Journalist @baltimoresun writer artist runner #amwriting Chaplain PIO #partylikeajournalist

Journalist @baltimoresun writer artist runner #amwriting Chaplain PIO #partylikeajournalist
Journalist @baltimoresun writer artist runner #amwriting Md Troopers Assoc #20 & Westminster Md Fire Dept Chaplain PIO #partylikeajournalist
Showing posts with label Technology. Show all posts
Showing posts with label Technology. Show all posts

Sunday, January 04, 2015

NYT: How My Mom Got Hacked - NYTimes.com

NYT: How My Mom Got Hacked - NYTimes.com: "By ALINA SIMONEJAN. 2, 2015"

http://www.nytimes.com/2015/01/04/opinion/sunday/how-my-mom-got-hacked.html?emc=edit_th_20150104&nl=todaysheadlines&nlid=45685287 

http://kevindayhoff.blogspot.com/2015/01/nyt-how-my-mom-got-hacked-nytimescom.html

MY mother received the ransom note on the Tuesday before Thanksgiving. It popped up on her computer screen soon after she’d discovered that all of her files had been locked. “Your files are encrypted,” it announced. “To get the key to decrypt files you have to pay 500 USD.” If my mother failed to pay within a week, the price would go up to $1,000. After that, her decryption key would be destroyed and any chance of accessing the 5,726 files on her PC — all of her data — would be lost forever.

Sincerely, CryptoWall.

CryptoWall 2.0 is the latest immunoresistant strain of a larger body of viruses known as ransomware. [...]

http://www.nytimes.com/2015/01/04/opinion/sunday/how-my-mom-got-hacked.html?emc=edit_th_20150104&nl=todaysheadlines&nlid=45685287 

Is there any other way to get rid of it besides paying the ransom? No — it appears to be technologically impossible for anyone to decrypt your files once CryptoWall 2.0 has locked them. (My mother had several I.T. professionals try.)

But should you really be handing money over to a bunch of criminals? According to the Internet Crime Complaint Center, a partnership between the F.B.I. and the National White Collar Crime Center, this answer is also no. “Ransomware messages are an attempt to extort money,” one public service announcement helpfully explains. “If you have received a ransomware message do not follow payment instructions and file a complaint.” Right. But that won’t get you your files back. Which is why the Sheriff’s Office of Dickson County, Tenn., recently paid a CryptoWall ransom to unlock 72,000 autopsy reports, witness statements, crime scene photographs and other documents... [...]

http://www.nytimes.com/2015/01/04/opinion/sunday/how-my-mom-got-hacked.html?emc=edit_th_20150104&nl=todaysheadlines&nlid=45685287 

'via Blog this'
++++++++++++
Kevin Dayhoff Art: http://www.kevindayhoff.com/
New Bedford Herald: http://kbetrue.livejournal.com/
Scribd Kevin Dayhoff: http://www.scribd.com/kdayhoff
Kevin Dayhoff's YouTube: http://www.youtube.com/kevindayhoff
Kevin Dayhoff Banana Stems: http://kevindayhoff.tumblr.com/ 

Sunday, July 27, 2014

Edward Snowden: Dropbox is 'hostile to privacy' | PCWorld

Edward Snowden: Dropbox is 'hostile to privacy' | PCWorld:

http://www.pcworld.com/article/2455215/edward-snowden-dropbox-is-hostile-to-privacy.html#tk.nl_pcwbest





"Dropbox is a very popular cloud storage service, but NSA whistleblower Edward Snowden is no fan. In a recent interview with The Guardian, Snowden called Dropbox a "targeted, wannabe PRISM partner" that is "very hostile to privacy.""

........

