Kesar Tech

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, 20 November 2013

Carriers reject kill switch for stolen smartphones

Posted on 17:48 by Unknown
Hello again.
I have been hearing rumors about "Kill Switches" in smartphones for awhile.
For those of you that don't know or haven't heard of them, they are a LoJack type program that can render a stolen phone inoperable once activated. It can be activated one of two ways: either by calling your carrier or going to a website.

http://money.msn.com/business-news/article.aspx?feed=AP&date=20131119&id=17126346&ocid=ansmony11


The following article is from June 2013. It tells how Law Enforcement agencies are pushing for kill switches. They state the following reasons for them:

The theft of mobile devices – smartphones and tablets – is now called “the fastest-growing street crime” in America. People across the country have been stabbed and mugged at gunpoint for their electronic devices, which are easy to resell. A stolen iPhone can fetch $300 or more on the black market.
The numbers are staggering:
  • 1.6 million Americans had a handheld device stolen last year.
  • One in every three robberies nationwide involves a stolen cell phone.
  • Approximately half of all robberies in San Francisco involved a mobile communications device.
  • In New York City, cell phone robberies increased 40 percent in the past year. In 2012, a 26-year old chef at the Museum of Modern Art was killed for his iPhone. Police there now use the term “apple-picking” to refer to the theft of iPhones and other mobile products, like iPads.

http://www.nbcnews.com/business/law-enforcement-demands-smartphone-kill-switch-6C10315942

How do you feel about Kill Switches?
Read More
Posted in Informative | No comments

Sunday, 17 November 2013

Adobe Servers Hacked, 2.9 Million Customers Affected

Posted on 08:27 by Unknown

Hello & welcome back or if this is your first time, Welcome.
If you are a regular follower of this blog, you have heard me mention the flaws in Adobe security before. The following links are examples of this "hole" in their security.

The first link talks about how they got hacked and 2.9 million customers info were stolen. Info ranging from names, credit & debt card numbers, addresses, and other such stuff.

http://www.maximumpc.com/adobe_hacked_29_million_customers_affected_2013


This second link also talks about the breach, but mainly talks about some of the
"weak" passwords people used and how easy they were to obtain.

http://www.maximumpc.com/attention_adobe_hack_victims_123456_terrible_password

Hope you enjoy and are informed by these articles.
Take care.
Read More
Posted in Informative | No comments

Wednesday, 13 November 2013

Banking malware infections rise to highest level since 2002

Posted on 11:45 by Unknown
For all of those of you that do online banking.
It seems that cybercriminals are becoming more focused on stealing online banking credentials. Read the following article to learn more.

http://www.computerworld.com/s/article/9243969/Banking_malware_infections_rise_to_highest_level_since_2002
Read More
Posted in Security | No comments
Newer Posts Older Posts Home
Subscribe to: Comments (Atom)

Popular Posts

  • I need your help.
    Hello and thanks for tuning in for another episode of the Kesar Tech blog. Today I would like to go in a little bit of a different directi...
  • 10 Reasons to Root Your Android Device
    Hello & Happy New Year. For those of you with Android devices, here is a way to take control of your device. It's called "Rooti...
  • Belarc Advisor
    This entry is to explain what the Belarc Advisor link on this page is for. Belarc's products automatically create an accurate and up-to-...
  • How do you get infected with malware?
    The answer to the above question is: Social engineering! Several people have asked me this very question, so to you guys, here is your answe...
  • Welcome
    Let me first start by saying, I am by no means an expert at writing, so you will probably find many grammatical errors and maybe even a spel...
  • Extortionware / Rogue Security Software / Malware
    You may not be familiar with the terms ‘rogue software, extortionware, or malware’ but there’s a very good chance that you or someone you kn...
  • Cell phone privacy reminder
    Cell phone numbers became public in March, and telemarketing companies can now call you on your cell. If you do not want to receive these ca...
  • Banking Scam
    Hello Everyone, I received the following scam email in my junk email account today. Many thing alerted me that this was false. * I have a Ch...
  • Free Download F-Secure Anti-Theft for Mobile 6.2
    Are you worried about your mobile phone being stolen and all your info (contacts, account info, etc..) being used for evil? Have no fear F-S...
  • Beware of Christmas scams
    Scammers absolutely love the holiday season. There are likely to be more online scam victims during those busy shopping and travelling Decem...

Categories

  • Facebook
  • Informative
  • Other
  • Security

Blog Archive

  • ►  2014 (1)
    • ►  January (1)
  • ▼  2013 (14)
    • ►  December (6)
    • ▼  November (3)
      • Carriers reject kill switch for stolen smartphones
      • Adobe Servers Hacked, 2.9 Million Customers Affected
      • Banking malware infections rise to highest level s...
    • ►  October (1)
    • ►  September (1)
    • ►  August (1)
    • ►  June (1)
    • ►  April (1)
  • ►  2012 (20)
    • ►  November (3)
    • ►  October (1)
    • ►  September (1)
    • ►  August (3)
    • ►  July (1)
    • ►  May (3)
    • ►  April (3)
    • ►  March (2)
    • ►  February (2)
    • ►  January (1)
  • ►  2011 (48)
    • ►  December (3)
    • ►  November (4)
    • ►  October (2)
    • ►  September (2)
    • ►  August (4)
    • ►  July (1)
    • ►  June (8)
    • ►  May (3)
    • ►  April (6)
    • ►  March (9)
    • ►  February (3)
    • ►  January (3)
  • ►  2010 (32)
    • ►  December (5)
    • ►  November (2)
    • ►  October (2)
    • ►  September (2)
    • ►  August (2)
    • ►  July (1)
    • ►  June (2)
    • ►  May (2)
    • ►  April (3)
    • ►  March (2)
    • ►  February (4)
    • ►  January (5)
Powered by Blogger.

About Me

Unknown
View my complete profile