go to sections menu

The Technology blog and podcast

This is for the technology blog and podcast Commentary, articles, and podcasts

header picture for Ingegno theme

You are here: January 2019

Go to Homepage [0], contents or to navigation menu

Here’s a change: change in court decisions

According to a recent article from Krebs on Security, it is looking like courts in different parts will be handing down harsher sentences for people who do denial of service attacks. Could this be a good thing? I really like the end of the article: “If you can’t do the time, than don’t do the crime.” I don’t remember at this moment if that is the exact quote at the end of the article, but it is going to fit.

According to the article, there are a lot of people who do this type of crime, and the consequences are not enough. They think that the crime should be punished harder because of the impact it has on business and the internet as a whole.

I’d invite you to read the article in full. The article is entitled: Courts Hand Down Hard Jail Time for DDoS and it was written on the 14th of January.

Comments (0)

Recent articles I’ve read, thoughts are welcome

Hello everyone,

Here are some of the items that I’ve read as of late that may be of interest to readers.

Two articles are of interest to me in regards to Germany. Seems as though they have a massive problem keeping data secure on people who are in Government. I’m hoping that this was a one time thing, and they’ve fixed the issues raised.

The other major article that interested me was the Apple Tech Support scam article that Krebs on Security had. written at the beginning of the year. If you’ve found anything of interest from this list, please feel free to let me know in the comments, or by sending me an email.

Comments (0)

Tech podcast 303

RSS has this as well as Mixcloud. Enjoy!

Here are the show notes.

Hello folks, welcome to podcast 303 of the technology blog and podcast series.

I’d like to start the podcast with something that came across my desk. This first segment deals with Swatting, and its a very interesting topic as now we’ve got a very interesting story that has a happy ending. Facebook cybersecurity exec victim of swatting call is the name of the article that sparked this discussion. When I retweeted this article, I got some likes and a conversation from someone who has been effected by swatting. The individual, whom I’m not naming talked to me about some things he’s been doing to learn, and he wrote an article A decidedly creepy story of how social media can impact your life. I told him my story of someone who had been wanting information from me, but yet, that individual was talked about on my podcast, and had to serve some time. He was able to gather that I’m blind, however, that isn’t top secret as its posted on my personal page, among other places as well. I sent some related articles his way which were written by me: Bullying, Is This Just a Disability Problem? and Can Social Media Really Be Bad for You? People need to think about their actions no matter whether they were targets of social engineering or swatting, both can have their own consequences. I think we really need to continue the conversation, and I’d love to hear from you on ways to curve the swatting and social engineering epidemic that has plagued us for way too long. Knowing that swatting has been a dacades long problem as of late isn’t going to make me feel better, thats for sure.

Next, I found someone with an interesting braille question, dealing with a contraction we’ve known for the longest time. While the contraction in question has not changed from English American Braille to Unified English Braille, the question was asked why the word here was spelled out with the “er” contraction and not the “dot 5, h” as we were taught. I’m curious on whether we have found an issue with the book with an error, or whether it was written that way by someone who doesn’t know the rules? I’m not going to speculate, but I’m putting it out there.

Next, Marty at Blindfold Games comes on the podcast to discuss his company Objective Education. I talk to him about some of the popular games, some that have dropped off, and about the new company. He gives his contact information at the end of that segment.

Finally, contact information as a whole, and a teaser on whats coming up on the next available podcast.

The podcast runs you 76 minutes, and I hope you enjoy! Thanks for listening!

Comments (0)

Facebook cybersecurity exec victim of swatting call | ZDNet

Hello folks, here’s something that I spotted while looking at twitter. It talks about another case of swatting, good thing nobody was killed in this incident. It links to other cases including Brian Krebs whom we talked about on our own podcast. This is scary, but yet real.

Prankster claimed exec had shot his wife, tied up his kids, and planted pipe bombs around the house.

Source: Facebook cybersecurity exec victim of swatting call | ZDNet

Comments (0)

Tech podcast 302

Tech podcast 302 is on our RSS feed for those who want it. I will make sure it gets on Mixcloud. In the meantime, I want to put up the show notes which you can see through the RSS already. Sorry for getting the show notes up late, I’ll do better next time.