Update: Here's what Dropbox has to say:
"Safeguarding our users’ information is a top priority at Dropbox. We were not involved in PRISM, and would resist any program of its kind. We’ve made a commitment in our privacy policy to resist broad government requests, and are fighting to change laws so that fundamental privacy protections are in place for users around the world. To keep our users informed, we also disclose government requests in our Transparency Report."
http://www.pcworld.com/article/2455215/edward-snowden-dropbox-is-hostile-to-privacy.html#tk.nl_pcwbest

'via Blog this'
*****

Friday, May 09, 2014

Proposed law would clarify who gets access to a deceased person’s digital accounts | Pew Research Center

Proposed law would clarify who gets access to a deceased person’s digital accounts | Pew Research Center:

http://www.pewresearch.org/fact-tank/2014/05/06/proposed-law-would-clarify-who-gets-access-to-a-deceased-persons-digital-accounts/

[...]

The Uniform Law Commission, a body of lawyers who produce uniform legislation for states to adopt, recently drafted the “Fiduciary Access to Digital Assets Act (FADA).” It would grant fiduciaries (a catch-all term for the various types of people who can be legally appointed to hold assets) broad authority to access and control digital assets and accounts.

FADA is considered by many attorneys to be an improvement over existing law because it would clarify and expand who can access a deceased person’s online accounts.

The proposal would create four categories of fiduciaries who would be able to take over these accounts in the event of a death: a personal representative of a deceased person’s estate; someone carrying out a power-of-attorney; a trustee of a trust; or someone appointed by a court to act on behalf of a protected person. Existing laws typically only apply to personal representatives... http://www.pewresearch.org/fact-tank/2014/05/06/proposed-law-would-clarify-who-gets-access-to-a-deceased-persons-digital-accounts/

'via Blog this'
*****

Snapchat, agreed to settle charges by the Federal Trade Commission that messages sent through its app did not disappear as easily as promised.

QUOTATION OF THE DAY

"The Internet is forever, and people don't realize that."
NICO SELL, a security expert, on Snapchat, which agreed to settle government charges that messages sent through its app do not disappear as easily as promised.

Off the Record in a Chat App? Don't Be Sure

By JENNA WORTHAM


The popular mobile service, Snapchat, agreed to settle charges by the Federal Trade Commission that messages sent through its app did not disappear as easily as promised... http://www.nytimes.com/2014/05/09/technology/snapchat-reaches-settlement-with-federal-trade-commission.html?emc=edit_th_20140509&nl=todaysheadlines&nlid=45685287

Tuesday, April 29, 2014

What is a photocopier? Public records humor? Yep ... watch this video | The Columbus Dispatch

Public records humor? Yep ... watch this video | The Columbus Dispatch: "By: Randy Ludlow
The Columbus Dispatch - April 28, 2014"


Hat Tip: Bryan Sears...


This is hilarious – and true. And, it involves public records, which typically aren't good for many laughs.
A Hollywood writer and movie director has created a new online feature for The New York Times in which he crafts a verbatim video around transcripts from court cases.
The debut video involves an Ohio Supreme Court case in which an incredulous lawyer (David Marburger of Cleveland in real life) questions a Cuyahoga County recorder’s office employee who refuses to concede he knows what a photocopier is. Hilarity ensues.
OMG - you simply must watch this here: http://www.dispatch.com/content/blogs/your-right-to-know/2014/04/photocopier-video.html 

'via Blog this'
 Google profile: https://profiles.google.com/kevindayhoff/

Kevin Dayhoff Art: http://www.kevindayhoff.com/ (http://kevindayhoffart.blogspot.com/http://www.kevindayhoffart.com/ New Bedford Herald: http://kbetrue.livejournal.com/ Twitter: https://twitter.com/kevindayhoff

Google profile: https://profiles.google.com/kevindayhoff/ “Each one should use whatever gift he has received to serve others, faithfully administering God’s grace in its various forms.” 1 Peter 4:10

Monday, April 28, 2014

ALAMOGORDO, N.M.: Diggers find Atari's E.T. games in landfill | Business | ADN.com

ALAMOGORDO, N.M.: Diggers find Atari's E.T. games in landfill | Business | ADN.comhttp://www.adn.com/2014/04/25/3442598/diggers-ready-to-unearth-ataris.html#emlnl=Morning_Newsletter

"BY JUAN CARLOS LLORCA Associated Press April 25, 2014"

ALAMOGORDO, N.M. — A decades-old urban legend was put to rest Saturday when workers for a documentary film production company recovered "E.T." Atari game cartridges from a heap of garbage buried deep in the New Mexico desert.

