Always Providing You With Ongoing Information

Archive for the ‘Computers’ Category

Google Drive Will Soon Back Up Your Entire Computer

fushia2_001

The backup feature will come out later this month, on June 28th, in the form of a new app called Backup and Sync.

Apple’s 1990 Sneakers Going For $30,000. Do You Own A Pair?

cornbraids1_001

 

apple sneakers

When Apple launched its first color desktop computer, in 1990, the tech giant also created a prototype pair of sneakers with its signature rainbow logo.

They were first sold to a lucky Apple employee some time in the mid-’90s, according to BitRebels.  They later sold for only $79 on eBay  back in 2007.

In the years that followed, the whereabouts of the shoes were unknown — until a friend of Leon Benrimon, director of modern and contemporary art at Heritage Auctions, found them at a garage sale in San Francisco.

Now, Heritage Auctions is auctioning off the pair at its Beverly Hills location. Bidding will begin at 11 am on June 11, and the sneakers are expected to go for at least $30,000. The starting bid will be $15,000. The Adidas sneakers, size 9 and a half, are made from the typical white leather material of the times. They feature Apple’s logo on the tongue and on the side. The soles are made from rubber that supposedly doesn’t leave skid marks.

5

Facebook Wants In On eSports

Intel Extreme Masters Katowice

Katowice, Poland is home to the largest eSports event in the world—Intel Extreme Masters. Photo courtesy ESL
esports.jpg ESL

Facebook said Thursday that it has partnered with ESL, formerly known as the Electronic Sports League, to live stream video game tournaments, also known as eSports.

As part of the deal, Facebook  will live stream upcoming ESL contests in which players battle each other in the first-person military shooter game, Counter-Strike: Global Offensive. Facebook will also host a weekly show dedicated to highlights and interviews with players participating in the Counter Strike tournament.

Each week ESL will live stream 30 hours of Counter-Strike tournaments, known as RankS competitions, via Facebook, the companies said. The RankS competition involves 300 gamers from North America and Europe who battle to win a cut of the $40,000 prize money ESL awards each month. In total, ESL plans to broadcast over 5,500 hours of gaming tournaments, starting in June.

 

Google Making It Easier to Find Jobs

Snapshotafrica_001

Forty-six percent of people say they have difficulty locating people available for jobs while millions are looking for work. Google for jobs will recognize when a job search query is entered into Google Search and will return a set of open jobs that will match that query. Entry level jobs will also be included. Google will locate the jobs through agencies like Monster, LinkedIn, Facebook, Career Builder & Glassdoor.

Google For Jobs has been piloting with Fad-Ex and Johnson & Johnson. Google For Jobs Will Roll out in the next few weeks.

Reporting or Avoiding Malware/Ransomware

knickers3_001

What you should Do

  • Contain the attack: Disconnect infected devices from your network to keep ransomware from spreading.
  • Restore your computer: If you’ve backed up your files, and removed any malware, you may be able to restore your computer. Follow the instructions from your operating system to re-boot your computer, if possible.
  • Contact law enforcement: Report ransomware attacks to the Internet Crime Complaint Center, FBI’s Cyber Division (CyWatch@ic.fbi.gov or 855-292-3937) or an FBI field office. Include any contact information (like the criminals’ email address) or payment information (like a Bitcoin wallet number). This may help with investigations.

Install Reputable Security Software: Your computer should have anti-virus and anti-spyware software, and a firewall. Viruses can be planted in emails or attachments to emails, in programs or files that you download, and even in Web sites that you visit. These viruses have the potential to wipe out your computer files.  Anti-virus software scans everything that enters your computer, looking for these viruses. Spyware is software that tracks your computer activity, gathering information without your knowledge. Anti-spyware software blocks or removes spyware. You may obtain the anti-virus and anti-spyware software separately or as a package. For lists of security tools from legitimate security vendors, visit staysafeonline.org.

Use a Firewall: A firewall is a virtual barrier between your computer and the Internet. Everything coming into or leaving your computer must go through the firewall, which blocks anything that doesn’t meet specific security criteria. Before purchasing separate firewall hardware or software, check your operating system to see if there is a built-in firewall and whether it is turned on.

