Crooks Can Make You Pay For Their Starbucks With Simple Screengrab

Researchers have discovered a security flaw in the new Starbucks Rewards Card iPhone app that could let someone else rack up a bunch of free coffees on your dime. All someone has to do is take a picture of your barcode and then they can use it to buy all the delicious black swill they want, draining your account to …



State Department Admits RFID Passports Are Insecure


The State Department is advising travelers using super-secure RFID-enabled passports to buy a “radio-opaque” holster, because it turns out that RFID chips aren’t so super-secure after all. Don’t fret if “radio-opaque sheath” isn’t on your holiday shopping list, this is thankfully one of those rare problems that you can solve with a hammer…

Give the back of your passport a few good whacks and hope the feds don’t give you 25 years for tampering with a passport.

Read More


 An Unofficial Guide to Hacking iPhones, iPads

So You thought for sure using your smartphone Ipad (iphone, Samsung with Android OS) doing online banking, paying bills online,You’re safe from hackers ..Want to learn how to remotely wipe address books and read private text messages on someone else’s iPhone?
Six rockstar hackers and Pwn2Own vets have put to paper everything they know about the iOS operating system, hoping to inspire white hat hackers to experiment with the OS and report vulnerabilities to further tighten the mainstream smartphone OS. The handbook “iOS Hacker’s Guide” begins with a detailed analysis of iOS’s architecture and the numerous security measures Apple quietly built into the OS, such as pervasive sandboxing, app scanning for malware, and code-signing enforcement. But iOS isn’t impenetrable, which is why the book also takes us through a history of 8 iPhone vulnerabilities performed over the last five years and presented in closed-door conferences like Black Hat.

.


Bullguard claim people are unaware of security for smartphones



We now expect every website and email to be a potential threat and we guard ourselves with firewalls, security software and malware protection at every corner.
We also expect our ISPs to do some of the work for us in limiting the amount of spam we receive, and catching the emails that are obvious threats.
So why do we treat the smartphone as being immune to the same attacks and threats that force us to spend millions of pounds a year in protecting our desktops?
How many of us have the same, or equivalent, protection on the devices we use the most?
Smartphones now use scaled-down versions of the operating systems we use on our laptops and PCs and are, therefore, at least as susceptible to such unwanted attacks. Maybe more so.
According to Claus Villumsen, mobile security expert at BullGuard “Mobile users need to be educated about the increasing potential risk involved in using a smartphone to access the internet, send emails and perform financial transactions.
Proof lies in the number of reported malware attacks that have been documented in recent months. Google Marketplace has removed several apps from its Android Marketplace after receiving a raft of complaints that they contained malware.
Even Apple, hitherto the only organization to escape such attacks previously, has been caught out with iOS now under attack from commercial malware.
Recent studies show a 250% rise in the number of malware attacks in the last six months alone.
According to reports, the number of malware infections has leap from 80 to 400 unique applications in the first six months of 2011.
The chance of encountering an unsafe link is now teetering on 30%



Brand-new PCs found preloaded with malware


Microsoft has discovered that cyber criminals within the hardware supply chain have been pre-installing malware on PCs in China so that they were infected before they were even taken out of the box.


Retailers, the company discovered, were selling computers loaded with counterfeit versions of Windows software with the Nitol malware embedded.


“What’s especially disturbing is that the counterfeit software embedded with malware could have entered the chain at any point as a computer travels among companies that transport and resell the computer,” says Richard Domingues Boscovich, assistant general counsel in Microsoft Digital Crimes Unit.


As many as twenty percent of the PCs researchers bought from an unsecure supply chain were infected with malware, which was capable of spreading through devices such as USB flash drives.


Microsoft struggles with viruses, counterfeit software

WASHINGTON (AP) – A customer in Shenzhen, China, took a brand new laptop out of its box and booted it up for the first time.

But as the screen lit up, the computer began taking on a life of its own. The machine, triggered by a virus hidden in its hard drive, began searching across the Internet for another computer.

The laptop, supposedly in pristine, super-fast, direct-from-the-factory condition, had instantly become part of an illegal, global network capable of attacking websites, looting bank accounts and stealing personal data.

For years, online investigators have warned consumers about the dangers of opening or downloading files emailed to them from unknown or suspicious sources.

Now, they say malicious software and computer code could be lurking on computers before the bubble wrap even comes off.


Scammers swarm through phone lines

The new motto for high-tech thieves may well be, “Reach out and swindle someone.”

