Tag Archives: software

Google:Weak Passwords Are Weak Link

Google capital G logoA recent CNet.com article reports that “At its I/O conference, two of Google’s top-level security experts, the director of security for Google Apps, and the head of Chrome security;  say the company is intensely focused on the issue, but passwords remain a thorny problem.” The “company”, Google, being intensely focused on security; in my opinion, remains to be seen. However, they stated “Unfortunately the human is often the weakest link in security.”

What a smoke screen! Instead of owning up to royally missing the boat on Google apps for the Android available through Google Play store, they talk about Continue reading

Leave a comment

Filed under Google, Internet Security, malware, passwords, security, software

Keylogger: A Definition

Security Binary DataKnow what a keylogger is? No, it’s not a lead lumberjack position. It’s a type of surveillance software or spyware that monitors and records all keystrokes made on a computer keyboard. It can record your emails, tweets on Twitter, posts to Facebook, instant messages, and more importantly your sign-on credentials. Continue reading

2 Comments

Filed under Cybercrime, Internet Security, malware, Warning

Scribd Breached Exposing Almost 1 Million Passwords

 

 

scribd logo

scribd logo (Photo credit: cjaffepickett)

 

According to a recent CSO.com.au article: Hackers broke into the network of popular document sharing service Scribd earlier this week and may have compromised “less than 1 percent” of its users’ passwords, according to the company. That amounted to almost 1 million passwords compromised.

 

 

 

The interesting thing about this Internet application Continue reading

Leave a comment

Filed under Cybercrime, Internet Security, Warning

Target: Mobile Devices

SmartphoneTarget: Mobile Devices is the second installment of the series of “Target” articles, discussing the various areas the cybercrime organizations are attacking. Unfortunately for computer users, our Internet environment is, as the military would say, “a target rich environment”. See Target: Social Networking Sites, the first article, to get some background on the tactics and strategies of cyber crime organizations.

Mobile devices include smartphones, tablets, PDAs, or any small, handheld computing device that can access the Internet. Continue reading

1 Comment

Filed under Cybercrime, Google, Internet Security, malware, Warning

Online Banking:Use With Care

Security Burgler Hand on SafeOnline banking comes in a couple of flavors; wired and wireless. The wired method involves using a financial institution’s Internet webpage accessed with a computer that is connected to the Internet via a cable or other provider through a receptacle in your home. The wireless method is similar, but the access to the bank’s Internet webpage is through the use of cell phone technology.

The wired method is much safer than the wireless method for several reasons. Continue reading

Leave a comment

Filed under Cybercrime, Facebook, Google, Internet Security, malware

500 Million Android Devices

SmartphoneGoogle has announced that there are 500 million Android devices (Internet capable smartphones, etc. with an Android operating system) activated globally. And that there are 1.3 million activated each day. That being the case, it’s no wonder why Android is the target of choice of cybercriminals the world over. Continue reading

Leave a comment

Filed under Cybercrime, Internet, Internet Security, software

Five-Minute Security Tip: Disable Java On Your Browser

Binary Code pink goldJava is one of the top five ways cyber crooks infect your computer with malware. A quick and easy way to avoid this threat is to disable Java from your computer’s Internet browser. Many Internet websites use Java in their website design, and those sites depend on Java being enabled on your computer. However, it’s been my experience that most sites, at least the ones I visit (many) operate okay without Java enabled. However, if the ones you visit often don’t operate well without it, then enable it temporarily only when it’s necessary. Here’s a great article on Java’s use on your computer. Continue reading

2 Comments

Filed under Cybercrime, How-To Corner, Internet, Internet Security, security