt;
This has greatly influenced pop-culture.&amp;nbsp; The software allows consumers to bank, shop and surf the web.&lt;br /&gt;
Also, this day in history:&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Pioneer space probe crossed Neptune in 1983&lt;/li&gt;
&lt;li&gt;Series of Brazilian websites were hacked by Analysta in 2000&lt;/li&gt;
&lt;li&gt;2.4.21 of LINUX kernel was released in 2003&lt;/li&gt;
&lt;li&gt;Microsoft ceased development of IE or the Macintosh in 2003&lt;/li&gt;
&lt;li&gt;IE for MAC shut down in 2003&lt;/li&gt;
&lt;li&gt;Fedora Core 4 was released 2005&lt;/li&gt;
&lt;li&gt;Music piracy had been contained from file sharing in 2006&lt;/li&gt;
&lt;li&gt;Vincent Farrari tried to cancel his AOL account, but the agent refused to in 2006.&lt;/li&gt;
&lt;li&gt;Jeffrey Goodin is the first to be sentenced 70 months in jail 
because of the CAN-SPAM act.&amp;nbsp; He was posing as an AOL billing agent.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
We are again making history today with the “Super Moon” or the “Honey
 Moon”.&amp;nbsp; It is the only full moon at its closest to the earth on a 
Friday 13th until 2049.&amp;nbsp; We haven’t seen a moon like this in over 100 
yrs.&lt;br /&gt;
&lt;br /&gt;
The moon will look larger in the sky, sitting low on the horizon with a honey hue to it.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at &lt;a href=&quot;https://twitter.com/hyphenet&quot; target=&quot;_blank&quot;&gt;@hyphenet&lt;/a&gt;, &lt;a href=&quot;http://www.facebook.com/hyphenet&quot; target=&quot;_blank&quot;&gt;“Like” us&lt;/a&gt; on Facebook or add us to your circle on &lt;a href=&quot;https://plus.google.com/105656426700111853818/posts&quot;&gt;Google+&lt;/a&gt;.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;References:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Powers, Jeffrey&lt;br /&gt;
&lt;a class=&quot;broken_link&quot; href=&quot;http://www.dayintechhistory.com/&quot; target=&quot;_blank&quot; title=&quot;This Day In Tech History - Interactive Television from Microsoft&quot;&gt;June 13, 2014: Honey Moon, 1993: Interactive Television from Microsoft&lt;/a&gt;&lt;br /&gt;
&lt;cite&gt;http://www.dayintechhistory.com/&lt;/cite&gt;&lt;br /&gt;
&lt;i&gt;Published: June 13, 2014&lt;/i&gt;&lt;br /&gt;
&lt;span class=&quot;sd-text-color&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;yarpp-related&quot;&gt;
&lt;h3&gt;
Related posts:&lt;/h3&gt;
&lt;div class=&quot;yarpp-thumbnails-horizontal&quot;&gt;
&lt;a class=&quot;yarpp-thumbnail&quot; href=&quot;http://www.hyphenet.com/blog/windows-8-consumer-preview-is-out-download-poke-around-share-your-thoughts/&quot; title=&quot;Windows 8 Consumer Preview is Out: Download, Poke Around &amp;amp; Share Your Thoughts!&quot;&gt;
&lt;img alt=&quot;Windows 8&quot; class=&quot;attachment-yarpp-thumbnail wp-post-image&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2012/02/new-windows-8.jpg&quot; height=&quot;120&quot; width=&quot;120&quot; /&gt;&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;Windows 8 Consumer Preview is Out: Download, Poke Around &amp;amp; Share Your Thoughts!&lt;/span&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;yarpp-thumbnails-horizontal&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;yarpp-thumbnails-horizontal&quot;&gt;
&lt;a class=&quot;yarpp-thumbnail&quot; href=&quot;http://www.hyphenet.com/blog/microsoft-issues-worldwide-virus-alert/&quot; title=&quot;Microsoft Issues Worldwide Virus Alert&quot;&gt;&lt;img alt=&quot;virus3&quot; class=&quot;attachment-yarpp-thumbnail wp-post-image&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2013/05/virus3.jpg&quot; height=&quot;120&quot; width=&quot;120&quot; /&gt;&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;Microsoft Issues Worldwide Virus Alert&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;yarpp-thumbnails-horizontal&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;yarpp-thumbnails-horizontal&quot;&gt;
&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;&amp;nbsp;&lt;/span&gt;
&lt;a class=&quot;yarpp-thumbnail&quot; href=&quot;http://www.hyphenet.com/blog/windows-xp-ending-preparation/&quot; title=&quot;Windows XP is ending, are you prepared?&quot;&gt;
&lt;img alt=&quot;xp-support&quot; class=&quot;attachment-yarpp-thumbnail wp-post-image&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/03/xp-support-120x120.jpg&quot; height=&quot;120&quot; width=&quot;120&quot; /&gt;&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;Windows XP is ending, are you prepared?&lt;/span&gt;&lt;/a&gt;
&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;yarpp-thumbnails-horizontal&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;yarpp-thumbnails-horizontal&quot;&gt;
&lt;a class=&quot;yarpp-thumbnail&quot; href=&quot;http://www.hyphenet.com/blog/end-windows-xp-near/&quot; title=&quot;The End of Windows XP is Near!&quot;&gt;&lt;img alt=&quot;Update Software - Microsoft Windows XP&quot; class=&quot;attachment-yarpp-thumbnail wp-post-image&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2013/08/patch_tuesday_290x230_HEMERA_THINKSTOCK.jpg&quot; height=&quot;95&quot; width=&quot;120&quot; /&gt;&lt;span class=&quot;yarpp-thumbnail-title&quot;&gt;The End of Windows XP is Near!&lt;/span&gt;&lt;/a&gt;
&lt;/div&gt;
&lt;img alt=&quot;YARPP&quot; src=&quot;http://yarpp.org/pixels/a398802f50accaa367845b322f511c42&quot; /&gt;
&lt;/div&gt;
&lt;div class=&quot;entry-utility&quot;&gt;
This entry was posted in &lt;a href=&quot;http://www.hyphenet.com/blog/category/news/&quot; rel=&quot;category tag&quot; title=&quot;View all posts in news&quot;&gt;news&lt;/a&gt; and tagged &lt;a href=&quot;http://www.hyphenet.com/blog/tag/microsoft/&quot; rel=&quot;tag&quot;&gt;microsoft&lt;/a&gt;. &lt;br /&gt;
Follow any comments here with the &lt;a href=&quot;http://www.hyphenet.com/blog/day-in-tech-history-june-13-2014/feed/&quot; rel=&quot;alternate&quot; title=&quot;Comments RSS to This Day In Tech History:  June 13, 2014&quot; type=&quot;application/rss+xml&quot;&gt;RSS feed for this post&lt;/a&gt;.
          &lt;a class=&quot;comment-link&quot; href=&quot;http://www.hyphenet.com/blog/day-in-tech-history-june-13-2014/#respond&quot; title=&quot;Post a comment&quot;&gt;Post a comment&lt;/a&gt; or leave a trackback: &lt;a class=&quot;trackback-link&quot; href=&quot;http://www.hyphenet.com/blog/day-in-tech-history-june-13-2014/trackback/&quot; rel=&quot;trackback&quot; title=&quot;Trackback URL for your post&quot;&gt;Trackback URL&lt;/a&gt;.          
     &lt;span class=&quot;edit-link&quot;&gt;&lt;a class=&quot;post-edit-link&quot; href=&quot;http://www.hyphenet.com/blog/wp-admin/post.php?post=16354&amp;amp;action=edit&quot;&gt;Edit&lt;/a&gt;&lt;/span&gt;                &lt;/div&gt;
&lt;div class=&quot;navigation&quot; id=&quot;nav-below&quot;&gt;
&lt;a href=&quot;http://www.hyphenet.com/blog/half-u-s-adults-hacked-one/&quot; rel=&quot;prev&quot;&gt;&lt;span class=&quot;meta-nav&quot;&gt;«&lt;/span&gt; Half of U.S. Adults have been hacked:  Are you one of them?&lt;/a&gt; 
                         
    &lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hyphenet.blogspot.com/feeds/9136801994129472534/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hyphenet.blogspot.com/2014/06/this-day-in-tech-history-june-13-2014.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/9136801994129472534'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/9136801994129472534'/><link rel='alternate' type='text/html' href='http://hyphenet.blogspot.com/2014/06/this-day-in-tech-history-june-13-2014.html' title='This Day In Tech History: June 13, 2014'/><author><name>Hyphenet</name><uri>http://www.blogger.com/profile/01596152977110049802</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6eNXBlFr-YlOKqREwjDaxUNaA7zvpQPVzXvBM2-0hDGVIdpZjcumUTuEag78Wm-wH34eOdwq7BrskA_a1VGS-fuM5vS5kGIiubj6T8mo2vcfo_gjCSdgRLswSwxmrf3MKHtaByiwmZe5U/s72-c/tv-teddy.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4713815208755702246.post-317035221692243269</id><published>2014-06-10T16:17:00.000-07:00</published><updated>2014-06-10T16:17:49.767-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer Security"/><category scheme="http://www.blogger.com/atom/ns#" term="computer security news"/><category scheme="http://www.blogger.com/atom/ns#" term="fraud"/><category scheme="http://www.blogger.com/atom/ns#" term="identity theft"/><category scheme="http://www.blogger.com/atom/ns#" term="privacy concern"/><category scheme="http://www.blogger.com/atom/ns#" term="scams"/><title type='text'>Half of U.S. Adults have been hacked: Are you one of them?</title><content type='html'>&lt;span class=&quot;edit-link&quot;&gt;&lt;/span&gt;                    
     
     &lt;br /&gt;
&lt;div class=&quot;entry-content&quot;&gt;
          
&lt;a href=&quot;http://www.hyphenet.com/blog/half-u-s-adults-hacked-one/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;identity-theft&quot; class=&quot;alignright wp-image-16346 size-medium&quot; height=&quot;300&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/06/identity-theft-300x300.png&quot; title=&quot;identity-theft&quot; width=&quot;300&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
AARP has estimated, nearly half of all adult Americans have been 
hacked in the past year.&amp;nbsp; The Better Business Bureau said 1 in 5 of all 
victims are college students or in their twenties.&lt;br /&gt;
&lt;br /&gt;
Identity theft is exponentially rising while users aren’t realizing the true risk that is posed.&lt;br /&gt;
&lt;br /&gt;

Roughly, 432 million online accounts that belong to 110 million 
Americans, which are half of all adults were hacked in cyber-attacks in 
the past year.&lt;br /&gt;
&lt;br /&gt;

&lt;em&gt;Consumer Reports&lt;/em&gt; estimates that 11 million Americans were victimized from email scams in 2013.&lt;br /&gt;
&lt;br /&gt;

This year alone, there have been 260 breaches that have occurred in 
health facilities, exposing the sensitive data of 8 million people.&lt;br /&gt;
&lt;br /&gt;

Could this be from health care facilities still using Microsoft 
Windows XP?&amp;nbsp; The software is no longer supported and vulnerable to 
zero-day exploits.&lt;br /&gt;
&lt;br /&gt;

From coffee shops to corporate networks, grocery stores to airports, two-thirds of surfers have nothing to protect themselves.&lt;br /&gt;
&lt;br /&gt;

AARP has launched &lt;a href=&quot;http://www.aarp.org/money/scams-fraud/fraud-watch-network/?cmp=RDRCT-FRDWCHNET_SEPT17_013&quot; target=&quot;_blank&quot; title=&quot;AARP - Fraud Watch&quot;&gt;Fraud Watch Network&lt;/a&gt;, where you can get access to information about how to protect yourself and stay alert on the latest tricks and scams.&lt;br /&gt;
&lt;br /&gt;

&lt;strong&gt;The best ways to safeguard your personal data are:&lt;/strong&gt;&lt;br /&gt;

&lt;ol&gt;
&lt;li&gt;Don’t share if you don’t have to&lt;/li&gt;
&lt;li&gt;Monitor your finances&lt;/li&gt;
&lt;li&gt;Protect your electronic devices and accounts&lt;/li&gt;
&lt;li&gt;Leave a paper trail&lt;/li&gt;
&lt;li&gt;Don’t trust everyone&lt;/li&gt;
&lt;/ol&gt;
Studies have shown that from the ages of 18 to 24, in the average of 
132 days, they’ve been scammed.&lt;br /&gt;
&amp;nbsp;&lt;br /&gt;
That’s five times larger than the 
national average.&lt;br /&gt;
&lt;br /&gt;

This goes to show why university computers are popular targets for cyber-criminals.&lt;br /&gt;
&lt;br /&gt;

This year nearly 840,000 private records were exposed in breach 
attacks in at least 12 universities.&lt;br /&gt;
&amp;nbsp;&lt;br /&gt;
Universities affected are: 
University of Maryland, Indiana University, Johns Hopkins University, 
Iowa State, University of Minnesota, Auburn University College of 
Business, University of Wisconsin, Loyola Law School and North Dakota 
University.&lt;br /&gt;
&lt;br /&gt;

Also, there were 5,000 records hacked in 10 data breaches of 
financial institutions, according to the Identity Theft Resource Center.&lt;br /&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.hyphenet.com/blog/half-u-s-adults-hacked-one/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot; AARP&quot; class=&quot;alignright size-full wp-image-16347&quot; height=&quot;136&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/06/AARP.gif&quot; width=&quot;270&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;strong&gt;Reducing identity theft includes:&lt;/strong&gt;&lt;br /&gt;

&lt;ul&gt;
&lt;li&gt;Monitoring financing accounts&lt;/li&gt;
&lt;li&gt;Keeping checkbooks and statements&lt;/li&gt;
&lt;li&gt;Securely storing computers and all devices&lt;/li&gt;
&lt;li&gt;Avoiding Wi-Fi networks when shopping online&lt;/li&gt;
&lt;li&gt;Reading reviews before installing apps&lt;/li&gt;
&lt;li&gt;Decline free game downloads, music, and screen savers&lt;/li&gt;
&lt;li&gt;Adjust privacy settings for your social network sites&lt;/li&gt;
&lt;li&gt;Use credit cards instead of debit cards for liability protection&lt;/li&gt;
&lt;li&gt;Shredding solicitations for pre-approved credit cards&lt;/li&gt;
&lt;/ul&gt;
You can opt out of certain solicitations at &lt;a href=&quot;https://www.optoutprescreen.com/opt_form.cgi&quot; target=&quot;_blank&quot; title=&quot;OptOutPrescreen.com&quot;&gt;https://www.optoutprescreen.com&lt;/a&gt;&lt;br /&gt;

&lt;br /&gt;
For information on other scams, sign up for the &lt;a href=&quot;http://www.aarp.org/money/scams-fraud/fraud-watch-network/?cmp=RDRCT-FRDWCHNET_SEPT17_013&quot; target=&quot;_blank&quot; title=&quot;AARP - Fraud Watch Network&quot;&gt;Fraud Watch Network&lt;/a&gt;.&lt;br /&gt;

&lt;br /&gt;
&lt;strong&gt;Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at &lt;a href=&quot;https://twitter.com/hyphenet&quot; target=&quot;_blank&quot;&gt;@hyphenet&lt;/a&gt;, &lt;a href=&quot;http://www.facebook.com/hyphenet&quot; target=&quot;_blank&quot;&gt;“Like” us&lt;/a&gt; on Facebook or add us to your circle on &lt;a href=&quot;https://plus.google.com/105656426700111853818/posts&quot;&gt;Google+&lt;/a&gt;.&lt;/strong&gt;&lt;br /&gt;

&lt;br /&gt;
&lt;strong&gt;References:&lt;/strong&gt;&lt;br /&gt;

