COVID19 and Stay-at-Home orders make performing this moderately difficult and time consuming procedure make sense.
Continue reading
Tag Archives: security
Digital Privacy at the U.S Border: A New How-To Guide from EFF
An update from the EFF on Digital Privacy at the U.S Border: A New How-To Guide from EFF – download the PDF.
HP “Time Bomb” Locks Out 3rd Party Ink Cartridges
Protecting Macs from Viruses and Malware
March 11, 2016
For many years, computer viruses and malware were mostly the concern of Windows users. Mac users faced very few threats. This has been atributed to the Mac’s sibgle digit market share and, some have argued, a more secure product. One common misconception was that Macs were somehow imune from viruses and malware. While the number of threats may pale in comparrisln to Windows, Macs are indeed suseptible to attack and more and more are appearing. The time has come for Mac users to make secutity a priority.
In the last few weeks, researchers have found the first Mac Ransomware malware in circulation. Ransomware is software that encrypts the files on a computer making them unuseable to the owner. The person controllling the malware then demnads a ransom to unencrypt the files. In most cases, the victim has only 72 hours to pay or the ransom or the malware author threatens to eraswe the key that is needed to restore the files. Regardless of the size of your business, the loss of data can be davastatiung.
Add these new threats to hardware failures and theft and the need for a well thought out and executed computer protection plan is more important then ever.
You can find my Mac security recomendations here.
Support Apple’s Fight to Protect Digital Security
Sign the petition at https://petitions.whitehouse.gov/petition/apple-privacy-petition
Read the letter from Tim Cook http://www.apple.com/customer-letter/
Rarely Patched Software Bugs in Home Routers Cripple Security
Librarian of Congress Renews and Expands Protections for Fair Uses
The new rules for exemptions to copyright’s DRM-circumvention laws were issued today, and the Librarian of Congress has granted much of what EFF asked for over the course of months of extensive briefs and hearings. The exemptions we requested—ripping DVDs and Blurays for making fair use remixes and analysis; preserving video games and running multiplayer servers after publishers have abandoned them; jailbreaking cell phones, tablets, and other portable computing devices to run third party software; and security research and modification and repairs on cars—have each been accepted, subject to some important caveats.
The exemptions are needed thanks to a fundamentally flawed law that forbids users from breaking DRM, even if the purpose is a clearly lawful fair use. As software has become ubiquitous, so has DRM. Users often have to circumvent that DRM to make full use of their devices, from DVDs to games to smartphones and cars.
The law allows users to request exemptions for such lawful uses—but it doesn’t make it easy. Exemptions are granted through an elaborate rulemaking process that takes place every three years and places a heavy burden on EFF and the many other requesters who take part. Every exemption must be argued anew, even if it was previously granted, and even if there is no opposition. The exemptions that emerge are limited in scope. What is worse, they only apply to end users—the people who are actually doing the ripping, tinkering, jailbreaking, or research—and not to the people who make the tools that facilitate those lawful activities.
Bug Lets Hackers Into Nearly Any Android Phone Using Nothing But an MMS Text Message
A major flaw in Android software allows an attacker to take complete control of a device by simply sending a specifically crafted media text message. The flaw was first reported by Zimperium zLabs VP of Platform Research and Exploitation, Joshua J. Drake – See more at: http://blog.zimperium.com/experts-found-a-unicorn-in-the-heart-of-android/#sthash.92fOeK4Q.dpuf
To kitigate the threat until an Android device receives a patch, go to Hangouts, select the menu in the upper left and select Settings. SElect the SMS settings, scroll down until you see "Auto retrieve SMS and UNCHECK that box.
GPG Suite for Mac – Privacy for People
Use GPG Suite to encrypt, decrypt, sign and verify files or messages. Manage your GPG Keychain with a few simple clicks and experience the full power of GPG without too much hassle.
One shouldn't need to set up sophisticated encryption tools to protect their private mail, documents and records. Amendment IV to the U. S,. Constitution reads:
High Profile Cyber Attacks Open Door to More Surveillance
Recent cyber attacks against private companies such as Sony, Target and Home Depot have legislators proposing new cyber security legislation that would open the door to more government surveillance and less individual privacy while doing little to address cyber threats.
Congress Should Say No to “Cybersecurity” Information Sharing Bills