Friday, August 30, 2013

Long passwords don’t offer “safe option”

A popular password-cracking app called “Hashcat” has upgraded it’s password characters to 55.  This app can actually crack a long password more quickly than a shorter one.
When passwords are made longer than the normal 8-11 characters, people start to make sentences out of them.
In 2011, Graham Cluely stated,  the best passwords are in a sentence.  Today, a password with 15 characters or longer are usually a combination of words or phrases because it’s hard to remember them.  Having a long password with only random numbers and special character such as T&7j#15!pDr8q is much harder to remember or even type than a simple MyN3wP@ssW0rd or Hamilton1.
Hackers are very quick at catching onto these passwords.no-password
“I’ve been saying for a long time that while passphrases can offer better protection against password cracking than a simple password, it’s easy to over-estimate the usefulness of that measure,” says ESET Senior Research Fellow David Harley.
It’s just like when an online dictionary can guess what word you are wanting to find even after you misspelled the word when typing it in.  Fuzzy matching algorithms are able to catch simple-to-fairly-complex variations exactly the same way.
Hackers use  “A Dictionary Attack” to crack passwords.  So if you have a common word as a password,  a dictionary is ran to scan and seek out those words, enabling hackers to crack your password much more easily.

A Solution

KeyPass, LastPass, and 1Password are all secure websites created for you to store all your passwords into one place.  All you have to do is remember 1 password.
A good technique  to use when creating a password is to make up a sentence and use the first letter of each word for your password.  You can alter certain letters into characters or numbers for variation.  Here is an example of how to create a password from a sentence.

password-security
Three key notes to remember:
  1. Never use a dictionary word
  2. Create a different password for each website
  3. Keep an antivirus up to date

References:
Long passwords don’t offer “safe option” as cracker app upgrades – WeLiveSecurity
http://www.welivesecurity.com/2013/08/27/even-long-passwords-can-be-cracked-quickly-as-hashcat-app-upgrades/
August 27, 2013

Facebook Users Passwords Harvested by Browser Malware

Don’t trust everything you see on Facebook.  Especially if it’s a message from your friends saying you have been tagged by them.
A malicious software is appearing  as a link in an e-mail or Facebook message telling people they have been tagged by a friend in a Facebook post.  When users go to Facebook and click on this link, they are sent to another website and prompted to download a browser extension or plug-in to watch a video, said researcher for an independent Italian security, Carlo De Micheli.
Once the plug-in is downloaded to the computer, attackers can access everything stored in the browser.  This includes all accounts and saved passwords that are automatically saved to your computer when you visit a site.  For this reason, it is important to tell your computer NOT to save your passwords.

Facebook Scam Video
Photo Credit: Bits

 
Facebook-malware
Mr. De Micheli said this malicious software has been spreading at the rate of 40,000 attacks an hour and has affected more than 800,000 people using Google’s Chrome browser.  The malware is replicating itself by hijacking victims’ Facebook accounts then attacking all their friends accounts.
This malware blocks access to the browser settings that allow it to be removed and also blocks access to websites that offer virus removal software.   These attackers have now released another version of this malware targeting Firefox users.

“When we detect items containing malware or learn of them through reports, we remove them from the Chrome Web Store and from active Chrome instances,” said the spokeswoman, Veronica Navarrete, in a statement. “We’ve already removed several of these extensions, and are continuing to improve our automated systems to help detect them even faster.”

Mr. De Micheli said the attackers appear to be of Turkish origin, based on comments embedded in the software.
This is not the first instance of an attack through browser extensions.  This software allows a Web browser to perform specific functions, like a smartphone app does.  This attack appears to be one of the most extensive in the usage of technology.
Remember when you were told not to click on attachments?  Now the same goes for browser add-ons, you may be allowing an attacker access to your accounts.
Follow us on Twitter at @hyphenet or “Like” us on Facebook to stay up-to-date on the latest tech news and PC security alerts.

References:
More than 800,000 Facebook users fall victim to password-harvesting browser malware, researcher claims – WeLiveSecurity
http://www.welivesecurity.com/2013/08/29/more-than-800000-facebook-users-fall-victim-to-password-harvesting-browser-malware-researcher-claims/
August 29, 2013
Malicious Software Poses as Video From a Facebook Friend – Bits
http://bits.blogs.nytimes.com/2013/08/26/malicious-software-poses-as-video-from-a-facebook-friend/
August 26, 2013

Thursday, August 29, 2013

Social Media Hoax: Footbal Star Joe Montana is NOT Dead

Joe Montana pronounced dead?  According to the Global Associated News on Monday, August 26, Joe Montana was in a car accident in his 2012 BMW.
 
joemontana-hoax

The announcement of his death is circulating via social media claiming the retired pro football star has died in a single car accident.
The story goes on to say, Joe Montana was taken to a California hospital in serious condition and due to his critical injuries, he passed away.  California Highway Safety Authority (HSA) said the roads were slippery and wet when Montana got into the accident, causing his fatal crash.
Joe Montana, the retired pro American football player and a hall of fame quarterback, known as “The Comeback Kid“.   He played for the San Francisco 49ers and the Kansas City Chiefs.  Now, he has come back from the dead.

montana_hoax_death

Joe Montana is alive and well.  He was not involved in a car accident whatsoever, this story is a hoax!  This is just one of the many celebrity death hoaxes going around.
These false death rumors come from “entertainment” websites that allow users to create fake news stories about supposed death of celebrities.  The website allows users to pick from an option of generic story templates.  Users have the ability to pick their celebrity of choice then create a story in an attempt to trick their friends into sharing the fabrication.

Do Your Research

Before sharing an extreme story such as a celebrity’s death, look to a reliable news source.  Users should always be wary of clicking on any links in these made up celebrity death messages.
Many hoaxes float throughout social media sites containing links that lead to malware or misleading sites. Some links even point to rogue apps and malicious browser extensions.
Don’t let these rumors fool you.  Be wary of falling into the hands of crooks and liars. There are a lot more important news we should be tuning into. If you’ve seen a celebrity hoax story come across your Facebook or Twitter account please share with us below.
Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

References:
Football Star Joe Montana is NOT Dead – Hoax Slayer
http://www.hoax-slayer.com/joe-montana-death-hoax.shtml
August 29, 2013
Joe Montana dies in California highway accident – Examiner
http://www.examiner.com/article/joe-montana-dies-california-highway-accident?cid=rss

Wednesday, August 28, 2013

Instagrams Ban on Hashtags

Instagram has a large amount of hashtags blocked from users using certain keywords.  Instagram, the social network site that allows friends to post photos and use #hashtags for keywords has put a stop to profanity and sex related terms.
Instagram is trying to stear clear from promoting: suicide or self harm, eating disorders, sexual acts and vulgar language.
Instagram’s Data Pack has a large list of hashtags that are seen as unsearchable.  When tagging a photo in Instagram, you can hashtag anything you like, but if your tag is in the “Data Pack List”, it is overlooked and meaningless.