&lt;br /&gt;
Kirchheimer, Sid&lt;br /&gt;
&lt;a href=&quot;http://blog.aarp.org/2014/06/06/half-of-u-s-adults-hacked-are-you-among-them/&quot; target=&quot;_blank&quot; title=&quot;AARP Blog - Half of Adults Hacked&quot;&gt;Half of U.S. Adults Hacked: Are You Among Them? – AARP Blog&lt;/a&gt;&lt;br /&gt;
&lt;cite&gt;http://blog.aarp.org/2014/06/06/half-of-u-s-adults-hacked-are-you-among-them/&lt;/cite&gt;&lt;br /&gt;
&lt;i&gt;June 6, 2014&lt;/i&gt;&lt;br /&gt;

&lt;br /&gt;
Kirchheimer, Sid&lt;br /&gt;
&lt;a href=&quot;http://blog.aarp.org/2014/05/16/college-students-ideal-for-id-theft/?intcmp=AE-BLIL-BL&quot; target=&quot;_blank&quot; title=&quot;AARP Blog - College Students Identity Theft&quot;&gt;College Students: Ideal for ID Theft – AARP Blog&lt;/a&gt;&lt;br /&gt;
&lt;cite&gt;http://blog.aarp.org/2014/05/16/college-students-ideal-for-id-theft…&lt;/cite&gt;</content><link rel='replies' type='application/atom+xml' href='http://hyphenet.blogspot.com/feeds/317035221692243269/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hyphenet.blogspot.com/2014/06/half-of-us-adults-have-been-hacked-are.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/317035221692243269'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/317035221692243269'/><link rel='alternate' type='text/html' href='http://hyphenet.blogspot.com/2014/06/half-of-us-adults-have-been-hacked-are.html' title='Half of U.S. Adults have been hacked: Are you one of them?'/><author><name>Hyphenet</name><uri>http://www.blogger.com/profile/01596152977110049802</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4713815208755702246.post-5556757351239079216</id><published>2014-06-09T11:11:00.000-07:00</published><updated>2014-06-09T11:11:29.873-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer security news"/><category scheme="http://www.blogger.com/atom/ns#" term="heartbleed attack"/><category scheme="http://www.blogger.com/atom/ns#" term="open source"/><category scheme="http://www.blogger.com/atom/ns#" term="OpenSSL"/><title type='text'>More Bugs Found in OpenSSL Security Tool</title><content type='html'>&lt;span class=&quot;edit-link&quot;&gt;&lt;/span&gt;                    
     
     &lt;br /&gt;
&lt;div class=&quot;entry-content&quot;&gt;
          
&lt;a href=&quot;http://www.hyphenet.com/blog/bugs-found-openssl-security-tool/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;OpenSSL&quot; class=&quot;alignright wp-image-16339 size-full&quot; height=&quot;170&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/06/openssl-170.png&quot; title=&quot;OpenSSL&quot; width=&quot;170&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
There have been six more bugs found in the widely used OpenSSL security tool.&lt;br /&gt;
&lt;br /&gt;
OpenSSL is a security tool that houses computer programs to enable security over the public Internet.&lt;br /&gt;
&lt;br /&gt;

OpenSSL is used in shared consumer applications, like software in Google’s Android smartphones.&lt;br /&gt;
&lt;br /&gt;

With the Heartbleed vulnerability in OpenSSL,&amp;nbsp; the new publicity had 
system administrators rushing to update their systems to protect against
 it.&lt;br /&gt;
&lt;br /&gt;

Computer administrators everywhere have frowned upon six new security
 issues that were recently found in the OpenSSL security library.&lt;br /&gt;
&lt;br /&gt;

For example: if you see “https://” in your URL bar, it&amp;nbsp; indicates that the connection is secure.&lt;br /&gt;
&lt;br /&gt;

The server computer at the other end of the connection is using OpenSSL to provide security.&lt;br /&gt;

The two main forms of security are:&lt;br /&gt;

&lt;ol&gt;
&lt;li&gt;It scrambles information so it is unreadable to anyone other than the intended recipient&lt;/li&gt;
&lt;li&gt;It authenticates the source of information, ensuring the sender is who they say they are&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;
&amp;nbsp;&lt;/h2&gt;
&lt;h2&gt;
How to protect yourself&lt;/h2&gt;
&lt;a href=&quot;http://www.hyphenet.com/blog/bugs-found-openssl-security-tool/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;OpenSSL-Vulnerability&quot; class=&quot;alignleft wp-image-16340&quot; height=&quot;134&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/06/OpenSSL-Vulnerability-Susceptible-to-Man-in-the-Middle-Attack-and-Other-Bugs-300x200.jpg&quot; title=&quot;OpenSSL-Vulnerability&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Most won’t have to take any kind of action in response to the OpenSSL attack.&lt;br /&gt;
&lt;br /&gt;

Non-browser client applications such as music players and chat programs will need to be immediately updated.&lt;br /&gt;
&lt;br /&gt;

Distributors of Linux, which uses OpenSSL more openly, have already received issued updates.&lt;br /&gt;
&lt;br /&gt;

If you haven’t already reset all your passwords due to the Heartbleed bug, it is the perfect time to do so.&lt;br /&gt;
&lt;br /&gt;

Major service providers will inform you if it is necessary to reset your password.&lt;br /&gt;
&lt;br /&gt;

Websites that are affected, may be unavailable for a short period of 
time.&amp;nbsp; This allows the fixed versions of OpenSSL to be installed by 
their system administrators.&lt;br /&gt;
&lt;br /&gt;

There will most likely be more flaws discovered in OpenSSL.&amp;nbsp; Password
 resets, and software updates are becoming more of a habit with 
increased internet usage.&lt;br /&gt;
&lt;br /&gt;

Delay no more, secure yourself and reset all your passwords.&lt;br /&gt;
&lt;br /&gt;

&lt;strong&gt;Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at &lt;a href=&quot;https://twitter.com/hyphenet&quot; target=&quot;_blank&quot;&gt;@hyphenet&lt;/a&gt;, &lt;a href=&quot;http://www.facebook.com/hyphenet&quot; target=&quot;_blank&quot;&gt;“Like” us&lt;/a&gt; on Facebook or add us to your circle on &lt;a href=&quot;https://plus.google.com/105656426700111853818/posts&quot;&gt;Google+&lt;/a&gt;.&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;

&lt;strong&gt;References:&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;

Merkel, Robert&lt;br /&gt;
&lt;a href=&quot;http://www.homelandsecuritynewswire.com/dr20140609-six-more-bugs-found-in-popular-openssl-security-tool?page=0,0&quot; target=&quot;_blank&quot; title=&quot;Homeland Security News Wire&quot;&gt;Six more bugs found in popular OpenSSL security tool – Homeland Security News Wire&lt;/a&gt;&lt;br /&gt;
&lt;cite&gt;http://www.homelandsecuritynewswire.com/dr20140609-six-more-bugs-found…&lt;/cite&gt;&lt;br /&gt;
&lt;i&gt;Published: June 9, 2014&lt;/i&gt;</content><link rel='replies' type='application/atom+xml' href='http://hyphenet.blogspot.com/feeds/5556757351239079216/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hyphenet.blogspot.com/2014/06/more-bugs-found-in-openssl-security-tool.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/5556757351239079216'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/5556757351239079216'/><link rel='alternate' type='text/html' href='http://hyphenet.blogspot.com/2014/06/more-bugs-found-in-openssl-security-tool.html' title='More Bugs Found in OpenSSL Security Tool'/><author><name>Hyphenet</name><uri>http://www.blogger.com/profile/01596152977110049802</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4713815208755702246.post-8686048620659505773</id><published>2014-06-05T12:20:00.000-07:00</published><updated>2014-06-05T12:20:10.461-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer Security"/><category scheme="http://www.blogger.com/atom/ns#" term="computer security news"/><category scheme="http://www.blogger.com/atom/ns#" term="heartbleed attack"/><category scheme="http://www.blogger.com/atom/ns#" term="Heartbleed Bug"/><category scheme="http://www.blogger.com/atom/ns#" term="internet security"/><title type='text'>Within the Heartbleed Bug</title><content type='html'>Only a few months ago, the &lt;a href=&quot;http://gizmodo.com/how-heartbleed-works-the-code-behind-the-internets-se-1561341209&quot; target=&quot;_blank&quot; title=&quot;Heartbleed Open SSL&quot;&gt;Hearbleed OpenSSL&lt;/a&gt; bug was discovered.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.hyphenet.com/blog/within-the-heartbleed-bug/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;heartbleed-openssl-bug&quot; class=&quot;alignright wp-image-16035 size-medium&quot; height=&quot;155&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/04/heartbleed-openssl-bug-300x155.jpg&quot; title=&quot;heartbleed-openssl-bug&quot; width=&quot;300&quot; /&gt;&lt;/a&gt;&lt;br /&gt;

&lt;br /&gt;
We are still learning about the countless encrypted transactions that left your accounts vulnerable to theft.&lt;br /&gt;

When computers talk to each other, it is called a heartbeat.&amp;nbsp; Because of a coding mistake, the Heartbleed bug was born.&lt;br /&gt;
&lt;br /&gt;

Lets say there is a banking transaction:&amp;nbsp; The client (you) sends its 
heartbeat to the server (your bank) and the server hands it back to 
you.&amp;nbsp; So if something goes wrong with the transaction, the other party 
will know because the heartbeats get out of sync.&lt;br /&gt;
&lt;br /&gt;

It’s like a cassette tape breaking because one of the spindles stopped working correctly.&lt;br /&gt;
&lt;br /&gt;

&lt;h2&gt;
How it happened&lt;/h2&gt;
The actual breach happened all because of the following code:&lt;br /&gt;

&lt;blockquote&gt;
memcpy(bp, pl, payload);&lt;/blockquote&gt;
To explain, the &lt;strong&gt;memcpy&lt;/strong&gt; is a command that copies 
data, and it requires three pieces of information to do so.&amp;nbsp;&lt;br /&gt;
The first 
set of information is the destination of where the data needs to be 
copied.&amp;nbsp; The second is the exact location of the data that needs to be 
copied.&amp;nbsp; The third set is the amount of data the computer is going to 
find when it goes to make the copy.&lt;br /&gt;
&lt;br /&gt;

&lt;a href=&quot;http://www.hyphenet.com/blog/within-the-heartbleed-bug/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;OpenSSL Heartbleed&quot; class=&quot;width: 600px; alignleft&quot; height=&quot;220&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/Heartbleed-written-in-C-v2.jpg&quot; title=&quot;OpenSSL Heartbleed&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;br /&gt;

&lt;br /&gt;
The &lt;strong&gt;bp&lt;/strong&gt; is a place on the server computer, &lt;strong&gt;pl&lt;/strong&gt; is where the actual data the client sent as a heartbeat is, and &lt;strong&gt;payload&lt;/strong&gt; is the number that says how big &lt;strong&gt;pl&lt;/strong&gt; is.&lt;br /&gt;
&lt;br /&gt;

The&lt;strong&gt; bp&lt;/strong&gt;, which is where the data is going to be 
copied, is full of the data sitting in the part of the computer before.&amp;nbsp;
 Although, the computer treats it as if it were empty because the data 
has been marked for deletion.&lt;br /&gt;
&lt;br /&gt;

When &lt;strong&gt;memcpy&lt;/strong&gt; takes the data from &lt;strong&gt;pl&lt;/strong&gt; and puts it in &lt;strong&gt;bp&lt;/strong&gt;, it covers up all the old data in&lt;strong&gt; bp&lt;/strong&gt;.&lt;br /&gt;
&lt;br /&gt;

Everything that used to be in &lt;strong&gt;bp&lt;/strong&gt; is destroyed and filled up with the&lt;strong&gt; pl&lt;/strong&gt; data.&lt;br /&gt;
&lt;br /&gt;

If payload says that &lt;strong&gt;pl&lt;/strong&gt; is 64 KB but it only has 0 KB,&amp;nbsp; &lt;strong&gt;memcpy&lt;/strong&gt; creates a 64 KB sized open space at&lt;strong&gt; bp&lt;/strong&gt; that’s full of garbage data.&amp;nbsp; None of the &lt;strong&gt;bp&lt;/strong&gt; old data gets overwritten because there’s nothing to replace it since &lt;strong&gt;pl&lt;/strong&gt; is actually empty.&lt;br /&gt;
&lt;br /&gt;

Meaning whatever old data was sitting in bp prior to the heartbeat 
gets passed back to the client.&amp;nbsp; Sometimes the data is irrelevant and 
sometimes its your banking password.&lt;br /&gt;
&lt;br /&gt;

The Heartbleed bug has been fixed but the vulnerability has existed for a decade.&amp;nbsp; Who knows how much data was exploited.&lt;br /&gt;
&lt;br /&gt;

Do you have maximum protection on your PC?&amp;nbsp; Is your antivirus 
out-of-date?&amp;nbsp; Let us help you protect yourself from the many 
vulnerabilities that live on the net.&amp;nbsp; [P] 619-325-0990&lt;br /&gt;
&lt;br /&gt;

&lt;strong&gt;Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at &lt;a href=&quot;https://twitter.com/hyphenet&quot; target=&quot;_blank&quot;&gt;@hyphenet&lt;/a&gt;, &lt;a href=&quot;http://www.facebook.com/hyphenet&quot; target=&quot;_blank&quot;&gt;“Like” us&lt;/a&gt; on Facebook or add us to your circle on &lt;a href=&quot;https://plus.google.com/105656426700111853818/posts&quot;&gt;Google+&lt;/a&gt;.&lt;/strong&gt;&lt;br /&gt;

&lt;br /&gt;

&lt;strong&gt;References:&lt;/strong&gt;&lt;br /&gt;

&lt;br /&gt;
Aguilar, Mario&lt;br /&gt;
&lt;a href=&quot;http://gizmodo.com/internet-vulnerability-left-encrypted-data-exposed-for-1586558051&quot; target=&quot;_blank&quot; title=&quot;Gizmodo - Internet Vulnerability Left Encrypted Data Exposed for 10 Years&quot;&gt;Internet Vulnerability Left Encrypted Data Exposed For 10 Years – GIZMODO&lt;/a&gt;&lt;br /&gt;
&lt;cite&gt;http://gizmodo.com/internet-vulnerability-left-encrypted-data-exposed…&lt;/cite&gt;&lt;br /&gt;
&lt;i&gt;Published: June 5, 2014&lt;/i&gt;&lt;br /&gt;

