Kesar Tech

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Sunday, 26 June 2011

Microsoft gets green light from feds to buy Skype.

Posted on 15:41 by Unknown
Microsoft is trying to get a bigger piece of the pie. Microsoft is expanding it's market by purchasing an established company -Skype. Read the following articles to findout more.

http://www.networkworld.com/news/2011/062011-microsoft-skype-deal-gets-us.html

http://www.bloomberg.com/news/2011-06-19/skype-fires-executives-avoiding-payouts-after-microsoft-buyout-closes.html

http://moconews.net/article/419-ftc-approves-skype-acquisition-by-microsoft-now-for-the-hard-part/
Read More
Posted in Informative | No comments

Malware, Spam Pose Greater Security Threat in 2011

Posted on 15:23 by Unknown
The latest reports out show that 2011 may show that Malware & Spam will be and are on the rise.  Read the following article to findout more.

http://www.eweek.com/c/a/Midmarket/Malware-Spam-Pose-Greater-Security-Threat-in-2011-882611/?kc=rss
Read More
Posted in Security | No comments

Wednesday, 15 June 2011

Google hones search for mobile and speed

Posted on 10:42 by Unknown
Hello and welcome to another installment of the Kesar Tech blog. Today, it is directed more toward the mobile phone users. The following articles are about Googles efferts to increase speed for it's mobile searches. Hope the these articles are helpful and informative. Until next time, safe computing.

http://www.reuters.com/article/2011/06/14/us-google-idUSTRE75D5C920110614

http://www.computerworlduk.com/news/applications/3286066/google-promotes-instant-pages-to-accelerate-search/
Read More
Posted in Informative | No comments

Thursday, 9 June 2011

Citigroup Inc gets hacked.

Posted on 16:12 by Unknown
   It seems yet another big business got hacked and had customer info stolen. Thousands of Citi customers at risk after hacker attack.

http://www.msnbc.msn.com/id/43335996/ns/business-personal_finance/
Read More
Posted in Informative | No comments

Wednesday, 8 June 2011

Smartphones get Malware.

Posted on 13:08 by Unknown
The following article is for my Anroid smartphone using readers. Seems there is an app that downloads Malware to your phone called "Droid Dream." Read the following article to find out more.

http://smartphone.biz-news.com/news/en_US/2011/06/08/0001/new-mobile-malware-droid-dream-affected-around-120-000-android-users-badly
Read More
Posted in Security | No comments

Free is the new thing.

Posted on 12:33 by Unknown
Yes, it's me again. Three times in one day, I know what you are thinking, "He must be bored!"  I am, but beside that, it's too hot to do anything outside. Here is the latest article I read and thought I would pass along.

http://www.pcworld.com/businesscenter/article/229610/free_antivirus_programs_rise_in_popularity_new_survey_shows.html

Hope you enjoy.
Read More
Posted in Informative | No comments

5 Tips to Keep You and Your Family Computer Safe This Summer.

Posted on 07:23 by Unknown
Summer is here and kids of all ages have a little free time on their hands and will inevitably be logging more hours on the computer, probably online.  While most young web surfers think they know more than their parents because they have grown up in an online world, they are also one of the most targeted groups by identity thieves and cyber criminals — among the least protected against intruders, and often lacking basic online privacy and safety knowledge.


How can you make sure that your kids have fun and stay safe when they go online? Keep reading for a look  at the  top 5 essential tips to help keep your family secure as they spend time on the Web this summer.



1.Set limits to establish good Internet behavior and habits.
Establish clear family rules, make sure everyone understands them, and post them by the PC so they are quickly on hand. Essential areas to cover include:

◦The maximum amount of time spent online per day.

◦Whether or not social networking sites can be used, and how to use them.

◦Who can or cannot be communicated with online.

◦What sites and content are appropriate or inappropriate to browse or play on.

◦The ability to download and install programs or files. (It's a good rule of thumb to always have kids check with an adult before they install anything on the family PC.) I recommend setting up a separate user account for the kids with a limited user account. This way, they can not download or install anything without your permission. Of course that means you have to password protect your account if you haven't already done it.


2.Understand what information is confidential.
 Have a clear understanding of what information is okay to give out, and what is not — and explain it to your kids.

It's especially important to emphasize the necessity of keeping the following details private:

◦Passwords (don't even share them with friends)

◦Banking, credit card, or payment details

◦Personal facts that should not be shared with strangers, such as address, full date of birth.



3.Create awareness about real-world threats that cross over into their online world, like online predators and cyber bullying.
The Internet is an effortless way for kids to meet old friends and make new ones, just as it is for adults. But, online intruders are known to take advantage of the Web's openness and anonymity to prey on young people. At the same time, statistics show that children may be more likely to experience online harassment from their peers, known as cyber bullying, than to be targeted by a stranger. Go over what these threats are, and what to do if kids encounter a potentially threatening situation.


4.Be prepared for stealthy security threats.
Make certain that you have security measures in place on your computer before disaster strikes. Don't assume that child-friendly sites are free from aggressive ads and malicious content. These sites may have advertisements popping-up regularly or attempt to download programs without your child asking for them. Even mainstream sites are subject to stealthy attack techniques like SQL injections and drive-by-downloads.

At a minimum, you should:

◦Install security software (anti-spyware, anti-virus, and a firewall) and keep it up-to-date. Make sure family member are aware of what security software you have, and warn them to be aware of messages and prompts from rogue security software and scareware, designed to trick them into purchasing fake products or giving away personal information.

◦Patch your operating system and other applications as soon as updates become available.

◦In Windows, operate under a limited user account, not the all-powerful administrator account.