Below are some of the blocked hashtags from Instagram:
Instagram Banned Hashtags

Their Reputation

Along with other Social Media sites like Facebook and Twitter, Instagram is very strict on it’s rules about pornography and obscene photographs. Instagram doesn’t want to be looked at as a porn site, it’s agenda is to share your story through photographs. Not be a perv and dirty their name.
Instagram is a photo-sharing, video-sharing and social networking service that allows you to filter your photos and add them to other social networks such as Facebook, Twitter, Flicker, and Tumblr.
The photos are usually put into a distinctive square shape and in many cases decorated with borders and colors.
Here are some of the filters you can apply to your images:
  • Amaro
  • Mayfair
    Instagram_Filters
    Photo Credit: Wikipedia
  • Rise
  • Valencia
  • Hudson
  • X-Pro II
  • Sierra
  • Willow
  • Lo-fi
  • Earlybird
  • Sutro
  • Toaster
  • Brannan
  • Inkwell
  • Walden
  • Hefe
  • Nashville
  • 1977
  • Kelvin

References:

These 12 Banned Hashtags Tell Us What Instagram Is Afraid Of Becoming – Business Insider
http://www.businessinsider.com/banned-instagram-hashtags-2013-8
August 27, 2013
Instagram’s New Guidelines Against Self-Harm Images & Accounts – Instagram
http://blog.instagram.com/post/21454597658/instagrams-new-guidelines-against-self-harm-images
Instagram – Wikipedia
http://en.wikipedia.org/wiki/Instagram

Tuesday, August 27, 2013

End of the month Special: HP LaserJet Pro 400 M401n for only $269!


hp-laserjet-pro-400-01

Optimize your day-to-day workflow with this HP LaserJet Pro 400.  This easy to install printer, has AirPrint to print from your wireless anywhere.

Specifications

Product Differentiator
  • 128 MB RAM as standard memory; 1 Hi-Speed USB, 1 Host USB, 1 Walk-up USB, 1 Ethernet 10/100/1000 Base-TX network; HP ePrint, Apple AirPrint™, 2-line LCD (text and graphics) display
Functions
  • HP LaserJet Pro 400 M401n – printer – monochrome – laser
Print speed, black (normal)
  • Up to 35 ppm – black normal – Letter A Size (8.5 in x 11 in)
  • Up to 33 ppm – black normal – A4 (8.25 in x 11.7 in)
Print speed
  • Measured using ISO/IEC 24734, excludes first set of test documents. For more information see http://www.hp.com/go/printerclaims. Exact speed varies depending on the system configuration, software application, driver, and document complexity.
Printer page yield
  • Declared yield value in accordance with ISO/IEC 19752. Actual yields vary considerably based on images printed and other factors. For more information, visit http://www.hp.com/go/learnaboutsupplies
First page out (ready) black
  • As fast as 8 sec
Resolution (black)
  • Up to 1200 x 1200 dpi
Resolution technology
  • HP FastRes 1200, HP ProRes 1200, 600 dpi
Monthly duty cycle
  • Up to 50,000 pages
  • Duty cycle is defined as the maximum number of pages per month of imaged output. This value provides a comparison of product robustness in relation to other HP LaserJet or HP Color LaserJet devices, and enables appropriate deployment of printers and MFPs to satisfy the demands of connected individuals or groups.
Recommended monthly page volume
  • 750 to 3000
  • HP recommends that the number of printed pages per month be within the stated range for optimum device performance, based on factors including supplies replacement intervals and device life over an extended warranty period.
Print Technology
  • Laser
Display
  • 2-line LCD (text and graphics)
Processor speed
  • 800 MHz
Number of print cartridges
  • 1 (black)
Replacement cartridges
  • HP 80A Black LaserJet Toner Cartridge (~2700 pages), CF280A; HP 80X Black LaserJet Toner Cartridge (~6900 pages), CF280X
Print languages
  • HP PCL 5e, HP PCL 6, HP Postscript Level 3 emulation, direct PDF (v 1.7) printing
Automatic paper sensor
  • No
Paper trays, standard
  • 2
Paper trays, maximum
  • 3

Connectivity

HP ePrint capability
  • Yes
Connectivity, standard
  • 1 Hi-Speed USB 2.0; 1 Ethernet 10/100/1000T network
Network ready
  • Standard (built-in Gigabit Ethernet)
Ports
  • 1 Hi-Speed USB 2.0; 1 Ethernet 10/100/1000T network
Security
  • Password-protected network embedded Web server; enable/disable Network protocols; SNMPv2 community password change; SNMPv3; 802.1x; SSL cert management; Firewall; Access Control List
Minimum system requirements
  • Microsoft® Windows® 7 (32-bit/64-bit), Windows Vista® (32-bit/64-bit): 1 GHz 32-bit (x86) or 64-bit (x64) processor, 1 GB RAM (32-bit) or 2 GB RAM (64-bit), 400 MB hard disk space, CD-ROM/DVD-ROM or Internet, USB or Network port; Windows® XP32 SP2 (32-bit): Pentium® 233 MHz processor, 512 MB RAM, 400 MB hard disk space, CD-ROM/DVD-ROM or Internet, USB or Network port
  • Mac OS X v 10.5, v 10.6, v 10.7; PowerPC G4, G5, or Intel® Core™ Processor; 500 MB hard disk; CD-ROM/DVD-ROM or Internet; USB or Network
Compatible operating systems
  • Full software installs supported on: Microsoft® Windows®7 32-bit and 64-bit, Windows Vista® 32-bit and 64-bit, Windows® XP 32-bit (SP2 or higher); Driver only installs supported on: Microsoft® Windows® Server 2008 32-bit and 64-bit, Windows® Server 2003 32-bit (SP3 or higher); Mac OS X v 10.5, v 10.6, v 10.7; Linpus Linux : 9.4, 9.5; Red Hat Enterprise Linux: 5.0, 6.0; OpenSuSE: 11.3, 11.4; Fedora: 14, 15; Ubuntu: 10.04, 10.10, 11.04; Debian: 5.0, 6.0 and HPUX11i

Memory specs

Memory, standard
  • 128 MB
Memory, maximum
  • 128 MB
Printer management
  • Windows: HP Device Toolbox (default install), SNP Alerts (minimum network install), HP Web Jetadmin (download); Mac: HP Utility
Supported network protocols
  • Via built-in networking solution: TCP/IP, IPv4, IPv6; print: TCP-IP port 9100 Direct Mode, LPD (raw queue support only), Web Services Printing, IPP 2.0, Apple AirPrint™, HP ePrint, FTP Print; DISCOVERY: SLP, Bonjour, Web Services Discovery; IP CONFIG: IPv4 (BootP, DHCP, AutoIP, Manual, TFTP Config, ARP-Ping), IPv6 (Stateless Link-Local and via Router, Statefull via DHCPv6); Management: SNMPv2/v3, HTTP/HTTPs, Telnet, TFTP Config, FTP FW Download, Syslog; Security: SNMPv3, SSL Cert Management, Firewall, ACL, 802.1x
Hard disk
  • None

