warning

Car Hacking

        "Here is an article about yet another hacking attack,"  yes, Jim Hamm gets our attention!  He continues, "This time on a car! Now this isn't something you or I need to be worried about at this time, but it does make one wonder. What if your car was hacked, engine turned off, and held for ransom? Admittedly, not a likely scenario, but possible.
        "One item the article mentioned, which I hadn't thought much about, is your car may communicate with your dealer and monitor when your next oil change or service is due. Both our cars do this, and we'll get an alert on our car's dash when an oil change is due. So our cars are periodically checking back with 'home base'. This is very similar to what most of the programs do on your computer -- they all want to check 'home' and see is an update is available."
        And Jim is closing with this thought, "Driverless cars, hacking cars, electric cars -- it's an interesting time we live in."

Apple Music "Nightmare"

     The article begins, "I love Apple. I love them because they take difficult problems and come up with innovative, simple solutions. The things they make just work and we trust them. Unfortunately, my experience with Apple Music has been exactly the opposite. As of today, I’m missing about 4,700 songs from my library with little hope of getting them back."       This link comes from Jim Hamm who goes on to add, "Here's another sad tale about Apple Music -- one of several I've read. My music transferred over mostly OK, except that the album art didn't always make it over correctly. One big lesson here -- always back up everything first before trying something new."         The article is followed with 102 comments as of 7-22.

It's Time to Uninstall Adobe's Flash From Your Mac

 This is serious. Jim Hamm alerts us, "As Steve Jobs so eloquently put it: Adobe Flash is a 'bag of hurt.'  Recently there's been many advisories about vulnerabilities in Adobe Flash.  The same comment has been true for many years.  Flash is vulnerable to hacking.  Time to get rid of it.  This article shows how." 

 Jim concludes with "If you must use Flash -- for example, if you listen to Pandora --  then use the Chrome Browser."

A New Hacking Tool

       The Yahoo Tech News of July 8 gives some details on a new hacking system with the headline "No One is Safe: $300 Gadget Steals Encryption Keys Out of the Air, and It's Nearly Unstoppable."

         At the end of the report it states, "The team plans to present its creation at the Worship on Cryptographic Hardware and Embedded Systems this coming September." An on-line  search shows several such workshops scheduled in California and  France. 

Are Loyalty Cards Worth the Risk?

        "You've probably read or heard about the recent hack of the U.S. Government," begins Jim Hamm.   "On a smaller scale here is an article about the hacking of loyalty cards at Starbucks, and why the hackers like to hack loyalty cards.
        "It is difficult to protect against dedicated hackers. If you shop online, or use a credit or loyalty card anywhere, you -- and I -- are vulnerable to hacking and losing our financial information."  And Jim winds up with,  "This is the e-life we live in."

Cool Stuff - Google Photos, (but read this)

        "If you plan to use Google Photos to store your photos, here's another review that will be helpful. Although I'm not the photo buff in our family, all that I've read seems to say that Google Photos is a great program to try out. Since it's free, what's to lose?" says Jim Hamm.  See here, http://www.wired.com/2015/06/coolest-stuff-didnt-know-google-photos  but read page 3 carefully under "Licensing" and note the ToS, Terms of Service.  You have been warned and this applies to all of Google's services. 

Text Messages That Crash iPhones

                This info is from Ars Technica, "There's yet another iOS bug that causes Apple devices to crash when they receive text messages containing a string of special characters. With further finessing, the same exploit may be able to attack Macs, since OS X is also unable to process the same combination of characters, which are technically known as glyphs."
        Here's a screen shot of the text that causes iPhones to promptly crash.  

Read this article for the warnings and the remedy they suggest:  http://arstechnica.com/security/2015/05/beware-of-the-text-message-that-crashes-iphones/#p3  

eBay Scam Described

        Of course, we want to be alert and aware.  Jim Hamm sends this:  "A member of a forum I belong to just posted the following note about an eBay scam. Another member mentioned that PayPal usually takes the side of the buyer, so this guy, hopefully, will get his money back. Just passing it on FYI, as there's always a risk when buying something from eBay, or, for that matter, on the internet." 

