Update: Facebook Messenger and Linkedin Users: You are Being Targeted

Check Point finally posted a detailed description on how attackers use images on Facebook and LinkedIn to install dangerous malware on a user’s computer/device. (For more on this exploit see the original article.) The installed malware will give the criminal full access to a victim’s computer and possibly encrypt all files on it with Locky Ransomware. … Continue reading Update: Facebook Messenger and Linkedin Users: You are Being Targeted

A Cell Phone that Never Needs Charging? How Nuclear Batteries may Make This and Other Dreams a Reality

Those who predicted the future of technology in the 1950s never even conceived of the internet. The prevailing network of scientific thought at that time constrained logical projections of anything so illogical as a digitally interconnected world. The nuclear battery, unveiled at the University of Bristol’s recent Ideas to Change the World lecture, may be … Continue reading A Cell Phone that Never Needs Charging? How Nuclear Batteries may Make This and Other Dreams a Reality

How can I Tell if Email Links or Attachments are Safe?

I’ve been getting a lot of questions on how to tell if an attachment or link is valid or malicious. Although I’ve mentioned these methods in a variety of posts, I’ve never put all of this  information in one place. So here it is: a compendium of information on keeping yourself safe from malicious email … Continue reading How can I Tell if Email Links or Attachments are Safe?

SF Metro’s Handling of a Ransomware Attack Deserves Some Credit

It didn’t help that San Francisco’s transportation system, known as Muni, was using old, Windows 2000 servers that haven’t been receiving updates in years. Sure, they may have paid Microsoft to give them special updates, but this doesn’t nullify the fact that exploits for Windows 2000 servers are readily available online. In any event, the … Continue reading SF Metro’s Handling of a Ransomware Attack Deserves Some Credit