Paper handling

Paper handling input, standard
  • 50-sheet multipurpose tray 1, 250-sheet input tray 2
Paper handling output, standard
  • 150-sheet output bin
Duplex printing
  • Manual (driver support provided)
Finished output handling
  • Sheetfed
Media sizes supported
  • Letter, legal, executive, 8.5 x 13 in
Media sizes supported
  • A4; A5; A6; B5 (JIS)
Media sizes, custom
  • Multipurpose tray: 3 x 5 to 8.5 x 14 in; tray 2 and optional 500-sheet-tray 3: 4.1 x 5.8 to 8.5 x 14 in
Media types
  • Paper (plain, Green mode, light, heavy, bond, color, letterhead, preprinted, prepunched, recycled, rough); envelopes; labels; transparencies, cardstock
Supported media weight
  • Tray 1: 16 to 43 lb (straight through paper path for special media); tray 2, optional 500-sheet tray 3: 16 to 32 lb
Media weights by paper path
  • Tray 1: 60 to 163 g/m² (straight through paper path for special media); tray 2, optional 500-sheet tray 3: 60 to 120 g/m²

Power & operating requirements

Power
  • 110-volt input voltage: 110 to 127 VAC (+/- 10%), 50/60 Hz (+/- 2 Hz)
Power consumption
  • 570 watts (Printing), 7.3 watts (Ready), 6.2 watts (Sleep), 0.1 watts (Off)
  • Power requirements are based on the country/region where the printer is sold. Do not convert operating voltages. This will damage the printer and void the product warranty.
Operating temperature range
  • 59 to 90.5ºF
Operating humidity range
  • 30 to 70% RH

Dimensions & weight

Dimensions (W x D x H)
  • 14.35 x 14.49 x 10.53 in
Maximum dimensions (W x D x H)
  • 14.35 x 24.94 x 12.14 in (multipurpose tray and foldup cover extended, tray 2 extended to legal-size)
Weight
  • 22.2 lb
Package weight
  • 29.3 lb

What’s included

What’s in the box
  • HP LaserJet Pro 400 M401n; HP 80A Black LaserJet Toner Cartridge (~2700 pages); Installation guide, Getting Started guide, Support flyer, Warranty guide; Printer documentation and software on CD-ROM; power cord
Cable included
  • No, please purchase USB cable separately
Warranty
  • One-year warranty, return to HP Authorized Service Provider
Software included
  • Windows: HP Installer/Uninstaller, HP PCL 6 print driver, Status Alerts, HP Update, DXP, Mac: HP Installer/Uninstaller, HP Postscript driver, HP Setup Assistant, HP Utility, HP Alerts, HP Firmware Updater

Call (619) 325-0990 to order the HP LaserJet Pro 400 M401n today!

Buy of the Week offer valid through August 30, 2013.
Note: Shipping and taxes apply.
Looking for something else? Check out our monthly deals or contact us to get a quote on the product you’re searching for.

Buy of the Week: Samsung Galaxy Note 8.0 – 8″ Tablet for only $389!

The Samsung Galaxy Note 8.0 – 8″ Tablet – Android 4.1 (Jelly Bean) – 16GB is perfect for people on the go!  Jot down a thought, sketch out a design, organize your ideas and express yourself creatively. 

samsung-galaxy-tablet


S Pen: Create, Compose, Edit
Use your pen as a reading note, personalizing emails, jotting down notes, or just doodling.
Multi Window: True Multitasking
Watch your favorite shows while doing your homework.  Use the Multi Window to multitask two applications a the same time.
Polaris Office: Work from anywhere
Open and edit  documents using Microsoft Word, PowerPoint, or Excel with ease right from the palm of your hand.
Enterprise Ready
Use your device at work because the tablet 8.0 has enhanced security, accessibility, and connectivity features.  It’s safe to use at work and keep your company data secure.
Group Play
Share your screen with an entire team on their devices.  This is in real time, and wireless, no projector needed.
galaxy-specs

Call (619) 325-0990 to order Samsung Galaxy Note 8.0 Tablet today!

Buy of the Week offer valid through August 30, 2013.
Note: Shipping and taxes apply.
Looking for something else? Check out our monthly deals or contact us to get a quote on the product you’re searching for.

NASDAQ Trading Halted by Technical Issue

On Thursday August 22, NASDAQ’s trading exchange halted by what was announced as a “Technical Issue”.  This stand still lasted for almost four hours, causing uproar in the trading market.  The last time NASDAQ stood still for that long was from the tragic day in 2001.

nasdaq-glitch

The exchange publicly classified the root of the cause being associated as trouble with the Unlisted Trading Privileges (UTP) and Securities Information Processor (SIP) quote dissemination system.  The UTP is the basis for the electronic network which carries quotes for the New York trading system.  The SIP refers to any person engaged in the business of collecting, processing, or preparing for distribution or publication with transactions or quotes.
So what we don’t know is why there was trouble with the UTP SIP quote dissemination system.  Was it really a glitch in the system, human error, or maybe an act of malicious crime?

Speculation

Our society is well aware of cyber-attacks, hackers, and the act of malicious behavior disrupting computer systems for their own gain.  Stock exchanges have been a target for hackers for a long time.

Ziv Gadot, Security Operations Center team leader at Radware had a talk titled, “Stock Exchanges in the Line of Fire—Morphology of Cyber-Attacks.”

In 2011, the NASDAQ Director’s Desk application used by the exchange to share information was hacked with and eavesdropping tool planted in the system.
There is no direct relation or official word still of why the incident occurred.  NASDAQ’s market system first reported “momentary interruptions” at 11:45 a.m. EDT.  The interruptions lasted for approximately fifteen minutes and were resolved with the system operating normally until 12:09 p.m., NASDAQ warned that it was experiencing a quote submission issue with the UTP SIP.
At 1:30 p.m. EDT, NASDAQ was still out of service to the market.  The big board posted that the market’s system status’s reopening would only allow a five-minute quote-only period.  Then at 2:28 p.m. EDT, a system status update stated equity trading would resume at 3:10 p.m. EDT.

nasdaq-halts-trading-for-three-hours

The system failure could have been a glitch in the system.  The NASDAQ quote dissemination system
is a highly operating system with extreme levels of concurrency and data given at one time.  Every trader and trading system expects the same data to be distributed at the same time.  It’s a very complex and sophisticated system that has a high level of risk for error.  Computers are computers with their integrated circuits of millions to billions of arithmetic operations.

The Risk

The Securities and Exchange Commission continue to review the reasoning and vulnerabilities of the system.  During the system failure, NASDAQ failed to establish a connection 30 times.  After the connection was finally re-establish, the computer began to suffer from a capacity overload created by the multiple efforts to connect with the exchange.
An outage like last Thursday can have catastrophic effects on the NASDAQ’s system exchange causing ripples of shutdowns across the market spreading confusion.
At RBC Global Asset Management in Chicago, traders noticed that quotes to buy Nasdaq-listed stocks were coming in at higher prices than quotes to sell those same stocks, an inversion of the normal order. Prices also seemed to be old, or “stale” in Wall Street parlance.
With 2,700 securities frozen, banks and big trading firms feared the brusque start of the systems.    Stock executives had to manage hundreds of backlogged orders during this crucial time.  Problems between NASDAQ and NYSE Arca continued even after the stocks reopened.
Time will tell what the problem was and if this is a bigger issue than a few hours lost at the stock exchange.