The "Atari grave" was, until that moment, a highly debated tale among gaming enthusiasts and other self-described geeks for 30 years. The story claimed that in its death throes, the video game company sent about a dozen truckloads of cartridges of what many call the worst video game ever to be forever hidden in a concrete-covered landfill in southeastern New Mexico.

The search for the cartridges of a game that contributed to the demise of Atari will be featured in an upcoming documentary about the biggest video game company of the early '80s.

As a backhoe scattered a huge scoop of 30-year-old trash and dirt over the sand, the film crew spotted boxes and booklets carrying the Atari logo. Soon after, a game cartridge turned up, then another and another.

Read more here: http://www.adn.com/2014/04/25/3442598/diggers-ready-to-unearth-ataris.html#emlnl=Morning_Newsletter

'via Blog this'  Google profile: https://profiles.google.com/kevindayhoff/

Saturday, April 12, 2014

Reply-all email chain fail: The email trick to help you avoid them.

Reply-all email chain fail: The email trick to help you avoid them.:

By Lowen Liu

http://www.slate.com/blogs/future_tense/2014/04/09/reply_all_email_chain_fail_the_email_trick_to_help_you_avoid_them.html?wpisrc=newsletter_jcr:content&mc_cid=ca5b8b9593&mc_eid=b27361148d

"No storm leaves as long a swath of destruction in your email inbox as the endless reply-all chain, and this week a Category 5 has been tearing through the journo-verse: a PR notice (for Netflix’s new show Marco Polo—see it!) that made the fatal error of listing all recipients in the public CC field, rather than the private BCC field. What happened next will not surprise you:"

[...] http://www.slate.com/blogs/future_tense/2014/04/09/reply_all_email_chain_fail_the_email_trick_to_help_you_avoid_them.html?wpisrc=newsletter_jcr:content&mc_cid=ca5b8b9593&mc_eid=b27361148d

Or you could use this simple Gmail button:
140408_gmail_mute2
Screenshot
As explained on Google support, the “mute” button will hide all future messages in the conversation—but not delete them, should you ever one day desire to confront the darkness you once avoided. Why Google gave such a powerful tool such a slight (though appropriate) name and tucked it under the “more” menu, I don’t know. But I know better than to question the gift... http://www.slate.com/blogs/future_tense/2014/04/09/reply_all_email_chain_fail_the_email_trick_to_help_you_avoid_them.html?wpisrc=newsletter_jcr:content&mc_cid=ca5b8b9593&mc_eid=b27361148d
'via Blog this'


+++++++++++++++
Kevin Dayhoff is an artist - and a columnist for:
Twitter: https://twitter.com/kevindayhoffTwitpic: http://twitpic.com/photos/kevindayhoff
Kevin Dayhoff's The New Bedford Herald: http://kbetrue.livejournal.com/ = www.newbedfordherald.net

Tumblr: Kevin Dayhoff Banana Stems www.kevindayhoff.tumblr.com/
Smurfs: http://babylonfluckjudd.blogspot.com/
Google profile: https://profiles.google.com/kevindayhoff/

E-mail: kevindayhoff(at)gmail.com
My http://www.explorecarroll.com/ columns appear in the copy of the Baltimore Sunday Sun that is distributed in Carroll County: https://subscribe.baltsun.com/Circulation/
+++++++++++++++

Friday, April 11, 2014

NSA knew about, exploited Heartbleed for years: Bloomberg report.

NSA knew about, exploited Heartbleed for years: Bloomberg report.: By Lily Hay Newman

"It just doesn't end. Bloomberg is reporting that, according to “two people familiar with the matter,” the NSA has known about the Heartbleed vulnerability for at least two years—and was using it to collect information about people instead of, you know, telling someone about it and getting it fixed.

