Kesar Tech

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 30 December 2013

73% Of U.S. Adults Use Social Networks.

Posted on 20:33 by Unknown
Hello and I hope everyone had a Merry Christmas.
I think the title speaks for its self.
More and more adults are using social media either to reconnect with family & friends, stay connected with them, or  to see what's going on around them, just to name a few things.
Check out the article to see which one leads the pack for popularity.
Have a safe and Happy New Year.

http://techcrunch.com/2013/12/30/pew-social-networking/
Read More
Posted in Informative | No comments

Thursday, 12 December 2013

iPhone 5C will be just $27 this Friday in Walmart

Posted on 15:00 by Unknown
Yes, you read the title right: "iPhone 5C will be just $27 this Friday in Walmart."

Before you get too excited, this is a deal on the iPhone 5C, not the more premium iPhone 5S.
The 5C is the basic one and normally sells for $99.00. Still, $27 is a good price if you don't need all the bells and whistles. If you want 5S, it too will be on sale for $127.00 down from $199.00.


Read the following article for all the details.

http://www.geek.com/apple/iphone-5c-will-be-just-27-this-friday-in-walmart-1579527/

5c
Read More
Posted in Informative | No comments

Friday, 6 December 2013

Somebody is watching you and using your own smartphone to do it.

Posted on 07:32 by Unknown
Have you ever had that feeling that someone was watching you. If you have the mSpy application installed on your smartphone or tablet, they could be.

mSpy is a mobile surveillance application that runs on smartphones and tablets including iPhone, Android, BlackBerry, Symbian, iPad and Galaxy Tab devices.

From the company's disclaimer:
My Spy (mSpy) is designed for monitoring your children, employees or others on a smartphone or mobile device that you own or have proper consent to monitor. You are required to notify users of the device that they are being monitored.
Its maker claims that the app is 100% undetectable by the device user, as a sale rep told The Next Web:
After complete installation the application runs in a stealth mode, so it is undetectable and completely invisible for the target phone’s user.
This is some scary stuff. That's why I still carry one of these.
 

http://nakedsecurity.sophos.com/2013/12/05/mspy-app-lets-someone-remotely-snoop-on-you-through-your-phone-or-tablet/
Read More
Posted in Security | No comments

Cyber Monday sting seizes 706 counterfeit sites.

Posted on 07:18 by Unknown
This article points out just how serious the bad guys are to take your money. 706 counterfeit sites were seized on Cyber Monday. These sites sell all kinds of stuff like: counterfeit headphones, sports jerseys, personal care products, shoes, toys, luxury goods, cell phones and electronic accessories.

This explains why the Nike shoes I got last year had the swooshes upside down.

http://nakedsecurity.sophos.com/2013/12/04/cyber-monday-sting-seizes-706-counterfeit-sites/


Read More
Posted in Informative | No comments

2 million passwords stolen in massive hack

Posted on 07:03 by Unknown
Yes, a file containing 2 million passwords has been found on the Internet for use by hackers. The list of sites associated with the file is as follows: Facebook,, Google,, Yahoo, Twitter,  LinkedIn, and others.


http://money.msn.com/top-stocks/post--2-million-passwords-stolen-in-massive-hack?ocid=ansmony11

This article also has a list of the most popular passwords which they suggest you change if your is on the list.


Read More
Posted in Security | No comments

Monday, 2 December 2013

On Cyber Monday, here’s how to not get cyber scammed.

Posted on 08:04 by Unknown
Good morning and I hope everyone had a great Thanksgiving.
Black Friday week is over and now we move onto the latest special shopping day: Cyber Monday!

Tis the day to get monster deals online.

But just because Cyber Monday lacks the threat of being trampled to death by a hoard of penny pinchers or the threat of getting into a stun gun fight like the two women in the Franklin Mills Mall in Northeast Philadelphia this past Black Friday, that doesn’t mean you’re safe. Scammers, hackers, and swindlers of all types are lurking in grungy basements around the world, ready to dupe anyone who fails to properly protect their e-commerce transactions.
Here’s everything you need to do to make sure your Cyber Monday goes off without a hitch.