References:
NASDAQ Halt: System Glitch or Hack? – eWeek
http://www.eweek.com/blogs/security-watch/nasdaq-halt-system-glitch-or-hack.html
August 23, 2013
NASDAQ Trading Halted by Technical Issue – eWeek
http://www.eweek.com/security/nasdaq-trading-halted-by-technical-issue/
August 22, 2013
Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

Monday, August 26, 2013

Threat o Mobile Security

http://www.hyphenet.com/blog/threat-on-mobile-security/

The threat on mobile security rises as the world today is more often surfing the net on their smart phones and tablets.  Issues regarding mobile security threats are starting to change the trends of the digital landscape.
Cybercriminals are becoming more sophisticated to specifically target smartphones and tablets.  These mobile attacks are just as susceptible to Trojans, worms and rootkits.  Through malware, criminals are making more refined attacks with no regard for the privacy of the users.
More malicious apps are over %30 from last quarter, creating a higher risk mobile security environment.  With 718,000 separate instances accounted for high-risk, the number is up from 509,000 three months ago.  Android applications are among the most of these attacks.
There is a Webroot Mobile Security app for Android that can quickly scan your phone without draining all the juice.
Android malware has the greatest sophistication by far, being nicknamed “obad malware”.  The Kaspersky Lab discovered the “master key” vulnerabilities and came up with this nickname.
The United Arab Emirates, has the highest downloaded volume of these malicious apps.  This is followed by Myanmar, Vietnam, and Mexico, in that order.

mobile security

References:

Mobile Security Industry to Grow Fast, Soon – WebProNews Business
http://www.webpronews.com/mobile-security-industry-to-grow-fast-soon-2013-08?utm_source=Business_sidebar
August 23, 2013

Research: 2013 State Of Mobile Security – Information Week
http://reports.informationweek.com/abstract/18/10935/Mobility-Wireless/Research:-2013-State-Of-Mobile-Security.html

June 26, 2013
Mobile security is presenting a growing threat – CommercePress(Mobile)
http://www.mobilecommercepress.com/mobile-security-is-presenting-a-growing-threat/858402/
August 26, 2013

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet, “Like” us on Facebook or add us to your circle on Google+.

Thursday, August 22, 2013

Cybercriminals use DDoS Attacks to make Millions


DDoS attack

Millions of dollars have been lost to a new tactic being used by cybercriminals call DDoS.  DDoS attacks or distributed denial-of-service attack is an attempt to make a machine or network service unavailable.  These attacks typically target high-profile web servers, banks, credit card companies, and even root nameservers.
DDoS attacks are more frequently hitting banking systems, by defrauding their system and diverting their security staffs attention while the account is being taken over.
These distributed denial of service attacks have been used to divert security personnel attention when there are millions of dollars stolen from accounts.  At least three US banks in recent months have been ransacked by fraudulent wire transfers while hackers set up a “low powered” DDoS attack.  Many websites including JP Morgan, Wells Fargo, Bank of America, Chase, and Citigroup have been hit.

Attack on your website

DDOS-Attack-Structure
Extortion threats are being made against numerous websites, including Cryptome which just released an “Opsecure DDoS Extortion” letter.  The letter stated that unless funds were transferred to the Bitcoin address, the Cryptome website “will be undergoing a distributed denial of service’ attack conducted by ’1 & 0 Logic Security Group.’”  The criminal demanded 1Bitcoin as payment, which is around $102.
DDoS attacks are illegal in many countries including the United States, they sustain because they are free.  With enough infected malware and control over their PCs or servers, these attackers can defeat almost any unprotected website.
Criminal operations are behind many of these DDoS disruptions.  BetaBot’s are a relatively new and economical piece of malware that’s built to deactivate information security software.  Smoke Loader is malware that is used to load addition malware such as crimeware toolkits.  These both remotely control DDoS tools – onto infected systems.
DDoS attack tools, have been a favorite of hacktivist.  In the run-up to the Anonymous backed attacks against North Korea, hacktivist recommended participants to get into one of the DDoS attack tools like Loris for Pythin and Windows.

DDoS attack worldwide

Vulnerabilities

Izz ad-Din al-Qassam Cyber Fighters, launched the Operation Ababil attacks against U.S. banks last year, favored the “itsoknoproblembro” toolkit, which is also known as Brobot.  These have entered into thousands of legitimate sites due to exploitation of a vulnerability in a WordPress plug-in.
In South Korea in October 2011, the DDoS attack was used to Disrupt the country’s Nation Election Commission website on teh day of a Seoul mayoral by-election.  “inofrmation on polling stations was made unavailable during morning hours when a large proportion of young, liberal-leaning constituents were expected to vote en route to work,” according to a Freedom House report.
Security researchers have recognized the trend of using DDoS attacks.  The Dell SecureWorks Center Threat Unit issued a report in April to warn about the toolkit.  Wire transfers of up to $2.1million have been spotted.  A layered fraud prevention and security approach is now assured.
References:
Cybercriminals use DDoS attacks as “smokescreens” for major cyber thefts – WeLiveSecurity
http://www.welivesecurity.com/2013/08/22/cybercriminals-use-ddos-attacks-as-smokescreens-for-major-cyber-thefts/
August 22, 2013
Cybercriminals Expand DDOS Extortion Demands – Information Week
http://www.informationweek.com/security/vulnerabilities/cybercriminals-expand-ddos-extortion-dem/240157366
June 26, 2013
Cybercrooks use DDoS attacks to mask theft of banks’ millions – CNet
http://news.cnet.com/8301-1009_3-57599646-83/cybercrooks-use-ddos-attacks-to-mask-theft-of-banks-millions/

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

Wednesday, August 21, 2013

Breaking…Justin Bieber to E! Online “I’m a gay”!

Twitter’s social media site has the most outrageous headlines when it comes to leaking spam.  Social networks have an abundance of  cybercriminals living among them.  With young people obsessed with pop culture as if their life depended on it, big news stories drive thousands of views per minute to these social media sites informed with celebrity gossip. So it’s difficult for anyone to spot whats real and what is a scam containing malware.
The average Twitter user has tweeted 307 times.  With around 51 followers and 32% of all Internet users are using Twitter. (source: Marketing Land)
Justin Beiber scams
Photo Credit: Mashable
For instance: A friend just tweeted about Justin Bieber, you love Just  Bieber!  You read and re-tweet to your friends, now your circle is being infected by malware and the source came from you, which came from your friend that you and everyone else trusted.
ESET Security Evangelist Stephen Cobb says, “Can we trust our friends not to make questionable decisions on social media? Apparently not, because our friends might actually be scamers in disguise, or just not well-informed.”
ESET’s Social Media Scanner provides a quick, free way to check news stories on Facebook and Twitter to see if it’s a scam or not.  Here are some scams that should never be clicked on.