&lt;br /&gt;
Limer, Eric&lt;br /&gt;
&lt;a href=&quot;http://gizmodo.com/how-heartbleed-works-the-code-behind-the-internets-se-1561341209&quot; target=&quot;_blank&quot; title=&quot;Gizmodo - How Heartbleed Works&quot;&gt;How Heartbleed Works: The Code Behind the Internet’s Security Nightmare – GIZMODO&lt;/a&gt;&lt;br /&gt;
&lt;cite&gt;http://gizmodo.com/how-heartbleed-works-the-code-behind-the-internets-se…&lt;/cite&gt;</content><link rel='replies' type='application/atom+xml' href='http://hyphenet.blogspot.com/feeds/8686048620659505773/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hyphenet.blogspot.com/2014/06/within-heartbleed-bug.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/8686048620659505773'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/8686048620659505773'/><link rel='alternate' type='text/html' href='http://hyphenet.blogspot.com/2014/06/within-heartbleed-bug.html' title='Within the Heartbleed Bug'/><author><name>Hyphenet</name><uri>http://www.blogger.com/profile/01596152977110049802</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4713815208755702246.post-2256546609591764470</id><published>2014-06-02T12:21:00.001-07:00</published><updated>2014-06-02T12:21:15.894-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="google"/><category scheme="http://www.blogger.com/atom/ns#" term="identity theft"/><category scheme="http://www.blogger.com/atom/ns#" term="information technology"/><category scheme="http://www.blogger.com/atom/ns#" term="tech industry"/><category scheme="http://www.blogger.com/atom/ns#" term="website security"/><title type='text'>Request for Google to remove links about you</title><content type='html'>&lt;a href=&quot;http://www.hyphenet.com/blog/google-remove-links-about-you/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;google-links&quot; class=&quot;aligncenter wp-image-16326 size-full&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/06/google-links.jpg&quot; height=&quot;217&quot; title=&quot;google-links&quot; width=&quot;543&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Have you ever searched for your name on Google and saw just how easy 
it is for people to find out personal information about you?&lt;br /&gt;
&lt;br /&gt;
Do you have personal information on the web that you would like deleted or hidden from Joe Schmo trying to find out about you?&lt;br /&gt;
&lt;br /&gt;
Google has created an &lt;a href=&quot;https://support.google.com/legal/contact/lr_eudpa?product=websearch&amp;amp;hl=en&quot; target=&quot;_blank&quot; title=&quot;Google Online Form to Remove Links&quot;&gt;online form&lt;/a&gt; in which you can ask for the links to your personal data or posts to be removed from search results.&lt;br /&gt;
&lt;br /&gt;
This form is a response to a European Commission ruling that people have “the right to be forgotten” online.&lt;br /&gt;
&lt;br /&gt;
The EC has administered for Google to stop linking to anything that’s
 “inadequate, irrelevant or no longer relevant, or excessive in relation
 to the purposes for which they were processed.”&lt;br /&gt;
&lt;br /&gt;
The landmark privacy decision by the European Union Court of Justice 
emerged from a number of cases coming from the Spanish data protection 
authority in 2011.&lt;br /&gt;
&lt;br /&gt;
This ruling applies across the EU, among those are web giants Google and Facebook.&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;
Clearing Your Name&lt;/h2&gt;
When you submit links that you would like to be removed, Google says it will,&lt;br /&gt;
&lt;blockquote&gt;
“assess each individual request and attempt to balance 
the privacy rights of the individual with the public’s right to know and
 distribute information.”&lt;/blockquote&gt;
A statement provided to CNET by Google, Floridi called the move “an 
exciting initiative, which will probably require some hard and rather 
philosophical thinking.”&lt;br /&gt;
&lt;br /&gt;
Google has pledged to consider whether or not there is public 
interest in information about financial scams, professional malpractice,
 criminal convictions, and public conduct or government officials.&lt;br /&gt;
&lt;br /&gt;
In order to ask for links to be removed, you have to supply the URL 
and request, provide your name, contact email address, and a copy of a 
photo ID.&lt;br /&gt;
&lt;br /&gt;
You may put in a request on the behalf of another person, like a 
spouse, or an associate, to have their name removed from a link.&lt;br /&gt;
&lt;br /&gt;
Once Google has reviewed your request and have removed the link, it 
will disappear from Google search results in all site across the EU.&lt;br /&gt;
&lt;br /&gt;
There is a statement saying, Google’s lawyers are arguing that 
applying the EU ruling to US publications in Google’s US search results 
would be “absurd”.&lt;br /&gt;
&lt;br /&gt;
So by deleting your name from the EU, are you really being deleted from the net?&lt;br /&gt;
&amp;nbsp;For more information, view this EU podcast below:&lt;br /&gt;
&lt;br /&gt;
&lt;iframe allowfullscreen=&quot;allowfullscreen&quot; frameborder=&quot;0&quot; height=&quot;270&quot; seamless=&quot;seamless&quot; src=&quot;http://www.cnet.com/videos/share/id/L9Cny0uTQ_2uHk_U_NOcWlkIFRkASApN/&quot; width=&quot;480&quot;&gt;&lt;/iframe&gt;
&lt;br /&gt;
&lt;b&gt;Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at &lt;a href=&quot;https://twitter.com/hyphenet&quot; target=&quot;_blank&quot;&gt;@hyphenet&lt;/a&gt;, &lt;a href=&quot;http://www.facebook.com/hyphenet&quot; target=&quot;_blank&quot;&gt;“Like” us&lt;/a&gt; on Facebook or add us to your circle on &lt;a href=&quot;https://plus.google.com/105656426700111853818/posts&quot;&gt;Google+&lt;/a&gt;.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;References:&lt;/b&gt;&lt;br /&gt;
Published by Trenholm, Rich&lt;br /&gt;
&lt;a href=&quot;http://www.cnet.com/news/you-can-now-ask-google-to-remove-links-about-you/&quot; target=&quot;_blank&quot; title=&quot;C|Net - Ask Google to Remove Links about you&quot;&gt;You can now ask Google to remove links about you – C|Net&lt;/a&gt;&lt;br /&gt;
&lt;cite&gt;http://www.cnet.com/news/you-can-now-ask-google-to-remove-links-about-you/&lt;/cite&gt;</content><link rel='replies' type='application/atom+xml' href='http://hyphenet.blogspot.com/feeds/2256546609591764470/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hyphenet.blogspot.com/2014/06/request-for-google-to-remove-links.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/2256546609591764470'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/2256546609591764470'/><link rel='alternate' type='text/html' href='http://hyphenet.blogspot.com/2014/06/request-for-google-to-remove-links.html' title='Request for Google to remove links about you'/><author><name>Hyphenet</name><uri>http://www.blogger.com/profile/01596152977110049802</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4713815208755702246.post-7444601703700314635</id><published>2014-05-29T09:00:00.000-07:00</published><updated>2014-05-29T09:00:22.020-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer Security"/><category scheme="http://www.blogger.com/atom/ns#" term="computer security news"/><category scheme="http://www.blogger.com/atom/ns#" term="password security"/><category scheme="http://www.blogger.com/atom/ns#" term="passwords"/><title type='text'>eBay Breach: Password Reset Issues</title><content type='html'>There are 145 million people affected by the security breach from the Internet giant eBay.
&lt;br /&gt;
&lt;h2&gt;
Dumping the Data&lt;span class=&quot;edit-link&quot;&gt;&lt;/span&gt;                    
     
     &lt;/h2&gt;
&lt;div class=&quot;entry-content&quot;&gt;
          
&lt;a href=&quot;http://www.hyphenet.com/blog/ebay-breach-password-reset-issues/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;EbayHackPasswordChange&quot; class=&quot;alignright wp-image-16310 size-medium&quot; height=&quot;180&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/EbayHackPasswordChange1-300x180.jpg&quot; title=&quot;EbayHackPasswordChange&quot; width=&quot;300&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
When a catastrophic event happens, cyber-criminals come out from the shadows and lurk on their pray…YOU!&lt;br /&gt;
&lt;br /&gt;

It has been stated that&amp;nbsp; eBay’s database and is on the market and priced for 1.45 bitcoin.&lt;br /&gt;
&lt;br /&gt;

The claimed offer is for sale via anonymous text file site &lt;a href=&quot;http://pastebin.com/&quot; target=&quot;_blank&quot; title=&quot;Pastebin&quot;&gt;Pastebin&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;

It is likely that the data is not from the recent eBay data breach but possibly from another source.&lt;br /&gt;
&lt;br /&gt;

The hacker provided a 3,000-row extract from a database with 
Asian-Pacific user names, addresses, phone numbers and their DOB.&amp;nbsp; This 
equals to about 145 million users.&lt;br /&gt;
&lt;br /&gt;

The users are shown in the sample would represent an odd subset of users for an international company like eBay.&lt;br /&gt;
&lt;br /&gt;

Even if the sample is not from the eBay breach, it could potentially be data from another major company’s leak.&lt;br /&gt;
&lt;br /&gt;

Or it could be fake, and just another cyber-criminal trading for bitcoin on the blackmarket.&lt;br /&gt;

&lt;h3&gt;
Did you receive a notice?&lt;/h3&gt;
Many reports from worried eBay users says eBay has not yet sent them 
an email about the issue.&amp;nbsp; There is no notification when you go to 
eBay.com or any kind of warning about the breach.&lt;br /&gt;
&lt;br /&gt;

There was a notification after the user tries to reset their password which urges users to create a new one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;

&lt;a href=&quot;http://www.hyphenet.com/blog/ebay-breach-password-reset-issues/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;ebay-password&quot; class=&quot;aligncenter wp-image-16309 size-full&quot; height=&quot;208&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/ebay-password.jpg&quot; title=&quot;ebay-password&quot; width=&quot;662&quot; /&gt;&lt;/a&gt;&lt;br /&gt;

&lt;br /&gt;
&lt;br /&gt;
It is common for websites to put a banner or notification on their 
site after a breach.&amp;nbsp; Notifications urging their users to change 
passwords, even when the theft is only of encrypted (and properly salted
 and hashed) passwords.&lt;br /&gt;
&lt;br /&gt;

The reason why eBay hasn’t done the same, is a mystery…&lt;br /&gt;

&lt;h3&gt;
&amp;nbsp;&lt;/h3&gt;
&lt;h3&gt;
Beef up the password&lt;/h3&gt;
If you haven’t already done so, create a strong, unique password for your account.&lt;br /&gt;

Make sure you can remember it but nobody else will be able to guess it.&lt;br /&gt;
&lt;br /&gt;

eBay unlike many others, allows short 6 character passwords.&amp;nbsp; &lt;a href=&quot;http://www.hyphenet.com/blog/is-password-protection-not-a-big-deal-to-you/&quot; target=&quot;_blank&quot; title=&quot;Hyphenet - Strong Passwords&quot;&gt;The suggested amount of characters is at least 8.&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;

eBay does require a mix of characters with upper, lower, number and a symbol.&amp;nbsp; Try and use a combination of them all.&lt;br /&gt;
&lt;br /&gt;

The following passwords are rated as “medium” allowing users to use these as passwords:&lt;br /&gt;

&lt;ul&gt;
&lt;li&gt;Password1&lt;/li&gt;
&lt;li&gt;MyH0us3&lt;/li&gt;
&lt;li&gt;Iloveyou!&lt;/li&gt;
&lt;li&gt;!2345@&lt;/li&gt;
&lt;/ul&gt;
You see how these passwords still have a combination of characters and numbers, although they are still quite easy to guess.&lt;br /&gt;
&lt;br /&gt;

This is why it is so important to &lt;a href=&quot;http://www.hyphenet.com/blog/long-passwords/&quot; target=&quot;_blank&quot; title=&quot;Hyphenet - Long Passwords&quot;&gt;create a strong, secure password&lt;/a&gt; at least 8 characters long.&lt;br /&gt;

&lt;h4&gt;
De-link PayPal&lt;/h4&gt;
Since eBay owns PayPal, they suggest users to link their PayPal account to their eBay account.&lt;br /&gt;
&lt;br /&gt;

Since the breach, if you have followed their suggestion, you may want to rethink your choice.&lt;br /&gt;
&lt;br /&gt;

If you un-link PayPal from eBay account, you can still pay with your PayPal account at any time.&lt;br /&gt;
&lt;br /&gt;

Linked accounts provide cyber-criminals with an easy way to gather a variety of data.&lt;br /&gt;
&lt;br /&gt;

Anytime a step is removed from the process of logging in as a user, 
you remove a step of security against criminals gaining access to your 
information.&lt;br /&gt;
&lt;br /&gt;

It took eBay two months to discover the hack because there was no 
sign of “unusual activity” detected.&amp;nbsp; eBay has not confirmed if the data
 stolen was private information or not.&lt;br /&gt;
&lt;br /&gt;

Security experts have criticized the company for not encrypting all private customer information obtained.&lt;br /&gt;

eBay is aggressively investigating the intrusion with police 
enforcement but has no evidence that user accounts have been tampered 
with.&lt;br /&gt;
&lt;br /&gt;

What do you think about this data breach?&amp;nbsp; Please leave your comments below, we would love to hear from you!&lt;br /&gt;
&lt;br /&gt;

&lt;strong&gt;Be sure to follow us on Twitter at&amp;nbsp;&lt;a href=&quot;http://twitter.com/#%21/hyphenet&quot; target=&quot;_blank&quot;&gt;@hyphenet&lt;/a&gt;&amp;nbsp;or&amp;nbsp;&lt;a href=&quot;http://www.facebook.com/pages/Hyphenet-Inc/215649044854&quot; target=&quot;_blank&quot;&gt;“Like” us on Facebook&lt;/a&gt;&amp;nbsp;to stay up-to-date on the latest computer security threats.&lt;/strong&gt;&lt;br /&gt;

&lt;br /&gt;

&lt;b&gt;References:&lt;/b&gt;&lt;br /&gt;

Myers, Lysa&lt;br /&gt;
ESET&lt;br /&gt;
&lt;a href=&quot;http://www.welivesecurity.com/2014/05/22/ebay-breach-news-posted-data-dump-valid-password-reset-issues/&quot; target=&quot;_blank&quot; title=&quot;We Live Security - eBay Breach News&quot;&gt;eBay breach news: Posted data dump not valid, password reset issues&lt;/a&gt;&lt;br /&gt;
&lt;cite&gt;http://www.welivesecurity.com/2014/05/22/ebay-breach-news-posted-data-dump…&lt;/cite&gt;&lt;br /&gt;
&lt;i&gt;Published: May 22, 2014&lt;/i&gt;&lt;br /&gt;

