If you should lose or forget your Apple ID, this article explains how to find it again. You may want to save -- or copy -- the article in case you should ever need it.
Jim Hamm
If you should lose or forget your Apple ID, this article explains how to find it again. You may want to save -- or copy -- the article in case you should ever need it.
Jim Hamm
According to the following article, it seems we may have to live with ransomware attacks forever. And the following statement from the article is a bit disconcerting, to say the least: "Many ransomware operators are based in Russia, where the Kremlin tends to turn a blind eye to cyber criminals targeting Western countries." And what if, say, countries like Russia, China, Iran, et al, decide to 'attack' a country using ransomware? Not good!
One solution to prevent a ransomware attack on you becoming a complete disaster is to do a full backup of your data and photos, whether to the 'cloud' or an external hard drive.
Here's the article..
Jim Hamm
Ransomware — a novelty just a few years ago — is now endemic, like COVID.
We'll have to learn to live with the malicious file-encrypting code, even as we struggle to limit it.
Why it matters: Ransomware attacks, which take an organization's data hostage and shut down its systems until the hackers receive payment, have exacted an escalating price on law enforcement, policymaking and financial resources around the world.
It remains the top threat on the minds of cyber defenders at this week's RSA Conference in San Francisco, the cybersecurity industry's highest-profile annual gathering.
What's happening: Rob Joyce, the NSA's director of cybersecurity, told reporters during a briefing at RSA that Russian hackers are now weaponizing ransomware in attempted attacks against Ukrainian logistics supply chain companies, as well as organizations in Western-allied countries.
Cybersecurity firm Sophos said in a report released Tuesday that 68% of cyberattacks last year involved ransomware.
A panel on the last day of RSA acted out what the federal response to a hypothetical, Iran-backed ransomware attack on U.S. banks in 2025 might look like.
How it works: A ransomware attack typically starts with malicious hackers installing file-encrypting malware onto an organization's networks and then displaying a ransom note on every screen.
To unlock the networks and prevent a leak of any stolen data, ransomware gangs demand payment, often in the form of cryptocurrency.
In recent years, ransomware has infected schools, hospitals, small businesses and more.
Between the lines: Conversations about ransomware at RSA have shifted from viewing it as an easily squashed nuisance to seeing it as a persistent threat.
Following the ransomware attack on Colonial Pipeline in May 2021, U.S. officials were quick to make ransomware a national priority. President Biden even started engaging with Vladimir Putin to try to get him to crack down.
Ransomware now is treated like any other crime that's not expected to be easily solved or to vanish after a couple of key arrests, experts told Axios.
Zoom out: Many ransomware operators are based in Russia, where the Kremlin tends to turn a blind eye to cyber criminals targeting Western countries.
Ransomware gangs are well-organized, making them adept at rebranding and reshuffling in the face of law enforcement heat, John Dwyer, head of research at IBM's X-Force, told Axios.
Organizations still struggle with basic cyber hygiene to protect themselves.
🥊 Reality check: Government sanctions, internet server takedowns and criminal arrests have slowly but steadily reduced businesses' willingness to pay ransomware gangs, Tom Hofmann, chief intelligence officer at Flashpoint, told Axios.
The number of ransomware attacks dropped 15% between 2021 and 2022, according to recent data from Google-owned threat intelligence firm Mandiant. But that came after they skyrocketed the year before.
If you want to use an external keyboard with an iPad, there are two Accessibility settings to be aware of.
I suggest that you disable “Accessibility -> Keyboards -> Full Keyboard Access” and enable “Accessibility -> Keyboards -> Key Repeat”.
If “Full Keyboard Access” is enabled, some pretty strange stuff will happen when you are trying to use the keyboard arrow keys to move the text cursor around.
If “Key Repeat” is disabled, you have to manually repress a key to repeat it, and this is undesirable when using the arrow keys to move the text cursor around.
John Carter Sr
A 2018 11” iPad Pro was left on a charger overnight. The next morning the charge had not increased from the 4% it started at. The iPad would not even connect to a Mac. Tried a different charger to no avail. By then, the charge had reduced to 3%. Argosy West in Prescott said that the iPad was a sealed unit and only Apple could do any repairs, which might come to $350.
Thinking that the best thing to do was destroy it, the iPad was erased and was ready to toss in the trash. On a hunch, it was connected to power again. After less than an hour it was charged to 15%. An hour later, it had charged to over 90%. The iPad was successfully restored from an iPhone backup via iCloud (which took a few hours).
By erasing the iPad, it is guessed that the system settings were cleared enabling the iPad to again take a charge.
John R. Carter, Sr.