1.  The story people share without reading

“Breaking! Exclusive: Justin Bieber to E! online ‘I’m a gay’”  – This is an instance where the subject line was so outrageous that everyone wants to get it out there and share.  This article was re-tweeted 1,200 times, with 69% of tweets coming from friends, this one was a big hit.

2.  Your friend thinks they are a news reporter

If you see a big news story posted by your friend and haven’t heard of it anywhere else, be suspicious.  Big news usually spreads like a wildfire.  Facebook and Twitter malware often spread as shocking news to attract readers.  Scammers use viral pages to build up thousands of likes, then sell the pages to other companies.

3.  Posts about miracle diets

There are so many people on a diet, thinking about dieting, or have previously dieted.  In order to grab readers,  tons of  “amazing weight loss” and “miracle diet” spam mail are out there.  Earlier this summer, Instagram was attacked by the fruit spam mail.  BBC news page headlined, “Tropical Fruit Burns 17 Pounds in 22 Days. Exclusive Offer for Readers,” the images linked to a bogus paged disguised by a short url.

4.  The friend who sends you a gift card

These little surprises can be costly to your pocketbook.  When these gift cards arrive, the “free gift” gets people excited and they are enticed to open the “gift cards”  immediately.  Rarely are they from anyone you know, the gift is a scam and you just handed over personal details and downloaded malware onto your computer.

So be careful on what “Hot News” you click on, you may be compromising yourself and your closest friends.
Have you experienced this scam before?  Please feel free to share your experience below.

References:
Justin Bieber’s AMAZING diet: Five social posts you should never click – We Live Security
http://www.welivesecurity.com/2013/08/15/justin-biebers-amazing-diet-five-social-posts-you-should-never-click/
August 15, 02013
20 Twitter Stats From 2012 – MediaBistro
http://www.mediabistro.com/alltwitter/twitter-stats_b32050

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

Tuesday, August 20, 2013

Microsoft Windows XP Upgrade or Risk Infinite “Zero-Days”

Update Software - Microsoft Windows XP
Image Credit: Computer Weekly
For everyone who is using Microsoft Windows XP, you may want to abort the program.  The 12-year-old operating system will no longer have support by next April. You need to upgrade your  Microsoft Windows XP or risk infinite “zero-days”.
Tim Rains, director of Microsoft Trustworthy Computing, posted a blog last week reminding customers of the risk they would be taking if they continued to run Windows XP.  All users are urgently asked to upgrade to Windows 7 or 8.
April 8, 2014, Windows XP will have a Service Pack 3 (SP3) stating that customers will no longer receive secuity news updates.  Also, non-security hotfixes, free or paid assisted support options and online technical content updates will no longer be available.
When Microsoft ends support for Windows XP, it will probably be vulnerable to outdated Windows versions.  So attackers and spammers will have free reign on XP endpoints.  With that said, Windows XP will have a ‘zero day‘ susceptibility forever.
With knowledge of zero-day, you will never know if you can trust the computing base system you are on.  Attackers know about this vulnerability and are well aware of the compromised situation.  You must stay ahead of the game, and protect yourself.

Who’s In?

According to a study handled by VMware, 64 percent of enterprise-size companies have not migrated to Microsoft Windows XP.  52 percent of midsize firms and 61 percent of SMBs are also at risk.
“Common challenges such as end-user-downtime, data loss, migration failures and effort to upgrade remote employees can all be avoided if you plan ahead, “wrote Sarah Semple, VMware’s director of product marketing.
Many companies haven’t switched over because of the cost of the implementation.  It is estimated that, based on a 10,000-PC environment, the expense of migration is between $1,205 and $1,999 per machine.  That is a lot of money, but if you look at the risk your company is susceptible of , it is very much worth it.

The Flaws

Microsoft also has 33 other flaws aside from the zero-day vulnerability.  The software giant issued seven bulletins in early July, six of those were rated “critical”.  The flaws urgency to be fixed in Microsoft Office, Internet Explorer, DirectShow, .NET, and Silverlight are targeted.  Remote attackers will gain access of discerning systems and files.
One of the flaws reported, had Metasploit module created and alows an attacker to elevate system privileges.

Trash Microsoft Windows XP System

A Windows True Type Font parsing vulnerability that appears in three independent bulletins is also concerning, because it is found in an assortment of Microsoft products. – Technical Manager of Security Research and Development Group at Tripwire.
Microsoft revealed a new policy that requires developers to create apps for the Windows Store, Windows Phone Store, Office Store, and Azure Marketplace to fix any security vulnerabilities within a definitive time frame.  This policy demands developers to fix these security issues within six months.  The company declared the right to remove an app from any store that is being targeted or if it exceeds the six month brink.
So tell your friends and co-workers, get rid of Microsoft Windows XP before you put yourself at risk of an unnecessary attack.

References:
Microsoft: Upgrade from Windows XP or risk infinite “zero-days” – SCMagazine
http://www.scmagazine.com/microsoft-upgrade-from-windows-xp-or-risk-infinite-zero-days/article/307937/
August 19, 2013
Microsoft Patches Windows Zero-Day Flaw, Serious TrueType Error – CRN News
http://www.crn.com/news/security/240157990/microsoft-patches-windows-zero-day-flaw-serious-truetype-error.htm

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

Monday, August 19, 2013

Deal of the Week: HP LaserJet Pro 400-M401dne for only $298!

Laser-Jet-Printer
Make the most of your day with the HP LaserJet Pro 400-M401dne monochrome printer.  You can share your printing resources on a network and take advantage of it's high speed printing.  This LaserJet also has a two-sided printer for paper conservation.
http://www.hyphenet.com/blog/hp-laserjet-pro-400-m401dne/

Features

  • Easy to install and use
  • Professional grade quality output
  • Print from smartphone or tablet
  • HP Web Jetadmin, centralized management

Specifications

Print speed black: Normal:Up to 35 ppm
First page out (ready) - Black:As fast as 8 sec
Print quality (best) - Black:Up to 1200 x 1200 dpi
Duty cycle (monthly, letter) - Up to 50,000 pages;
Recommended monthly page volume - 750 to 3000
Print technology - Laser
Processor speed - 800 MHz
Print languages - HP PCL 5e, HP PCL 6, HP Postscript Level 3 emulation, direct PDF (v 1.7) printing
Display - 2-line LCD (text and graphics)

