Chuck Talking Tech / by Chuck Bienenfeld

December 14, 2016

As many of you may already be aware, there is a new malware campaign called Gooligan.  This is a rootkit identified by the security researchers at Check Point that in part steals authentication tokens that can be used to access data from Google Play, Gmail, Google Photos, Google Docs, G Suite and Google Drive.  Moreover Gooligan can be even more frightening.  This involves its ability to install other applications even ones from the Google Play store, serve up additional adware and provide 5 star ratings to applications that bought in.

Read the rest of this entry »

Advertisements

“I love it when a plan comes together.”  – John ‘Hannibal’ Smith – The A team

The plan came together when I received an email after subscribing to Troy Hunt’s “Have I been pwned” website notifying me that my account (email address and password) was part of the recently made available LinkedIn 2012 data breach.

Read the rest of this entry »


Chuck Talking Tech / by Chuck Bienenfeld

March 19, 2016

Disclaimer, I am a happy user of UBlock Orgin. I use it primarily due to all the behind the scenes data tracking and system fingerprinting being done via JavaScript by the advertising, ISPs and web communities.  It also helps prevent ads from 3rd party sites where malivertising so readily exists.  I am also frustrated that our data is considered free game and not ours to control as we see fit.

Read the rest of this entry »


UniquePasswordsBlogChuck Talking Tech / by Chuck Bienenfeld

September 1, 2014

This blog post is long over due. I felt with the almost daily announcements in the media of a company losing our sensitive data, such the highly publicized Heartbleed vulnerability, Target and E-Bay breach and multiple StubHub account violation, it was time to start the conversation about the need for strong, random, unique passwords.

Read the rest of this entry »


Chuck Talking Tech / by Chuck Bienenfeld

March 27, 2014, 2014

Microsoft announced on March 24, 2014 in a Microsoft Security Advisory (link: 2953095) that they discovered a vulnerability affecting supported version of Microsoft Word.  This exploit could allow a malicious user remote access to the effected system with the same user rights as the current user.

Read the rest of this entry »


IOS71

Chuck Talking Tech / by Chuck Bienenfeld

March 10, 2014, 2014

With all the rumors that users would need to be running iOS 7.1 to stream this year’s iTunes Festival beginning March 11, 2014 it was inevitable that iOS 7.1 would be released prior to the festival and guess what, it was released today. Read the rest of this entry »


Chuck Talking Tech / by Chuck Bienenfeld

February 27, 2014

Listening to the February 25th, 2014 Security Now podcast yielded some very interesting statistics about the level of your vulnerability when it comes to exploits against both the Windows operating system and Window’s Office and Internet Explorer based on your user profile.  We all know that when we setup a new computer we “should” create a standard user accounts for all system users and not use the administrator account for day to day activities.  Steve Gibson sites some amazing statistics from Avecto’s February 18, 2014 report to support this belief.

Read the rest of this entry »