Hello everyone, welcome to podcast 302 of Jared’s technology blog and podcast series. How many of you know about Live Wire and its sister system Ground Zero? If you don’t, I have a short segment in regards to both, and include Live Wire’s web site for you to go peruse its offerings. Next, BevMo payment breach affects thousands, with researchers pointing to Magecart is talked about, but yet, BevMo did the best they could. Next, Skype has some changes, and a potential bug that happened to me could happen to you. Finally, lesson 8 of the braille transcription course, and reading with Braille 2000 with JFW is demoed, as there is something that I’ve found that isn’t a show stopper, but yet, I’ve provided the file to Braille 2000 for their review and hopeful resolution. Contact information is at the end, and please feel free to utalize it. Thanks for reading the show notes, and enjoy your day!

I hope you enjoy the show as much as I have putting it together for you.

Comments (0)

Security Now, podcast 696

SN 696: Here Comes 2019!
Tuesday, January 8, 2019, 7:05 PM

Security Now (Audio)

list of 8 items
• The NSA announces the forthcoming release of an internal powerful reverse-engineering tool for examining and understanding other people’s code.
• Emergency out-of-cycle patches from both Adobe and Microsoft.
• PewDiePie hacker strikes again.
• Prolific 0-day dropper SandboxEscaper ruffles some feathers.
• A new effort by the US government to educate industry about the risks of Cyber attacks.
• Welcome news on the ransomware front.
• VERY welcome news of a new Windows 10 feature.
• A note about a just-published side-channel attack on OS page caches.
list end

We invite you to read our
show notes.

Steve Gibson
Leo Laporte

Download or subscribe to this show at

You can submit a question to Security Now! at the
GRC Feedback Page.

For 16kbps versions, transcripts, and notes (including fixes), visit Steve’s site:
also the home of the best disk maintenance and recovery utility ever written
Spinrite 6.


list of 3 items
• LastPass.com/twit
• securitynow.cachefly.com
• FreshBooks.com/securitynow
list end
Media files
(audio/mpeg, 49.5 MB)

Comments (0)

Password Manager Users Exposed After Privacy Snafu

If you are a user of this service, it is important that you see this. I’m going through twitter, and saw this. I’ve never heard of the service, so I can’t comment on its use, but boy, this can’t be good.

Albine admits millions of Blur customers may have been affected

Source: Password Manager Users Exposed After Privacy Snafu

Comments (0)

What I’ve read the last little bit

Here’s what I’ve read in the last little bit.

Hackers target ‘hundreds’ of Middle East activists with fake login pages, 2FA bypass schemes other countries need to learn what to look for so they aren’t bit, not saying that the United States doesn’t, but this article is targeting others outside the U.S. and we should teach tmem what they should look for.

In case you missed it, so I didn’t post this, DOJ indicts 2 hackers linked to Chinese spy agency for breaching tech firms, U.S. Navy is the article.

Find anything that I’ve missed? Send it and lets talk.

Comments (0)

Why it’s Time to Switch from Facebook Login to a Password Manager

Hello folks,

In the continuing of catching up of news, Trend Micro has an interesting article dealing with Face Book, and its log in capabilities. We use whats called facebook connect to get connected to other apps and services. I’ve used it, but we now know that it isn’t the best thing we can do today.

Recently, Facebook disclosed a potential issue where data was exposed, because of the access to other apps, and this is done through their API and key system.

The article Why it’s Time to Switch from Facebook Login to a Password Manager talks about this more.

Whether you use Trend Micro’s solution, Lastpass, One Password, KeyPass, or another solution developed in the future, I know now that it isn’t a good idea to use facebook for my log in needs.

I decided with Dice World to go ahead and do that, but that was at a time when it wasn’t that big of a deal. I’m not going to change that now, but I won’t do it for anything else unless it recognizes where I am, like a game I’ve not talked about called Game World, by the same folks that make Dice World.

What do you guys think of this?

Comments (0)

Why are building systems connected to the Internet?

I have a question to start this post off. Why are building systems connected to the Internet, and what is their purpose? I’ve never heard of this until I heard it mentioned I believe near the end of Security Now’s recent podcasts. The article I found on this subject is called FBI warns industry that hackers could probe vulnerable connections in building systems which was published on the 21st of December, 2018. Here is a section, talking a particular port, that is wide open.

