Apple iPad & iPhone Users Locked Out of Devices by Hacker

Original article here Apparently a hacker has gained access to Apple iCloud accounts and used account information to remotely lock Apple iPhones, iPads, and Mac computers, demanding anywhere from $50 to $100 to unlock the devices.  No malware was installed on any of these devices to accomplish this.  The hacker used iCloud username/password information, combined […]

Continue Reading Comments { 0 }

Serious E-Bay Breech Requires Password Changes

Original article here. In essence, hackers managed to access an E-Bay customer database and gain access to the personal information of millions of E-Bay customers, including usernames and passwords.  E-Bay claims the passwords are encrypted, however, E-Bay customers should change their passwords nevertheless.  PayPal accounts were not directly affected since they are part of a […]

Continue Reading Comments { 0 }

HTML E-Mail versus Text E-Mail

So I have been against the use of HTML code in e-mail ever since it first started becoming popular, and now that e-mail clients more often than not come with that particular feature enabled by default, it’s time for me to share one of the many reason why I advise people against the practice. This […]

Continue Reading Comments { 0 }

Text to 911 Services Available in Some Areas May 15th

Original article here. Being able to text 911 in an emergency will be a service provided by all major cellular carries in the United States beginning on May 15th, 2014.  The catch:  Just because they provide the service doesn’t mean the emergency communications center in your county will necessarily make it available.  Currently it is […]

Continue Reading Comments { 0 }

U.S. Judge Rules American Search Warrants Apply to Data Stored on Foreign Computers

Original link is HERE. Essentially, in a ruling that is sure to be challenged all the way to the US Supreme Court, a magistrate in New York has ruled that companies must turn over the private data of customers when a warrant is issued, even if that data is stored on computers located in foreign […]

Continue Reading Comments { 0 }

OpenSSL “Heartbleed” Bug Threatens Secure Websites

This news has been out for a few days, but it’s pretty technical and I’ve debated the best way to present it to non-technical people. Essentially the protocol used to secure connections between computers and websites has a very severe vulnerability in its implementation that was just recently discovered. Problem is, the vulnerability – a […]

Continue Reading Comments { 0 }

Fake AntiVirus App Scams $40,000 in One Week of Downloads

Original article here. Anyone who knows me or reads this blog on a regular basis understands that I have a bias toward preference for free open source software and that this is one of the many reasons I recommend Android over iOS devices.  However, it is true that the open nature of the Android app […]

Continue Reading Comments { 0 }

Microsoft Ending Support for Windows XP on April 8, 2014

Well, it’s been a great run, but Microsoft is pulling the plug on one of its best operating systems and ending support for Windows XP on April 8, 2014.  This means that any security flaws discovered after this date will not be patched by Microsoft, leaving XP systems vulnerable to being compromised. Companies still using […]

Continue Reading Comments { 0 }

Wireless WPA2 Encryption No Longer Secure

Original article here. Summary:  Several years ago,WEP wireless encryption was cracked and very quickly became almost as insecure as using no encryption at all.  More recently, WPA encryption was also cracked, leaving only WPA2 as a method of keeping wireless networks secure.  With nothing more secure than WPA2 available to secure wireless networks against intrusion, […]

Continue Reading Comments { 0 }

Funeral Phishing Scam

My wife Kathy received a phishing e-mail today that is very convincing, especially for older computer users: Everything about this message is correct on the surface, down to the address and phone numbers listed in small print.  Three things, all of them subtle, point to this being a phishing scam: Neither the person to whom […]

Continue Reading Comments { 1 }