Archive for the ‘Security’ Category


Chuck Talking Tech / by Chuck Bienenfeld

December 14, 2016

As many of you may already be aware, there is a new malware campaign called Gooligan.  This is a rootkit identified by the security researchers at Check Point that in part steals authentication tokens that can be used to access data from Google Play, Gmail, Google Photos, Google Docs, G Suite and Google Drive.  Moreover Gooligan can be even more frightening.  This involves its ability to install other applications even ones from the Google Play store, serve up additional adware and provide 5 star ratings to applications that bought in.

(more…)

Advertisements

“I love it when a plan comes together.”  – John ‘Hannibal’ Smith – The A team

The plan came together when I received an email after subscribing to Troy Hunt’s “Have I been pwned” website notifying me that my account (email address and password) was part of the recently made available LinkedIn 2012 data breach.

(more…)


Chuck Talking Tech / by Chuck Bienenfeld

March 19, 2016

Disclaimer, I am a happy user of UBlock Orgin. I use it primarily due to all the behind the scenes data tracking and system fingerprinting being done via JavaScript by the advertising, ISPs and web communities.  It also helps prevent ads from 3rd party sites where malivertising so readily exists.  I am also frustrated that our data is considered free game and not ours to control as we see fit.

(more…)


UniquePasswordsBlogChuck Talking Tech / by Chuck Bienenfeld

September 1, 2014

This blog post is long over due. I felt with the almost daily announcements in the media of a company losing our sensitive data, such the highly publicized Heartbleed vulnerability, Target and E-Bay breach and multiple StubHub account violation, it was time to start the conversation about the need for strong, random, unique passwords.

(more…)


Chuck Talking Tech / by Chuck Bienenfeld

March 27, 2014, 2014

Microsoft announced on March 24, 2014 in a Microsoft Security Advisory (link: 2953095) that they discovered a vulnerability affecting supported version of Microsoft Word.  This exploit could allow a malicious user remote access to the effected system with the same user rights as the current user.

(more…)


Chuck Talking Tech / by Chuck Bienenfeld

February 27, 2014

Listening to the February 25th, 2014 Security Now podcast yielded some very interesting statistics about the level of your vulnerability when it comes to exploits against both the Windows operating system and Window’s Office and Internet Explorer based on your user profile.  We all know that when we setup a new computer we “should” create a standard user accounts for all system users and not use the administrator account for day to day activities.  Steve Gibson sites some amazing statistics from Avecto’s February 18, 2014 report to support this belief.

(more…)


Chuck Talking Tech / by Chuck Bienenfeld

February 22, 2014

ios

On Friday, Apple released iOS update version 7.0.6 for download. Although this is a minor release and coming just before the scheduled 7.1 it is an important update for iOS users. As stated in the release notes, this update is to patch a SSL connection verification.

(more…)