Major universities, state governments, and communications companies are among the organizations at risk of having their building-system data exposed, the
bureau said in an industry advisory obtained by CyberScoop. The port in question – port 1911 – is serving up building-network information on the internet
that could be of use to hackers.

“This default port discloses system information without authenticating, allowing cyber attackers to identify devices and systems that are not patched against
known exploits,” the FBI alert says. “Successful exploitation could lead to data leakage and possible privilege escalation.”

You’re welcome to check out this article in full, but I’ve never heard of this before. Is this the future of hacks? This can’t be good overall.

Comments (0)

Lets start the new year with more good news

Hello everyone,

Lets start the new year with some good news, although we all know that this is only a stepping stone. DOJ indicts 2 hackers linked to Chinese spy agency for breaching tech firms, U.S. Navy was written on Cyber Scoop on the 20th of December, last year.

We all know that China is one of the forces, they targeted practically everyone with no mercy with their attacks.

The hackers also targeted more than 45 companies and government agencies, including sectors ranging from aviation to pharmaceuticals, along with the U.S.
Navy, a Department of Energy laboratory, and NASA, prosecutors alleged. The defendants stole the Social Security numbers and other personal information
of over 100,000 Navy personnel, U.S. officials said.

This is just a highlight and this is only the beginning. Have you seen this?

Comments (0)

BevMo payment breach affects thousands, with researchers pointing to Magecart

Happy New Year,

I’m trying to catch up on 2018 news, and I found this article entitled BevMo payment breach affects thousands, with researchers pointing to Magecart and between BevMo and NCR, the companies could do no harm. The group behind this is known as Mage Cart, a loose hacking group looking for payment systems to target. The article has this as one word, but for ease of reading, I’m putting it as two words. NCR notified the BevMo company of the breach, they fixed the issue, and BevMo put out a release. While 14,500 plus is a small number, the company operates in three states, and sends to 8 others including Washington D.C. in the United States. Under the circumstances, both companies did the best they could, and I bet that we should see this type of response in the future.

What do you think? I’ll leave my thoughts on the podcast which will be number 302 in our series, and you can comment here or in my email box. Hope this partnership continues, this was the best under the circumstances.

Comments (0)

Tech podcast 301

On this extended edition, the podcast has some lengthy segments. We ask you what we should cover. Question, are you keeping up with your finances? News notes, what else did we miss? The San Diego school District got breached, the tech blog links to the breach via an article. Finally, our predictions and how things have changed through the years. Contact information is available at the end of the podcast, and the podcast is extended running an hour and 40 minutes (100 minutes) long. Thanks for listening!

Mix Cloud

Comments (0)

Happy New Year from the Jared Rimer network

As the new year is starting, I’m interested in hearing your predictions. So far, my prediction on Philmore Productions has been wrong, but I feel with the many mistakes this company has made, its just a matter of time. You can’t be in business with as many mistakes including trash talking this company has done.
The landscape discussed in podcast 300 has changed, both for assistive tech as well as security and other aspects of life. I’m curious on what thoughts you have on what might change. Main Menu a program as part of ACB Radio’s channels, had a show for year end. The whole team was a part of it, and it will be on the RSS feed as part of their podcast feeds.

In podcast 300, I covered the last several years of content, and how we’re trying to branch our content out to cover lots of stuff. I’m curious on what content you’d like to see?

My predictions:

We may see breaches that could effect one country as a whole, if other breaches has not shown that to possibly be the case.

We’ll see at some point, a shift in the way assistive tech works with the computers of the future. We’ll probably have a bigger threat landscape, and the assistive tech companies, no matter which one, will have to double their efforts to make sure our data is as secure as possible, and the software we use is patched from any potential vulnerabilities. If it wasn’t known, GW Micro had a main script that was changed and it caused a big issue on who did it, and I don’t know if we ever found out. Since GW Micro’s closing, people may try to go after JFW or NVDA in the same way, figuring out how to push an update that could do something we as users don’t want. We’ve got to figure out how these things can be prevented.

I’m curious on your thoughts, so please post those comments.

Comments (2)

go to sections menu

navigation menu

go to sections menu