Tech Thoughts Daily Net News – April 28, 2013

Alert: Skype account hijack technique may affect all users – After six malicious takeovers of his Skype account, a frustrated security researcher has posted his attempts to get Skype’s help. Here’s how to protect yourself.

4 steps to reclaim your social media after a hack attack – Last week’s hacking of the Associated Press’ Twitter account is the latest in a number of high-profile social media hijackings. Eric Johnson, professor and director of the Center for Digital Strategies at Dartmouth College’s Tuck School, says that these types of hacks have become all too common. “Phishing is the most common method used to break into Twitter and steal credentials. They’re extremely simple hacks that can cause extreme havoc,” Johnson says. “It only takes one simple hack to create a world of problems. If you or your business falls victim to a social media hack, here are four things you should do to recover from it and ensure it doesn’t happen again.

New Android Phone? Check Out These 14 Essential Hints and Tips – Android is a powerful platform, but only for those who take full advantage of all its tricks. Here’s a guide to tricking out your phone.

A Portable Math Tool That Includes Many Calculators And Converters – Calculate/Convert everything with Calculatormatik. Nothing fancy, but does what it is suppose to… Definitely a keeper!

Tech Thoughts Daily Tech News 2

Bitdefender Internet Security 2013 & Zemana Antilogger License Giveaway – I thought of making a come back with a security giveaway so here we go with Bitdefender Internet Security 2013 along with Zemana`s license, both would be valid for 1 year. 10 lucky winners would be selected and the winners will be announced on 11th May.

Gadgets You Must Have Right Now – These desirable devices are clamoring for a place on your shelf or in your pocket, and in your home.

Fedora 19 alpha offers a peek at what’s coming – It’s not intended for production use, of course. Rather, the alpha software is available purely for testing purposes. Still, if you want to take it for a whirl to see what’s coming in the final release due in July, it’s now available as a free download. Here are some of the highlights of what you’ll find.

Infographic: Social Media Battle of the Sexes – Many adults have given into the social media temptation and have signed up for Facebook or created a Twitter account. But not all men and women agree on where to spend their online time.

Cloud adoption growing, but how big depends on who you ask – Is cloud computing really catching on in the enterprise? Well, that depends on who you talk to, recent surveys have found. RightScale, a company that acts as a broker between end users and public cloud service providers, released the most recent results of its annual State of the Cloud report and found that about 75 percent of respondents surveyed were using the cloud in some capacity. But 70 percent of organizations using the cloud seems like a lot to some people, such as Forrester Research cloud guru James Staten.


Locked and loaded, online gamers draw phishing attackers – Online gamers have become rich targets for cybercriminals, according a report released this week by the Anti Phishing Work Group. Over the last two quarters of 2012, phishing attacks aimed at online gamers jumped from 2.7 percent in the September frame to 14.7 percent in the December quarter, the APWG said in its Phishing Activity Trends Report for the fourth quarter of 2012.

Checking-In: May Be Dangerous – Many people use Twitter, Facebook, Foursquare, Yelp, or other applications that allow announcements to be published on the Internet about where you are. Perhaps you do too. But did you know that criminals, both cyber and terrestrial, can take advantage of check-ins to do you harm?

Military Grooms New Officers for War in Cyberspace – The U.S. service academies are ramping up efforts to groom a new breed of cyberspace warriors to confront increasing threats to the nation’s military and civilian computer networks that control everything from electrical power grids to the banking system.

Budweiser’s intimate, dangerous way to make Facebook friends – The brewing company’s Brazilian arm creates cups, which, if you clink them together to say cheers, turn both parties into Facebook friends. Oh, how difficult.

Company News:

Microsoft Wins Latest Round in Motorola Patent Fight – Royalty payments set by a Seattle judge are far less than the billions Motorola wanted.

‘Wintel’ on the wane: Intel goes Google – Intel has been synonymous with Windows PCs seemingly forever. But it’s trying to change that in a hurry. Enter Google.

AT&T Will Automate Your Home and Keep It Safe, but It’ll Cost You – Some day, you’ll never have to worry about whether you left the lights on, the garage door open or the curling iron plugged in, because you’ll be able to control it all remotely by phone or tablet. AT&T is offering a taste of that future right now–as long as you buy a home security package to go with it. On Friday, the company is launching its Digital Life service, which combines home security with optional home automation.