&lt;br /&gt;
Gibbs, Samuel&lt;br /&gt;
TheGuardian&lt;br /&gt;
&lt;a href=&quot;http://www.theguardian.com/technology/2014/may/22/ebay-denies-stolen-database-on-sale-for-145-bitcoin-is-authentic&quot; target=&quot;_blank&quot; title=&quot;TheGuardian - eBay denies stolen database for sale for 1.45 bitcoin&quot;&gt;Ebay denies ‘stolen database’ on sale for 1.45 bitcoin is authentic&lt;/a&gt;&lt;br /&gt;
&lt;cite&gt;http://www.theguardian.com/technology/2014/may/22/ebay-denies-stolen-database-on-sale…&lt;/cite&gt;&lt;br /&gt;
&lt;i&gt;Published: May 22, 2014&lt;/i&gt;</content><link rel='replies' type='application/atom+xml' href='http://hyphenet.blogspot.com/feeds/7444601703700314635/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hyphenet.blogspot.com/2014/05/ebay-breach-password-reset-issues.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/7444601703700314635'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/7444601703700314635'/><link rel='alternate' type='text/html' href='http://hyphenet.blogspot.com/2014/05/ebay-breach-password-reset-issues.html' title='eBay Breach: Password Reset Issues'/><author><name>Hyphenet</name><uri>http://www.blogger.com/profile/01596152977110049802</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4713815208755702246.post-3341159705119230697</id><published>2014-05-28T10:03:00.000-07:00</published><updated>2014-05-28T11:59:31.491-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cyber security"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber security tips"/><category scheme="http://www.blogger.com/atom/ns#" term="internet spam"/><category scheme="http://www.blogger.com/atom/ns#" term="spam mail"/><title type='text'>Cyber Security Tips</title><content type='html'>&lt;h1&gt;
&lt;span style=&quot;color: green;&quot;&gt;&lt;i&gt;10 Tips on how to Protect Your Personal Data&lt;/i&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;br /&gt;
&lt;b&gt;Target&lt;/b&gt;, &lt;b&gt;Google&lt;/b&gt;, &lt;b&gt;Yahoo&lt;/b&gt;, and &lt;b&gt;eBay&lt;/b&gt; have all sent out announcements to change your password and secure your personal data.&lt;br /&gt;
&lt;br /&gt;
When visiting a website you enter personal information sometimes without even knowing it.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;eBay&lt;/b&gt; said that its corporate network was hacked and hackers obtained 
names, &lt;span style=&quot;color: #38761d;&quot;&gt;encrypted passwords&lt;/span&gt;, &lt;span style=&quot;color: #38761d;&quot;&gt;e-mail&lt;/span&gt; &lt;span style=&quot;color: #38761d;&quot;&gt;addresses&lt;/span&gt;, &lt;span style=&quot;color: #38761d;&quot;&gt;home addresses&lt;/span&gt;, and&lt;span style=&quot;color: #38761d;&quot;&gt; phone 
numbers&lt;/span&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #38761d;&quot;&gt;Cyber-security&lt;/span&gt; experts say that this information leak could lead to spam e-mails and bogus applications.&lt;br /&gt;
&lt;br /&gt;
To avoid cyber-criminals from accessing your personal data, follow these tips on how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;
1.&amp;nbsp; Strong Passwords&lt;a href=&quot;http://www.hyphenet.com/blog/cyber-security-tips/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;strong-passwords&quot; class=&quot;alignright wp-image-16295 size-full&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/7.png&quot; height=&quot;62&quot; title=&quot;strong-passwords&quot; width=&quot;62&quot; /&gt;&lt;/a&gt;&lt;/h2&gt;
Never, never, never use an easy-to-guess password for any of your accounts.&amp;nbsp; &lt;b&gt;ie.&lt;/b&gt; password, 123456, admin&lt;br /&gt;
&lt;br /&gt;
You know you are not supposed to do it, but you do anyway, right?&lt;br /&gt;
&lt;br /&gt;
That is until your identity gets stolen and your life has entered into a state of chaos.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;
2.&amp;nbsp; Creative Passwords&lt;/h2&gt;
Experts advise you to use &lt;a href=&quot;http://www.hyphenet.com/blog/long-passwords/&quot; target=&quot;_blank&quot; title=&quot;Hyphenet Password Protection&quot;&gt;complex passwords with multiple characters and numbers&lt;/a&gt; in them.&lt;br /&gt;
&lt;br /&gt;
Thankfully most &lt;span style=&quot;color: #38761d;&quot;&gt;technologically advanced&lt;/span&gt; companies know the importance in this, so you are forced to create a &lt;span style=&quot;color: #38761d;&quot;&gt;complex password&lt;/span&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;
3.&amp;nbsp; Use Different Passwords&lt;a href=&quot;http://www.hyphenet.com/blog/cyber-security-tips/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;creative passwords&quot; class=&quot;alignright wp-image-16301 size-full&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/12.png&quot; height=&quot;62&quot; title=&quot;creative passwords&quot; width=&quot;62&quot; /&gt;&lt;/a&gt;&lt;/h2&gt;
This is a very bad habit and increases the risk of all your accounts being tampered with.&lt;br /&gt;
&lt;br /&gt;
A hacker can begin to profile a victim that uses the same password or
 very similar variations of a password to hack into accounts.&lt;br /&gt;
&lt;br /&gt;
If one of the accounts are linked with a payment method, then your money is that much closer to being stolen.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
4.&amp;nbsp; Do Not Use Family Names or Pet Names&lt;/h3&gt;
Social media sites give-a-way more information than sometimes 
realized.&amp;nbsp; Personal data like; birthdays, pet names, and even a persons 
obsessions are public to followers and depending on your preference 
settings, possibly everyone.&lt;br /&gt;
&lt;br /&gt;
Many people use their pet’s name for their &lt;span style=&quot;color: #38761d;&quot;&gt;password&lt;/span&gt;.&amp;nbsp; If a person is 
so into their pet that they would use it as a password, that pets name 
is probably posted on their social media site somewhere.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
5.&amp;nbsp; Avoid Sharing Information&lt;a href=&quot;http://www.hyphenet.com/blog/cyber-security-tips/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;secure information&quot; class=&quot;alignright wp-image-16296 size-full&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/2.png&quot; height=&quot;62&quot; title=&quot;secure information&quot; width=&quot;62&quot; /&gt;&lt;/a&gt;&lt;/h3&gt;
Avoid sharing &lt;span style=&quot;color: #38761d;&quot;&gt;credit card&lt;/span&gt; information on retail, &lt;span style=&quot;color: #38761d;&quot;&gt;e-commerce&lt;/span&gt;, or &lt;span style=&quot;color: #38761d;&quot;&gt;social networking sites&lt;/span&gt;.&lt;br /&gt;
&lt;br /&gt;
Just by stating you have a specific credit card, provides information that &lt;b&gt;cyber-crooks&lt;/b&gt; can tug on.&lt;br /&gt;
&lt;br /&gt;
When posting personal information online, be sure not to share 
personal details because it can remain online for an infinite amount of 
time.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
6.&amp;nbsp; Know Your Stuff&lt;/h3&gt;
When receiving an email from an unknown sender, check the information to make sure all details make sense.&lt;br /&gt;
&lt;br /&gt;
Gauge the &lt;span style=&quot;color: #38761d;&quot;&gt;name&lt;/span&gt;, &lt;span style=&quot;color: #38761d;&quot;&gt;email address&lt;/span&gt;, &lt;span style=&quot;color: #38761d;&quot;&gt;spelling&lt;/span&gt;, and &lt;span style=&quot;color: #38761d;&quot;&gt;format&lt;/span&gt; to see if their 
are visible red flags.&amp;nbsp; &lt;b&gt;Cyber-criminals&lt;/b&gt; are getting witty and starting 
to put more detail into these emails.&lt;br /&gt;
&lt;br /&gt;
Logos are being swiped from the legitimate companies and put into emails to fool users.&lt;br /&gt;
&lt;br /&gt;
Even if you receive an email that is from a friend, it is important to know that their account may have been tampered with.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
7.&amp;nbsp; Know Whats Bogus&lt;a href=&quot;http://www.hyphenet.com/blog/cyber-security-tips/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;passwords protection&quot; class=&quot;alignright wp-image-16302 size-full&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/16.png&quot; height=&quot;62&quot; title=&quot;passwords protection&quot; width=&quot;62&quot; /&gt;&lt;/a&gt;&lt;/h4&gt;
If you reply to a bogus email, then a signal to hackers may be sent to other hackers for more spam emails to be sent out to you.&lt;br /&gt;
&lt;br /&gt;
If anyone asks for &lt;span style=&quot;color: #38761d;&quot;&gt;log-in&lt;/span&gt; details, &lt;span style=&quot;color: #38761d;&quot;&gt;personal&lt;/span&gt; details, or for you to 
call a number within the &lt;span style=&quot;color: #38761d;&quot;&gt;email&lt;/span&gt;, refrain from further compliance.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
8.&amp;nbsp; Legitimacy&lt;/h4&gt;
Place your cursor or mouse over the website url and see what 
appears.&amp;nbsp; If there are a bunch of numbers or random characters, it may 
be a spam site.&lt;br /&gt;
&lt;br /&gt;
Fake sites and web links sometimes have addresses that do not match the organization in the stated email.&lt;br /&gt;
&lt;br /&gt;
Look for any grammar mistakes or spelling errors.&amp;nbsp; If the site is secure, the Web address should start with a &lt;b&gt;“https”&lt;/b&gt;.&lt;br /&gt;
&lt;br /&gt;
A green padlock in the address bar will often show that the website is secure and safe to visit.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
9.&amp;nbsp; What to do if hacked&lt;a href=&quot;http://www.hyphenet.com/blog/cyber-security-tips/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;secure information&quot; class=&quot;alignright wp-image-16297 size-full&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/4.png&quot; height=&quot;62&quot; title=&quot;secure information&quot; width=&quot;52&quot; /&gt;&lt;/a&gt;&lt;/h3&gt;
Change all your &lt;span style=&quot;color: #38761d;&quot;&gt;FTP&lt;/span&gt;, &lt;span style=&quot;color: #38761d;&quot;&gt;software&lt;/span&gt;, and &lt;span style=&quot;color: #38761d;&quot;&gt;email passwords&lt;/span&gt;.&amp;nbsp; Write them down on paper, do not save your password to your computer.&lt;br /&gt;
&lt;br /&gt;
Run an &lt;b&gt;antivirus&lt;/b&gt; scan on your computer.&amp;nbsp; &lt;b&gt;Here are come recommended resources:&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.malwarebytes.org/&quot; target=&quot;My site hacked?&quot;&gt;http://www.malwarebytes.org/&lt;/a&gt;&lt;br /&gt;
Excellent malware scanning software, with a free download option.&lt;br /&gt;
&lt;a href=&quot;http://www.microsoft.com/security/default.aspx&quot;&gt;http://www.microsoft.com/security/default.aspx&lt;/a&gt;&lt;br /&gt;
Start with Microsoft’s website for free or low cost security options.&lt;br /&gt;
&lt;a href=&quot;http://download.cnet.com/windows/internet-security-software-suites/&quot; title=&quot;CNET&quot;&gt;http://download.cnet.com/windows/internet-security-software-suites/&lt;/a&gt;&lt;br /&gt;
CNET writes fairly current reviews on the latest antivirus apps. I would start here.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
10.&amp;nbsp; Close Your Account&lt;a href=&quot;http://www.hyphenet.com/blog/cyber-security-tips/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;delete files&quot; class=&quot;alignright wp-image-16299 size-full&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/3.png&quot; height=&quot;62&quot; title=&quot;delete files&quot; width=&quot;56&quot; /&gt;&lt;/a&gt;&lt;/h3&gt;
Sometimes closing your account is safer and will limit the risk of hackers taking over your personal data.&lt;br /&gt;
&lt;br /&gt;
Information associated with compromised accounts can be stored in 
other places.&amp;nbsp;&amp;nbsp; Take into consideration to see weather information on a 
website is encrypted from one end to another, and stored securely.&lt;br /&gt;
&lt;br /&gt;
Users are responsible for checking the website and making sure it is trustworthy.&lt;br /&gt;
&lt;br /&gt;
Do you need professional advise to know if your computer has been compromised?&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Follow us on Twitter at&amp;nbsp;&lt;a href=&quot;https://twitter.com/hyphenet&quot; target=&quot;_blank&quot;&gt;@hyphenet&lt;/a&gt;&amp;nbsp;or&amp;nbsp;&lt;a href=&quot;http://www.facebook.com/hyphenet&quot; target=&quot;_blank&quot;&gt;“Like” us on Facebook&lt;/a&gt;&amp;nbsp;to stay up-to-date on the latest tech news and PC security alerts.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;color: #38761d;&quot;&gt;References:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
Chee, Kenny&lt;br /&gt;
&lt;a href=&quot;http://news.asiaone.com/news/digital1/10-tips-how-protect-your-personal-data-online?page=0%2C0&quot; target=&quot;_blank&quot; title=&quot;AsiaOne News - Tips to protect your personal data online&quot;&gt;10 tips on how to protect your personal data online&lt;/a&gt;&lt;br /&gt;
&lt;cite&gt;http://news.asiaone.com/news/digital1/10-tips-how-protect-your-personal-data-online?page=0%2C0&lt;/cite&gt;&lt;br /&gt;
&lt;i&gt;Published: May 26, 2014&lt;/i&gt;</content><link rel='replies' type='application/atom+xml' href='http://hyphenet.blogspot.com/feeds/3341159705119230697/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hyphenet.blogspot.com/2014/05/cyber-security-tips.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/3341159705119230697'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/3341159705119230697'/><link rel='alternate' type='text/html' href='http://hyphenet.blogspot.com/2014/05/cyber-security-tips.html' title='Cyber Security Tips'/><author><name>Hyphenet</name><uri>http://www.blogger.com/profile/01596152977110049802</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4713815208755702246.post-8936170260012874155</id><published>2014-05-21T14:54:00.000-07:00</published><updated>2014-05-21T14:54:45.274-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer Security"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber security"/><category scheme="http://www.blogger.com/atom/ns#" term="it security"/><category scheme="http://www.blogger.com/atom/ns#" term="security threats"/><title type='text'>IT Security and Risk Management Review</title><content type='html'>With the world turning digital, people are connected to multiple&amp;nbsp; 
devices throughout the day. Listening to your iPod at home, connecting 
to Wi-Fi at the coffee shop, or accessing your smartphone at work can 
leave you open to all kinds of cybercrime.&lt;br /&gt;
&lt;br /&gt;

The digital world consists of the widespread use of mobile devices 
that cybercriminals are able to access through platforms, social 
networks, and the public cloud.&lt;br /&gt;
&lt;br /&gt;

Organizations in particular need to protect against multi-faceted 
‘advanced persistent threats’ (APTs – also known as ‘advanced targeted 
attacks, or ATAs).&lt;br /&gt;
&lt;br /&gt;

The key attributes are:&amp;nbsp; the use of social engineering (such as spear
 phishing) to gain initial entry to a target organization’s network and 
execute a zero-day attack; the acquisition of privileges to further 
penetrate the target network; the establishment of communication links 
with external ‘command and control’ (C&amp;amp;C) servers; the theft or 
compromise of assets; and the covering of tracks after completing the 
mission.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;

&lt;div class=&quot;wp-caption alignnone&quot; style=&quot;width: 477px;&quot;&gt;
&lt;a href=&quot;http://www.hyphenet.com/blog/security-risk-management-review/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;IT-security&quot; height=&quot;466&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/security-ponemon-2-467x466.jpg&quot; title=&quot;IT-security&quot; width=&quot;467&quot; /&gt;&lt;/a&gt;&lt;div class=&quot;wp-caption-text&quot;&gt;
Source: The Ponemon Institute/HP&lt;/div&gt;
&lt;/div&gt;
&lt;h2&gt;
&amp;nbsp;&lt;/h2&gt;
&lt;h2&gt;
Cost of a Cyberattack&lt;/h2&gt;
The Ponemon Institute’s 2013 survey has found that the average annul cost of&amp;nbsp; cybercrime is $7.2 million per organization.&lt;br /&gt;
&lt;br /&gt;

This represents a 30% increase from the year before.&amp;nbsp; The United States takes the greatest hit out of all countries surveyed.&lt;br /&gt;
&lt;br /&gt;

Denial of Services (DoS) attacks account for the highest percentage of costs in both smaller(16%) and larger (22%) companies.&lt;br /&gt;
&lt;br /&gt;

Attacks like viruses, worms and trojans, and phishing and social 
engineering (both 1.7x more prevalent in smaller organizations), malware
 (2.5x) and botnets (2.7x).&lt;br /&gt;
&lt;br /&gt;

The larger companies are hit the hardest by Dos, and malicious insiders attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;

&lt;div class=&quot;wp-caption alignnone&quot; style=&quot;width: 475px;&quot;&gt;
&lt;a href=&quot;http://www.hyphenet.com/blog/security-risk-management-review/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;IT-security-stats&quot; height=&quot;299&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/security-ponemon-1-465x2991.jpg&quot; title=&quot;IT-security-stats&quot; width=&quot;465&quot; /&gt;&lt;/a&gt;&lt;div class=&quot;wp-caption-text&quot;&gt;
Source: The Ponemon Institute/HP&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;

&lt;div class=&quot;wp-caption alignnone&quot; style=&quot;width: 464px;&quot;&gt;
&lt;a href=&quot;http://www.hyphenet.com/blog/security-risk-management-review/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;IT-security-by-industry&quot; height=&quot;554&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/security-ponemon-3-454x554.jpg&quot; title=&quot;IT-security-by-industry&quot; width=&quot;454&quot; /&gt;&lt;/a&gt;&lt;div class=&quot;wp-caption-text&quot;&gt;
Source: The Ponemon Institute/HP&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;

&lt;br /&gt;
The survey shows the average number of days that it takes to resolve 
the cyberattack ranges from 2.6 days for viruses, worms and trojans up 
to 53 days for malicious insider attacks:&lt;br /&gt;
&lt;br /&gt;

