How to surf safely: From LastPass to tin foil hats, and everything in between – Don’t wait until it’s too late to implement a solid strategy for staying safe online. Here, one of our new writers — Paul Lilly — runs you through a dizzying array of safe surfing techniques.
Welcome to the soon-to-be enormous world of Facebook email spam – I am pissed off. Like most other Facebook users, I woke up recently to discover I had a Facebook email address. I don’t want a Facebook email address. Frankly, if I were King of the World, I’d boot Facebook into a giant black hole and laugh gleefully as the entire thing burned to a never-to-haunt-us again crispy hulk.
Hands-on with Android 4.1 Jelly Bean (pictures) – It’s not the full revamp that Ice Cream Sandwich was, but Android 4.1 Jelly Bean nonetheless adds a collection of new and useful features for Android enthusiasts. Using a Jelly Bean-equipped Samsung Galaxy Nexus that Google issued after the first day keynote of Google I/O, I was able to explore some of the enhancements and get a taste of what Jelly Bean will bring.
Malware As A Service: A New Twist? – Malware (or crimeware) as a service, has been around for a couple of years – and, is one of the main reasons cybercrime is spreading rapidly. However, there’s a new twist to the service.
Which is the most popular antivirus software? – In an over-crowded antivirus software market, end and corporate users are often finding it difficult to differentiate between a value-added market proposition, next to the “me too” vendors of solutions. As in every other market segment, any scientific insight into the market share of various vendors offers an invaluable perspective into the market dynamics, what are customers purchasing, and most importantly, are they living in a world of ‘false feeling of security’.
Better Explorer – Better Explorer (aka BExplorer) looks and behaves the way Windows Explorer will in Windows 8–except that it runs in Windows 7. At the top of the file-finder window, Better Explorer adds options that behave much as the Ribbon at the top of Microsoft Word’s newest layout does, letting you more easily arrange, copy, move, and delete files. The free tool also has a button for accessing a file s properties when you’re using a device (such as a tablet) that doesn’t support right-clicking. Best of all, you can view folders in tabs at the top of the window, so you can see multiple folders at once without getting lost.
Telstra halts data collection – Australian telco stops tracking websites visited by its mobile customers. It’s a tinfoil tale of international intrigue.
Chrome 20 fixes 20 security vulnerabilities – Summary: In its latest browser release, 20.0.1132.43, Google’s Chrome fixes 20 security vulnerabilities, none of which are critical.
Winamp 5.63 fixes four critical security vulnerabilities – As originally reported in Winamp’s release announcement, version 5.63 fixes four critical security vulnerabilities. Successful exploitation of the vulnerabilities allows execution of arbitrary code. For the exploitation to take place, a user running an outdated version of Winamp, would have to open a specially crafted . AVI video file.
Public domain Windows Desktop wallpaper from US National Parks – There are thousands of public domain images available from the U.S. National Park Service that make great scenic view wallpaper.
Massive crime ring automates bank fraud, steals tens of millions – Two-factor authentication schemes have definitely been proven to be ineffectual as news of a massive global financial services fraud campaign that targeted well-moneyed individual and organizations exploded on the Internet. Insight into these attacks has been offered in a paper by McAfee and Guardian Analytics, who discovered that once the users’ computers have been compromised with banking Trojans such as Zeus and SpyEye, at least a dozen groups proceeded using client- and server-side components and heavy automation in order to swiftly effect the fraudulent money transfers.
Data Snatchers! The Booming Market for Your Online Identity – A huge, mostly hidden industry is raking in billions collecting, analyzing, and sharing personal information you put on the Web. Should you be worried?
Fake “confirm PayPal account” emails lead to phishing – An extremely legitimate looking email supposedly coming from PayPal has been hitting inboxes in the last few days, trying to trick customers of the popular e-payment giant to follow a link embedded in it, Webroot warns.
The Hidden Security Risks of P2P Traffic – For years enterprises have been trying to control peer-to-peer (P2P) technologies inside their networks, and for good reason. The efficiency with which P2P technology move large files have made P2P networks key enablers of the Internet grey market by acting as the distribution mechanism of choice for pirated movies, music or applications. Aside from P2P being a source for pirated content, they are also a significant enabler of malware as both an infection vector and a command-and-control (C2) channel. These security risks have made controlling P2P traffic a priority for many security teams.