Connectivity

HP ePrint capability - Yes
Mobile printing capability - HP ePrint, Apple AirPrint™
Wireless capability - None
 Connectivity, standard
  • 1 Hi-Speed USB 2.0
  • 1 Ethernet 10/100/1000T network
Network ready - Standard (built-in Gigabit Ethernet)
Minimum system requirements
Microsoft® Windows® 7 (32-bit/64-bit), Windows Vista® (32-bit/64-bit): 1 GHz 32-bit (x86) or 64-bit (x64) processor, 1 GB RAM (32-bit) or 2 GB RAM (64-bit), 400 MB hard disk space, CD-ROM/DVD-ROM or Internet, USB or Network port; Windows® XP32 SP2 (32-bit): Pentium® 233 MHz processor, 512 MB RAM, 400 MB hard disk space, CD-ROM/DVD-ROM or Internet, USB or Network port;
Mac OS X v 10.5, v 10.6, v 10.7; PowerPC G4, G5, or Intel® Core™ Processor; 500 MB hard disk; CD-ROM/DVD-ROM or Internet; USB or Network
Compatible operating systems
  • Full software installs supported on: Microsoft® Windows®7 32-bit and 64-bit, Windows Vista® 32-bit and 64-bit, Windows® XP 32-bit (SP2 or higher)
  • Driver only installs supported on: Microsoft® Windows® Server 2008 32-bit and 64-bit, Windows® Server 2003 32-bit (SP3 or higher)
  • Mac OS X v 10.5, v 10.6, v 10.7
  • Linpus Linux : 9.4, 9.5
  • Red Hat Enterprise Linux: 5.0, 6.0
  • OpenSuSE: 11.3, 11.4
  • Fedora: 14, 15
  • Ubuntu: 10.04, 10.10, 11.04
  • Debian: 5.0, 6.0 and HPUX11i

Memory specifications

Memory, standard
256 MB
Memory, maximum
256 MB
Hard disk
  • None

Paper handling

Paper handling input, standard
  • 50-sheet multipurpose tray 1
  • 250-sheet input tray 2
  • automatic duplexer for two-sided printing
Paper handling output, standard
  • 150-sheet output bin
Duplex printing - Automatic (standard)
Media sizes supported
Letter, legal, executive, 8.5 x 13 in
Media sizes, custom
Multipurpose tray: 3 x 5 to 8.5 x 14 in; tray 2 and optional 500-sheet-tray 3: 4.1 x 5.8 to 8.5 x 14 in
Media types
Paper (plain, Green mode, light, heavy, bond, color, letterhead, preprinted, prepunched, recycled, rough); envelopes; labels; transparencies, cardstock
Media weight, supported
Tray 1: 16 to 43 lb (straight through paper path for special media); tray 2, optional 500-sheet tray 3: 16 to 32 lb
Finished output handling
  • Sheetfed

Power and operating requirements

Power - 110-volt input voltage: 110 to 127 VAC (+/- 10%), 50/60 Hz (+/- 2 Hz)
Power consumption - 570 watts (Printing), 7.3 watts (Ready), 6.2 watts (Sleep), 0.1 watts (Off)
(Power requirements are based on the country/region where the printer is sold. Do not convert operating voltages. This will damage the printer and void the product warranty.)
Energy efficiency
  • ENERGY STAR® qualified
  • EPEAT® Bronze
Operating temperature range - 59 to 90.5ºF
Operating humidity range - 30 to 70% RH

Dimensions and weight
Minimum dimensions (W x D x H) - 14.35 x 14.49 x 10.53 in
Maximum dimensions (W x D x H) - 14.35 x 24.94 x 12.14 in (multipurpose tray and foldup cover extended, tray 2 extended to legal-size)
Weight - 23.5 lb
Package dimensions (W x D x H) - 16.9 x 13 x 18.9 in
Package weight - 30.6 lb

What's included
What's in the box
  • HP LaserJet Pro 400 M401dne
  • HP 80A Black LaserJet Toner Cartridge (~2700 pages)
  • Installation guide, Support flyer, Warranty guide
  • power cord
  • Documentation CD
Cable included
No, please purchase USB cable separately
Warranty
One-year warranty, return to HP Authorized Service Provider

Call (619) 325-0990 to order HP LaserJet Pro 400 today!

Buy of the Week offer valid through August 23, 2013.
Note: Shipping and taxes apply.
Looking for something else? Check out our monthly deals or contact us to get a quote on the product you’re searching for.

Obamacare Scams…

http://www.hyphenet.com/blog/obamacare-scams/
obama-ObamaCare-Time-304x318
Image Credit: Time Magazine
We have heard about Obamacare taking effect soon.  A lot of people aren’t too sure of how it will work or what exactly it is, but now signs of scammers are coming about.  There is a huge debate over who will benefit from the Affordable Care Act and how to get it.  The gray area of this health care act is vast, which means there is a huge market for scammers and con artists.
Scammers have been at it for more than a year now, and with October 1st right around the corner, this problem will become even greater.    They have been calling, faxing, and emailing people, claiming to be part of the ‘Obamacare’ help staff.  October 1, 2013 is when the act will give millions of uninsured Americans the use of health insurance.  But everyone should know that not until October 1, can insurance be set up.
Scam artists are quick to jump into the national health care reform.  These con artists are asking for your bank account number, social security number, and other personal information in order to “verify” your identity.  This kind of scam is confusing and hard to spot, especially when it comes to senior citizens.  They are not as informed and aware of these types of scams.  All they know is Obamacare is coming and they are eligible.

Don’t Be Fooled

Thousands of people are being trained to become professional scam artists. They are learning how to professionally take you through the process for ‘applying’ for coverage to this new program. Your trust is gained from them explaining the coverage in detail and how it will affect you. Please know that you can not sign up for the Obamacare right now. You can learn more at HealthCare.gov. Also here is the phone number to contact Customer Service, 1-800-318-2596.
Here are some tips to help you spot fraud:
  • There is no card of any sort associated with the health care reform.
  • A Medicare card is not going to be updated nor given so don’t give personal information out.
  • The Health Insurance Marketplace does not open until October 1, 2013, nothing can be bought into until then.
  • Do not respond to a cold call asking for money or personal information.  Even if the Caller ID says it’s from a government office.
  • The enrollment period is from Oct.1 to March 31, anyone promising you a “special price for a limited time” is lying to you.
Please be aware of these Obamacare scam, this is meant to help people, but with kindness resides evil.  These people are waiting around the corner for you to fall into their trap.
References:
Obamacare is coming, and so are the scammers – Today
http://www.today.com/money/obamacare-coming-so-are-scammers-6C10913891
aug.15, 2013

Thursday, August 15, 2013

Hyphenet’s Infographic

Hyphenet is partnered with top-name computer and software vendors.  We give full service customer support and repair, on or off site. We can help your business with Web Design and SEO services, as well as graphic design and print work.  Hyphenet is San Diego’s leading Value-Added Reseller.  Here is an infographic on our company and the services we provide.  Enjoy!

hyphenet-infographic

Best Antivirus for Microsoft Windows 8

With Microsoft Windows 8.1 just around the corner, we’ll be updating our software, and trying out the new version of  Microsoft Windows 8.1 platform.  We should make sure our antivirus is also up-to-date.  Having an antivirus on your computer is very important with all the phishing and malware lurking in cyber land.  Here is a list of some great antivirus’ for your Windows 8.

