" Here is an article describing a vulnerability found in WPA2 wireless security. After reading the article I suspect most homeowners needn't be unduly concerned. This vulnerability might be a bit more of a concern for commercial WiFi users, though." Thanks to Jim Hamm for this notification.
Gmail Messages Will Now Be Encrypted
"If you use Gmail, the following is some good news for you," Jim Hamm declares. The article from Gizmodo says, "Good news, security lovers. Google just announced that Gmail will be encrypted all the time." Read the article here.
Clip Art, Photos, Recent Discoveries
What a clever picture. It grabbed my attention and I just had to read what the article said. Ever said that?
Google to the rescue. Well, first I emailed John Carter to ask where he’d found the photo he posted to the pmug.us website.
Practical Privacy
"Here is an interesting article on browser privacy mode," remarks David Passell. "A use that really stood out for me was the way to circumvent the NY times 10 article/month limit. I will have to try that since I used to get a lot of news from NY Times site before they began charging. Now I use the freely available BBC news site." Look here.
If you're using Safari and have clicked Block Cookies Always, and are continually aggravated at the number of Cookies noted, you might see if Private Browsing works for you.
Security Flaw Warning
Jim Hamm informs us, "Here is an article about a vulnerability in iOS and OS X on a shared network you should be aware of." http://gizmodo.com/why-apples-huge-security-flaw-is-so-scary-1529041062.
Secure From Hackers?
The headline brought attention to a new hackers' method: http://www.foxnews.com/tech/2013/12/12/computers-can-be-hacked-with-high-frequency-sounds/?intcmp=obnetwork
Time to get John Carter's opinion of the serious possibilities. This is what he has to say, "This technique takes advantage of the audio input/output on the computer. Most notably, the computers mentioned were a Lenovo business computer. Also mentioned was Linux. Now, if Linux computers can be hacked like this, so can a Mac or any smart phone or tablet.
Adobe Security Breach
"The recent hacking of passwords stored by Adobe seems to have expanded," declares Jim Hamm. He goes on to say, "Take a read on this article. This is one reason why I haven't stored any passwords in the 'Cloud" -- I'm concerned about security breaches such as this. I like to keep my passwords close to me."
Flash Player on Mavericks
Now that we know what "sandboxed" is read this good news about Flash Player found by Jim Hamm here: http://appleinsider.com/articles/13/10/24/adobe-confirms-flash-player-is-sandboxed-in-safari-for-os-x-mavericks-
You Can Sandbox Flash Player
You can Sandbox Flash Player in Safari for OS Mavericks as described and explained in this article http://techland.time.com/2013/10/24/finally-you-can-sandbox-flash-player-in-safari-for-os-x-mavericks/
What’s an “app sandbox?. Here’s Apple’s guide to this protection for your security. https://developer.apple.com/library/mac/documentation/Security/Conceptual/AppSandboxDesignGuide/AboutAppSandbox/AboutAppSandbox.html
Prevent Google From Monetizing Your Face
"Here's an article that may be of interest. I opted out (deselected) from permitting Google to use my picture or opinion for anything. Also, In iOS 7, I turned on 'Limit Ad Tracking' as well in the privacy settings," Jim Hamm informs us.
Password Problems
After speaking to the PMUG meeting this morning, Jim Hamm informs us, "Here's another article about the NSA after our passwords again. As I discussed in my presentation today, articles about passwords and password hacking are increasingly in the news.
Privacy Settings in iOS 7
"Here is an article with some suggestions for privacy settings in iOS 7," Jim Hamm wants us to know.
Dropbox Peeks at Your Files
"Although I like and use Dropbox frequently, here's an article that reminds us nothing is secure in the 'cloud', unless it's encrypted, and even then NSA might take a peek at your documents," notes Jim Hamm. Here's the article for you to check: http://www.computerworld.com/s/article/9242384/Dropbox_takes_a_peek_at_files?source=CTWNLE_nlt_dailyam_2013-09-13
Snooping at Free Public WiFi
"If you occasionally use free public WiFi, say at a cafe or the library, here's an article you might read about what other people can see on the network," warns Jim Hamm.
Google Defends Sanning Email
"Here is an article discussing how Google defends their scanning every email sent or received through Gmail. Google says this is a 'normal business practice', and uses the info to tailor ads that appear beside your inbox." Jim Hamm continues, "I use Gmail, and the adds don't bother me, but I'm not fond of the idea of Google scanning the contents of every email sent through their system. On the other hand, Google is providing a useful service for free, so something or someone has to foot the costs.
No, Your Data Isn't Secure in the Cloud
John Carter wants to share his viewpoint on security in the Cloud. "You do understand that it's the government that is insisting on an open book for all personal information, yet they also insist on not telling us anything they don't want us to know about - like what really happened at Roswell and other places.
Storage Security?