&lt;div class=&quot;wp-caption alignnone&quot; style=&quot;width: 478px;&quot;&gt;
&lt;a href=&quot;http://www.hyphenet.com/blog/security-risk-management-review/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;IT-security-resolve-cyber-attack&quot; height=&quot;370&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/security-ponemon-4-468x370.jpg&quot; title=&quot;IT-security-resolve-cyber-attack&quot; width=&quot;468&quot; /&gt;&lt;/a&gt;&lt;div class=&quot;wp-caption-text&quot;&gt;
Source: The Ponemon Institute/HP&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;

&lt;br /&gt;
To view more Internet Security full reports:&lt;br /&gt;

&lt;ol&gt;
&lt;li&gt;Symantec – &lt;a href=&quot;http://www.symantec.com/security_response/publications/threatreport.jsp&quot; target=&quot;_blank&quot; title=&quot;Internet Security Threat Report 2013&quot;&gt;Internet Security Threat Report 2013&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Trustwave – &lt;a href=&quot;https://www2.trustwave.com/2013GSR.html&quot; target=&quot;_blank&quot; title=&quot;Trustwave Security Report&quot;&gt;2013 Trustwave Gloval Security Report&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;PwC – &lt;a href=&quot;http://www.pwc.co.uk/audit-assurance/publications/2014-information-security-breaches-survey.jhtml&quot; target=&quot;_blank&quot; title=&quot;PwC Security Breach&quot;&gt;2013 Information Security Breaches Survey&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;

Hyphenet can help you find the right type of cyberdefence for your 
company.&amp;nbsp; Rackmount appliances, cloud-based services and threat defense 
are all precautions you can take to protect your business and keep the 
bad guys out.&lt;br /&gt;
&lt;br /&gt;

Call us today!&amp;nbsp; 619-325-0990&lt;br /&gt;
&lt;br /&gt;

&lt;strong&gt;Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at&amp;nbsp;&lt;a href=&quot;https://twitter.com/hyphenet&quot; target=&quot;_blank&quot;&gt;@hyphenet&lt;/a&gt;,&amp;nbsp;&amp;nbsp;&lt;a href=&quot;http://www.facebook.com/hyphenet&quot; target=&quot;_blank&quot;&gt;“Like” us&lt;/a&gt;&amp;nbsp;on Facebook or add us to your circle on&amp;nbsp;&lt;a href=&quot;https://plus.google.com/105656426700111853818/posts&quot;&gt;Google+&lt;/a&gt;.&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;

&lt;strong&gt;References:&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;

&lt;article&gt;McLellan, Charles&lt;br /&gt;
IT Security and Risk Management: An overview&lt;br /&gt;
&lt;a href=&quot;http://www.zdnet.com/it-security-and-risk-management-an-overview_p3-7000022659/&quot; target=&quot;_blank&quot; title=&quot;ZDnet - IT Security and Risk Management&quot;&gt;http://www.zdnet.com/it-security-and-risk-management-an-overview_p3-7000022659/&lt;/a&gt;&lt;/article&gt;</content><link rel='replies' type='application/atom+xml' href='http://hyphenet.blogspot.com/feeds/8936170260012874155/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hyphenet.blogspot.com/2014/05/it-security-and-risk-management-review.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/8936170260012874155'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/8936170260012874155'/><link rel='alternate' type='text/html' href='http://hyphenet.blogspot.com/2014/05/it-security-and-risk-management-review.html' title='IT Security and Risk Management Review'/><author><name>Hyphenet</name><uri>http://www.blogger.com/profile/01596152977110049802</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4713815208755702246.post-9183626864904906021</id><published>2014-05-20T11:56:00.004-07:00</published><updated>2014-05-20T11:56:57.002-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="android apps"/><category scheme="http://www.blogger.com/atom/ns#" term="android malware"/><category scheme="http://www.blogger.com/atom/ns#" term="android ransomware"/><category scheme="http://www.blogger.com/atom/ns#" term="Computer Security"/><category scheme="http://www.blogger.com/atom/ns#" term="trojan"/><title type='text'>Do you know how to avoid Android ransomware malware?</title><content type='html'>&lt;a href=&quot;http://www.hyphenet.com/blog/how-to-avoid-android-malware/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;android ransomware&quot; class=&quot;alignnone&quot; height=&quot;225&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/Ransomware_4-300x225.jpg&quot; title=&quot;android ransomware&quot; width=&quot;300&quot; /&gt;&lt;/a&gt;&lt;br /&gt;

&lt;br /&gt;

Ransomware is a type of malware that restricts the access to your computer system and infects it.&lt;br /&gt;
Then a ransom is demanded to be paid to the creator of the malware in order for the restriction to be removed.&lt;br /&gt;
&lt;br /&gt;

Ransomware can be the encryption of files on the system’s hard drive 
and usually locks the system demanding payment for it to be lifted.&lt;br /&gt;
&lt;br /&gt;

Another form of ransomware is &lt;a href=&quot;http://nakedsecurity.sophos.com/2013/10/18/cryptolocker-ransomware-see-how-it-works-learn-about-prevention-cleanup-and-recovery/&quot; target=&quot;_blank&quot; title=&quot;CryptoLocker Ransomware - NakedSecurity&quot;&gt;CryptoLocker&lt;/a&gt;.&amp;nbsp; This leaves your computer running while scrambling your data and demands a fee for the decryption key to get your data back.&lt;br /&gt;
&lt;br /&gt;

The fee is usually around $300.&amp;nbsp; Recently, the pay-to-unlock 
ransomware has made its way into the Android ecosystem, and charges $300
 to un-lock.&lt;br /&gt;

&lt;br /&gt;

&lt;h2&gt;
“Koler”&lt;/h2&gt;
One of the most ransomware through the Android is known as “Koler”.&amp;nbsp; 
Koler is very similar to the Reveton malware, which leaves your data in 
tack but locks you out of your computer.&lt;br /&gt;
&lt;br /&gt;

It’s thought that the Reveton gang is the one behind Koler.&amp;nbsp; Both 
malware’s follow a criminal formula that has worked for them on Windows 
computers.&lt;br /&gt;
&lt;br /&gt;

As soon as the malware pops up, it downloads a display warning screen
 stating you are accused of viewing something illegally, like 
pornography.&lt;br /&gt;
&lt;br /&gt;

According to reports, the crooks use the time-honored trick of 
telling you to install a specific “video player” app, then offering you 
help with downloading it.&lt;br /&gt;
&lt;br /&gt;

&lt;span style=&quot;color: green;&quot;&gt;**Because Koler has not made it into 
the Google Play Store, you need to have “Allow installation of apps from
 unknown sources” enabled in your Android security settings to be at 
risk.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;

Just like with Windows-based police warning ransomware, the malware 
can adapt the content it displays depending on your country or language 
settings.&lt;br /&gt;
&lt;br /&gt;

The malware warnings have been coming from “U.S.A. Cyber Crime 
Center” and “FBI Department of Defense” (which doesn’t make sense 
because the FBI is not part of the DoD).&lt;br /&gt;

&lt;br /&gt;

&lt;br /&gt;

&lt;a href=&quot;http://www.hyphenet.com/blog/how-to-avoid-android-malware/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;ransomware&quot; class=&quot;aligncenter&quot; height=&quot;601&quot; src=&quot;http://hyphenet.com/blog/wp-content/uploads/2014/05/andr-kol-1-4751.png&quot; title=&quot;ransomware&quot; width=&quot;475&quot; /&gt;&lt;/a&gt;&lt;br /&gt;

&lt;br /&gt;

&lt;br /&gt;
The screen shot shows fake government seals and an assortment of 
ripped-off images coaxing the victims to do what they are told on the 
screen.&lt;br /&gt;
&lt;br /&gt;

These scare tactics often work for many, how many times do you have 
The President pointing his finger at you in a scolding manner?&lt;br /&gt;
&lt;br /&gt;

Another message that is often seen:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;

&lt;tt&gt;ATTENTION! Your phone has been blocked up for safety reasons 
listed below. All the actions performed on this phone are fixed. All 
your files are encrypted. CONDUCTED AUDIO AND VIDEO.&lt;/tt&gt;&lt;br /&gt;

&lt;br /&gt;

&lt;br /&gt;

&lt;a href=&quot;http://www.hyphenet.com/blog/how-to-avoid-android-malware/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Ransomware-Ad&quot; class=&quot;aligncenter&quot; height=&quot;598&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/andr-kol-2-475.png&quot; title=&quot;Ransomware-Ad&quot; width=&quot;475&quot; /&gt;&lt;/a&gt;&lt;br /&gt;

&lt;br /&gt;

&lt;br /&gt;

&lt;strong&gt;Note.&lt;/strong&gt; Sophos products, including &lt;a href=&quot;http://www.sophos.com/en-us/products/free-tools/sophos-mobile-security-free-edition.aspx&quot; target=&quot;_blank&quot; title=&quot;Sophos Free Anti-Virus and Security&quot;&gt;Sophos Free Anti-Virus and Security for Android&lt;/a&gt;, detect this malware as Andr/Koler-A.&lt;br /&gt;

&lt;h2&gt;
Get rid of Koler&lt;/h2&gt;
Koler doesn’t scramble your data or disengage your audio.&amp;nbsp; It locks 
your phone with a pop-over browser window that automatically reappears 
if you try to get rid of it.&lt;br /&gt;
&lt;br /&gt;

News that continually reappears through pop-up windows makes it 
nearly impossible to get into the Settings menu to remove the malware.&lt;br /&gt;
&lt;br /&gt;

When trying to reboot, the malware kicks back in at the beginning of restarting your device.&lt;br /&gt;

If this happens, a factory reset will get rid of it.&amp;nbsp; The reset will 
remove the malware along with any other apps and stored data installed 
on your device.&lt;br /&gt;
&lt;br /&gt;

It is recommended to use the Android “Safe Mode”, also detailed explination can be found in Sophos’&amp;nbsp; &lt;a href=&quot;http://nakedsecurity.sophos.com/2014/05/19/first-aid-for-android-how-to-unlock-your-ransomed-phone/&quot; target=&quot;_blank&quot; title=&quot;Naked Security - Android unlock&quot;&gt;companion article&lt;/a&gt;.&lt;br /&gt;

&lt;br /&gt;

&lt;br /&gt;

&lt;div class=&quot;wp-caption alignleft&quot; style=&quot;width: 510px;&quot;&gt;
&lt;a href=&quot;http://www.hyphenet.com/blog/how-to-avoid-android-malware/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Android Safe Mode&quot; height=&quot;44&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/learn-safe-mode-500.png&quot; title=&quot;Android Safe Mode&quot; width=&quot;500&quot; /&gt;&lt;/a&gt;&lt;div class=&quot;wp-caption-text&quot;&gt;
via: NakedSecurity – Sophos&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;

&lt;br /&gt;
&lt;strong&gt;Stay protected from police warning ransomware&lt;/strong&gt;
Here are five easy tips to help you deal with Android malware of all sorts, including “police lockers”:&lt;br /&gt;

&lt;ul&gt;
&lt;li&gt;Install a &lt;a href=&quot;http://www.sophos.com/en-us/products/free-tools/sophos-mobile-security-free-edition.aspx&quot;&gt;reputable anti-virus program&lt;/a&gt; to vet all new apps automatically before they run for the first time.&lt;/li&gt;
&lt;li&gt;Be cautious of apps you are offered in ads and pop-ups.&lt;/li&gt;
&lt;li&gt;Stick to Android’s default setting of allowing installs from the Google Play store only.&lt;/li&gt;
&lt;li&gt;Keep off-device backups of your important data.&lt;/li&gt;
&lt;li&gt;Read our article about &lt;a href=&quot;http://nakedsecurity.sophos.com/2014/05/19/first-aid-for-android-how-to-unlock-your-ransomed-phone/&quot;&gt;using “Safe Mode”&lt;/a&gt;, just in case you ever need it in a hurry.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;

&lt;strong&gt;Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at&amp;nbsp;&lt;a href=&quot;https://twitter.com/hyphenet&quot; target=&quot;_blank&quot;&gt;@hyphenet&lt;/a&gt;,&amp;nbsp;&amp;nbsp;&lt;a href=&quot;http://www.facebook.com/hyphenet&quot; target=&quot;_blank&quot;&gt;“Like” us&lt;/a&gt;&amp;nbsp;on Facebook or add us to your circle on&amp;nbsp;&lt;a href=&quot;https://plus.google.com/105656426700111853818/posts&quot;&gt;Google+&lt;/a&gt;.&lt;/strong&gt;&lt;br /&gt;

&lt;br /&gt;

&lt;strong&gt;References:&lt;/strong&gt;&lt;br /&gt;
Zorabedian, John&lt;br /&gt;
NakedSecurity from SOPHOS&lt;br /&gt;
Android “police warning” ransomware – how to avoid it, and what to do if you get caught&lt;br /&gt;
&lt;i&gt;Published: May 19, 2014&lt;/i&gt;&lt;br /&gt;
&lt;a href=&quot;http://nakedsecurity.sophos.com/2014/05/19/android-police-warning-ransomware-how-to-avoid-it-and-what-to-do-if-you-get-caught/&quot; target=&quot;_blank&quot; title=&quot;NakedSecurity - Android Ransomware&quot;&gt;&lt;cite&gt;http://nakedsecurity.sophos.com/2014/05/19/android-police-warning-ransomware-how-to-avoid-it-and-what-to-do-if-you-get-caught/&lt;/cite&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://hyphenet.blogspot.com/feeds/9183626864904906021/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hyphenet.blogspot.com/2014/05/do-you-know-how-to-avoid-android.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/9183626864904906021'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/9183626864904906021'/><link rel='alternate' type='text/html' href='http://hyphenet.blogspot.com/2014/05/do-you-know-how-to-avoid-android.html' title='Do you know how to avoid Android ransomware malware?'/><author><name>Hyphenet</name><uri>http://www.blogger.com/profile/01596152977110049802</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4713815208755702246.post-7818125692629438954</id><published>2014-05-16T14:33:00.000-07:00</published><updated>2014-05-16T14:33:22.847-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer graphics"/><category scheme="http://www.blogger.com/atom/ns#" term="ivan sutherland"/><category scheme="http://www.blogger.com/atom/ns#" term="kyoto prize"/><category scheme="http://www.blogger.com/atom/ns#" term="sketchpad"/><title type='text'>This Day in Tech History: May 16, 2014</title><content type='html'>&lt;span style=&quot;color: green;&quot;&gt;&lt;i&gt;Happy Birthday Ivan Sutherland!! The Inventor and Developer of Interactive Computer Graphics!&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: green;&quot;&gt;&lt;i&gt;&amp;nbsp;&lt;/i&gt;&lt;/span&gt;

&lt;a href=&quot;http://www.hyphenet.com/blog/day-tech-history-may-16-2014/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;ivan-sutherland-sketchpad&quot; class=&quot;alignright wp-image-16250 size-medium&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/sutherland-213x300.jpg&quot; height=&quot;300&quot; title=&quot;ivan-sutherland&quot; width=&quot;213&quot; /&gt;&lt;/a&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Ivan Sutherland&lt;/b&gt; was the mastermind inventor and developer of MIT&#39;s Sketchpad.

The Computer Graphics pioneer, Sutherland was born in 1938, and in 1963, while an MIT student, created a highly interactive drawing-and-design program called &lt;a href=&quot;http://en.wikipedia.org/wiki/Sketchpad&quot; target=&quot;_blank&quot; title=&quot;Wiki - Sketchpad&quot;&gt;Sketchpad&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Sketchpad&#39;s many innovations included a display file to refresh the screen, a hierarchical structure for modeling graphical objects, recursive methods for geometric transformations, and an object-oriented programming style.