1. Bit Defender Antivirus Plus 2013Bit-Defender-Antivirus

The Bit Defender Antivirus Plus 2013, not only gets rid of the spyware, malware, and viruses but saves your infected computer files.  Bit Defender cures your files from the antivirus so you don’t have to delete them from your computer.
  • Improves performance and speed
  • Stores sensitive credentials, access your most visited emails, websites, and apps
  • Autopilot makes security decisions for you, allowing you to still use your PC
  • 24/7 credit monitoring
  • Social network protection
  • Blocks websites that support scams and phishing
  • Immunizes Flash Drives from viruses when connected to your PC

2.  Microsoft Security Essentials

Microsoft-Security-Essentials-AntivirusMicrosoft Security Essentials is a free download for your home or small business.  Your PC must run on Windows to install.  It is user friendly and has an easy interface to navigate through.
  • Easily detects malware
  • Fast scanning speed
  • Rootkit Removal
  • Automatic updates

3.  AVG Free 2013

AVG-Antivirus-FreeThis free antivirus can be found on the Internet.  Keep your computer data safe from viruses and hackers, AVG is a great option.  The viruses and spyware slowing your computer down are easily detected and removed with this software.
  • Performance boost for your PC
  • Free phone support
  • Stops viruses in their tracks

4.  Avast Antivirus 2013

Avast-Antivirus-2013
This antivirus can be used on both computers as well as mobile.  Avast antivirus is user friendly with an easy interference and other nifty features.  This powerful antivirus automatically detects phishing and secures your data from hackers.
  • Blocks viruses and spyware
  • Remote assistance
  • Streaming virus database updates
  • Enhanced touch screen navigation
  • Software updater maintenance tool

5.  Kaspersky Antivirus

Kaspersky-Antivirus-SoftwareKaspersky Antivirus helps defend your data against Trojans that effect your computer.  This antivirus protects your data from malicious attacks with time-by-time updates.
  • Protects against all viruses
  • Detects new threats
  • Identifies suspicious websites
  • Prevents your PC from malware vulnerabilites


References:
Top 5 Best Free Antivirus For Windows 8 – Skyhitech
http://www.skyhittech.com/top-5-best-free-antivirus-for-windows-8/
August 7, 2013
BitDefender Antivirus Plus Download – HermanStreet
http://store.hermanstreet.com/pc-software/bitdefender-antivirus-plus-download/?cmpid=529806&s_kwcid=TC|17163|bitdefender%20antivirus%20plus%202013||S|e|25620204081&gclid=CJPQ8qTo_7gCFc57QgodHVgATQ
Microsoft Security Essentials – Microsoft
http://windows.microsoft.com/en-us/windows/security-essentials-download
Is AntiVirus FREE right for you? – AVG
http://free.avg.com/us-en/free-antivirus-download
avast! Free Antivirus – Avast!
http://www.avast.com/en-us/index
Kaspersky Anti-Virus 2013 -BuyCheapSoftware
http://www.buycheapsoftware.com/details.asp?productID=5789&utm_source=GoogleProductSearch&utm_medium=cpc&utm_campaign=ComparisonSite&gdftrk=gdfV23304_a_7c1137_a_7c3520_a_7cKAV1303121USZZ5789

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet, “Like” us on Facebook or add us to your circle on Google+

Wednesday, August 14, 2013

Microsoft Windows 8.1 is Arriving!



windows-blue-logoMicrosoft revealed their Windows 8.1 will be released on October 18, 2013.  Windows 8.1 will be released at 12 a.m. in New Zealand for it’s global tour.  Boxed discs, new hardware, and everything you need will be in stores by the 18th.  The Windows 8 users will be able to download and install the 8.1 version for free via the Microsoft Windows Store.
With all the traffic Microsoft will be getting, they are going to increase their rates on the new PCs and tablets.  Microsoft’s Windows 8.1 is available to be previewed as of June.  The new version of Windows offers a Start button, that is not a Start menu.  The button will allow you to return to the Start screen with a click, buttons are more fun than menus anyway, right?  If you would like to get down to business and bypass the Start screen entirely, there is a Boot to Desktop option.

Start em up

For the users who want to use the Start screen, they will find a fun and easy way to customize and personalize the menu.  There are special features like the All Apps screen and Search tools have been enhanced.  There are many other built-in apps that have improved as well.
The new Windows 8.1 is designed for both PCs and touch-screen devices.  Although, the new modern look of the UI may not be everyone’s favorite.  It has been a hit-or miss with its dueling Modern desktop approach.

Windows 8.1
References:
Windows 8.1 Preview
http://windows.microsoft.com/en-us/windows-8/preview?ocid=GA8_O_WOL_Hero_Home_BlueRP_Pos2_01
Windows 8.1 digital download will be released October 17, full retail launch October 18 – PCWorld
http://www.pcworld.com/article/2046630/windows-8-1-digital-download-will-be-released-october-17-full-retail-launch-october-18.html
August 14, 2013
Microsoft: Windows 8.1 to roll out October 18 – C-Net
http://news.cnet.com/8301-10805_3-57598456-75/microsoft-windows-8.1-to-roll-out-october-18/
August 14, 2013

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet, “Like” us on Facebook or add us to your circle on Google+.

Monday, August 12, 2013

Smartphone Buyer’s Guide 2013

Smartphones are getting smarter with their bigger displays, stronger battery life, sharper camera’s and cool new gadgets. We are a society that wants bigger and better so here is the rundown of all the hottest phones this year.
Nokia-Lumia-1020

Windows – Nokia Lumia 1020

The Lumia’s camera has a 41-megapixel sensor with image stabilization.  This state-of-the-art camera features xenon flash, high-end Zeiss optics, manual shutter, and many other photographic controls.  The Lumia captures two images automatically as you shoot.  The first is full-resolution and the other is either 34 or 38 megapixels.
The camera allows you to take pictures in direct sunlight.  It has a dual-core Qualcomm processor and 4.5-inch display.
Exclusively at AT&T for $299.99



samsung-galaxy-s-4-verizon

Samsung Galaxy S4

Samsung’s flagship phone has all the bells and whistles.  The dual camera feature allows you to take pictures with the front and rear cameras simultaneously.
Answering calls takes just a wave of the hand.  If you hover your finger over the screen you can magnify text and images.
The battery in the Galaxy is removable.
This phone has 5-inch high resolution, quad-core Qualcomm processor, long battery life, and water-resistant on some models.
Available in all major U.S. wireless carriers for $199.99 with a two-year contract.



HTC one

HTC ONE

The HTC is one of the thinnest and stylish phones out on the market.
It offers an excellent screen display, great photo features, and a BlinkFeed interface that pushes your screen content to the front and center instead of using icons.
HTC One has an UltraPixel Camera, 1080p HD video capture and playback.
For the 32GB version you can get this phone for $199.99.  $299.00 for the 64GB at AT&T and Sprint with a two-year contract.  T-Mobile has the HTC One available for $99.99 with a $20 a month payment for 24 months.



