technology

About a year ago, I wrote about my then new favorite real-time smart phone road routing program Waze. At the time, Google had recently purchased Waze from its Israeli developer for over a billion dollars, a princely sum that the developer generously shared with his handful of employees.

shadow
Wilsker

Listening to the news can often be disturbing, especially when we hear stories about massive password thefts. Recently, there were widely broadcast reports 5 million Gmail passwords were stolen, and available online to anyone wishing to use them for nefarious purposes (money.cnn.com/2014/09/10/technology/security/gmail-hack/index.html).

shadow

I hope that you have not encountered the devious CryptoLocker malware, but sadly, I know as a fact that many of you have been victimized by it. For those of you who are not familiar with CryptoLocker, it is a vile form of sophisticated malware, “ransom ware,” where the malware encrypts data on the hard drive (and possibly USB drives and other external media), and then charges the user a sizeable fee to get the decryption key.

shadow

Several months ago, I wrote about some of the online services that make available to users a “daily deal” of commercial PC and MAC software either for free or deeply discounted. Recently, SharewareOnSale.com offered, for very brief periods of time, name brand software from Norton, BitDefender, IObit and other well-known software publishers.

shadow
Ira Wilsker

Virtually all new laptop (notebook) computers, tablets and smart phones now include some type of webcam (web connected video camera). Some of the newer desktop monitors incorporate an integral webcam, and millions of computer users have an external webcam connected to their computers, typically mounted on the top of the monitor and pointed at the user. External webcams, often only requiring a USB connection, can frequently be purchased for under $20.

There are many legitimate uses for Webcams, as well as some illicit or criminal uses that webcam owners need to be aware of.

shadow

If you have listened to the news recently, you are well aware that there is a major controversy about at least nine major Internet and phone companies turning over a massive number of records to the National Security Agency (NSA). I’ll make no attempt here to politicize or judge what has occurred regarding; instead, I’ll review the privacy policies of some of the major players in cyberspace.

shadow

Countless times in this column over the years, I have recommended free standing anti-malware software from MalwareBytes, SuperAntiSpyware and Emsisoft. I have now had an opportunity to experiment with another newly released competing product, Malware Fighter 2 from IObit, and my first impressions are positive.

shadow

Countless times in this column over the years, I have recommended free standing anti-malware software from MalwareBytes, SuperAntiSpyware and Emsisoft. I have now had an opportunity to experiment with another newly released competing product, Malware Fighter 2 from IObit, and my first impressions are positive.

shadow

Some suspicious computer users believe that, while they are away, others are accessing their computer, running unauthorized software or malware. Other wary users may find it interesting seeing what other people have done on a particular computer, what programs they may have run, what documents were viewed, and when the computer was booted and shut down. If a computer was infected by malware, it may often be of great interest to see what was being run on the computer at the time of infestation, and even identify the malware and its payload.

shadow