Here's a warning to heed right now, according to Jim Hamm. "I recommend you read this article and update the Adobe Flash Player in your browser for security reasons. An easy way is to click here. If you're using the Chrome browser it will update Flash automatically."
Bing and Botnets (What?)
"Here's an interesting article on how automated botnets are searching Microsoft's Bing to find a weakness, or something they can harvest for nefarious purposes," begins Jim Hamm.
He explains, "Google, for example, has a 20-person team fighting this type of search all the time. The hackers are always looking for a weakness in a website, a bank's or retail database, or your computer, to try and steal something.
"It's no wonder sites and computers get hacked — the search by hackers is relentless," is Jim's final comment.
So now we've learned about Bing and Botnets. See, we do need to keep up!
Need Another Reason to Switch from Windows?
Whether you use Windows— or not — there's some helpful info here for all of us! Don't miss the suggestions about thumb drives and external drives. Thanks to John Carter for the following detailed report! He starts with the news article. Feds: Infected USB drive idled power plant 3 weeks
Explaining Java & JavaScript
Looking at Safari > Preferences > Security you might be puzzled. You’ve heard we need to protect our computers from the latest Java exploit by unchecking “Enable Java” and “Enable Plug-ins.” Maybe you've already checked to “Block pop-up windows” and “Enable JavaScript.”
A Google search for the difference between Java and JavaScript brings up some websites. See http://www.htmlgoodies.com/beyond/javascript/article.php/3470971/Java-vs-JavaScript.htm Written by the co-author of a JavaScript Primer Series, Joe Burns explains the similarities and differences.
Another Java Exploit — Here's What to Do
Here's what we really need to know! "A Java exploit is in the news again," warns Jim Hamm. "Hopefully, by now, you've disabled Java in your browser. If not, read on." A Reasonable Response to Java Security Problems http://www.tuaw.com/2013/01/11/a-reasonable-response-to-java-security-problems/
Watch Out for Roaming Charges
The article about unexpected charges to smartphone users caught my attention. An email to Jim Hamm gives us his take on this potential problem. "Years ago when we first got a cell phone and had to be aware of possible roaming charges while traveling in the US. Now we are on AT&T and roaming may be a thing of the past -- at least for us. If AT&T doesn't have a signal in a particular area, then we just don't get service and can't make a call. I'm not sure what the situation may be for Verizon." See the article here.
Bookmark This NOW: System Status
Probably this will be the handiest website for you to bookmark! Jim Hamm strongly suggests, "Here's a site published by Apple that will alert you to a known problem with a particular Apple System.
"Let's say, for example, you're having a problem with iCloud Mail. Is it your computer, or ? A quick check of this site will alert you if it is a known problem that may be system-wide. If there's no alert showing, then take a closer look at your computer."
He closes with this, "You might want to bookmark this site -- it could be helpful." But as soon as you view that site you WILL see its usefulness.
See Examples of Clever Schemes of Crooks
This is not a new posting at TruthorFiction, but it still applies and might give you helpful information. Go to http://www.truthorfiction.com/rumors/p/phishing.htm and scroll down to “Crooks Using Clever Schemes to Try to Get Your Personal Financial Information.” It quotes seven different emails so you can protect yourself if you receive some similar email.
Remember you can click on Reader at the right side of the address bar and print out just the information without all the ads. After going to Reader then you can click to Print and you can also choose to save it as a PDF on the menu that comes up and you can direct it to “Mail as a PDF.”
Be Careful With Chrome
This alert is just in from Jim Hamm: "If you use the Chrome browser occasionally (as I do), here is an article about carefully reading the 'permissions' question before completing the installation. I hadn't paid much attention to this previously, but will now, especially after reading the following quote in the article."
FaceBook Concerns
"For those of you with FaceBook accounts, and getting ready to upgrade to iOS 6 when it comes out, here's something else to worry about. iOS 6 will have the ability to sync your Contacts with your FaceBook friends. This is a two-way sync, so your Contacts (Address Book on older Macs) will potentially get a bunch of new information added. The problem is that FaceBook is scheming to increase the use of useless Facebook.com email addresses, and will send them to your Contacts. Check out the story for the details." This info from Prez Art Gorski. http://www.tuaw.com/2012/09/04/with-ios-6-your-address-book-may-be-invaded-by-facebook-com-em/
Java Complications
Watching the latest news about Java? Jim Hamm says, "Here's an article with an overview of Java's history, current issues, and ends with the question: is it time to say goodbye to Java?"
Movie Download Temptation?
"Of course, none of us PMUG members would ever download a movie via Bit Torrent. This article might be of interest to those who might be tempted." This friendly warning comes via David Passell, who closes with a smile, "P.S. My ignorance protects me here :)"
Potential Privacy Risks with Facebook
"This is why I don't have a FaceBook account!" exclaims Prez Art Gorski. See the potential for problems as it's described in this MacWorld article. Consider the pop-up alert available as a browser plug-in which is going to be available on Wednesday.
Java Fix Doesn't Work (Updated 8-31)
We start out with the latest warning on Java, received at 3:20 pm Friday, 8-31. Jim Hamm brings us up to date. (Then read the rest of this for the background of this huge issue.) "Now this is amazing. A few hours after Oracle issued a patch for the security flaw in Java, another exploit has been found. This has been forwarded to Oracle, but since Oracle never comments on these security breaches they didn't say anything. It doesn't appear the hackers have found this opening yet, but after they read this article, they'll probably start trying. "Although our risk of hacking might be small, I think it's best to disable Java. I did so a long time ago and haven't missed it yet." You saw this here on 8-27. Here's a warning from Jim Hamm, "If you've still got Java enabled in your browser, now's a good time to disable it. Another vulnerability with Java has surfaced. Take a read on this. In Safari, Java can be disabled in Preferences > Security > uncheck enable Java." With another notice of a potential malware risk from Java 7 Jim sends this link. The last paragraph in the article states, "Mac owners can disable the Java plug-in from within their browsers, or remove Java 7 from their machines. To do the latter, select 'Go to Folder' from the Finder's 'Go' menu, enter '/Library/Java/JavaVirtualMachines/' and drag the file '1.7.0.jdk' into the Trash." Here's a quick test to see if Java is disabled in your browser, from our eagle-eyed Jim Hamm. He tells us, "Just click here and if the box comes up empty, you're okay — Java is disabled." And, Jim sends the latest: "Here's an article describing how Oracle knew about the Java vulnerability to a malware attack since early April. And, moving right along at a snail's pace, Oracle doesn't plan a fix till October. Given Oracle's slow response to acknowledging and fixing malware attacks, it's a wonder any developer use Java at all." We were surprised to see a fix announced here this afternoon, (Thursday, August 30). Keep us informed on the latest and we'll pass the word along! ! A hot topic: this just out an hour ago, (8-31) and recommends you turn Java off or delete it.
Password Dilemma
"Passwords have never been weaker — and crackers have never been stronger," the headline grabs our attention. Here's a 10 page report on the dilemma of the password. Thanks to son, Peter, for finding this irritating information!
A Serious Warning
Recent shootings in the news prompted the city of Houston, Texas to issue this video. Three actions we must immediately take when threatened should be discussed at work, home, school. Thanks to Jim Hamm for forwarding this on to us.
iCloud Tale of Woe
Jim Hamm's found something we need to heed. He says, "here is a tale of woe, where a tinkerer got into trouble for messing with his iCloud folder. Looks like it is best to leave the iCloud folder alone, ie, no tinkering, and just use it."
iCloud Vulnerability, Continued . . .
Here's another story in the saga about iCloud vulnerability, sent to us by Jim Hamm. He comments, "Apple has an article explaining what to do about iCloud if you plan to sell your Mac or other Apple device.
Hacking Incident Warns Us About Passwords
The latest on this situation is updated 8-5. Read the whole thing. Jim Hamm sent this link about a horrible hacking of a man's iCloud account. This evening John Carter sent a further warning of the need to establish strong passwords to avoid such a terrible thing. Here's the first from Jim: "Here is a scary tale of woe: Mr Honan's iCloud account was hacked. What's even scarier, the hacker was then able to remotely wipe Mr Honan's iPhone, iPad and MacBook Air! Yes, all dead. If you happen to use a Gmail account, a two-step verification process is available to prevent hacking. As far as I know, this feature isn't available for iCloud. So, one should have a very strong password for your iCloud account. Yes, I know, it's probably remote that your iCloud account will be hacked. Mr Honan thought so, too." But Jim, can that really be true? He wrote back with two other sites on the issue. Here and here. John Carter went into more detail on what we should do about our own passwords. ". . . if your passwords are short and simple, be prepared to be hijacked and potentially lose all the money in your bank or all the files on your computer. "A strong password contains a mix of letters and numbers with at least one uppercase letter, and the password should be at least 8 characters long. A very secure password will be 10 or more characters long. The password should never contain a word that can be found in the dictionary or letters or numbers in a sequence or that repeat. "Some of my clients do not even have a password to login to their computer, and this is a grave mistake because it makes all your other passwords in the Keychain Access application accessible to anyone that manages to hack into your computer.
Precautions About Java
Got Java? Note these precautions forwarded to us from Jim Hamm.
"Here's another article describing the risk of keeping Java enabled on your browser. If you need to access websites that require Java, I like the suggestion in the article to have a browser set aside for this purpose. I think Chrome might be good for this. As I've mentioned previously, I have Java disabled in Safari and haven't had any problems accessing websites. It seems there are fewer of them nowadays."