Get updated
Software updates can be annoying, but they often include key protections against the latest security threats. To have the best chance of escaping Cyber Monday without any battle wounds, install updates for your Web browsers, email clients, and operating systems.

Antivirus all the way
Many of the online threats this year come from malware that can steal your payment information and otherwise wreak havoc on your life. To limit the chances of getting pawned by a virus, make sure you have antivirus software installed and activated. There are many quality free versions to choose from, which you can check out here:
http://freebies.about.com/od/computerfreebies/tp/best-free-antivirus.htm

Ignore emails and pop-ups
Even if you have antivirus software up and running, there’s no guarantee that you’re completely safe. To further avoid allowing any life-screwing viruses onto your machine, don’t click any pop-up ads, as they may contain malicious software. Put any Cyber Monday emails that include attachments directly in the trash – they may contain a virus. And always check the email address of any Cyber Monday deal offerings.

Look for the lock
This one is a no-brainer – and absolutely crucial. Anytime you go to check out online, “make sure the website you’re using has an SSL ‘padlock’ icon, which ensures information passed between a server and a browser remains private,” says J.D. Sherry, a vice president at cybersecurity firm Trend Micro. “The symbol should appear in the far left corner of your browser’s search bar.”
Another way to know that your connection is secure is to look at the URL in your browser, which should show “HTTPS,” rather than just “HTTP.” If you don’t see the padlock icon or HTTPS, don’t enter any personal or payment information, close the window, and shop somewhere else.

Credit, not debit
Credit and debit cards are so similar that it’s easy to forget how different they are. But when it comes to getting hit with fraudulent charges, the differences couldn’t be more important. With debit cards, it’s your money that’s being stolen, and it can often be difficult to recover those lost funds – right when you need them the most. With a credit card, on the other hand, no money is being taken from your bank account. And credit card companies are merciless when it comes to combating fraudulent activity.
In other words, if you’re shopping online, only use a credit card – it’s the safest bet. And keep close tabs on your statements – if anything looks out of the ordinary, call your credit card provider or bank immediately.

Switch it up
We all know that using quality passwords is essential – but it’s even more important when shopping online. Because of this, Sherry suggests you “use different passwords for every login you have to ensure your accounts are not compromised when you need them most.” If you’re not sure what makes a password good quality, check out our guide to crafting excellent passwords, and then change any passwords you’ve already created to make sure they are the best that they can be.
An even better option is to use a password manager app that will do all the heavy lifting for you. The best ones cost a bit of money, but they’ll keep you safe while saving you the hassle of remembering a billion different login credentials.

How to make a good password: http://netforbeginners.about.com/od/antivirusantispyware/tp/5-steps-to-a-strong-password.htm

Password Manger Apps:
http://password-management-software-review.toptenreviews.com/


Stick with what you know
There will be a ton of deals from all over the Web flying around on Cyber Monday, and a lot of them will seem too good to pass up. If staying safe and secure is a top priority, however, you’re best off only buying from online stores that you know and trust. Sure, SuperCheapGadgets.com might have the best deal – but can you trust it? Don’t take a risk and find out the hard way, even if it means spending a few bucks extra for the peace of mind.

Go for home base
As tempting as it may be to pop into a Starbucks to get some online shopping done in the middle of your offline present buying, don’t do it. Public Wi-Fi connections are ripe targets for cybercriminals looking to steal buyers’ personal information. Instead, only shop online from an Internet connection you know and trust – preferably a home connection that’s protected with a good password.

Beware of eBay, Craigslist, and so on
When you’re in a rush to get all your shopping done on one day, it’s easy to forget to take extra precautions. This is especially true on eBay & Craigslist where scammers can fool buyers directly with too-good deals. So don’t let your skepticism lapse just because you’re in a hurry. “Buyers should pay attention to the reputation of sellers,” says Joe Schumacher, a security consultant for mobile and cloud security company Neohapsis. “If you are buying from eBay or Craigslist, then look at the person’s rating and history before forking over hard-earned dollars.”