With millions of websites compromised, people all over the world changing their passwords for protection, the Canadian government suspending electronic tax filing, and people speculating about whether Heartbleed is the “worst vulnerability ever,” this could end up looking pretty bad for the agency. Good thing it already has a sparkly-clean public image, or it might be in trouble.

According to Bloomberg, it doesn’t seem that the NSA created Heartbleed—it just  found the bug and used it. " http://www.slate.com/blogs/future_tense/2014/04/11/nsa_knew_about_exploited_heartbleed_for_years_bloomberg_report.html?wpisrc=newsletter_jcr:content&mc_cid=67b8a19711&mc_eid=b27361148d


'via Blog this'
*****

Saturday, April 05, 2014

Apple designer's court testimony recalls birth of iPhone | PCWorld

Apple designer's court testimony recalls birth of iPhone | PCWorld

"Martyn Williams Apr 4, 2014 "The roots of the iPhone can be traced to many corners of Apple’s campus in Cupertino, California, but a Silicon Valley courtroom on Friday heard how some of the most recognizable software features came from a team working in a dark, dirty, windowless room with special security to keep others out.

The story of the iPhone’s software design was related by Greg Christie, an Apple vice president and software designer, as part of Apple’s patent infringement case against Samsung. Christie is one of the inventors listed on the patent for the “slide to unlock” function, which is one of the patents in question in Apple’s lawsuit against Samsung, on trial in the U.S. District Court in San Jose, California.

http://www.pcworld.com/article/2140380/apple-designers-court-testimony-recalls-birth-of-iphone.html#tk.nl_today

'via Blog this'
*****

Friday, April 04, 2014

Rejoice! The Start menu is coming back to Windows | PCWorld

Rejoice! The Start menu is coming back to Windows | PCWorld: "
Brad Chacos @BradChacos Apr 2, 2014" 
You heard right, devout desktop lovers: The Start menu is coming back to Windows, Microsoft operating system head Terry Myerson announced at Build on Wednesday.

The details are hazy, aside from the fact that it's going to be pushed to all Windows 8.1 users as an update at some point in the future. But it's a-coming—though it's not quite the Start menu you're familiar with. Beyond the traditional mouse-friendly features, the Windows 8.1 Start menu will be crammed with Live Tiles, along with the ability to find and install Microsoft's universal Windows apps, also announced Wednesday.
'via Blog this'

*****

Sunday, March 30, 2014

HTC's next flagship smartphone needs more than Robert Downey Jr. | PCWorld

HTC's next flagship smartphone needs more than Robert Downey Jr. | PCWorld: "The HTC One: is a good phone not enough?"

http://www.pcworld.com/article/2111121/htcs-next-flagship-smartphone-needs-more-than-robert-downey-jr.html#tk.nl_today

[...]

The second iteration of the One is expected to have a 5-inch full HD screen and a Snapdragon 801 processor with four cores running at 2.3GHz. The phone is also rumored to have two cameras on the back that will work together to produce better images.

[...]

An improved camera has been one of the main themes on smartphones HTC’s newcomer will compete with, including the Sony’s Xperia Z2 and the Galaxy S5 from Samsung, They were launched at Mobile World Congress last month and will go on sale in April, with the S5 starting to ship on the 11th.
The smartphone market is anticipated to heat up further with a successor to the G2 from LG Electronics and a new iPhone as early as May or June.
HTC has already introduced three new phones this year: Desire 310, Desire 610 and Desire 816, which are all part of an increased focus on the midrange of the market. But a successful high-end model is key for any smartphone company, because it can both help improve profits with better margins and create a trickle-down effect for the rest of the portfolio.
http://www.pcworld.com/article/2111121/htcs-next-flagship-smartphone-needs-more-than-robert-downey-jr.html#tk.nl_today

'via Blog this'
*****

Thursday, March 20, 2014

Bloomberg Business Week: Target Missed Warnings in Epic Hack of Credit Card Data

Bloomberg Business Week: Target Missed Warnings in Epic Hack of Credit Card Data

Target Missed Warnings in Epic Hack of Credit Card Data Reblogged 5 hours ago from newsweek

http://kevindayhoff.tumblr.com/post/80106052145/newsweek-the-biggest-retail-hack-in-u-s
newsweek:

The biggest retail hack in U.S. history wasn’t particularly inventive, nor did it appear destined for success. In the days prior to Thanksgiving 2013, someone installed malware in Target’s (TGT) security and payments system designed to steal every credit card used at the company’s 1,797 U.S. stores.
At the critical moment—when the Christmas gifts had been scanned and bagged and the cashier asked for a swipe—the malware would step in, capture the shopper’s credit card number, and store it on a Target server commandeered by the hackers.
Target Missed Warnings in Epic Hack of Credit Card Data
The biggest retail hack in U.S. history wasn’t particularly inventive, nor did it appear destined for success. In the days prior to Thanksgiving 2013, someone installed malware in Target’s (TGT) security and payments system designed to steal every credit card used at the company’s 1,797 U.S. stores.
At the critical moment—when the Christmas gifts had been scanned and bagged and the cashier asked for a swipe—the malware would step in, capture the shopper’s credit card number, and store it on a Target server commandeered by the hackers.


*****

Monday, March 10, 2014

News from The Hill Rubio warns of UN Internet 'takeover' - By Kate Tummarello

News from The Hill Rubio warns of UN Internet 'takeover'  - By Kate Tummarello

Sen. Marco Rubio (R-Fla.) plans to introduce legislation to prevent a “takeover” of the Internet by the United Nations or another government regime.

Speaking Monday at Google’s office in Washington, the possible presidential contender said he will introduce legislation to codify U.S. support of an open Internet as other countries attempt to control its growth.


Read the story here.
*****

Thursday, March 06, 2014

PCWorld.com: Bugs & Fixes: The Moon Worm slinks by Linksys E-series routers - by Jon L. Jacobi

*****

Thursday, February 27, 2014

Apple retires Snow Leopard from support, leaves 1 in 5 Macs vulnerable to attacks

Apple retires Snow Leopard from support, leaves 1 in 5 Macs vulnerable to attacks

Twice now that Apple's bypassed Snow Leopard when it patched newer editions
Gregg Keizer


Apple on Tuesday made it clear that it will no longer patch OS X 10.6, aka Snow Leopard, when it again declined to offer a security update for the four-and-a-half-year-old operating system.

As Apple issued an update for Mavericks, or OS X 10.9, as well as for its two predecessors, Mountain Lion (10.8) and Lion (10.7), Apple had nothing for Snow Leopard or its owners yesterday.

Snow Leopard was also ignored in December, when Apple patched Safari 6 and 7 for newer editions of OS X, but did not update Safari 5.1.10, the most-current Apple browser for the OS.


*****

Sunday, February 23, 2014

Windows 8.1 update due in spring with concessions to mouse and keyboard users | PCWorld


BARCELONA—At a Sunday press event prior to Mobile World Congress, Microsoft vice president Joe Belfiore led with bright news about Windows 8: Microsoft has sold 200 million licenses (more than all of OS X’s user base, he noted); users have downloaded 4 million apps from the Windows Store; and 40 percent of Windows 8 machines are touch-enabled.
But for the 60 percent of Windows 8 machines still not touch-enabled, Belfiore conceded, users’ “satisfaction level is lower.” So when the Microsoft executive confirmed rumors of a Windows 8.1 update this spring, he also detailed three major improvements that would come with it. First and foremost will be features to give mouse-and-keyboard diehards a break.
'via Blog this'
 Google profile: https://profiles.google.com/kevindayhoff/

Kevin Dayhoff Art: http://www.kevindayhoff.com/ (http://kevindayhoffart.blogspot.com/http://www.kevindayhoffart.com/ New Bedford Herald: http://kbetrue.livejournal.com/ Twitter: https://twitter.com/kevindayhoff

Google profile: https://profiles.google.com/kevindayhoff/ “Each one should use whatever gift he has received to serve others, faithfully administering God’s grace in its various forms.” 1 Peter 4:10

Sunday, February 09, 2014

Washington Post: Court papers escalate fight between key contractors on Md. health insurance exchange

Court papers escalate fight between key contractors on Md. health insurance exchange

By Jenna Johnson and Mary Pat Flaherty, Published: February 7, 2014


One of the two companies that built Maryland’s troubled online health insurance exchange charged in court papers Friday that the lead contractor “concealed its lack of relevant expertise” when it bid on the contract.