Tesla Model S Set to Beat Chevy Volt and Nissan Leaf in Q1 Sales – You might not think it at first, given the not-so-insignificant price difference between the vehicles, but Tesla Motors’ Model S luxury sedan is allegedly set to best its rivals, the Chevrolet Volt and Nissan Leaf, in first-quarter vehicle sales for the first time in the company’s history.

Webopedia Daily:

Composite applications – Applications that consist of pieces of other applications. Composite applications bring this information together in one place. For example, salespeople have disparate software applications that make it possible to do their jobs: software for contacts, ERP, a file system, and so on. May also be called custom applications, portals, Web applications, Web services, or complex applications.

Games and Entertainment:

Nintendo Just Made the Wii U a Whole Lot Speedier – Here it is, Wii U owners: the performance boost Nintendo promised earlier this year to remedy those crippling lag times when loading into or out of the main menu.

Console camera overload: This is what your TV will look like in 2014 – The next generation of gaming consoles aren’t just fighting for your time, they are also fighting for the space around, under, and on top of your television.

More Stephen King headed to TV with the help of JJ Abrams – We’re big fans of time travel stories here on TG, and Stephen King wrote one titled “11/22/63,” the fateful day when Kennedy was killed. Now it looks like 11/22/63 will also be headed to television, with the help of JJ Abrams’s production company, Bad Robot.

Epcot’s Spaceship Earth turned into huge, animated Monsters Inc. characters – If you’ve only been to Disney as a kid a long time ago and thought all of the technology was magical, think about how Disney must have advanced with the times now that it’s 2013 and we’re all carrying around little internet-connected computers in our pockets that we can control via yelling at them.

Off Topic (Sort of):

Coming soon: A Breathalyzer for pot and cocaine? – Scientists in Sweden believe they’ve made a breakthrough in creating a machine that police can use to detect high drivers.

Cracked: 5 Ridiculous Myths Everyone Believes About the Wild West – The Wild West, aka the Old West, was an astoundingly awesome period in American history that every person who has ever played Red Dead Redemption wants to emulate. Now, clearly pop culture has turned much of the true West into bullshit legend — there were never quick-draw artists who could shoot a six gun out of your hand with another six gun. But the basics were true, right? The lawlessness, the guns, the constant Indian attacks? Well … not exactly. Some common myths you probably still believe include …

Can design innovation make PCs cool again? – As tablets gobble up low-end PC sales, manufacturers are turning to slick industrial design to win mindshare—and luxury buyers.

Burner: Disposable Phone Numbers For Voice, SMS – Use your iPhone or Android phone like a disposable cell phone. For cheap you can buy a number (or multiple numbers) with voice time and SMS messages. If person-to-person anonymity is important, this app is for you.

Today’s Quote:

The first day of spring is one thing, and the first spring day is another. The difference between them is sometimes as great as a month.”

–      Henry Van Dyke

Today’s Free Downloads:

WinHTTrack – WinHTTrack is a free, easy-to-use offline browser utility. It allows you to download a site from the Internet to a local directory, building recursively all directories, getting HTML, images, and other files from the server to your computer.

7+ Taskbar Tweaker – This programs enables you to tweak your Windows 7 taskbar. Reorder items within a tab group, close, minimize, change application ID and more.

VNC Password Recovery 1.5 – VNC Password Recovery is the FREE software to instantly recover VNC password stored by popular VNC Servers. It automatically detects the encrypted VNC password stored in the file system or registry by various VNC server applications.


Filed under downloads, Internet Security Alerts, Tech Net News

6 responses to “Tech Thoughts Daily Net News – April 28, 2013

  1. Mal

    Hey Bill,
    Regarding Alert: Skype account hijack technique may affect all users
    Well, I’ve only got Skype on my machine because Hotmail got rid of Messenger and urged everyone to download Skype, I rarely use it. But I’m not surprised about this vulnerability. Bit of a worry when a security researcher gets stung by this.

    • Hey Mal,

      There are “security professionals” and then there are – “Security Professionals.” A title that is so loose and undefined that it essentially has lost its meaning. In this case, the “security professional” first lost access through social engineering. I’m not saying that we’re not all susceptible to this but, to lose access an additional 5 times following? This guy is a loser – capitalized. Oh, and a whiner too.

      I’ve had Skype for 10/15 years (who knows anymore 🙂 ) and I’ve never been penetrated. Many have tried but……

      BTW, you are as capable as many of the true “security professionals” in my group. So, don’t take this Viola Blue BS too seriously.