Stay regular
Just because it’s Cyber Monday doesn’t mean that you should be required to hand over any personal information, like Social Security Numbers, that you wouldn’t otherwise need to enter when buying things online. So if a site is asking you to enter anything out of the ordinary, stop the transaction immediately. There’s no reason any online store needs more than your name, billing and shipping address, payment info, and perhaps a coupon code or two.

Watch the step
Finally, stay on top of all your tracking information. That way you know when a package is supposed to arrive, and when it actually does. If it’s not there when you know it should be, you can call the shipping company to report a theft.


Follow these suggestions and it should be a very happy Cyber Monday and a Merry Christmas.


The preceding suggestions were courtesy of FoxNews.com
http://www.foxnews.com/tech/2013/12/02/cyber-monday-heres-how-to-not-get-cyber-screwed/

Read More
Posted in Informative | No comments

Wednesday, 20 November 2013

Carriers reject kill switch for stolen smartphones

Posted on 17:48 by Unknown
Hello again.
I have been hearing rumors about "Kill Switches" in smartphones for awhile.
For those of you that don't know or haven't heard of them, they are a LoJack type program that can render a stolen phone inoperable once activated. It can be activated one of two ways: either by calling your carrier or going to a website.

http://money.msn.com/business-news/article.aspx?feed=AP&date=20131119&id=17126346&ocid=ansmony11


The following article is from June 2013. It tells how Law Enforcement agencies are pushing for kill switches. They state the following reasons for them:

The theft of mobile devices – smartphones and tablets – is now called “the fastest-growing street crime” in America. People across the country have been stabbed and mugged at gunpoint for their electronic devices, which are easy to resell. A stolen iPhone can fetch $300 or more on the black market.
The numbers are staggering:
  • 1.6 million Americans had a handheld device stolen last year.
  • One in every three robberies nationwide involves a stolen cell phone.
  • Approximately half of all robberies in San Francisco involved a mobile communications device.
  • In New York City, cell phone robberies increased 40 percent in the past year. In 2012, a 26-year old chef at the Museum of Modern Art was killed for his iPhone. Police there now use the term “apple-picking” to refer to the theft of iPhones and other mobile products, like iPads.

http://www.nbcnews.com/business/law-enforcement-demands-smartphone-kill-switch-6C10315942

How do you feel about Kill Switches?
Read More
Posted in Informative | No comments

Sunday, 17 November 2013

Adobe Servers Hacked, 2.9 Million Customers Affected

Posted on 08:27 by Unknown

Hello & welcome back or if this is your first time, Welcome.
If you are a regular follower of this blog, you have heard me mention the flaws in Adobe security before. The following links are examples of this "hole" in their security.

The first link talks about how they got hacked and 2.9 million customers info were stolen. Info ranging from names, credit & debt card numbers, addresses, and other such stuff.

http://www.maximumpc.com/adobe_hacked_29_million_customers_affected_2013


This second link also talks about the breach, but mainly talks about some of the
"weak" passwords people used and how easy they were to obtain.

http://www.maximumpc.com/attention_adobe_hack_victims_123456_terrible_password

Hope you enjoy and are informed by these articles.
Take care.
Read More
Posted in Informative | No comments

Wednesday, 13 November 2013

Banking malware infections rise to highest level since 2002

Posted on 11:45 by Unknown
For all of those of you that do online banking.
It seems that cybercriminals are becoming more focused on stealing online banking credentials. Read the following article to learn more.

http://www.computerworld.com/s/article/9243969/Banking_malware_infections_rise_to_highest_level_since_2002
Read More
Posted in Security | No comments

Saturday, 26 October 2013

Crypto Locker Virus

Posted on 14:46 by Unknown
There is a new virus out there that is really nasty. It is called "The Crypto Locker Virus."
The virus enters your computer through an email that you open because it looks like it’s from a legitimate company such as FedEx or UPS. It locks your computer up so you cannot access anything. This computer virus asks for a ransom that ranges from $100 to $300 so your computer will be restored back to normal. Some users have been asked to pay up to $700, claims one.
Read the following articles to learn more and also learn how to remove it if you do get infected.