In 1968, Sutherland co-founded Evans &amp;amp; Sutherland Computer Corporation, he was vice president and chief scientist of the company.&lt;br /&gt;
&lt;br /&gt;
He was also the chairman of the computer science department at Caltech from 1976 to 1980.

In the 1980&#39;s, Sutherland left Caltech to establish the consulting firm Sutherland, Sproull and Associates.

He also founded Advanced Technology Ventures, a venture capital firm.

In 1964, MIT produced a TV show about Sketchpad, this featured researchers talking about the product and software.  The demo section of the video starts at 3:30, if you would like to skip to that section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;Dr. Ivan Sutherland won the &lt;a href=&quot;http://www.inamori-f.or.jp/e_kp_out_out.html&quot; target=&quot;_blank&quot; title=&quot;Kyoto Prize&quot;&gt;Kyoto Prize&lt;/a&gt; for Advanced Technology in 2012.

Ivan Sutherland did not know exactly how he was jump-starting a revolution that would carry on for decades.  He was asked if he knew how he was changing the tech world.

This is what he said:
&lt;br /&gt;
&lt;blockquote&gt;
&lt;span style=&quot;-webkit-text-size-adjust: auto; background-color: rgba(255,255,255,0);&quot;&gt; “The future is very hard to see. I had no idea of what would happen in the future, nor did I think of it much. I just wanted to make nice pictures.”&lt;/span&gt;&lt;/blockquote&gt;
&lt;h2&gt;
&lt;/h2&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.hyphenet.com/blog/day-tech-history-may-16-2014/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;flight-simulator&quot; class=&quot;alignright wp-image-16251 size-medium&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/flight-simulator-248x300.jpg&quot; height=&quot;300&quot; title=&quot;flight-simulator-ivan-sutherland&quot; width=&quot;248&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h2&gt;
Other Accomplishments&lt;/h2&gt;
&lt;h2&gt;
&amp;nbsp;&lt;/h2&gt;
In 1968, Sutherland and fellow University of Utah computer-science professor David Evans founded Evens &amp;amp; Sutherland, which was responsible for the flight simulators.&lt;br /&gt;
&lt;br /&gt;
Sutherland was a very humble man, when asked which one of his accomplishments pleased him the most.  He replied with &quot;the thing I&#39;m most proud of is my grandchildren.&quot;

He later mentioned an achievement in his &lt;a href=&quot;http://www.amazon.com/Logical-Effort-Designing-Circuits-Architecture/dp/1558605576&quot; target=&quot;_blank&quot; title=&quot;Amazon - Logical Effort&quot;&gt;1999 book Logical Effort&lt;/a&gt;, co-written with Sproull and David Harris, on designing fast circuits.&lt;br /&gt;
&lt;br /&gt;
Sutherland&#39;s research focused on making a forward leap in circuit design by ditching one of the fundamental facts about almost all processors.&lt;br /&gt;
&lt;br /&gt;
They performed tasks synchronously, at a rate governed by the processor&#39;s clock.

The clockspeeds led to faster processors.  Sutherland&#39;s concern with the paradigm is that it doesn&#39;t scale.&lt;br /&gt;
&lt;br /&gt;
When Sutherland was asked what he thought about the industry&#39;s future, he responded, “You’d have to ask someone who’s 25 years old, not someone who’s 74.  I haven’t done any computer graphics in the last 35 years. I’ve just been doing my thing and having fun.”

&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at &lt;a href=&quot;https://twitter.com/hyphenet&quot; target=&quot;_blank&quot;&gt;@hyphenet&lt;/a&gt;,  &lt;a href=&quot;http://www.facebook.com/hyphenet&quot; target=&quot;_blank&quot;&gt;“Like” us&lt;/a&gt; on Facebook or add us to your circle on &lt;a href=&quot;https://plus.google.com/105656426700111853818/posts&quot;&gt;Google+&lt;/a&gt;.&lt;/b&gt;

&amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;References:&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
This Day in History&lt;br /&gt;
&lt;cite&gt;&lt;a href=&quot;http://www.computerhistory.org/tdih/&quot; target=&quot;_blank&quot; title=&quot;This Day In History - computer History&quot;&gt;http://www.computerhistory.org/tdih/&lt;/a&gt;&lt;/cite&gt;&lt;br /&gt;
&lt;br /&gt;
McCracken,Harry&lt;br /&gt;
A Talk with Computer Graphics Pioneer Ivan Sutherland
&lt;i&gt;&amp;nbsp;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;Publsihed April 12, 2014&lt;/i&gt;&lt;br /&gt;
&lt;cite&gt;&lt;a href=&quot;http://techland.time.com/2013/04/12/a-talk-with-computer-graphics-pioneer-ivan-sutherland/&quot; target=&quot;_blank&quot; title=&quot;Time - A talk with Computer Graphics Pioneer Ivan Sutherland&quot;&gt;http://techland.time.com/2013/04/12/a-talk-with-computer-graphics-pioneer-ivan-sutherland/&lt;/a&gt;&lt;/cite&gt;</content><link rel='replies' type='application/atom+xml' href='http://hyphenet.blogspot.com/feeds/7818125692629438954/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hyphenet.blogspot.com/2014/05/this-day-in-tech-history-may-16-2014.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/7818125692629438954'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/7818125692629438954'/><link rel='alternate' type='text/html' href='http://hyphenet.blogspot.com/2014/05/this-day-in-tech-history-may-16-2014.html' title='This Day in Tech History: May 16, 2014'/><author><name>Hyphenet</name><uri>http://www.blogger.com/profile/01596152977110049802</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4713815208755702246.post-546508624839824745</id><published>2014-05-15T10:24:00.001-07:00</published><updated>2014-05-15T10:24:43.245-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer scam"/><category scheme="http://www.blogger.com/atom/ns#" term="internet scam"/><category scheme="http://www.blogger.com/atom/ns#" term="microsoft scam"/><category scheme="http://www.blogger.com/atom/ns#" term="tech support scam"/><title type='text'>WARNING: Microsoft tech-support scam responsible for $175,000 loss</title><content type='html'>&lt;a href=&quot;http://www.hyphenet.com/blog/microsoft-tech-support-scam/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;scam-alert-pic&quot; class=&quot;alignright size-medium wp-image-16237&quot; height=&quot;168&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/scam-alert-pic-300x168.jpg&quot; width=&quot;300&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Police are warning computer owners about a scam involving a bogus company claiming to be Microsoft’s technical support.&lt;br /&gt;
&lt;br /&gt;

The calls are not coming from Microsoft’s technical support department, Microsoft is not involved in any way.&lt;br /&gt;
&lt;br /&gt;

An 84-year old man from Edmonton, has lost over $175,000 in the past two years to these cyber-criminals.&lt;br /&gt;

The scammers contacted the victim almost daily.&lt;br /&gt;
&lt;br /&gt;
At the beginning, he
 took a phone call from someone claiming to be from Microsoft, who then 
informed the man he had a virus on his computer and they would fix it 
for $200.&lt;br /&gt;
&lt;br /&gt;

The man gave them his credit card number, in which he was charged for $600.&lt;br /&gt;
&lt;br /&gt;

The victim noticed the amount taken from his credit card and contacted the believed Microsoft company to get a refund.&lt;br /&gt;
&lt;br /&gt;

The fraudsters told him in order to get his refund, he needed to wire them money to get a transaction started.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.hyphenet.com/blog/microsoft-tech-support-scam/lottery_phone_scam/&quot; rel=&quot;attachment wp-att-16240&quot;&gt;&lt;img alt=&quot;phone-scam&quot; class=&quot;alignleft size-medium wp-image-16240&quot; height=&quot;192&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/lottery_phone_scam-300x192.jpg&quot; width=&quot;300&quot; /&gt;&lt;/a&gt;&lt;br /&gt;

&lt;br /&gt;
&lt;br /&gt;
The man became so obsessed with receiving the refund document it 
affected his daily routine.&amp;nbsp; He wouldn’t attend family functions or even
 take a shower the day he thought the delivery would arrive.&lt;br /&gt;
&lt;br /&gt;

When the mans family tried to intervene, he started hiding his interactions with the scammers from them.&lt;br /&gt;
&lt;br /&gt;

&lt;blockquote&gt;
“He was lonely. His whole day revolved around these phone
 calls,” stated Detective Bill Allen. “Whenever he ran into a stumbling 
block in the whole scheme, they would give him instructions on how to 
get around those stumbling blocks.&lt;br /&gt;

“These people have this guy totally under their control.&amp;nbsp; Even to 
this day, he feels I interfered with his document. He wasn’t 
understanding that he was being deceived and there was not going to be a
 refund, and it didn’t matter if he sent $100,000.”&lt;/blockquote&gt;
&lt;br /&gt;
It is believed that the fraudsters are operating out of India.&amp;nbsp; The 
Detective said Western Union shut down wire transfer outlets in that 
country because they were being used excessively to receive hustled 
money.&lt;br /&gt;
&lt;br /&gt;

Senior citizens are particularly vulnerable to these types of scams.&amp;nbsp;
 This is partly because they do not realize how advanced computer 
technology is.&amp;nbsp; Seniors also tend to be more trusting and do not 
understand how slick cyber-criminals are.&lt;br /&gt;
&lt;br /&gt;

Allen said, many victims are afraid to admit to relatives they have 
been deceived, as it may convince relative they can no longer live 
independently.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;

&lt;a href=&quot;http://www.hyphenet.com/blog/microsoft-tech-support-scam/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;how-to-report-a-scam&quot; class=&quot;alignleft size-medium wp-image-16238&quot; height=&quot;200&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/how-to-report-a-scam-300x200.jpg&quot; width=&quot;300&quot; /&gt;&lt;/a&gt;&lt;br /&gt;

&lt;br /&gt;

&lt;br /&gt;

&lt;strong&gt;Learn the ways to protect yourself from telephone tech support scams:&lt;/strong&gt;&lt;br /&gt;

&lt;ol&gt;
&lt;li&gt;Do not purchase software or services from callers&lt;/li&gt;
&lt;li&gt;If there is a fee or subscription, do not comply&lt;/li&gt;
&lt;li&gt;Never hand over control to your computer unless you can verify the company’s legitimacy&lt;/li&gt;
&lt;li&gt;Take down the callers information and report them&lt;/li&gt;
&lt;li&gt;Never provide your credit card or financial information&lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
One-third of attempted scams are successful.&amp;nbsp; These cyber-criminals are professional pirates.&lt;br /&gt;
&lt;br /&gt;

If you have been a victim to a cyber scam you can go to these sites to report them.&lt;br /&gt;
&lt;br /&gt;

&lt;a href=&quot;http://www.ic3.gov/default.aspx&quot; target=&quot;_blank&quot; title=&quot;Federal Government Internet Crime Complaint&quot;&gt;http://www.ic3.gov/default.aspx&lt;/a&gt;&lt;br /&gt;

&lt;a href=&quot;http://www.stopfraud.gov/report.html&quot; target=&quot;_blank&quot; title=&quot;Stop Fraud Government Website&quot;&gt;http://www.stopfraud.gov/report.html&lt;/a&gt;&lt;br /&gt;

&lt;a href=&quot;http://www.bbb.org/council/bbb-scam-stopper/&quot; target=&quot;_blank&quot; title=&quot;BBB Scam Stopper&quot;&gt;http://www.bbb.org/council/bbb-scam-stopper/&lt;/a&gt;&lt;br /&gt;

&lt;a href=&quot;http://www.consumer.ftc.gov/articles/0076-phone-scams&quot; target=&quot;_blank&quot; title=&quot;Consumer FTC Phone Scams&quot;&gt;http://www.consumer.ftc.gov/articles/0076-phone-scams&lt;/a&gt;&lt;br /&gt;

&lt;br /&gt;

&lt;strong&gt;Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at&amp;nbsp;&lt;a href=&quot;https://twitter.com/hyphenet&quot; target=&quot;_blank&quot;&gt;@hyphenet&lt;/a&gt;,&amp;nbsp;&amp;nbsp;&lt;a href=&quot;http://www.facebook.com/hyphenet&quot; target=&quot;_blank&quot;&gt;“Like” us&lt;/a&gt;&amp;nbsp;on Facebook or add us to your circle on&amp;nbsp;&lt;a href=&quot;https://plus.google.com/105656426700111853818/posts&quot;&gt;Google+&lt;/a&gt;.&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;

&lt;strong&gt;References:&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;

By Keith Gerein, Edmonton Journal&lt;br /&gt;
Police warn about computer tech-support scam after Edmonton man loses $175,000&lt;br /&gt;
&lt;i&gt;Published May 14, 2014&lt;/i&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.edmontonjournal.com/Police+warn+about+computer+tech+support+scam+after+Edmonton+loses/9835538/story.html&quot; target=&quot;_blank&quot; title=&quot;EdmontonJournal - Tech Support Scam&quot;&gt;&lt;cite&gt;http://www.edmontonjournal.com/Police+warn+about+computer+tech+support+scam+after+Edmonton+loses/9835538/story.html&lt;/cite&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://hyphenet.blogspot.com/feeds/546508624839824745/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hyphenet.blogspot.com/2014/05/warning-microsoft-tech-support-scam.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/546508624839824745'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/546508624839824745'/><link rel='alternate' type='text/html' href='http://hyphenet.blogspot.com/2014/05/warning-microsoft-tech-support-scam.html' title='WARNING: Microsoft tech-support scam responsible for $175,000 loss'/><author><name>Hyphenet</name><uri>http://www.blogger.com/profile/01596152977110049802</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4713815208755702246.post-3013318702989100935</id><published>2014-05-12T11:17:00.000-07:00</published><updated>2014-05-12T11:17:03.496-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="budget concerns"/><category scheme="http://www.blogger.com/atom/ns#" term="budget trends"/><category scheme="http://www.blogger.com/atom/ns#" term="business security"/><category scheme="http://www.blogger.com/atom/ns#" term="it security"/><category scheme="http://www.blogger.com/atom/ns#" term="it security budget"/><title type='text'>IT security budget increase by 41 percent in 2014</title><content type='html'>&lt;span class=&quot;edit-link&quot;&gt;&lt;/span&gt;                    
     
     &lt;br /&gt;
&lt;div class=&quot;entry-content&quot;&gt;
          
&lt;a href=&quot;http://www.hyphenet.com/blog/businesses-are-increasing-it-budget/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;security-risk&quot; class=&quot;alignright wp-image-16215&quot; height=&quot;183&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/ID-100259303.jpg&quot; title=&quot;security-risk&quot; width=&quot;220&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
It’s usually not until you get something stolen that you beef up your security and pay more attention to safety.&lt;br /&gt;
&lt;br /&gt;
This past year has proven just how critical IT security is to companies.&lt;br /&gt;
&lt;br /&gt;

New reports of data breaches and leaks, combined with internal threats have significantly increased concern for security woes.&lt;br /&gt;
&lt;br /&gt;

The recent Tech Pro Research survey focused on IT security and 
discovered that 41 percent of survey respondents say they will increase 
their IT security budget for the next year.&lt;br /&gt;
&lt;br /&gt;

This is a 16 percent increase compared to the number of budgets that rose from last year.&lt;br /&gt;
&lt;br /&gt;

Only 11 percent say they plan to decrease their security budget next year.&lt;br /&gt;
&lt;br /&gt;

&lt;a href=&quot;http://www.hyphenet.com/blog/businesses-are-increasing-it-budget/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;security-projections-2014&quot; class=&quot;aligncenter wp-image-16212&quot; height=&quot;306&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/screen-shot-2013-11-25-at-2-35-31-pm-620x316.jpg&quot; title=&quot;security-projections-2014&quot; width=&quot;600&quot; /&gt;&lt;/a&gt;&lt;br /&gt;