Update Operating System and Software Frequently: Computer and software companies frequently update their programs to include protection against new security threats. Update your operating system and software whenever new versions become available gives you an added measure of security. If available, activate automatic security updates so you will be alerted when updates are issued.

Avoid “Free” Security Scans: Be suspicious of an offer of a “free security scan,” especially when faced with an unexpected pop-up, email, or an ad that claims “malicious software” has been found on your computer.

Create and Protect Strong Passwords: Create strong email passwords and protect them with the following tips:

  • The longer the password, the tougher it is to crack.  Use at least 10 characters.
  • Mix letters, numbers, and special characters.  Try to be random – don’t use your name, birthdate, or common words.
  • Don’t use the same password for different accounts.  If it’s stolen from you, it can be used to take over all your accounts.
  • Don’t share passwords on the phone, in texts or by email.  Legitimate companies will not send you messages asking for your password.
  • Keep your passwords in a secure place, out of plain sight.

Use a Pop-up Blocker: Don’t click on links or open attachments in emails unless you know what they are, even if the emails seem to be from friends or family.

Use the Spam Filter: Utilize your email program’s automatic spam filter, which reduces the number of unwelcome email messages that make it to your inbox. Delete, without opening, any spam or “junk mail” that gets through the filter.

Backup Important Data: Copy important files onto a removable disc or an external hard drive, and store it in a safe place. If your computer is compromised, you’ll still have access to your files.

 

 

Image

 

White House homeland security adviser Thomas Bossert said “the best and the brightest are working on” tracking who was behind the ransomware cyberattack.

 

Michael Reynolds/European Pressphoto Agency

White House homeland security adviser Thomas Bossert said “the best and the brightest are working on” tracking who was behind the ransomware cyberattack.

Security researchers have discovered digital clues in the malware used in last weekend’s global ransomware attack that might indicate North Korea is involved, although they caution the evidence is not conclusive.

An early version of the ‘‘WannaCry’’ ransomware that affected more than 150 countries and major businesses and organizations shares a portion of its code with a tool from a hacker group known as Lazarus, which researchers think is linked to the North Korean government.

John Bambenek, a research manager at Fidelis Cybersecurity says “This implies there is a common source for that code, which could mean that North Korean actors wrote ‘WannaCry’ or they both used the same third-party code,’’

White House homeland security adviser Thomas Bossert said Monday that investigators were still working to determine who was behind the attack. The best and the brightest are working on it.

Several security researchers studying ‘‘WannaCry’’ on Monday found evidence of possible connections to the crippling hack on Sony Pictures Entertainment in 2014 attributed by the US government to North Korea. That hack occurred in the weeks before Sony released a satiric movie about a plot to kill North Korean leader Kim Jong Un.

However, Bambenek cautioned that the links are circumstantial. ‘‘It could be a freak coincidence,’’ he said. ‘‘The code in question is not a large portion of the overall Wannacry malware so it’s plausible that the attackers got it from somewhere else.’’

The spread of the WannaCry virus has slowed as new cyberdefenses have been put in place and some eight to 10 U.S. entities, including a few in the health-care sector, reported possible “WannaCry” infections to the Department of Homeland Security, a US official said.

Factories, hospitals, and schools were disrupted in China by the attack, the spread of the virus appeared to be slowing. State media said 29,000 institutions had been hit, along with hundreds of thousands of devices.

South Korea reported that just five companies were affected, including the country’s largest movie chain.

Researchers discovered a ‘‘kill switch’’ on the virus that stopped its spread from computer to computer, potentially saving tens of thousands of machines from further infection.

The ransomware program, which is spread through e-mail, encrypts computer files and then demands the bitcoin equivalent $300 to unlock them.

The attack hobbled operations at Russia’s Interior Ministry, Spanish telecommunications giant Telefónica, and Britain’s National Health Service.

 

 

 

Tag Cloud

%d bloggers like this: