" Here is an article about counterfeit Apple products seized in a shopping mall in Hanover, Maryland. As the article states, it's a good idea to only purchase Apple products from Apple or a reputable, authorized reseller," Jim Hamm informs us.
Do NOT Install MacKeeper
Here's an important notice from John Carter: "It was just brought to my attention by Betsy Barnes that MacKeeper is one of the apps that you do not want to install on your Mac.
Avoiding Problems With Passwords
Do you know the Do's and Don'ts of secure passwords? Check this out: here is an interesting article on passwords recommended to us by Jim Hamm.
Hacker Conference Coming
"Hackers Reveal Nasty New Car Attacks -- " is how the title begins. The story is to appear in the August 12, 2013 issue of Forbes. See the article posted here http://www.forbes.com/sites/andygreenberg/2013/07/24/hackers-reveal-nasty-new-car-attacks-with-me-behind-the-wheel-video/
FBI E-Scam
Jim Hamm passes along a warning, "There have been reports of a recent email scam, presumably from the FBI, that threatens to lock up your computer unless you pay a 'ransom.' You can read more about this scam here. The malware comes from a website to your browser via Javascript, and can infect both a Mac and a PC (ie., OS X and Windows).
Adobe Flash Caution
This is just in from Jim Hamm, "FWIW, a few moments ago I got an alert on a web page (a music-listening site) that I needed to update to Flash 12 immediately -- important! I looked at the website for this notice and it said -- as I recall -- "Quixter", or something like that. Anyway, I didn't click the update link but instead went to Adobe's website and had them check the Flash I had installed on the browser I was using at the time (Opera Next). Flash was up to date.
More on Malware
"Here's an article on yet another way malware is attempting to infect our computers," says Jim Hamm. And that gets our attention.
" The original article was in French, and Google was used to translate it to English. And here is an article from F-Secure Lab (also originally in French) providing further details.
iPhone: Lost! Then, Found!
John Carter left his iPhone on a plane! There's a happy ending! There's something for us to learn from this!
"Suppose your iPhone gets lost (you left it on the plane). Frantically, you go online to iCloud.com and configure the iPhone to be erased if anyone attempts to use the iPhone. This seems to be the best way to protect your information, right? Wrong! The iPhone will only be erased when someone attempts to connect to the Internet — or so the story goes. So, if they never access the Internet, they can open Contacts and browse any file on the iPhone at will.
Warning About Internet Crooks
Alert and aware! Ward Stanke forwards a message from a Mac writer who details how thieves nearly switched his Social Security payments to a dummy bank account. Read and heed! Jerry King, the president of the Naples MacFriends User Group in Naples, Florida has written a Mac 411 article for the local newspaper titled "Internet Crooks Nearly Rerouted My Social Security Payments." It was published May 23. See the full article here.
Warning About Smartphone Photos
If you take photos with your smart phone and post them online you face a real risk of trouble. This 4 minute video is a must for you, your kids, your grandkids. Ginger Carlson found this website http://www.youtube.com/embed/N2vARzvWxwY?rel=0 and comments, "Everyone needs to see it."
Password Hacking
"Here is an article, admittedly somewhat lengthy and nerdy, about how hackers can make mincemeat out of your passwords so easily." Jim Hamm goes on to elaborate, "After reading the article, I know my passwords are, oh, so vulnerable. I bet yours are, too. I'm thinking about buying something like 1Password, or another strong password generator program, and redoing all my passwords.
Are You Checking Time Machine?
"If you're using a Mac, chances are you're using Time Machine. It's nice that Apple provides a backup system that's easy to use. However, have you checked that Time Machine is really backing up? No? Well, I haven't either. Here's a Blog from a guy that didn't check either.
Cloud: Pro & Con
Here's a risk that Jim Hamm describes, "Storing 'stuff' in the Cloud has its advantages, but also a real risk, too. Take a read on this article where Google just shut an individual off from his Cloud storage. He hadn't done anything wrong to violate any of Google's policies, but someone or something at Google thought he had."
(Scroll down and consider the logic of those 95 comments already posted on that site.)
"Which brings me to Gmail. For quite some time I've used Google's web-based Gmail for all my email storage. i no longer download anything to my computers or iPad -- I do everything online. What if Google suddenly shut me off from my Gmail account? All of my emails -- both read and unread -- are stored there, not on my computer. Not a pleasant thought to contemplate. I'd survive, but what a pain.
Here's Jim's conclusion, "I would never store anything of value in the Cloud. I much prefer an external hard drive for my extra storage. Could something like this happen with a Microsoft or Apple Cloud storage? I'd guess it's possible. Just something for you to think about when you use the Cloud."
Public Wi-Fi Precautions
Stay safe when you're using public Wi-Fi. Jim Hamm points out several important precautions to take.
1. Don't make online purchases or access your bank account.
2. Switch your passwords. Use a different password for each of your online accounts.
3. Look for the locked padlock in the address bar. That means the info submitted to that site is encrypted. But still be cautious.
4. Turn off file sharing on your computer.
Malware Info We Need to Know
Ward Stanke, our PMUG Ambassador, sends important info on Mac malware: "I saw this post to the Apple Users Group Mailing List from Randy Singer (co-author of The Macintosh Bible, 4th, 5th and 6th editions).
Legal to Post or Not?
If you received the April issue of CostCo Connection magazine in the mail today you’ve seen “The Copyright Quandry” and the sidebar, “Copyright Myths.” Both give very important legal info about posting photos, copying from a book, magazine, or movie. These are facts that our kids and grandkids need to know. Watch for the online copy of April or see if that's the magazine on the rack as you go out the door.
The March issue is http://www.costcoconnection.com/connection/201303#pg1 On page 13 it has an interesting article on the “cloud.”
Evernote Breach
Here's what David Passell passes along today, "I saw this news item, and also received an e-mail from Evernote (which was filtered by cableone's spam filter). I think I used it briefly. Nothing will organize my stuff:). http://www.bbc.co.uk/news/technology-21644317
The article says Evernote acts like an online personal organiser, with users able to save data such as video clips, images, web pages, notes and itineraries in an external storage system commonly known as the cloud.
How to Isolate Java
Jim Hamm grabs our attention with important info on Java. "in case you didn't see it, here is another article discussing Java, and how to remove or disable Java in your browser of choice. Some time ago I had disabled Java in the three browsers I use: Safari, Firefox and Chrome. I happened to be using Firefox when reading this article, so I thought I'd check the Java plug-in. Ouch! Sure enough, it was enabled again. How, I don't know. Perhaps when the browser itself is updated. I immediately disabled Java again.
Concern About Illegal Patent Applications
Describing some illegitimate patent applications in the software and Internet fields, and claiming that these patents cause profound harm, an organization, Electronic Frontier Foundation, has been formed to document the issues. Their website gives more info. https://www.eff.org/patent-busting
"Pintsized Trojan" on Mac
Keeping us alert, Jim Hamm passes along this, "Although the 'pintsized trojan' (as it's called) hasn't been released yet to cause trouble for your Mac, you might take a read on this article http://www.macobserver.com/tmo/article/pintsized-trojan-bypasses-macs-gatekeeper-feature to be aware of what might be coming."