Archive for the ‘Security’ Category


Chuck Talking Tech / by Chuck Bienenfeld

December 14, 2016

As many of you may already be aware, there is a new malware campaign called Gooligan.  This is a rootkit identified by the security researchers at Check Point that in part steals authentication tokens that can be used to access data from Google Play, Gmail, Google Photos, Google Docs, G Suite and Google Drive.  Moreover Gooligan can be even more frightening.  This involves its ability to install other applications even ones from the Google Play store, serve up additional adware and provide 5 star ratings to applications that bought in.

(more…)


“I love it when a plan comes together.”  – John ‘Hannibal’ Smith – The A team

The plan came together when I received an email after subscribing to Troy Hunt’s “Have I been pwned” website notifying me that my account (email address and password) was part of the recently made available LinkedIn 2012 data breach.

(more…)


Chuck Talking Tech / by Chuck Bienenfeld

March 19, 2016

Disclaimer, I am a happy user of UBlock Orgin. I use it primarily due to all the behind the scenes data tracking and system fingerprinting being done via JavaScript by the advertising, ISPs and web communities.  It also helps prevent ads from 3rd party sites where malivertising so readily exists.  I am also frustrated that our data is considered free game and not ours to control as we see fit.

(more…)


UniquePasswordsBlogChuck Talking Tech / by Chuck Bienenfeld

September 1, 2014

This blog post is long over due. I felt with the almost daily announcements in the media of a company losing our sensitive data, such the highly publicized Heartbleed vulnerability, Target and E-Bay breach and multiple StubHub account violation, it was time to start the conversation about the need for strong, random, unique passwords.

(more…)


Chuck Talking Tech / by Chuck Bienenfeld

March 27, 2014, 2014

Microsoft announced on March 24, 2014 in a Microsoft Security Advisory (link: 2953095) that they discovered a vulnerability affecting supported version of Microsoft Word.  This exploit could allow a malicious user remote access to the effected system with the same user rights as the current user.

(more…)