Here is an article discussing a new malware circulating for the Mac. Be cautious of downloading and installing any apps from the internet. If you need an app for your Mac, try the apps at Apple and see if one is available.
Jim Hamm
And here's another article and tip that might be handy for iPhone owners: here is yet another nefarious hacking attempt by iPhone thieves -- getting locked out of your Apple account. This article explains what you can do to prevent this.
Jim Hamm
If you use the Chrome Browser, you should do an update right away, according to this article, as there is another exploit affecting the browser.
Jim Hamm
FYI, here is an article discussing another malware program that you should be aware of. Right now it looks like it affects only Android devices, but I suspect we may soon see it trying to infect other devices as well..
Jim Hamm
When on a website one is frequently asked if it's OK to accept their 'cookies'. Opinions may vary on an answer, but if you do accept them, should they periodically be cleared from your device? Here's a couple of articles with opinions on this.
Jim Hamm
Should you delete cookies? 6 reasons you probably should clear cookies (norton.com)
Cache and tracking cookies? Get ‘em out of here. They’re (admittedly helpful) little files that store info in your browser so you don’t have to log in every single time, and the stuff you add to your cart on shopping sites stays there for next time.
But they also weigh down your browser and should be cleared periodically as part of your tech privacy maintenance. Since many of you use Chrome, I’ve included steps for that browser below.
🍪 Use Safari, Edge or Firefox? Get the steps here — scroll to No. 5.
On your computer, open Chrome. At the top right, click the three stacked dots.
Click More Tools > Clear Browsing Data …
At the top, choose a time range. To delete everything, select All Time.
Best sure to check the boxes next to “Cookies and other site data” and “Cached images and files.”
Click Clear data. Voila!
By the way, your phone is full of cookies, too — here’s how to clear those out.
I use the Malwarebytes malware app, and just got notice they are now offering a browser guard. I've not tried it yet, but probably will do so.
Jim Hamm
This article discusses a new malware affecting Macs. Full link below.
Jim Hamm
So, does everyone already have a backup, or will March 31st be your first??
A backup is a copy of all your important files — for example, your family photos, home videos, documents and emails. Instead of storing it all in one place (like your computer or smartphone), you keep a copy of everything somewhere safe. MORE
When Clean Energy Charging suspends charging, a notification on the Lock Screen says when your iPhone will be full charged. If you need to have your iPhone fully charged sooner, touch and hold the notification and then tap Charge Now.
Submitted by Bob Hale
If you don’t already have a backup, March 31st should be your first. Information and directions are contained in the link below. Very important!!
https://www.worldbackupday.com/en
Frank Croft
FYI, here is an article discussing a malware extension that may steal your Gmail messages.
Jim Hamm
https://www.tomsguide.com/news/hackers-are-stealing-gmail-messages-delete-this-extension-right-now
The following links to articles discussing safe download sites may be of interest.
Jim Hamm
The 7 Safest Free Mac Software Download Sites (makeuseof.com)
The 10 Safest Free Software Download Sites for Windows (makeuseof.com)
Here is a note to do an update on your Apple devices.
JIIM hamm
Apple has released emergency security updates in order to patch a new zero-day vulnerability that’s being used to hack vulnerable iPhones, iPads and Macs.
As reported by BleepingComputer(opens in new tab), this zero-day vulnerability (tracked as CVE-2023-23529(opens in new tab)) was discovered by an anonymous researcher and has now been patched with the release of iOS 16.3.1, iPadOS 16.3.1 and macOS 13.2.1.
The flaw itself is a WebKit confusion issue and if exploited by an attacker, it could be used to execute arbitrary code on vulnerable iPhones, iPads and Mac after a user navigates to a malicious website.
If you use or receive anything from Microsoft's OneNote app, this article describes malware that's being distributed using OneNote. I don't use OneNote, nor have I received an email yet with OneNote attached, but I will pay close attention to all emails -- especially from someone I don't know.
Jim Hamm
The following article describes how Google and Microsoft are looking to change how their search engines work. Instead of searching for and then giving you access to what has been posted elsewhere, they plan to use AI to formulate an answer for you. Is this a good thing, you might ask? I don’t know, but my initial thought is I like the way Google or Bing searches are handled right now.
Jim Hamm
At a conference in 2011, its chairman at the time, Eric Schmidt, declared that search's endgame was to use AI to "literally compute the right answer" to queries rather than identify relevant pages.
According to the 'arstechnica' article in the link below, it's best to avoid any downloads from Google because of malware. Following is a sort blurb from the article.
Jim Hamm
"Until Google regains its footing, people should be extremely cautious when searching Google, and likely other search sites, particularly for software downloads."