Cellphones have made it easier to stay in touch, but they have also brought everyone closer to scam artists and tricksters, who are just a few numbers away from separating you from thousands of dollars

Anyone with a phone number is a target, and there is no shortage of flim-flam schemes. Here’s a look at some scams happening now across the nation:

Jailhouse jingles.

An inmate calls collect from jail and tricks you into dialing a number starting with *72. But *72 activates call forwarding, giving control of your phone to the inmate — who then makes long-distance phone calls or racks up fees on 900 numbers on your bill.

 Election scam.

The phone scammer asks you to take a voter survey and says that at the end, you will get a free cruise. When you complete the bogus survey, the scammer asks for a debit or credit card number for port fees.


Watch NFL games the virus-free way

It was only two years ago that I came to fully understand the magic of football.

The occasion was attending my first Super Bowl.

I was caught up in the crowd’s escalated enthusiasm and impressed by the agility and strength of the players, who were truly at the pinnacle of their careers and their sport.

Watching from home isn’t quite the same, but I enjoy it much more after that experience. Football is also a great excuse to have a few friends over to the house.

The latest wrinkle in football fever is watching online, and I’m sure you’ve heard of websites that offer free live streaming of NFL games. Doesn’t that sound like a great way to get around all the additional charges for sports subscription programs?


If it sounds too good to be true, there’s a reason.


  1. The unfortunate fact is these sites aren’t genuine.


  1. That isn’t to say you don’t get to watch the game. It just won’t be legal.


Why should you care?


First, you can get in trouble with your service provider, which means you might lose your Internet privileges.


Also, the streaming video quality is usually terrible. It especially gets corrupted during fast-paced action — the very thing you most want to watch.


  1. And there are even bigger risks to your computer, your identity and personal information.


 Cyber-Crook for a Day

By Neil J. Rubenking

Just how hard is it for a hacker to remotely pwn your computer?

It turns out to be ridiculously easy, as long as you’re a bit gullible and don’t have antivirus protection.

I know; I’ve done it, along with several other tech journalists. It all happened as part of a recent McAfee Consumer Journalist Day at McAfee Headquarters in Santa Clara. Bruce Snell, McAfee Director of Technical Marketing, provided each of us with a laptop already running two VMWare virtual machines, one representing the attacker and one representing the more


How to Tell If that Pop is A Rogue Anti-Malware Product


Are you getting a Virus warning popping up in the right bottom of your PC or Laptop’s Monitor, warning you that you have a serious trojan invading your Computer?

This could be a dangerous and fake virus warning scanning you PC displaying fake infections while it uses a Keylogger App that steals every keystroke you’ve typed at your bank, social media websites, credit card purchases. Here is what to do….

Read More>>>>


Router Security

First Line Of Defense Against Hacker Intrusion


Important Information for anyone using a home or business wireless router.

“Protect Your Personal Documents, Tax, Accounting Information from Snoopy Neighbor or Criminals”

Did you know a criminal  can sit on your street with a common wireless laptop, Or with any wireless smartphone, and actually turn your computer or laptop on through the Wireless router giving them administer rights, then making any changes to the wireless router settings they choose, Setup a Spyware app to spy on everything your typing or sending and receiving emails from miles away once he gains total control, Then locks you out so you can not make any changes to your wireless router.

Also,did you know your next door neighbor can use your router and computer to surf the internet free without your knowledge, plus snoop through all of your personal documents, Accounting, Photos, Emails or worse surf child porn sites using your wireless router and PC  & you then become a victim of a serious child porn investigation because your neighbor is Un- delectable using your router to connect to the internet, & you get accused of surfing child porn and get arrested.

Even if your neighbor is innocently stealing free internet and they surf the web , your computer gets infected with Virus, Spyware, Trojans, Worms from their web surfing.

(most routers are always on)

This Also Includes Turning Web Cam  On Your Laptop or Desk Top PC Using  Administrator Remote Management In Routers Settings” .

Then spying on your family or worse taking pictures of your wife or kids nude after a shower.

(There are some people that have PCs’ or Laptops In their bedrooms with Webcam installed for talking on  Skype’s  )

This includes snoopy neighbors, that inadvertently pick up on your routers signal and either snoop through your personal documents, turn on your Webcam or surf child porn sites using your wireless router.

Law enforcement & FBI-  “Child Porn Online Alerts”

Most manufactures routers (cable or Wireless) set to basic factory settings are at high risk of intruders using your router!