Web Attackers Borrow Domain Generation Tricks From Botnet-type Malware – Hackers have started to adopt domain-generation techniques normally used by botnet-type malware in order to prolong the life of Web-based attacks, according to security researchers from antivirus firm Symantec. Such domain-generation techniques were recently observed in a series of drive-by download attacks that used the Black Hole exploit toolkit to infect Web users with malware when visiting compromised websites,
Cristiano Ronaldo is the most dangerous player in cyberspace – Fans on the internet looking for “Cristiano Ronaldo”, “Cristiano Ronaldo and download”, “Cristiano Ronaldo and photos” or “Cristiano Ronaldo and videos” may run into online threats that could steal their personal information. Clicking on these dangerous sites to download files like photos, videos or screensavers may expose them to viruses and malware.
$199 Google Nexus 7 Tablet Coming in July – Google today unveiled the Nexus 7, a 7-inch tablet from Asus that will run the latest version of Android 4.1 Jelly Bean. The Nexus 7 is available for pre-order now via Google Play. The 8GB is $199, while the 16GB is $249. The device will ship in mid-July to customers in the U.S., U.K., Canada, and Australia. The Nexus 7 includes a front-facing camera, and “all the connectivity options you’d expect,” like Wi-Fi, Bluetooth, and NFC. Barra promised up to nine hours of video playback on a single charge, and up to 300 hours of standby time. It weighs in at 340 grams.
Sprint Gives Biz 360 a Small Businesses Makeover – The mobile carrier refreshes its Biz 360 program for small business with upgrades, new hardware offerings, apps and buyback program.
VeriSign Retains Control of .com – Management of the .com Top Level Domain registry is going to remain with VeriSign. That’s the ICANN board level decision, coming out of the ICANN meeting in Prague this morning, which approved the renewal of VeriSign’s .com mastery.
Apple Wins U.S. Ban on Samsung Galaxy Tab 10.1 – A California district judge ordered a preliminary injunction against Samsung’s Galaxy Tab 10.1 tablet.
Amazon brings NoSQL to the masses with DynamoDB – Amazon’s new cloud offering called DynamoDB overcomes some of the scaling limitations of SimpleDB. Learn more about the DynamoDB NoSQL system.
Time-out – An interrupt signal generated by a program or device that has waited a certain length of time for some input but has not received it. Many programs perform time-outs so that the program does not sit idle waiting for input that may never come. For example, automatic bank-teller machines perform a time-out if you do not enter your password quickly enough.
Off Topic (Sort of):
Life is like Coffee – Life is what we make it, and the simpler things that we enjoy are always the best in life. (Thanks Mike – my favorite Bus Driver )
Slaves of electricity – We are slaves of electricity. Without power, your PC, your DVD player, your wireless router, your digital camera, your smartphone — all computers everywhere would be dead. As we move towards mobile computing, this is a rather big problem, because batteries simply can’t keep up with our demands. Are we heading towards a battery crunch?
Creating The Blackbird – Gary Powers’ U-2 aircraft was disabled. Hit by Soviet surface-to-air missiles, the plane fell from 70,000 feet to 30,000 feet before Powers could release himself and bail out of the damaged cockpit. It was May 1, 1960, and the Cold War was heating up. President Eisenhower deeply valued the strategic benefits of the U-2’s airborne reconnaissance during these tense Cold War times. And now the call came from Lockheed’s customer in Washington to build the impossible – an aircraft that can’t be shot down – and do it fast. (recommended by Michael F.)
The Roots of Social Networking – Before Facebook, before even Friendster, people still had social networking. Here’s a look at how computer users got together in the days before the dawn of the Internet.
Network neutrality: Revisiting the arguments – A “neutral” network cannot coexist with high-speed, unlimited usage broadband connections, nor can consumers expect carriers to foot the bill for increasingly bandwidth-hungry applications.
“History is the version of past events that people have decided to agree upon.”
– Napoleon Bonaparte
Today’s Free Downloads:
SUPERAntiSpyware Free – Detect and Remove Spyware, Adware and Remove Malware, Trojans, Dialers, Worms, KeyLoggers, HiJackers, Parasites, Rootkits, Rogue Security Products and many other types of threats.
SUPERAntiSpyware Portable – Detect and Remove Spyware, Adware and Remove Malware, Trojans, Dialers, Worms, KeyLoggers, HiJackers, Parasites, Rootkits, Rogue Security Products and many other types of threats. The scanner does NOT install anything on your Start Menu or Program Files and does NOT need to be uninstalled.