Child Predators Shifting to Blackmail

(Image is in the Public Domain)

It seems that online predators are getting tired of savvy kids that know better than to be lured (or they're just getting lazy/impatient). Either way, one police group is warning that predators are shifting to a strategy of blackmail instead.

As always, be aware of what your kids are doing online and know who their friends are. Make sure they know what to do when threatened by someone online.

Tags: , , ,

How to Watch TV Shows For Free Legally

(Image used under: Creative Commons 2.0 [SRC])

Here's an article listing (and rating) the various ways to watch download/watch TV legally.

Tags:

“Spore” Dying Under DRM

DRM
(Image is in the Public Domain)

Spore, the long-awaited video game from the creator of Sim-City and the Sims has finally been released, but with a catch. It includes invasive Digital Rights Management (DRM) that has resulted in a movement by gamers to keep the Amazon.com score at the absolute bottom.

I hate to see a good game go down, but no company has the right to try so hard to control how we use our legally purchased software.

Tags: , , , ,

The World’s First “Unclonable” RFID Chip – Yeah Right

(Image used under: Creative Commons 2.0 [SRC])

The website includes very loose information about what makes this chip so "uncloneable", but I highly doubt that it's true. An RFID chip is read by radio waves and as long as you can make a chip, computer, or anything else that transmits replicate the signal that the original chip did, you can clone it.

If they mean that you can't make one of these chips copy the data from another of these chips, I can see that as being possible, but what difference does that make in the end if I can use a different brand chip to open your secure door or travel the world in your name?

Tags:

Ten of The Coolest Science Videos You’ll Ever See

(Image used under: Creative Commons 2.0 [SRC])

An equalizer made of pure flame, music played with pure electricity, and others. You should really check this out.

Tags: ,

Possible Trend: Movies on USB Drives

To the movies!
(Image is in the Public Domain)

Ghostbusters has become the first movie to be distributed on a USB drive. It includes a strong form of DRM that they hope will prevent people from copying it. Whether that proves more effective than the DRM they've tried on DVDs remains to be seen.

Tags: ,

Stealing Cellphone Data Takes Only Seconds

Digital Pickpocketing
(Image used under: Creative Commons 2.0 [SRC])

There's a small device that when plugged into many cellphone brands (and the list is growing) that can copy all data on the phone. In other words, if someone wanted to know every bit of data you have on your phone, they could ask to "borrow it for second", plug this thing in when you weren't looking and hand it back.

While designed for law enforcement, this device is available to the public for only ~$200

The rule: if your phone contains sensitive data, do not leave it unattended. If you loan it to someone to use because they tell you theirs is not working, make sure you actually see them using the phone and there is nothing connected to it.
Tags:

How RFID Tags in Products You Own Can Be Used to Track You

(Image used under: Creative Commons 2.0 [SRC])

Katherine Albrecht has written has written an article for Scientific American that everyone should read. For those who don't already know her, she's the leader of CASPIAN and one of the world's foremost experts on RFID privacy issues.

Here is a mini summary of some of the major points:

  • Companies intend to replace barcodes with RFID
  • Unlike barcodes which identify a product type (i.e. a can of soda), RFID will identify an INDIVIDUAL product (i.e. can of coke #48377625376)
  • RFID tags can be read secretly from long distances (30 or more feet).
  • RFID tags in licenses have minimal security (and even passports that have more security have been hacked already many times)
  • IBM filed a patent that was granted in 2006 for a system of scanners at “shopping malls, airports, train stations, bus stations, elevators, trains, airplanes, restrooms, sports arenas, libraries, theaters, [and] mu­­se­­ums ? to track the movements of people by their RFID tags
  • Alton Towers (an English amusement park) issues RFID wristbands to visitors and tracks their movements through the park. While they use it to create a keepsake "where you went" map for their customers, they prove that the system works in practice
Tags:

Beware Google Browser’s License Agreement

Read the terms, don't like what you see.
(Image used under: Creative Commons 2.0 [SRC])

As I suspected, a product from a company like Google shouldn't be trusted without scrutiny. They've developed a new open-source Internet browser to compete with Firefox and Internet Explorer, but if you read carefully, you might notice this:

You retain copyright and any other rights you already hold in Content which you submit, post or display on or through, the Services. By submitting, posting or displaying the content you give Google a perpetual, irrevocable, worldwide, royalty-free, and non-exclusive license to reproduce, adapt, modify, translate, publish, publicly perform, publicly display and distribute any Content which you submit, post or display on or through, the Services. This license is for the sole purpose of enabling Google to display, distribute and promote the Services and may be revoked for certain Services as defined in the Additional Terms of those Services.

11.2 You agree that this license includes a right for Google to make such Content available to other companies, organizations or individuals with whom Google has relationships for the provision of syndicated services, and to use such Content in connection with the provision of those services.

So anything you submit through the Google browser can be stored and used for either promotion purposes or for selling to 3rd parties. In other words, Google browser is nothing more than the most sophisticated data-brokering device yet created (or spyware in other words).

Google may have the best search engine around, but their privacy policies are and have always been complete crap.

2008 Sept, 04 Update

Well that was fast. Google has updated it's EULA to remove any reference to them holding rights to what you own. It looks like they just cut-and-pasted their EULA from Google docs (which still has that problem). Now it reads like this:
11.1 You retain copyright and any other rights that you already hold in Content that you submit, post or display on or through the Services.
Surprisingly forward thinking.
Tags: , ,

Diebold Finally Admits Voting Machines Lose Votes

(Image is in the Public Domain)

Though they originally blamed it on anti-virus software on the machines, Diebold has admitted that it was coding error that leads its machines to drop votes. Hopefully that will help in the lawsuit against Diebold and encourage others states to recoup their losses as well.

Tags: , ,

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

computer security Tutorial
|INDEX|next: Spyware Scanners

Security Software

Make sure you have a up-to-date Anti-Virus Program to protect you against bad websites or files.
Sometimes spyware gets in your computer and the anti-virus won't stop it. Use a spyware scanner to find and remove spyware and adware.
Use a software firewall to detect bad code on your computer when it tries to connect to the Internet.
Always keep your system up to date with security patches or none of the rest of your security software will matter.
Use an encryption tool to protect your important data when storing or transmitting it.
Switch to Firefox for your web browsing and you'll be better protected from Internet threats.

Safe Computing Practices

Don't get tricked by fake alerts or clever webpages into downloading viruses or spyware!

... or check out any of my other guides and tutorials by clicking here!

Digital Rights Management (DRM)

What is Digital Rights Management (a.k.a. DRM) and why does it matter?

[Click for full description]

Anti-Virus

A virus can come from files, e-mails, web pages, or even devices you plug in (like thumbdrives or printers) and destroy your files or your computer once they get in. An anti-virus is software designed to detect and prevent that from happening.

[Click for full description]

Spyware Scanners

Learn how to detect and remove spyware and adware using a free scanning tool.

[Click for full description]

Software Firewall

Learn what a firewall is and why you want one on your computer.

[Click for full description]

Operating System Updates

Make sure to keep your operating system up-to-date with security patches or else none of the rest of your security software will be able to protect you.

[Click for full description]

File Encryption

Learn how to protect your important files on your computer or when transmitting them with free tools for file encryption.

[Click for full description]

Mozilla Firefox - Internet Browser

There are many browser choices out there. Read why I think Firefox is one of the best.

[Click for full description]

Fake Alerts

Maybe you've done everything right and you're computer is sufficiently fortress-like, but then you or someone in your family falls for a simple scam that tricks them into directly installing the bad guy's virus! Learn how to spot and ignore fakes!

[Click for full description]