&lt;br /&gt;
Almost two-thirds of the survey takers said they are now more 
concerned with security, following media reports, breaches and leaks.&lt;br /&gt;
&lt;br /&gt;

Smaller companies are usually the ones who lag when it comes to IT 
security.&amp;nbsp; Large organizations with more than 1,000 employees say they 
are planning to improve their IT security.&lt;br /&gt;
&lt;br /&gt;

That doesn’t come as a surprise because they generally have more at steak.&lt;br /&gt;
&lt;br /&gt;

&lt;a href=&quot;http://www.hyphenet.com/blog/businesses-are-increasing-it-budget/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;security-projects-planned-2014&quot; class=&quot;aligncenter wp-image-16213&quot; height=&quot;366&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/screen-shot-2013-11-25-at-3-38-39-pm-620x378.jpg&quot; title=&quot;security-projects-planned-2014&quot; width=&quot;600&quot; /&gt;&lt;/a&gt;&lt;br /&gt;

&lt;br /&gt;
The number one security concern is “Bring Your Own Device”, (BYOD) to work.&lt;br /&gt;
&lt;br /&gt;

Lack of employee awareness regarding social engineering, is a topic that Tech Pro Research has put their focus into.&lt;br /&gt;
&lt;br /&gt;

They have created a ready-made BYOD policy that companies can download to use as their own policy.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;

&lt;a href=&quot;http://www.hyphenet.com/blog/businesses-are-increasing-it-budget/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;security-challenges-2014&quot; class=&quot;aligncenter wp-image-16214&quot; height=&quot;410&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/screen-shot-2013-11-25-at-3-42-48-pm-620x424.jpg&quot; title=&quot;security-challenges-2014&quot; width=&quot;600&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Other reports that address IT security topics are:&lt;br /&gt;

&lt;ul&gt;
&lt;li&gt;Employee awareness challenges&lt;/li&gt;
&lt;li&gt;Improved risk management leads&lt;/li&gt;
&lt;li&gt;Managing internal threats&lt;/li&gt;
&lt;li&gt;Moving to risk management&lt;/li&gt;
&lt;li&gt;BYOD challenges&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
If you would like to Download the full Tech Pro Research report, &lt;a href=&quot;http://www.techproresearch.com/&quot; target=&quot;_blank&quot; title=&quot;Tech Pro Research - IT Security Research&quot;&gt;IT Security: Concerns, budgets, trends and plans&lt;/a&gt;.&amp;nbsp; The report is free to all Tech Pro Research subscribers.&lt;br /&gt;
&lt;br /&gt;

Are you a small business thinking about increasing your budget?&amp;nbsp; Let us know why in the comments below!&lt;br /&gt;
&lt;br /&gt;

&lt;strong&gt;Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at&amp;nbsp;&lt;a href=&quot;https://twitter.com/hyphenet&quot; target=&quot;_blank&quot;&gt;@hyphenet&lt;/a&gt;,&amp;nbsp;&amp;nbsp;&lt;a href=&quot;http://www.facebook.com/hyphenet&quot; target=&quot;_blank&quot;&gt;“Like” us&lt;/a&gt;&amp;nbsp;on Facebook or add us to your circle on&amp;nbsp;&lt;a href=&quot;https://plus.google.com/105656426700111853818/posts&quot;&gt;Google+&lt;/a&gt;.&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;

&lt;br /&gt;

&lt;strong&gt;References:&lt;/strong&gt;&lt;br /&gt;

&lt;div&gt;
Hammond, Teena&lt;br /&gt;
Research: 41 percent increasing IT security budget in 2014&lt;br /&gt;
12/03/2013&lt;br /&gt;
&lt;a href=&quot;http://www.zdnet.com/research-41-increasing-it-security-budget-in-2014-7000023597/&quot;&gt;http://www.zdnet.com/research-41-increasing-it-security-budget-in-2014-7000023597/ &lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hyphenet.blogspot.com/feeds/3013318702989100935/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hyphenet.blogspot.com/2014/05/it-security-budget-increase-by-41.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/3013318702989100935'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/3013318702989100935'/><link rel='alternate' type='text/html' href='http://hyphenet.blogspot.com/2014/05/it-security-budget-increase-by-41.html' title='IT security budget increase by 41 percent in 2014'/><author><name>Hyphenet</name><uri>http://www.blogger.com/profile/01596152977110049802</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4713815208755702246.post-4759637517706185512</id><published>2014-05-08T10:36:00.000-07:00</published><updated>2014-05-08T10:36:05.187-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="facebook ads"/><category scheme="http://www.blogger.com/atom/ns#" term="google ads"/><category scheme="http://www.blogger.com/atom/ns#" term="phishing scams"/><category scheme="http://www.blogger.com/atom/ns#" term="tech support"/><category scheme="http://www.blogger.com/atom/ns#" term="trustinads.org"/><title type='text'>Internet Giants Come Together to Attack Ad Scams</title><content type='html'>&lt;a href=&quot;http://www.hyphenet.com/blog/internet-giants-come-together-attack-ad-scams/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;trustinads-ad-scams&quot; class=&quot;aligncenter wp-image-16194 size-full&quot; height=&quot;138&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/trustinads.jpg&quot; title=&quot;trustinads-ad-scams&quot; width=&quot;571&quot; /&gt;&lt;/a&gt;&lt;br /&gt;

&lt;br /&gt;

&lt;br /&gt;
Internet giants; &lt;strong&gt;Google&lt;/strong&gt;, &lt;strong&gt;Facebook&lt;/strong&gt;, &lt;strong&gt;Twitter&lt;/strong&gt; and &lt;strong&gt;AOL&lt;/strong&gt; have come together with a campaign to protect users from malicious online advertisements.&lt;br /&gt;

&lt;br /&gt;
More ads, more pop-ups, and more annoyances are overpopulating the internet.&lt;br /&gt;

&lt;br /&gt;
Online ads have been reported as dangerous phishing scams and tech support rip-offs.&lt;br /&gt;

&lt;br /&gt;
These Internet companies have launched &lt;a class=&quot;broken_link&quot; href=&quot;http://trustinads.org/&quot; target=&quot;_blank&quot; title=&quot;Trust In Ads&quot;&gt;TrustInAds.org&lt;/a&gt; this past Thursday.&lt;br /&gt;

&lt;br /&gt;
The campaign is designed to raise consumer awareness of emerging online advertising scams.&lt;br /&gt;

&lt;br /&gt;
This will allow companies to share information on the misleading ads and their trends.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.hyphenet.com/blog/internet-giants-come-together-attack-ad-scams/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;ad-scams&quot; class=&quot;alignright wp-image-16200 size-full&quot; height=&quot;484&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/trend-alerts1.jpg&quot; title=&quot;ad-scams&quot; width=&quot;210&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Ads on Google and Facebook are usually legitimate and trusted, 
although there are ingenious scammers that will go great lengths to fool
 you.&lt;br /&gt;

&lt;br /&gt;
Fake businesses, deceptive websites, and phony voice-mail messages 
are created to dupe users into believing their company is legitimate.&lt;br /&gt;

&lt;blockquote&gt;
“However, there are some very sophisticated bad actors 
out there trying to game the system.&amp;nbsp; This is something companies deal 
with on a very regular basis,” stated the group’s executive director, 
Rob Haralson.&lt;/blockquote&gt;
&lt;br /&gt;

The organization has plans to release reports on the stats of the new
 online ad scams as well as information for the consumers on how to 
protect themselves.&lt;br /&gt;

&lt;br /&gt;
The group’s first report focused on fraudulent online tech support 
schemes.&amp;nbsp; Google and Facebook employees found that scammers were placing
 display ads that lured consumers into calling 1-800 numbers for tech 
support.&amp;nbsp; After they would contact the “tech support” for help, 
consumers were then lured into downloading software which is a keystroke
 logger and other malicious software on their PCs.&lt;br /&gt;

&lt;br /&gt;
The companies have removed 4,000 suspicious accounts linking to 2,400 tech support websites.&lt;br /&gt;

&lt;br /&gt;
The FTC has issued a &lt;a href=&quot;http://www.consumer.ftc.gov/articles/0346-tech-support-scams&quot; target=&quot;_blank&quot; title=&quot;Consumer bulletin tech support scams&quot;&gt;consumer bulletin&lt;/a&gt; warning about online tech support scams in January.&lt;br /&gt;

&lt;br /&gt;
This has been an ongoing problem because scammers are constantly working on outsmarting consumers and coming up with new scams.&lt;br /&gt;

&lt;br /&gt;
What do you think about the tech giants coming together?&amp;nbsp; I think 
this should have been done a long time&lt;br /&gt;
ago, maybe identity theft 
wouldn’t be so prominent today if this was done at the brink of 
cyberattacks.&lt;br /&gt;

&lt;br /&gt;
Go to &lt;a class=&quot;broken_link&quot; href=&quot;http://trustinads.org/&quot; target=&quot;_blank&quot; title=&quot;Trust In Ads&quot;&gt;TrustInAds.org&lt;/a&gt; to find out more!&lt;br /&gt;

&lt;br /&gt;
&lt;strong&gt;Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at &lt;a href=&quot;https://twitter.com/hyphenet&quot; target=&quot;_blank&quot;&gt;@hyphenet&lt;/a&gt;, &lt;a href=&quot;http://www.facebook.com/hyphenet&quot; target=&quot;_blank&quot;&gt;“Like” us&lt;/a&gt; on Facebook or add us to your circle on &lt;a href=&quot;https://plus.google.com/105656426700111853818/posts&quot;&gt;Google+&lt;/a&gt;.&lt;/strong&gt;&lt;br /&gt;

&lt;br /&gt;
&lt;strong&gt;References:&lt;/strong&gt;&lt;br /&gt;

&lt;br /&gt;
&lt;a href=&quot;http://recode.net/2014/05/07/internet-firms-launch-effort-to-expose-deceptive-ads/&quot; target=&quot;_blank&quot; title=&quot;Internet Firms Launch Effort to Expose Deceptive Ads - Recode.net&quot;&gt;Internet Firms Launch Effort to Expose Deceptive Ads – Recode&lt;/a&gt;&lt;br /&gt;
&lt;cite&gt;http://recode.net/2014/05/07/internet-firms-launch-effort-to-expose-deceptive-ads/&lt;/cite&gt;&lt;br /&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hyphenet.blogspot.com/feeds/4759637517706185512/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hyphenet.blogspot.com/2014/05/internet-giants-come-together-to-attack.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/4759637517706185512'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/4759637517706185512'/><link rel='alternate' type='text/html' href='http://hyphenet.blogspot.com/2014/05/internet-giants-come-together-to-attack.html' title='Internet Giants Come Together to Attack Ad Scams'/><author><name>Hyphenet</name><uri>http://www.blogger.com/profile/01596152977110049802</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4713815208755702246.post-7527842912542285311</id><published>2014-05-07T11:30:00.001-07:00</published><updated>2014-05-07T11:30:33.404-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="internet explorer bug"/><category scheme="http://www.blogger.com/atom/ns#" term="support for xp"/><category scheme="http://www.blogger.com/atom/ns#" term="windows xp support"/><category scheme="http://www.blogger.com/atom/ns#" term="zero-day attack"/><title type='text'>Microsoft helps Windows XP One last Time</title><content type='html'>&lt;strong&gt;&lt;span class=&quot;edit-link&quot;&gt;&lt;/span&gt;                    
     
     &lt;/strong&gt;&lt;br /&gt;
&lt;div class=&quot;entry-content&quot;&gt;
          
&lt;a href=&quot;http://www.hyphenet.com/blog/microsoft-helps-windows-xp-one-last-time/&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;&lt;img alt=&quot;XPend-of-road&quot; class=&quot;alignright wp-image-16190 size-medium&quot; height=&quot;300&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/XPend-of-road1-300x300.jpg&quot; title=&quot;XPend-of-road&quot; width=&quot;300&quot; /&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;strong&gt;Microsoft&lt;/strong&gt; made the decision to patch &lt;span style=&quot;color: green;&quot;&gt;Windows XP&lt;/span&gt; one last time.&amp;nbsp; A serious &lt;em&gt;Internet Explorer&lt;/em&gt; flaw has caught the attention of Microsoft as they worked on security issues for XP.&lt;br /&gt;
&lt;br /&gt;
Industry observers were shocked when Microsoft issued the Internet Explorer zero-day browser vulnerability patch.&lt;br /&gt;
&lt;br /&gt;

Microsoft made an exception last week after support for Windows XP ended on April 8, 2014.&lt;br /&gt;

&lt;h2&gt;
Fighting a Good Fight&lt;/h2&gt;
Even though Microsoft issued the patch after the end of their 
support, Microsoft seriously urges Windows XP users to upgrade to a 
newer operating system such as &lt;span style=&quot;color: green;&quot;&gt;Windows 7&lt;/span&gt; or &lt;span style=&quot;color: green;&quot;&gt;Windows 8.1&lt;/span&gt;.&lt;br /&gt;

&lt;blockquote&gt;
“Just because this update is out now doesn’t mean you 
should stop thinking about getting off Windows XP and moving to a newer 
version of Windows and the latest version of Internet Explorer,” 
Adrienne Hall wrote, the General Manager of Trustworthy Computing.&lt;/blockquote&gt;
The latest version of Internet Explorer, “has increased support for 
modern web standards, better performance, and expanded the ability to 
deliver an immersive experience from within the web browser.&amp;nbsp; In other 
words, cool stuff that you need even if you didn’t know you need it, ” 
Hall proclaimed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;

&lt;a href=&quot;http://www.hyphenet.com/blog/microsoft-helps-windows-xp-one-last-time/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;malware-bug&quot; class=&quot;alignright wp-image-16187&quot; height=&quot;218&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/malware-bug1.jpg&quot; title=&quot;malware-bug&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Windows XP is a widely used OS that has proven to be resilient, possibly the reason why people are sticking by &lt;strong&gt;XP&lt;/strong&gt; even after the discontinued support.&lt;br /&gt;
&lt;br /&gt;

Windows 7 had nearly 50% of the desktop operating system market in 
April.&amp;nbsp; Windows XP had more than 26% of users, that is more than all the
 players put together.&lt;br /&gt;
&lt;br /&gt;

Senior security researcher for &lt;a href=&quot;http://www.malwarebytes.org/&quot; target=&quot;_blank&quot; title=&quot;Malwarebytes - Anti-Malware&quot;&gt;Malwarebytes&lt;/a&gt;,
 Jerome Segura told TechNewsWorld, “It somehow shoots itself in the foot
 by encouraging users to stick with [that OS] for at least a little 
longer.”&lt;br /&gt;
&lt;br /&gt;

&lt;h3&gt;
What’s the Risk&lt;/h3&gt;
“The financial services and healthcare industries may have the most 
to lose if XP remains unsupported,” Darren Hayes, a professor at &lt;strong&gt;Pace University’s Seidenberg School of Computer Science and Information Systems&lt;/strong&gt;, told TechNewsWorld.&lt;br /&gt;
&lt;br /&gt;

Utility companies, &lt;em&gt;ATM’s&lt;/em&gt;, and many medical devices are still running on Windows XP.&lt;br /&gt;
&lt;br /&gt;

The move toward cloud computing will make things worse, warned Eric Chiu, president and co-founder of &lt;a href=&quot;http://www.hytrust.com/&quot; target=&quot;_blank&quot; title=&quot;HyTrust - Cloud Under Control&quot;&gt;HyTrust&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;

With the cloud, virtualization will just about let the OS live 
forever.&amp;nbsp; The technology runs on 70% of the data center by removing the 
hardware dependence of the operating system.&amp;nbsp; The older operating 
systems like XP can run on the cloud easily for 20 years.&lt;br /&gt;
&lt;br /&gt;