http://nakedsecurity.sophos.com/2013/10/18/cryptolocker-ransomware-see-how-it-works-learn-about-prevention-cleanup-and-recovery/

http://www.examiner.com/article/crypto-locker-virus-holds-computer-hostage-and-ransom-demanded-up-to-700
Read More
Posted in Security | No comments

Sunday, 8 September 2013

Banking Scam

Posted on 14:43 by Unknown
Hello Everyone,
I received the following scam email in my junk email account today.
Many thing alerted me that this was false.
* I have a Chase account, but I don't use it on Amazon.
* The email account that received this email isn't linked to my Chase account.
* You can't tell from this, but the return address was dragonflykiki969@onlinechase.com
 
The content of this email is almost spot on for a real Maintenance Alert. The differences are the phone number, the links to Chase.com are all capital "C" on Chase for the real alerts, and the return address is no-reply@alertsp.chase.com.
Also, I have no idea about the To: address because it isn't mine.
 
I have also heard that 1st Source Bank has had similar attempts on their customers.
Please be careful with stuff link this.

 
 
From: Chase
Sent: Saturday, September 07, 2013 1:28 PM
To: bhipshman1@gdlsk.com
Subject: An Alert from Amazon about Your Chase Maintenance

 

We're writing to let you know that we've updated your Account Alert preferences as you have requested.

If you believe you've received this message in error, please log on to www.chase.com or call (1-877-215-7372) immediately.

---------------------

To see all of the Alerts available to you, please log on to www.chase.com.

To reply to this Alert, please send us a secure message from your inbox on www.chase.com. 
Read More
Posted in Security | No comments

Tuesday, 20 August 2013

I know where you took that picture.

Posted on 19:09 by Unknown
I'm back!!  I haven't used this page in a while must of my posts have been to my Facebook account. To follow me on Facebook, click on the Facebook badge on my home page.
Smartphone photography has really taken off. You never need to worry about missing that once in a life time photo because you have a camera built into your phone. The market has taken off so fast and become so popular that phone manufactures are putting more emphasis on the camera part of it. One example is the new Microsoft  Nokia Lumia 1020. If anyone from Microsoft wants to send me a check for advertising their product feel free.
The purpose of this post is not to promote the phone or to tell you something you already know, but to tell you something you may not know. You smartphone photos can be tracked when you post them online. Your photos have GPS coordinates from where they were taken. Read the following story to find out more. . 

http://kyeos.wordpress.com/2013/05/10/warning-if-you-take-photos-with-your-cell-phone/

Remember, if you found this helpful follow this blog or better yet, follow me on Facebook.
Send any questions to me and I will do my best to answer them.
Read More
Posted in | No comments

Friday, 7 June 2013

Are We Overexposing Ourselves on Social Networks?

Posted on 07:37 by Unknown

   

Facebook, Twitter, Google+, YouTube, Pinterest, LinkedIn and other social networks have become an essential part of online lives. Social networks are a great approach to stay connected with others, but you should always be aware about how much personal information you post...
A Consumer Reports in 2012 investigation indicates 13 million U.S. Facebook users are oversharing — and likely don’t know it. That figure represents 8 percent of Facebook’s 150 million U.S. users, but it is part of an upward trend in users failing to protect themselves while on the social network — putting themselves at risk in the real world.
Most U.S. tweens, 10- to 12-year-olds, have at least one social media account and many go online without any supervision from their parents, according to a survey released on Tuesday.

Facebook is the most popular platform among tweens. Although the site says users must be at least 13 years old to log on, 85 percent of tweens said they have an account and a similar number admit they use it every day.
The threats to children of unsupervised use of the Internet are well known and range from identity theft, cyberbullying and sharing photos and videos to pornography and sexual predators.
Your social media reputation may also affect the possibility of you finding a job. It used to be that job candidates were judged on their resume, cover letter and references before the in-person interview. But now with social media, job candidates are being fully examined before even stepping foot into a human resources department, and some college students might find themselves at a disadvantage.