Yes, we're still concerned about storage security. Jim Hamm writes, "For your possible interest, here is an article about storage security -- or lack thereof -- in the cloud. For reasons mentioned in the article, I don't, and wouldn't, store passwords in the cloud. I wouldn't even use a Password Manager to store passwords in the cloud."
http://www.computerworld.com/s/article/9241553/No_your_data_isn_t_secure_in_the_cloud?taxonomyId=223&pageNumber=1
OS X Mavericks: Hands-On
"Here is an article from MacWorld with comments about their hands-on experience with OS X Mavericks, to be released this fall. With various recent articles commenting on password security -- or lack thereof -- in browsers, read the section about a new feature: iCloud Keychain," Jim Hamm informs us. Scroll down about half way for that password security feature.
Is Your Router Vulnerable?
With his thoughtful suggestion Jim Hamm forwards an interesting site. He starts off, "Here is a description and test to see whether your router may be vulnerable to a UPnP discovery request. I ran the test, and our router is not vulnerable.
And this is the latest addition from Jim, "Here is more information on the Universal Plug and Play (UPnP) vulnerability issue. Although this article came out a while back, I guess reading it now is better late than never."
So, What Do You Want Them to Know?
See http://www.worldprivacyforum.org lists articles on ID theft, security, privacy, cloud computing, medical info on HIPAA, medical identity theft, and more.
Lots of links are provided on this website. One article brought to our attention was “Top ten opt out list.” The information goes into detail and when printed out is 12 pages long as it describes the various opt-outs you can use to stop information about you from being collected, circulated, and sold among various companies and government agencies.
One company is described which builds detailed dossiers on consumers with “information scraped from social networking sites like Facebook, and is combined with public record data.” Dossiers have been used in political campaigns and other businesses. According to their quotation from Wall Street Journal this company’s segments recently included “a person's household income range, age range, political leaning, and gender and age of children in the household, as well as interests in topics including religion, the Bible, gambling, tobacco, adult entertainment and ‘get rich quick’ offers. In all . . . more than 400 categories, the documents indicated."
This site also gives consumer tips and links on how to get your free annual credit report.
A February 2010 report discloses Digital Signage Privacy Principles which might be a new term and a previously unexplained form of sophisticated digital information collection.
Defending privacy at the U.S. Border: a guide for travelers carrying digital devices states that “for now, a border agent has the legal authority to search your electronic devices at the border even if she has no reason to think that you’ve done anything wrong.”
It discusses such agencies as CBP, ICE, TSA. Which other countries have you recently visited before entering the United States? What other connections do you have there?
Be aware of two basic precautions: make regular backups so if your computer is ever taken, lost or destroyed you’ll still have access to your data, and encrypt the information on your computer.
It gives details on how and why. Talks about hard drives, flash drives, mobile phones, details, date and disk encryption, digital cameras. It goes into how to interact with border agents, what to say, how to behave. The appendix lists 47 sources and their links with descriptions.
You can click to download a PDF with this material. This might be something you’d want to pass along to your grown kids and friends who plan to travel this summer.
These are not just the yummy ones Ginger brings to PMUG! Read on . . .
Using Firefox: are you collecting lots and lots of cookies? See how to view history and clear what you don’t want saved. http://support.mozilla.org/en-US/kb/how-clear-firefox-cache Using Safari: http://support.apple.com/kb/HT1677
A handy little thumb drive can hold a lot of info. But they can be misplaced, lost, mishandled. Make a plan to store them and use them. How long of a life do they have? Probably you’ll want to back one up, then buy a new one & copy over again in a few years?
An infected USB thumb drive can infect a computer. This discusses software encryption, hardware encryption. http://en.wikipedia.org/wiki/Secure_USB_drive
Oh, it was a young man’s voice on the phone, but he said, “Grandma, I’m calling from Rome and I need help.” Who wouldn’t be concerned? How did he travel so far from home? What’s going on? Asking a few questions like, “Maybe you have the wrong number. What did you say your name was? What’s your sister’s name?” Ask anything that only the real grandson could possibly know. “Give me your phone number and I’ll call you back after I ...“ Make some quick excuse and sound sort of confused. Your brain’s internal warning device is in full swing now. You’ve heard about scams like this. Don’t be cheated out of your $$$.
Facebook gives crooks the information so they can find information to pretend to be your grandchild. http://newyork.cbslocal.com/2013/01/16/scam-artists-using-facebook-to-target-grandparents/
Alert your grandkids about posting information on Facebook, etc that would jeopardize you or them! A good reminder now and then shows you care about their safety.
While we are bemoaning the loss of truth, honesty, and respect in the world today we of the “generation with years of experience” must continue to be relevant and responsible. It’s part of our heritage, how mama and dad raised us to be decent and trustworthy. It’s like doing push-ups for exercise. Now, we’re exercising our brains. And part of that is continuing communication. Listen and learn. Respond as best as you can!
Let your computer help you keep in touch. Let PMUG help you learn.