Escalating a bitter feud, EngagePoint alleged that Noridian Healthcare Solutions had no experience in developing the type of software the exchange would need. EngagePoint also said Noridian “lacked the expertise, resources and commitment actually required” to develop and operate the Web site through which Marylanders were supposed to sign up for insurance under the federal Affordable Care Act.

Noridian fired EngagePoint in October, and the two companies — which are suing each other in federal court in Baltimore — are fighting over employees, money and work that remains to be completed.

[….]

Maryland Lt. Gov. Anthony G. Brown (D), who was tasked with implementing health-care reform in Maryland, said top state officials became aware of potential problems in September but did not realize their gravity. Maryland’s exchange crashed Oct. 1, its first day, and has been plagued with problems that have made it difficult for Marylanders to sign up for health insurance.

[…]

The exchange is largely functioning through work-arounds, state health officials have said. Rather than signing up for insurance through the Web site, many Marylanders have contacted call centers and spent hours on the phone. Some applications are being processed on paper.


*****

Saturday, February 08, 2014

Tech fears shadow campaign to seize control of Internet - News from The Hill By Kate Tummarello

News from The Hill:

Tech fears shadow campaign to seize control of Internet 

By Kate Tummarello

Fearing a power grab for control of the Internet, members of the tech industry are pleading with Congress to pay attention to the domain name expansion that is underway at a little-known nonprofit.

The Internet Corporation for Assigned Names and Numbers (ICANN), led by its CEO Fadi Chehade, last year began rolling out thousands of alternatives to the traditional .com ending used by most websites. New endings using the Latin alphabet, such as .clothing and .singles, became available in January, and hundreds of others are on the way.

ICANN says it is focused on making the Internet more broadly available and has prioritized creating domain names in languages such as Chinese, Arabic and Cyrillic. 

But critics say the nonprofit betrayed broader ambitions last year when it endorsed a statement calling for the globalization of ICANN and other domain name technical work that is currently managed by the United States.

Read the story here.
*****

Friday, January 10, 2014

How to prevent strangers on Google+ from flooding your Gmail inbox | PCWorld

How to prevent strangers on Google+ from flooding your Gmail inbox | PCWorld:


"If you use Google+ and Gmail, Google is about to open your email account to a whole new level of spam. A new feature rolling out over the next couple of days makes it possible for any Google+ user to email you, as long as they follow you on Google+—they don’t need to know your actual email address, and you don't even have to follow them back. And to make it even worse, Google took the Facebook approach by turning on the new feature by default.

Fun, right? Not so much. I’ve already got this new “feature” in my inbox and the first thing I did was turn it off. Today, I’m going to show you how to do the same thing.

But first, let’s cover the basics about how this new “email via Google+” feature works." READ MORE: http://www.pcworld.com/article/2086722/how-to-prevent-strangers-on-google-from-flooding-your-gmail-inbox.html#tk.nl_today

[...]

When the Settings panel opens, scroll down the “General” tab until you see “Email via Google+” label. (If you don’t see the new setting in your Gmail account, check back over the next few days, as the feature is still rolling out to all Gmail users.) Click on the drop-down menu and choose the setting that you’re most comfortable with. Remember, by default Google is letting anyone from Google+ send you unsolicited mail. I chose to stop Google+ emails completely by selecting “No one,” as you can see below... READ MORE: http://www.pcworld.com/article/2086722/how-to-prevent-strangers-on-google-from-flooding-your-gmail-inbox.html#tk.nl_today

'via Blog this'
*****