*All Your Devices Can Be Hacked


Avi Rubin is Professor of Computer Science at Johns Hopkins University and Technical Director of the JHU Information Security Institute. Avi’s primary research area is Computer Security, and his latest research focuses on security for electronic medical records. Avi is credited for bringing to light vulnerabilities in electronic voting machines.  


16:50 minutes 

Be Safe – Backup Your Data Regularly!


And don’t forget to take advantage of our FREE subscription to the TechViews.org Newsletter. A must-read if you are interested in Internet Security.


*But what if you DON’T have a Yahoo account? Are you affected?

TechViews News   …..

With this latest breach you may be asking, “Am I affected if I don’t have a Yahoo email account?”

Simply put, yes you are. If you have friends or family who use Yahoo, and they communicated with you, then your information is available to the hackers as well.

As emails are transmitted back and forth between service providers, a string of information ‘tid-bits’ in the email headers keep track of all the who-when-where of the process. That’s what all those seemingly meaningless numbers and letters are in the headers.  (How to decode an email header will be in an upcoming article).

But what’s key here is what was accessed in the breach. Stolen user data reportedly includes not just the contents of emails, but also account user’s names, email addresses, telephone numbers, dates of birth and passwords.

And you still don’t think a hacked email account is serious? Well, it’s serious enough it exposed corruption and brought down a Presidential candidate.

Continue reading

*Yahoo just announced MORE breached accounts (no, this is NOT last year’s news)

TechViews News   …..   

After Yahoo announced last year that 1.5 Billion of their accounts had been breached, many were wondering if it was time to close their email accounts and move elsewhere.

Well, the time has come. Close your Yahoo account now. Don’t just change your password or secret information. Close it down and move to something more secure, at least until Yahoo can get it’s act together. 

What is Yahoo’s latest security breach? On February 15, 2017, Yahoo announced this time, hackers used forged cookies to access accounts without needing passwords. That’s right folks, cookies. 

Here is what the announcement stated: “We are writing to inform you about a data security issue that involves your Yahoo account. We have taken steps to secure your account and are working closely with law enforcement. 

Continue reading

*Edward Snowden now urging encryption with business communications

TechViews News …..

The NSA whistleblower, Edward Snowden, has urged lawyers, journalists, doctors, accountants, priests and others with a duty to protect confidentiality to upgrade security in the wake of the spy surveillance revelations.

The response of professional bodies has so far been lukewarm, not out of disinterest, but out of careless laziness.

The former National Security Agency and CIA computer specialist, wanted by the US under the Espionage Act after leaking tens of thousands of top secret documents, has given only a handful of interviews since seeking temporary asylum in Russia three years ago.

In recent interviews Snowden has also said:

  • If he ended up in US detention in Guantánamo Bay he could live with it.
  • He rejected various conspiracy theories surrounding him, describing as “bullshit” suggestions he is a Russian spy.
  • He claims he has been living on savings, and money from awards and speeches he has delivered online round the world.
  • Said he was holding out for a jury trial in the US rather a judge-only one, hopeful that it would be hard to find 12 jurors who would convict him if he was charged with an offence to which there was a public interest defense. Negotiations with the US government on a return to the US appear to be stalled.

Snowden, who recognizes he is almost certainly kept under surveillance by both the Russians and the Americans. He has revealed that he works online late into the night; a solitary, digital existence not that dissimilar to his earlier life.

Continue reading

*A Few Ways to Unsend an Email

TechViews News   …..  

OK, You just crafted a wonderful email and hit “Send”, and away it went. Then you realize that it went to the wrong person, or maybe you wrote the email out of anger. Or perhaps we hit Send before it was finished, or even you didn’t take the time to proofread what you wrote.  For whatever reason, we all wish we could ‘unsend’ an email from time to time.

Here are four ways that you set up your system so that you can ‘undo’ sending your email.

Continue reading

*New Facebook customer service scam offers fake phone number

TechViews News   …..

Many of my friends are active, regular Facebook users. It’s estimated that there are nearly 2 billion active monthly users worldwide. That’s an astonishing number.

And we all know that some websites go down from time to time. And that Includes Facebook. But what if you were in the middle of posting something important … like what you had for breakfast, or a photo of your new cat. And suddenly Facebook crashes. If something did go wrong, how would you contact Facebook?

Crafty scammers have developed a way to target Facebook users who feel the need to get in touch with the popular website if they have trouble with their postings. And of course, people are falling for the scam.

National Public Radio (NPR) decided to investigate this scam after multiple police reports were filed.

How this Facebook customer service scam works

Continue reading

*Data Firms Are Harvesting – and Selling – Your Social Media Profiles

TechViews News   …..

By now most people are aware that companies are harvesting their personal, private data from their emails, texts, videos, and social website profiles.

In particular, your public social media profiles—including Twitter, Facebook and LinkedIn—are being harvested and resold by large consumer data companies.

A recent Congressional inquiry revealed that some companies record — and then resell — your screen names, web site addresses, interests, hometown and professional history, and how many friends or followers you have.

Some companies also collect and analyze information about users’ “tweets, posts, comments, likes, shares, and recommendations,” according to Epsilon, a consumer data company.

Many people think their lives aren’t worth recording, they simply say, “so what? everyone is watching?” But what’s cringe worthy is that we’re talking about an industry that brags about largely “operated in the shadows.”

Continue reading