Google Admits that It Reads your Emails

From: The Hacker News, Tuesday, April 15, 2014 by

Google has updated its privacy terms and conditions on Monday to offer more transparency regarding its email-scanning practices. One of the world’s biggest Web internet giant, Google, made it clear that the information its users submit and share with its systems is all analyzed.

Last year, Google was accused of its illegal interception of all electronic communications sent to Gmail account holders and using the gathering data to sell and place advertisements in order to serve related ads to its users. Practically, the more information you let Google collect about you, the more accurate its adverts become. <READ MORE>

Don’t waste your money trying to upgrade your Windows XP PC

PC World Insights, by Tony , Apr 7, 2014

With the end of Windows XP support from Microsoft imminent, perhaps you’ve finally made the (very wise) decision to stop using the vulnerable operating system. I commend you. However, if you’re planning to simply install a newer operating system on your existing hardware, you should reconsider.

Sure, there’s a good chance that your existing hardware meets the minimum system requirements for either OS: a 1GHz or faster processor, 1GB of RAM (2GB for 64-bit), 16GB of hard drive space (20GB for 64-bit) and a DirectX 9 graphics device with WDDM 1.0 or higher.

But although Windows 7 or Windows 8 will technically run on a system like this,  it will do so in that way that causes you to frequently threaten your PC and spew profanity laced insults at Microsoft. For either of those operating systems to run moderately well, you need at least a dual-core CPU and 4GB of RAM. And Windows itself may only need 20GB of hard drive storage, but it’s easy to fill 500GB or more with applications, photos, videos, and other content. <READ MORE>

Heartbleed – OpenSSL Zero-day Bug leaves Millions of websites Vulnerable

From – The Hacker News, Tuesday, April 08, 2014 by

It is advised to those who are running their web server with OpenSSL 1.0.1 through 1.0, then it is significantly important that you update to OpenSSL 1.0.1g immediately or as soon as possible.

As this afternoon, an extremely critical programming flaw in the OpenSSL has been discovered that apparently exposed the cryptographic keys and private data from some of the most important sites and services on the Internet.

The bug was independently discovered by security firm Codenomicon along with a Google Security engineer. The flaw is in the popular OpenSSL cryptographic software library and its weakness allows cyber criminals to steal the information protected, under normal conditions, by the SSL (Secure Sockets Layer) or TLS (Transport Security Layer) encryption used to secure the Internet.

OpenSSL is an open-source implementation of the SSL and TLS protocols. The core library implements the basic cryptographic functions that enable SSL and TLS encryption. Mostly every websites use either SSL or TLS, even the Apache web server that powers almost half of the websites over internet utilizes OpenSSL. <READ MORE>

Free Microsoft Windows for the Internet of Things and Mobile Devices

The Hacker New Blog, Sunday, April 06, 2014 by

Tomorrow, 8th April could be a sad day for all those who are still using Windows XP, as it is an official assassination day of it, but there is also a good news that Microsoft is going to stop charging for its Windows Operating System on the devices with screens smaller than nine inches.

Yes, Free a Windows OS for the Internet of Things (IoTs)such as Mobile Devices, Smart thermostats, Smart TVs, wearable devices etc., that was announced by Microsoft at Build 2014 conference on Wednesday.

To accelerate the creation of great mobile devices running Windows and grow our number of users, we announced today that Windows will be available for $0 to hardware partners for Windows Phones and tablets smaller than 9” in size,” said Terry Myerson, executive vice president, OS Group at Microsoft and he also added that it will include a one-year subscription to Office 365. <READ MORE>

YAHOO! Now Encrypts Everything; Encrypted Yahoo Messenger Coming Soon

From – The Hacker News, Thursday, April 03, 2014 by

ON HIGH-PRIORITY YAHOO! is finally rolling out encryption implementation over their site and services in order to protect users. Yahoo is rapidly becoming one of the most aggressive supporters of encryption, as in January this year Yahoo enabled the HTTPS connections by default, that automatically encrypts the connections between users and its email service.

November last year, Yahoo revealed plans to encrypt all information that moves between its data centers and finally from 31st March Yahoo has taken another leap in user-data protection through the deployment of new encryption technologies. <READ MORE>

Malaysian flight MH370 tragedy abused by Chinese hackers for Espionage attacks

Hacker News: Wednesday, March 26, 2014 by

The Mysterious Malaysian Airlines flight MH370, a Boeing 777-200 aircraft that has gone missing by the time it flew from Kuala Lumpur to Beijing. The Malaysian Prime Minister had also confirmed that the Malaysia Airlines plane had crashed in a remote part of the southern Indian Ocean.

Cyber Criminals are known to take advantage of major news stories or events where there is a high level of public interest and now Scammers are also targeting tragedy of MH370 to trap innocent Internet users. <READ MORE>

 

In the Trenches: Relying on Customer Service When Technology Fails

Intuit Small Business Blog, by Brett Snyder on March 19, 2014

As you may recall, Cranky Concierge switched to using  Google Apps for email last year to improve the reliability and functionality  of our communications system. This past week, however, a quirky little feature  left us in hot water with a client. All we could do was fix the problem and rely  on our customer-service skills to save face.

If you use Google  Apps for email, you probably have Groups set up. This lets you establish a group that acts as  an email alias and forwards messages to multiple addresses. Cranky  Concierge’s main address (info@) is nothing but a group that forwards email to  various employees. <READ MORE>

 

A thin lifeline for XP users: New Malwarebytes suite will support the older OS

PC World – Software Security Information, March 24, 2014, by

As Malwarebytes announces its new Anti-Malware Premium suite Monday morning, it comes with a nice present for Windows XP users: lifetime support.  Perhaps it isn’t entirely surprising given that, according to the company, 20 percent of its user base remains on Windows XP. Microsoft is actually extending malware support well beyond the XPocalypse date of April 8th, but knowing other companies have your back is a rare bright spot.

(Not that we’re encouraging anyone to stick with Windows XP. Cyber criminals are ready and waiting to pounce on the holdouts. There are some things you can do to protect your XP machine, but most people should upgrade to Windows 7/8, or consider Linux as an alternative safe haven. Microsoft’s campaign to move everyone off Windows XP involves increasingly lucrative enticements.) <READ MORE>

Working Remotely: How to Manage Work-at-Home Employees

From Legal Productivity, By , March 13, 2014

This series on “Working Remotely” is inspired by “Remote,” the book by the 37Signals guys, and by my own experience working remotely for the past six years.

Working RemotelyWe know the benefits of working remotely and what it takes to be a good remote worker. So you’re a good candidate, your employer is on board, and you’re ready to work from home. But how does one manage a worker who’s no longer working a few steps away?

It starts with trust – David and Jason laid it out clearly in Remote:

If you can’t let your employees work from home out of fear they’ll slack off without your supervision, you’re a babysitter, not a manager. Remote work is very likely the least of your problems. <READ MORE>

28-hospital group fails mock cyberattack

Heatlthcare IT News, March 20, 2014, Erin McCann, Associate Editor

28-hospital Indian Health Service has failed a mock cyberattack conducted by the Office of Inspector General after its computer network was discovered to have “high risk” vulnerabilities.

This test was the first in a series of OIG audits to be conducted on the U.S. Department of Health and Human Services and its operating division’s networks.

Back in June, OIG conducted the hacking test on Indian Health Service’s information systems and computer network, requesting that IHS response staff not be notified of the testing to better gauge employee response. Subsequently, the agency was able to obtain unauthorized access to an IHS Web server and one of its computers, according to a recent OIG report <READ MORE>