According to a survey conducted Abine Inc., an online privacy company, only 60% of graduates are not concerned about their online profiles affecting their ability to secure or keep a job, and experts say a candidate’s online presence and the content they post can make or break a job opportunity.
“Your digital footprint says a lot about you--it’s extremely accessible and the majority of employers are checking it and doing their due diligence on you just like you should do it on them when you’re applying for a job,” says Sarah Downey, privacy analyst at Abine. “There’s a lot of stuff out there that can either hurt you or help you depending on how on top of it you are.”
Here are 5 online dangers that you expose yourself to when connecting with people at any of these social networking sites:

Malware: Being social media today is all the rage it's quite easy to find large volumes of active users at any of these popular sites! This has created a target for those who have a 'twisted'  interest in planting malware on the computers of others! All it takes is for somebody to click on the 'wrong' link and bingo, your hardware or software have now been infected!

Phishing: Scam artist have found a new home on the internet and it suits their purposes perfectly! Where else are these 'bottom feeders' going to find an environment with so many potential and unsuspecting targets! Phishing for sensitive and private information has never been easier than within an environment where connecting with people on a social level is users prime objective! Do you REALLY know who it is you're talking to or sharing your thoughts or information with at these communities?

Damaged Reputation: One of the most common online dangers for anybody who uses social media today is that whatever they say is there for the entire world to see! As a result these sites are typically used as part of a screening process or background check by potential employers or other organizations! Getting 'caught up' in the moment when making comments or offering opinions can easily come back to haunt you!

StaySafeOnline.org has prepared a few tips and tactics for you to follow to ensure that you’re not sharing too much information on social networks:

Have your family follow these tips to safely enjoy social networking:
•    Privacy and security settings exist for a reason: Learn about and use the privacy and security settings on social networks. They are there to help you control who sees what you post and manage your online experience in a positive way.
•    Once posted, always posted: Protect your reputation on social networks. What you post online stays online. Think twice before posting pictures you wouldn’t want your parents or future employers to see. Recent research (http://www.microsoft.com/privacy/dpd/research.aspx) found that 70% of job recruiters rejected candidates based on information they found online.
•    Your online reputation can be a good thing:  Recent research (http://www.microsoft.com/privacy/dpd/research.aspx) also found that recruiters respond to a strong, positive personal brand online. So show your smarts, thoughtfulness, and mastery of the environment.
•    Keep personal info personal: Be cautious about how much personal information you provide on social networking sites. The more information you post, the easier it may be for a hacker or someone else to use that information to steal your identity, access your data, or commit other crimes such as stalking.
•    Know and manage your friends: Social networks can be used for a variety of purposes. Some of the fun is creating a large pool of friends from many aspects of your life. That doesn’t mean all friends are created equal. Use tools to manage the information you share with friends in different groups or even have multiple online pages. If you’re trying to create a public persona as a blogger or expert, create an open profile or a “fan” page that encourages broad participation and limits personal information. Use your personal profile to keep your real friends (the ones you know trust) more synched up with your daily life.
•    Be honest if you’re uncomfortable: If a friend posts something about you that makes you uncomfortable or you think is inappropriate, let them know. Likewise, stay open-minded if a friend approaches you because something you’ve posted makes him or her uncomfortable. People have different tolerances for how much the world knows about them respect those differences.
•    Know what action to take: If someone is harassing or threatening you, remove them from your friends list, block them, and report them to the site administrator.

Protect Yourself with these STOP. THINK. CONNECT. Tips:
•    Keep a clean machine: Having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats.
•    Own your online presence: When applicable, set the privacy and security settings on websites to your comfort level for information sharing. It’s ok to limit how you share information.
•    Make passwords long and strong: Combine capital and lowercase letters with numbers and symbols to create a more secure password.
•    Unique account, unique password: Separate passwords for every account helps to thwart cybercriminals.
•    When in doubt, throw it out: Links in email, tweets, posts, and online advertising are often the way cybercriminals compromise your computer. If it looks suspicious, even if you know the source, it’s best to delete or if appropriate, mark as junk email.
•    Post only about others as you have them post about you.
Read More
Posted in Informative | No comments