 Why or How? To access your most personal private banking, credit card purchases info, or a pedophile (Child Porn Criminal) using your router somewhere outside of your home surfing  child porn, will alert FBI or local law enforcement and you will get a knock on your door, possibly be arrested and accused of surfing child porn sites even if you did not do it, after time spent investigating you leaving you embarrassed because your neighbor’s watched the FBI or Local Law Enforcement that arrested you.

(As it goes your guilty until proven innocent.)

Second worse is a professional criminal hacker that can and will take over your home or business PC’s/Laptop/Smart Phone, Ipad using the routers remote management and WAN settings.

Left undiscovered all of your online tax return info. credit card purchase, banking info (User name, passwords) will be stolen. Leaving you with zero funds in your bank, creditors hounding you for purchases you never purchased. Possibility of being arrested for checks you never wrote.

In the US alone there are thousands people daily sticking their heads in sand, only to get their rear ends kicked by a hacker & added to the daily 1,000 of  ID theft victims, because they’re afraid of technology or believe they need a degree in technology and think hiring a professional technician cost to much.

“If you believe spending no more then what you would buy coffee and & doughnuts at Dunkin’ Doughnut’s for your router & PC security-sorry to say this but you deserved to get hacked are added to the daily statistics of ID theft victims”!.

Hire a Professional Certified Techncian to lock down your internet and routersecurity.

For under $125 You will hire a certified Microsoft Technician, he will insure your pc/laptop 4 router is secured from outside criminal hackers or snoopy neighbor snooping through you accounting, emails, family photos, personal documents. or having free access to use your internet connection without your permission, maybe surfing child porn or adult websites, leaving your computer infected with Trojans, Worms, Viruses,Spyware.

Dont fall for the cheap fraudulent download sites offering  $30 or more to setup your routers setting with their software…this could be spyware or a Trojan not only stealing your money and your credit card info…but worse taking control of your router and spying on your banking habits  and credit card purchases...

Before You Call Our Professional Technicians To Lock Down Your System Securley

Try following the directions in setting up your router properly.

Some Do’s and Don’ts

Below is a list of common sense tactics that you can use to protect your business information.

                                                              Basic Wireless Router Settings

                              Dlink                                   Linksys


Wireless setup protection:

  1. Set your login name and your password on your routers (some router may not have a setting for username).
  2. Enable WEP (Wireless Equivalent Privacy) and setup the passphrase, alternatively newer wireless routers and laptops support WPA (Wi-Fi Protected Access) which is even more secure and easier to setup.
  3. Optionally, for even more security, setup MAC (Ethernet Address) filtering if present.
  4. Setup all devices with same logon name to access router.
  5. Setup all devices with same channel number.
  6. Check the firewall check box is enabled (some are not set, most are set on default.)
  7. Shut off WOL on the Router and in the Computers Bios (Wake up On Lan allows anyone to turn on your computer even if it is off)
  8. Down load a 3rd party personal firewall (Zone alarm Free Firewall Software ) along with your routers.
  9. Have your routers leak test completed @ Knology Speed Test
  10. Setup appointment with Compu Tek’s Email tech support Engineer for your routers security settings.

Personal Security and Computer Security

“The Golden Rules Of Protecting Your Personal Information”

  •  Don’t give out a password over the telephone.

Hackers don’t just work via computers; in some cases they use a telephone with some type of ruse to extract a password or code from an unsuspecting employee.

Hackers sometimes disguise themselves as your ISP asking for a password.
ISP’s do not need for you to tell them your password

  •  Don’t accept a file from an unknown person
  •  Beware of malicious web sites that have pages embedded with ActiveX , Java or JavaScript attack that execute when the pages are loaded
  • Make sure you have a firewall(Personal or Router firewall Free Demo Firewall
  • Make sure you are running a good anti-virus software that also catches Trojans
  • Make sure your passwords are varied and changed at least once a month
  • Don’t download software you’ve never heard about (free cute photos, .i.e.)
  • Make sure you have the latest version of the software you are using
  • Download the latest security patches for your computer
  • Update your anti-virus signature files regularly
  • Don’t put false hopes into your Anti-Virus (not all viruses can be detected)

Experiment with newer free Anti-Viruses


Trend Micro, Titanium

Avira Anti-Virus


Update your Windows security patches regularly

 Backup your system regularly (0nce data is infected or lost, it is almost impossible to recover data or very expensive to recover, from a complete hard drive failure)