&lt;h3&gt;
&amp;nbsp;Possible Outcome&lt;/h3&gt;
Malwarebytes and many antivirus vendors, that include Kaspersky, 
Avira, Symantec and Trend Micro, are the companies that will continue to
 support XP.&lt;br /&gt;
&lt;br /&gt;

The antivirus software will not resolve the underlying vulnerabilities cyber-criminals are likely to discover.&lt;br /&gt;

If you have questions about your OS, we can help!&amp;nbsp; Call Hyphenet @ 619-325-0990 today!&lt;br /&gt;
&lt;br /&gt;

&lt;strong&gt;Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at&amp;nbsp;&lt;a href=&quot;https://twitter.com/hyphenet&quot; target=&quot;_blank&quot;&gt;@hyphenet&lt;/a&gt;,&amp;nbsp;&amp;nbsp;&lt;a href=&quot;http://www.facebook.com/hyphenet&quot; target=&quot;_blank&quot;&gt;“Like” us&lt;/a&gt;&amp;nbsp;on Facebook or add us to your circle on&amp;nbsp;&lt;a href=&quot;https://plus.google.com/105656426700111853818/posts&quot;&gt;Google+&lt;/a&gt;.&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;

&lt;strong&gt;References:&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.technewsworld.com/story/Microsoft-Gives-XP-One-last-Hug-80390.html&quot; target=&quot;_blank&quot; title=&quot;TechNewsWorld - Microsoft Gives XP One last Hug&quot;&gt;Microsoft Gives XP One last Hug – TechNewsWorld&lt;/a&gt;&lt;br /&gt;
&lt;cite&gt;http://www.technewsworld.com/story/Microsoft-Gives-XP-One-last-Hug-80390.html&lt;/cite&gt;&lt;br /&gt;
&lt;i&gt;Published: May 3, 2014&lt;/i&gt;</content><link rel='replies' type='application/atom+xml' href='http://hyphenet.blogspot.com/feeds/7527842912542285311/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hyphenet.blogspot.com/2014/05/microsoft-helps-windows-xp-one-last-time.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/7527842912542285311'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/7527842912542285311'/><link rel='alternate' type='text/html' href='http://hyphenet.blogspot.com/2014/05/microsoft-helps-windows-xp-one-last-time.html' title='Microsoft helps Windows XP One last Time'/><author><name>Hyphenet</name><uri>http://www.blogger.com/profile/01596152977110049802</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4713815208755702246.post-392076727747902609</id><published>2014-05-06T10:23:00.001-07:00</published><updated>2014-05-06T10:23:30.826-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="antivirus"/><category scheme="http://www.blogger.com/atom/ns#" term="antivirus software"/><category scheme="http://www.blogger.com/atom/ns#" term="Computer Security"/><category scheme="http://www.blogger.com/atom/ns#" term="computer software"/><category scheme="http://www.blogger.com/atom/ns#" term="semantec"/><title type='text'>Symantec warns antivirus is ‘doomed’</title><content type='html'>According to &lt;strong&gt;Symantec&lt;/strong&gt;, antivirus products are “&lt;em&gt;doomed to failure&lt;/em&gt;,” says Brian Dye, senior vice president for information security at Symantec.&lt;br /&gt;
&lt;br /&gt;

From &lt;a href=&quot;http://online.wsj.com/news/article_email/SB10001424052702303417104579542140235850578-lMyQjAxMTA0MDAwNTEwNDUyWj&quot; target=&quot;_blank&quot; title=&quot;The Wal Street Journal - Symantec Develops New Attack&quot;&gt;The Wall Street Journal&lt;/a&gt; on Sunday, end-point security technology isn’t a “moneymaker”,&amp;nbsp; antivirus companies need to adjust and adapt.&lt;br /&gt;
&lt;br /&gt;

Antivirus products have been proven to prevent hackers from obtaining
 your private information from your computer.&amp;nbsp; Today, hackers are often 
able to bypass the antivirus’ and get into your computer’s source code.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.hyphenet.com/blog/symantec-warns-antivirus-doomed/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Symantec-Updates-Mobile-Portfolio-Launches-Mobile-Security-for-Android&quot; class=&quot;aligncenter wp-image-16173&quot; height=&quot;220&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/Symantec-Updates-Mobile-Portfolio-Launches-Mobile-Security-for-Android.png&quot; title=&quot;Symantec-Updates-Mobile-Portfolio-Launches-Mobile-Security-for-Android&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;br /&gt;

&lt;br /&gt;
&lt;br /&gt;
Antivirus technology scans networks for malicious-looking computer code and spots hackers before there is any real damage.&lt;br /&gt;
&lt;br /&gt;

It’s like an immune system on your computer.&lt;br /&gt;
&lt;br /&gt;

Brian Dye, Symantec’s senior vice president for information security estimates the antivirus catches 45% of cyber-attacks.&lt;br /&gt;
&lt;br /&gt;

Mr. Dye says Symantec’s Norton security suite has evolved beyond 
antivirus software and searches for suspicious activity that may have 
come from previous unseen viruses.&lt;br /&gt;
&lt;br /&gt;

The software includes a &lt;span style=&quot;color: green;&quot;&gt;password manager&lt;/span&gt;, &lt;span style=&quot;color: green;&quot;&gt;spam blocker&lt;/span&gt;, and scans a user’s &lt;span style=&quot;color: green;&quot;&gt;Facebook feed&lt;/span&gt; to guard against dangerous links.&lt;br /&gt;
&lt;br /&gt;

&lt;h2&gt;
Area of concern&lt;/h2&gt;
&lt;strong&gt;China&lt;/strong&gt;,&lt;strong&gt; Iran&lt;/strong&gt;, and the former &lt;strong&gt;Soviet bloc&lt;/strong&gt;., are the countries whom pose the most concerning threats.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.hyphenet.com/blog/symantec-warns-antivirus-doomed/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;symantec-encryption&quot; class=&quot;alignright size-medium wp-image-16175&quot; height=&quot;170&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/symantec-encryption-300x170.png&quot; width=&quot;300&quot; /&gt;&lt;/a&gt;&lt;br /&gt;

&lt;br /&gt;
&lt;br /&gt;
Hackers that were linked to Iran last spring breached the digital 
perimeters of energy companies and one of the U.S.’s five biggest 
banks.&amp;nbsp; They were caught before moving further into the systems.&lt;br /&gt;
&lt;br /&gt;

Last year before the Target Corp. was breached, FireEye security 
equipment alerted the retailer of the suspicious activity found.&amp;nbsp; When 
the company failed to follow up with the warning, they were hacked.&lt;br /&gt;
&lt;br /&gt;
Former Target employees say the reason why the system failed is because 
they lacked the resources to pursue all posed threats.&lt;br /&gt;
&lt;br /&gt;

The malware market is now declining and hackers are aiming their 
focus on cyber-attacks.&amp;nbsp; A few avenues are; denial-of-service assaults, 
spear-phishing, and network intrusion.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;

&lt;a href=&quot;http://www.hyphenet.com/blog/symantec-warns-antivirus-doomed/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Symantec - Infographic for Advanced Persistent Threats 2012&quot; class=&quot;aligncenter wp-image-16176&quot; height=&quot;429&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/05/Symantec-Infographic-for-Advanced-Persistent-Threats-2012-1024x731.jpg&quot; title=&quot;Symantec - Infographic for Advanced Persistent Threats 2012&quot; width=&quot;600&quot; /&gt;&lt;/a&gt;&lt;br /&gt;

&lt;br /&gt;
&lt;br /&gt;
Cyber-criminals previously used mass-emailing to catch millions of people off-guard in order to steal their information.&lt;br /&gt;
&lt;br /&gt;

Now, Symantec has partnered with IBM, with a new cyber-security 
offering to protect networks and critical data from zero-day attacks, by
 identifying&amp;nbsp; irregular patterns in network traffic.&lt;br /&gt;
&lt;br /&gt;

Although cyber-criminals are finding ways around antiviruses, the 
antivirus market is doing their part in working around hackers.&lt;br /&gt;
&lt;br /&gt;

Are you still unprotected from cyber-crimes?&amp;nbsp; We can help give you 
the best protection for your home or small business.&amp;nbsp; Call us today! 
619-325-0990&lt;br /&gt;
&lt;br /&gt;

&lt;strong&gt;Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at&amp;nbsp;&lt;a href=&quot;https://twitter.com/hyphenet&quot; target=&quot;_blank&quot;&gt;@hyphenet&lt;/a&gt;,&amp;nbsp;&amp;nbsp;&lt;a href=&quot;http://www.facebook.com/hyphenet&quot; target=&quot;_blank&quot;&gt;“Like” us&lt;/a&gt;&amp;nbsp;on Facebook or add us to your circle on&amp;nbsp;&lt;a href=&quot;https://plus.google.com/105656426700111853818/posts&quot;&gt;Google+&lt;/a&gt;&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;

&lt;strong&gt;References:&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;

&lt;a href=&quot;http://www.zdnet.com/antivirus-is-dead-long-live-the-antivirus-7000029078/?s_cid=e539&amp;amp;ttag=e539&amp;amp;ftag=TRE17cfd61&quot; target=&quot;_blank&quot; title=&quot;ZDNet - Symantec calls antivirus &#39;doomed&#39;&quot;&gt;Symantec calls antivirus ‘doomed’ as security giants fight for survival – ZDNet&lt;/a&gt;&lt;br /&gt;
&lt;cite&gt;http://www.zdnet.com/antivirus-is-dead-long-live-the-antivirus-7000029078/?s_cid=e539&amp;amp;ttag=e539&amp;amp;ftag=TRE17cfd61&lt;/cite&gt;&lt;br /&gt;
Published May 5, 2014&lt;br /&gt;
&lt;br /&gt;

&lt;a href=&quot;http://online.wsj.com/news/article_email/SB10001424052702303417104579542140235850578-lMyQjAxMTA0MDAwNTEwNDUyWj&quot; target=&quot;_blank&quot; title=&quot;The Wall Street Journal - Symantec Develops New Attack on Cyberhacking&quot;&gt;Symantec Develops New Attack on Cyberhacking – The Wall Street Journal&lt;/a&gt;&lt;br /&gt;
&lt;cite&gt;http://online.wsj.com/news/article_email/SB10001424052702303417104579542140235850578-lMyQjAxMTA0MDAwNTEwNDUyWj&lt;/cite&gt;&lt;br /&gt;
Published May 4, 2014</content><link rel='replies' type='application/atom+xml' href='http://hyphenet.blogspot.com/feeds/392076727747902609/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hyphenet.blogspot.com/2014/05/symantec-warns-antivirus-is-doomed.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/392076727747902609'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/392076727747902609'/><link rel='alternate' type='text/html' href='http://hyphenet.blogspot.com/2014/05/symantec-warns-antivirus-is-doomed.html' title='Symantec warns antivirus is ‘doomed’'/><author><name>Hyphenet</name><uri>http://www.blogger.com/profile/01596152977110049802</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4713815208755702246.post-8640936443334512486</id><published>2014-04-30T11:27:00.000-07:00</published><updated>2014-04-30T11:27:17.647-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer technology"/><category scheme="http://www.blogger.com/atom/ns#" term="internet"/><category scheme="http://www.blogger.com/atom/ns#" term="world wide web"/><category scheme="http://www.blogger.com/atom/ns#" term="www"/><title type='text'>This Day in Tech History: April 30th</title><content type='html'>&lt;h1&gt;
The World Wide Web is Born!&lt;a href=&quot;http://www.hyphenet.com/blog/day-tech-history-april-30th/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;World_wide_web&quot; class=&quot;aligncenter wp-image-16161&quot; height=&quot;322&quot; src=&quot;http://www.hyphenet.com/blog/wp-content/uploads/2014/04/World_wide_web-e1398877104933-1024x550.jpg&quot; title=&quot;World_wide_web&quot; width=&quot;600&quot; /&gt;&lt;/a&gt;&lt;/h1&gt;
&lt;em&gt;April 30, 1993&lt;/em&gt;, www (The World Wide Web) enters the public domain.&lt;br /&gt;
&lt;br /&gt;

CERN, the international particle physics lab developed The World Wide Web.&lt;br /&gt;
&lt;br /&gt;

On this day, WWW technology source code was freely available for anyone to use and without a licensing fee.&lt;br /&gt;
&lt;br /&gt;

They announced the “www” into the public domain.&lt;br /&gt;
&lt;br /&gt;

The first Web browser could run only on one type of computer.&amp;nbsp; By the
 end of 1993, Web users around the world set up more than 500 servers to
 help host it.&lt;br /&gt;

The first search engines started to appear in the mid 1990′s.&amp;nbsp; It 
didn’t take long for Google to come on the scene and establish a 
permanent position in the market.&lt;br /&gt;

&lt;strong&gt;Also this day in Tech History:&lt;/strong&gt;&lt;br /&gt;

&lt;ul&gt;
&lt;li&gt;Microsoft shipped 10 million copies of Windows 3.0.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;2006 version 4.10 of the Linux Ubuntu “Warty Warthog” was released.&lt;/li&gt;
&lt;/ul&gt;
&lt;a href=&quot;http://info.cern.ch/hypertext/WWW/TheProject.html&quot; target=&quot;_blank&quot; title=&quot;First Website&quot;&gt;Discover the World Wide Web in the beginning.&lt;/a&gt;&lt;br /&gt;

&lt;br /&gt;

&lt;strong&gt;Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at&amp;nbsp;&lt;a href=&quot;https://twitter.com/hyphenet&quot; target=&quot;_blank&quot;&gt;@hyphenet&lt;/a&gt;,&amp;nbsp;&amp;nbsp;&lt;a href=&quot;http://www.facebook.com/hyphenet&quot; target=&quot;_blank&quot;&gt;“Like” us&lt;/a&gt;&amp;nbsp;on Facebook or add us to your circle on&amp;nbsp;&lt;a href=&quot;https://plus.google.com/105656426700111853818/posts&quot;&gt;Google+&lt;/a&gt;&lt;/strong&gt;.&lt;br /&gt;
&lt;br /&gt;

&lt;strong&gt;References:&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;

Read more: Day in Tech History – Daily Tech History Podcast &amp;amp; 
Blog 365 Days a Year http://www.dayintechhistory.com/#ixzz30O9bwH71&lt;br /&gt;
Under Creative Commons License: Attribution Share Alike&lt;br /&gt;
Follow us: @geekazine on Twitter | geekazine on Facebook&lt;br /&gt;
&lt;a href=&quot;http://www.cjr.org/the_kicker/and_thats_the_way_it_was_april_18.php?page=all&amp;amp;print=true&quot; target=&quot;_blank&quot; title=&quot;The Columbia Journalism Review&quot;&gt;&lt;br /&gt;
And that’s the way it was: April 30, 1993 – Columbia Journalism Review&lt;/a&gt;&lt;br /&gt;
&lt;cite&gt;http://www.cjr.org/the_kicker/and_thats_the_way_it_was_april_18.php?page=all&amp;amp;print=true&lt;/cite&gt;</content><link rel='replies' type='application/atom+xml' href='http://hyphenet.blogspot.com/feeds/8640936443334512486/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hyphenet.blogspot.com/2014/04/this-day-in-tech-history-april-30th.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/8640936443334512486'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4713815208755702246/posts/default/8640936443334512486'/><link rel='alternate' type='text/html' href='http://hyphenet.blogspot.com/2014/04/this-day-in-tech-history-april-30th.html' title='This Day in Tech History: April 30th'/><author><name>Hyphenet</name><uri>http://www.blogger.com/profile/01596152977110049802</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>