Friday, 26 April 2013

Ransomeware

Posted on 16:09 by Unknown
The following is a link to the newest scam out there. It's called "Ransomware"  I just recently had to clean two computers infected with this particular one. This one freezes their computer and accuses you of committing heinous crimes, like distributing child porn. "You have been viewing or distributing child porn ... violating article 202 of the Criminal Code of the United States of America," says one version, allegedly sent by the FBI.  The threats sound real enough that victims are coughing up $200 to pay a "fine," Of  course this is a scam to get your $200. Check-out the following link for the full story.


http://redtape.nbcnews.com/_news/2013/04/26/17917497-ransomware-tricks-victims-into-paying-hefty-fines
Read More
Posted in Security | No comments
Newer Posts Older Posts Home
Subscribe to: Comments (Atom)

Popular Posts

  • I need your help.
    Hello and thanks for tuning in for another episode of the Kesar Tech blog. Today I would like to go in a little bit of a different directi...
  • 10 Reasons to Root Your Android Device
    Hello & Happy New Year. For those of you with Android devices, here is a way to take control of your device. It's called "Rooti...
  • Belarc Advisor
    This entry is to explain what the Belarc Advisor link on this page is for. Belarc's products automatically create an accurate and up-to-...
  • How do you get infected with malware?
    The answer to the above question is: Social engineering! Several people have asked me this very question, so to you guys, here is your answe...
  • Welcome
    Let me first start by saying, I am by no means an expert at writing, so you will probably find many grammatical errors and maybe even a spel...
  • Extortionware / Rogue Security Software / Malware
    You may not be familiar with the terms ‘rogue software, extortionware, or malware’ but there’s a very good chance that you or someone you kn...
  • Cell phone privacy reminder
    Cell phone numbers became public in March, and telemarketing companies can now call you on your cell. If you do not want to receive these ca...
  • Banking Scam
    Hello Everyone, I received the following scam email in my junk email account today. Many thing alerted me that this was false. * I have a Ch...
  • Free Download F-Secure Anti-Theft for Mobile 6.2
    Are you worried about your mobile phone being stolen and all your info (contacts, account info, etc..) being used for evil? Have no fear F-S...
  • Beware of Christmas scams
    Scammers absolutely love the holiday season. There are likely to be more online scam victims during those busy shopping and travelling Decem...

Categories

  • Facebook
  • Informative
  • Other
  • Security

Blog Archive

  • ►  2014 (1)
    • ►  January (1)
  • ▼  2013 (14)
    • ▼  December (6)
      • 73% Of U.S. Adults Use Social Networks.
      • iPhone 5C will be just $27 this Friday in Walmart
      • Somebody is watching you and using your own smartp...
      • Cyber Monday sting seizes 706 counterfeit sites.
      • 2 million passwords stolen in massive hack
      • On Cyber Monday, here’s how to not get cyber scammed.
    • ►  November (3)
      • Carriers reject kill switch for stolen smartphones
      • Adobe Servers Hacked, 2.9 Million Customers Affected
      • Banking malware infections rise to highest level s...
    • ►  October (1)
      • Crypto Locker Virus
    • ►  September (1)
      • Banking Scam
    • ►  August (1)
      • I know where you took that picture.
    • ►  June (1)
      • Are We Overexposing Ourselves on Social Networks?
    • ►  April (1)
      • Ransomeware
  • ►  2012 (20)
    • ►  November (3)
    • ►  October (1)
    • ►  September (1)
    • ►  August (3)
    • ►  July (1)
    • ►  May (3)
    • ►  April (3)
    • ►  March (2)
    • ►  February (2)
    • ►  January (1)
  • ►  2011 (48)
    • ►  December (3)
    • ►  November (4)
    • ►  October (2)
    • ►  September (2)
    • ►  August (4)
    • ►  July (1)
    • ►  June (8)
    • ►  May (3)
    • ►  April (6)
    • ►  March (9)
    • ►  February (3)
    • ►  January (3)
  • ►  2010 (32)
    • ►  December (5)
    • ►  November (2)
    • ►  October (2)
    • ►  September (2)
    • ►  August (2)
    • ►  July (1)
    • ►  June (2)
    • ►  May (2)
    • ►  April (3)
    • ►  March (2)
    • ►  February (4)
    • ►  January (5)
Powered by Blogger.

About Me

Unknown
View my complete profile