LG G2

LG G2

The LG G2 offers a unique design with power controls in the back.  You can answer a phone call just by picking it up instead of pressing a button.  If you want to turn the phone off or on, just knock on the screen twice.
The power and volume controls are on the back of the phone sense its believed to be a more natural location.
The LG G2 comes with a handset with high-quality audio.  5.2-inch full-high definition IPS display.  Quad-core Qualcomm Snapdragon 800 processor.  32GB of internal storage and an all-day battery.
The G2 is available in all major U.S. carriers. Date of release TBA.

Moto X

Motorola – Moto X

This Motorola has Touchless Control features that let you speak on command to make calls or texts.  The Active Display wakes up the phone when its sleeping.
You can personalize the phone back cover and highlight colors with the Moto X.  The cameria is 10 megapixels which is average for a camera phone.
It has 2GB of RAM, X8 Mobile Computing System, with a series of chips that includes a Qualcomm Snapdragon S4 Pro.  Android(Jelly Bean) 4.7-inch AMOLD high-definition display with 720 x 1080 resolution.


Xperia Z

Sony-Xperia Z

This phone has a 5-inch display, 13-megapixel camera and a battery with stamina.  The Xperia Z shuts down the wireless radios and other activities when you’re not using them to save life.
This is a smaller version of the Android tablet, can withstand a little water.  It is water-resistant down to 1 meter of water for up to a half-hour, as long as the ports are sealed.
The 5-inch high resolution (1920 x 1080) screen, quad-core Qualcomm processor, water resistant, long-life battery.
Exclusively from T-Mobile for $579.99.  Or $25 a month for 24 months.




Apple iPhone

Apple – iPhone 5S

The new iPhone will be the thinnest, lightest, and fastest iPhone ever.
12 megapixel iSignt camera, a larger display, faster chip, and the latest wireless technology.  iPhone 5 will have a fingerprint reader and Sapphire glass Home button.
4-inch Retina display, and ultrafast wireless.  18%thinner, 20% lighter, and 12% less volume.
The iOS is the worlds most advanced mobile operating system, with over 900,000 built-in apps.
Price TBD at the Apple iPhone Store coming out this September/October.






References:
iPhone 5S release date, news and rumours – TechRadar.Phones
http://www.techradar.com/us/news/phone-and-communications/mobile-phones/iphone-5s-release-date-news-and-rumours-1111911
July 22, 2013
Fall’s hottest smartphones: A buyer’s guide – USA Today
http://www.usatoday.com/story/tech/personal/2013/08/10/top-smartphones-android-apple-windows-phone/2635511/
Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+

Buy of the Week: Brother MFC 9130CW – Color Multifunction Printer

This Brother MFC 9130CW color multifunction printer is fast, reliable, and has great color resolution.
If you’re looking for a reliable digital color printer, that is fast and efficient, the Brother MFC-9130CW is what you need.  This color printer copies and prints high-impact color up to 19ppm, and scans and faxes too.  It offers wireless printing from mobile devices, and has features such as a 3.7″ color Touch Screen display.

Main Features

  • Fast Printing
  • 3.7″ Color TouchScreen Display
  • Wireless Networking
  • High-Impact Business Printing
  • Mobile Device Printing
  • 35-page Capacity Auto Document Feeder
  • High Quality Scanning
  • Customer Support

Brother Printer Specifications

Call (619) 325-0990 to order Brother Color Printer today!

Buy of the Week offer valid through August 16, 2013.
Note: Shipping and taxes apply.
Looking for something else? Check out our monthly deals or contact us to get a quote on the product you’re searching for.

Friday, August 9, 2013

How to keep your email safe…

Spam isn’t only annoying but it is also dangerous to users.  Attackers often send vast broadcasts with misleading IP addresses and email addresses.  Over 27 million Americans have been a victim of identity theft in the past five years.  More than 9 million people found their identities were stolen last year alone.
If a spammer gets a hold of both a company’s email and IP adress, the impact can be disastrous.  The company’s Internet connection would be terminated by it’s Internet Service Provider (ISP) if its an email that is added on the black list of spamming addresses.  It is very important to guard all gateways of a network.  Having a firewall and anti-virus software sometimes isn’t enough to keep you safe.  An intrusion detection system(IDS) is good to have, this system makes sure nobody is able to access your network without permission.
We have gotten a little wiser when it comes to email spams and scams.  Cybercriminals are also doing their homework and becoming more clever with these scams.  An email scam might start out with a bill that’s owed or even a wedding invitation from a friend.

Here are a few tips for keeping your email safe:

  • Look at the IP address
Check the link from the sender by hovering over the email address, make sure the link looks legit and makes sense.

  • Be careful with shortened URLs
Twitter uses URL shorteners but be cautious if you receive one in your email. Ask yourself why would anyone not want to show the company they are sending an email from.

  • Telephone numbers aren’t guaranteed telephone
Even if the email looks professional and has a telephone number, it can be a cyber-criminal trick. The phone number may lead you to a scammer requesting for personal information.

  • Don’t give out your email address
Giving out your email address is a bad idea. Electric companies in the U.S. were targeted with a “spear phishing” attack, which used information on company websites. Also be aware of the uncertainty of putting your email address public to social networks or Craigslist.

  • Don’t auto load images
Don’t configure your email settings to where images are automatically downloaded. This will send a signal to spammers and the images sent to you are stored onto their servers with your email connected to them.

  • Don’t spam yourself
Be mindful of filling out internet forms. Don’t click on the “I want to receive information”, box unless you truly trust the company. Even if the company is reputable, your email could possibly be passed on to other lists.

  • Don’t store important information in your “Sent” folderSent folder
Bank account information, credit card numbers, and passwords are not safe in your “Sent” folder. These details can be picked up by spammers very easily.

  • Make recovery questions hard
Questions like your first job or your mothers maiden name can be found very easily. Choose something harder, or if possible  make up your own question.

Unless we are aware of the possibilities of how these cyber criminals are take our identity and personal info, we will not know who to prevent it from happening.  Make sure you always have strong passwords and an up-to-date anti-virus on your computer.  Be cautious when connecting to open Wifi spots and consider a multi-factor authentication to add extra security to your system.   Fortunately, the U.S. Federal Government and email service providers have been taking steps to reduce and hopefully eliminate spam email.

References:
Bulletproof Inbox: Tips for staying safe (and sane) on email – WeLiveSecurity
http://www.welivesecurity.com/2013/08/02/bulletproof-inbox-tips-for-staying-safe-and-sane-on-email/
August 2, 2013
Ten Scariest Hacking Statistics – StopTheHacker
http://www.stopthehacker.com/2012/04/20/ten-scariest-hacking-statistics/#.UgUTM2009qY
April 20, 2013
Email hacking – Wikipedia
http://en.wikipedia.org/wiki/Email_hacking
What is Email Spam? – Comm100
http://emailmarketing.comm100.com/email-marketing-ebook/email-spam.aspx

Thumbnail image courtesy of [Stuart Miles] / FreeDigitalPhotos.net

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+