        And here's the info Jim copies for us:  "I have just been scammed by an eBay seller, and pass this along for what it's worth. I paid for a MacBook via PayPal, but the seller apparently sent it (or more likely a phone book) to a different address in my city. This results in a 'it was delivered' receipt by the post office. The scammer wanted that because my protest and demand for a refund will look weaker if they have a 'it was delivered' receipt.
        "Fortunately, the scammer didn't know that the post office keeps a copy of the deliver label, and the delivered address (neither of which are mine of course), and they will have a hard time explaining 'Your item was delivered to the front desk or reception area at 2:24 pm on June 2, 2015 in MARINA, CA 93933.'
        "I don't have a front desk nor a reception area in my little house…  Beware folks. The world is full of crooks. (I'll let you know if eBay's guarantee refunds my $$$ as it should.)"

Warning About Fake Amazon Email

        David Passell alerts us about this fake Amazon email.  If you get something similar DO NOT click on any links on it.  

Instead either attach the email or forward it to spoofing@amazon.com  
        David comments, "For some reason Amazon does not provide a quick and easy link to report taking their name in vain.  However, after I sent a message to them it seemed like a convoluted process which I don't even remember.  I received a message back from Amazon the next day which identifies the email address to send messages to." 

Of Course, You're Careful . . .

        Scan the info that applies to you:  "Surprising Ways Hackers Can Steal Your Identity"  http://www.lifelock.com/education/crimes/surprising-ways-hackers-can-steal-your-identity   
        If you're a Facebook fan you'll want to look at this info:  http://www.lifelock.com/education/alerts/the-latest-scam/malicious-tagging-on-facebook/  
        Keeping informed and being careful are simply logical things to do! 

What Will the FCC Allow?

       "Here is an interesting article wherein the FCC is considering allowing carriers to use their cellular network and Wi-Fi frequencies together. Does this seem like a traffic jam just waiting to happen?" asks Jim Hamm.  He goes on to challenge us to get informed.  
        "I'm sure that I don't understand all of the ramifications of this idea, or whether it's a good or a bad idea. It will be interesting, though, to see how this develops with the FCC." 

About This So-Called Security Program

        Take a look at this serious matter brought to our attention by Jim Hamm.  
        "If you surf the net, you've probably seen ads pop up for MacKeeper, a so-called security program for the Mac. Here is an article about MacKeeper, and its aggressive advertising program on the internet.       
         "My suggestion is to stay far away from this program. You'll see why after you read the article. Having said that, though, I am amazed -- and somewhat jealous -- at how some young, smart programmers in the Ukraine had an idea, developed a program, aggressively marketed it, and rolled in some $26 million dollars. Now why wasn't I smart enough to do this?...(grin)…" Thanks to Jim for this info. 

Malware / Adware / Crapware

        With the bold statement, "Mac OS X isn't safe anymore" this article dated 2-26-15 has 16 pages of details and pictures.  http://www.howtogeek.com/210589/mac-os-x-isn’t-safe-anymore-the-crapware-malware-epidemic-has-begun/  
        Your personal information, bank and credit card numbers, where you are and what you're doing is open to view.  How did this happen?  What can I do?  What downloads are safe? 
        This article has 37 replies posted which gives you an idea of what others are thinking about the troubles that many have not considered. This website also has sections on Windows, Linux, Office, Apple, Mobile, Gadgets, and more.  

Immediately Check Your Apps

        Two days ago this urgent notice was printed with the notice "iOS users should immediately check the status of any apps they use, especially if the apps convey bank account numbers or other sensitive personal information."  Take a look:  keep informed.  http://arstechnica.com/security/2015/04/24/critical-https-bug-may-open-25000-ios-apps-to-eavesdropping-attacks/#p3 

Apps That Are Vulnerable

        Alert and aware! We spare ourselves a lot of trouble by keeping informed.  The ArsTechnica article of April 20 declares about 1,500 iPhone and iPad apps contain a vulnerability that makes it easy for your encrypted passwords, bank account numbers and other sensitive information to be intercepted.  The article of April 20 needs your attention. http://arstechnica.com/security/2015/04/1500-ios-apps-have-https-crippling-bug-is-one-of-them-on-your-device/

Where is Your AV Program Made?

        "Here is an interesting article that discusses where AV (anti-virus) programs are developed.  I hadn't gave this much thought before reading this article. I use Avast, which comes from the Czech Republic," Jim Hamm gets our attention.  
        "Now, this isn't something that most of us are going to worry about. But, having said that, I think I would avoid any programs coming from China or Russia. I don't trust either of those countries, and they are definitely not our friends. Lots of recent articles about hackers from China and Russia attempting to spy on us.
        "Just a thoughtful, philosophical article for your contemplation...(grin)…" Jim.