5.Plug-in to your kids' online lives — and let them know you're watching. 
 According to the Norton Online Family report, a study released in mid-June 2010 that surveyed kids and adults in 14 countries around the world about their online experiences, 20 percent of kids say that their parents have “no idea” of what they do online. It's important to provide your kids with the online supervision they need to make good choices and stay secure. Need help on how to do that? The StaySafeOnline.org website is an excellent resource to learn more on how to guide your children as they use the Internet.
Read More
Posted in Informative | No comments

Protecting Your Privacy.

Posted on 06:40 by Unknown
As the following article shows, it doesn't matter how safe you are about your personal info, if bad guys what it they will get it. You just have to limit what you give them.

"We share more and more personal details about ourselves online, but you may still be surprised when you find actually how much information really is available about you. Gaining rapidly in popularity are information-gathering websites, such as Spokeo and Intelius that pull information from government databases and hundreds of social-networking sites. For a small amount, you can run a complete background check on someone and get access to income, occupation, address, number of people in your household, spouse's name, credit status, education, and religion. It even offers a satellite photo of your house, complete with an estimated value, and personal photos gathered from various social networks.


All of this data comes from public records, so technically, they are not doing anything illegal, but it is still a strong wake-up call to consider your digital footprint.

So what can you do to protect your privacy? With Spokeo, you can remove the listing. To do so, visit: http://www.spokeo.com/privacy

However, as they point out on their website, “Spokeo aggregates publicly available information from third party sources. Therefore, removing a listing from our directory will not remove your information from its original source and therefore your information might still appear on other directory sites.”


Combined with the information that is available from public records, more and more people are using location-based services like Foresquare and Facebook Places, to let people know where they are. These services let users check in to different locations, via smartphones, and to share their location with their social network friends. It also gives users the option to "tag" friends who are with them at that same location. This may seem like a fun feature, but it also raises a multitude of security and privacy issues as there is a lot of opportunity for misuse. It could, for example, be a burglar’s, or a stalkers, dream. Want to know where someone is? Check Facebook. Want to know when someone is away from home? Check Facebook.

Always think twice and be extra cautious of what information you share and with whom. And remember, if you wouldn’t give the information to a stranger, you probably shouldn’t be posting it online."
Read More
Posted in Security | No comments
Newer Posts Older Posts Home
Subscribe to: Comments (Atom)

Popular Posts

  • I need your help.
    Hello and thanks for tuning in for another episode of the Kesar Tech blog. Today I would like to go in a little bit of a different directi...
  • 10 Reasons to Root Your Android Device
    Hello & Happy New Year. For those of you with Android devices, here is a way to take control of your device. It's called "Rooti...
  • Belarc Advisor
    This entry is to explain what the Belarc Advisor link on this page is for. Belarc's products automatically create an accurate and up-to-...
  • How do you get infected with malware?
    The answer to the above question is: Social engineering! Several people have asked me this very question, so to you guys, here is your answe...
  • Welcome
    Let me first start by saying, I am by no means an expert at writing, so you will probably find many grammatical errors and maybe even a spel...
  • Extortionware / Rogue Security Software / Malware
    You may not be familiar with the terms ‘rogue software, extortionware, or malware’ but there’s a very good chance that you or someone you kn...
  • Cell phone privacy reminder
    Cell phone numbers became public in March, and telemarketing companies can now call you on your cell. If you do not want to receive these ca...
  • Banking Scam
    Hello Everyone, I received the following scam email in my junk email account today. Many thing alerted me that this was false. * I have a Ch...
  • Free Download F-Secure Anti-Theft for Mobile 6.2
    Are you worried about your mobile phone being stolen and all your info (contacts, account info, etc..) being used for evil? Have no fear F-S...
  • Beware of Christmas scams
    Scammers absolutely love the holiday season. There are likely to be more online scam victims during those busy shopping and travelling Decem...

Categories

  • Facebook
  • Informative
  • Other
  • Security

Blog Archive

  • ►  2014 (1)
    • ►  January (1)
  • ►  2013 (14)
    • ►  December (6)
    • ►  November (3)
    • ►  October (1)
    • ►  September (1)
    • ►  August (1)
    • ►  June (1)
    • ►  April (1)
  • ►  2012 (20)
    • ►  November (3)
    • ►  October (1)
    • ►  September (1)
    • ►  August (3)
    • ►  July (1)
    • ►  May (3)
    • ►  April (3)
    • ►  March (2)
    • ►  February (2)
    • ►  January (1)
  • ▼  2011 (48)
    • ►  December (3)
    • ►  November (4)
    • ►  October (2)
    • ►  September (2)
    • ►  August (4)
    • ►  July (1)
    • ▼  June (8)
      • Microsoft gets green light from feds to buy Skype.
      • Malware, Spam Pose Greater Security Threat in 2011
      • Google hones search for mobile and speed
      • Citigroup Inc gets hacked.
      • Smartphones get Malware.
      • Free is the new thing.
      • 5 Tips to Keep You and Your Family Computer Safe T...
      • Protecting Your Privacy.
    • ►  May (3)
    • ►  April (6)
    • ►  March (9)
    • ►  February (3)
    • ►  January (3)
  • ►  2010 (32)
    • ►  December (5)
    • ►  November (2)
    • ►  October (2)
    • ►  September (2)
    • ►  August (2)
    • ►  July (1)
    • ►  June (2)
    • ►  May (2)
    • ►  April (3)
    • ►  March (2)
    • ►  February (4)
    • ►  January (5)
Powered by Blogger.

About Me

Unknown
View my complete profile