go to sections menu

The Technology blog and podcast

This is for the technology blog and podcast Commentary, articles, and podcasts

header picture for Ingegno theme

You are here: Home [0]

Go to contents or to navigation menu



audio game hub

Hi all,

My phone was showing a large amount of app updates today, one of them being audio game hub. The biggest change is that all of the games are going paid unless you want to watch adds. The other is that all casino games will remain free. That is what it shows in the notations for the update. The app version is 2.0.13.

Comments (6)

updates for the month

Well.
I usually don’t post a piece on here especially because ms doesn’t post any info however.
Updates for windows are out no office, adobe reader, flash abbyy fine reader, some applien studio products, amd drivers, codecguide.
and ccleaner.
There is a lot of them.
Read up if you want.

Comments Off on updates for the month

Tech podcast 262 is now available!

Hi all,

I just released podcast 262. I almost released 263 thinking I already posted it. I can’t believe I almost did that. I’ll be happy to release that one next week, so you can enjoy this one which you can find on our RSS feed and of course, please feel free to let me know what you think.

On this podcast, I talk about my initial experience of windows 10 from podcast 261. Also, Shaun Everess is along with his demo on the game blind cricket which I’ve actually won. I hope you’ll enjoy the show.

Comments (3)

What has been going on?

Hi all,

I know I have been dormant lately, lots has been going on.

First, tech 261 has been released and can be found on the RSS feed. On it, I talk about MENVI’s 20th anniversary and how it all got started on the web.

Next, I have been reading a bunch of stuff, but have not had the time to blog. Krebs has posted some stuff about recent breaches, and it seems like thats where we’re headed. Read anything of interest from Krebs by going to this web page.

My computer up and crashed after I recorded the first segment above on 261, and I had to learn a new operating system as well as a new keyboard.

I published part 3 of the screen reader series, and started a draft of part 4 which talks about my learning the mac and just some thoughts on the different types of keystrokes and resources out there. I don’t remember enough to do a whole course on some of the commands like I did with Windows and DOS, but hopefully readers will have an understanding on the challenges of learning Voice Over which is quite complex. Read part 3 which was posted on June 28th on Omni by clicking on the link.

I’m thinking of writing something on my experience of learning Windows 10, but I’m not really sure how to do this because there is so much that is different. If you have any ideas, let me know.

I think thats it. I’ll try to post more, I’ve been dormant but read interesting things from Krebs and Trend Micro I’d like to blog about but just haven’t had the time. I hope that changes. See you all soon.

Comments Off on What has been going on?

Screen reader series

Hello folks,

Its been quite a busy time of me writing lately. It didn’t help that the person that helps me was away, but things are back on track. I’m curious on your thoughts on my screen reader series. I’ve had the first two published on omni. Part 1 was published on the 8th of June, and part 2 was published on the 9th. I hope you all enjoy the articles.

Comments Off on Screen reader series

Antivirus and the disabled computer user

Hello folks,

I really need some help, and it deals with AntiVirus and security. I’ve been using Microsoft Security Essentials, but have found in my opinion that it doesn’t work as advertised. I saw an article online about creating a file, with some code. The antivirus should pick it up while saving the file. Its not harmful, but it is a test of sorts that checks the antivirus. Its called eicar and you can google it.

MSE did not pick up this file while saving, and saving the file and scanning it showed that it was fine. I wrote an E-mail list with Jaws users on it, and someone recommended Sophos home free which i downloaded. Someone else just said that it was not accessible, and that I’m better off with MSE.

The problem we’re running in to is that we need antivirus now more than ever. Even if we’re careful, things can be downloaded that are not wanted, even when visiting a site we intend to visit. With all the breaches, something is better than nothing, but in my opinion, security essentials is not cutting it.

I do not want to install something that is not accessible, although i want something where I can set some options, and forget it unless something comes up.

It should be able to scan as something is downloaded, notify the user if something is not right about the file, and do daily updates and weekly scans.

If anyone that reads this comes up with something accessible that is free or low cost, I would be greatful.

We should not live without something that can protect our PC’s. Just because we don’t browse much, doesn’t mean that sites we do could become a problem. Its sad that antivirus has become such a problem with companies, that they make it useless to us.

We use a computer just like everyone else, and I hope to publish a series on screen reader usage. Two articles are written, and I am hoping to start a third. I know these developers are aware of access tech, as we once had the access to a lot of the products out there, but as I said, MSE is just seemingly to just pick things up at random, and it doesn’t pick up something that is tested to make sure the program runs as it should.

What are you using? How does it work?
I do not want people responding who don’t use antivirus. That will not be helpful to me.

Thanks for your time.

Comments (2)

Technology podcast 259

Show notes:
Welcome to podcast 259 of tech. I’ve been wrapping my head around the WannaCry worm turned ransomware, or worm turned in to a not so money making venture.
To date, 250,000 machines and only $110,000 in money. The blog has various articles on it including my longer piece on vocal. I also have a talk by Mikko
Hyponen, as well as some JFW stuff I’ve fond as I’ve started the relearning process. All of that on this podcast. Thanks for listening.


RSS feed

Comments Off on Technology podcast 259

Android Overlay and Accessibility Features Leave Millions at Risk

OK, this is as bad as it gets for Android, right? While reading the sans newsletter I talked about in my first article for today, I came across this. Sent this to Security Now, and someone else who uses Android that i know. All I can say is that I hope that nobody who is disabled who relies on the disability features like talkback’s screen reader, or any magnification program that might be available got hit with this. This sounds bad. Really bad if someone who is disabled got hit with this.

Researchers warn two features, not flaws, in Android can be used together to open devices up to attack.

Source: Android Overlay and Accessibility Features Leave Millions at Risk

Comments Off on Android Overlay and Accessibility Features Leave Millions at Risk

WannaCry Ransom Notes Penned by Chinese-Speaking Authors, Analysis Shows

Hi folks,

This is quite interesting. I’ve published several longer posts on ransomware through my Vocal posts on this blog, and while I’d love to write about this one, it is definitely something that can speak for itself. We’ve definitely learned quite a lot since last week’s publishing of my longer piece on Vocal. Like I’ve said before, we’ve got to use our heads, as this has to start somewhere, probably with a phish. I don’t believe this was started by someone using Shodan from that location, and spewing the net with port 445 scans and infecting all of that. Luckily, very little was spent on notes although $110,000 is nothing to sneeze at. The article also continues to say that only 250,000 machines and 150 countries. This thing could’ve been worse.

Before I give you the article, Security Now reported that someone was looking to take the domain offline, unleashing this thing to cause more havoc. Not sure if it was successful, but something to keep in mind.

Now, to the article and its link.

But a Chinese-language link doesn’t shoot down theories of the North Korean Lazarus Group’s involvement in the ransomware worm attacks, say language experts at Flashpoint.

Source: WannaCry Ransom Notes Penned by Chinese-Speaking Authors, Analysis Shows

Comments Off on WannaCry Ransom Notes Penned by Chinese-Speaking Authors, Analysis Shows

Target Reaches Breach Settlement: $18.5 Million Fine, Security Controls

Continue: ‘Target Reaches Breach Settlement: $18.5 Million Fine, Security Controls’

Comments Off on Target Reaches Breach Settlement: $18.5 Million Fine, Security Controls

Hard to swallow: 17m user details stolen in Zomato security breach

Oh boy. I just tweeted this for several users, and if this is true, we are definitely lucky in one aspect, but not in the other.

This is 17 million more people who have been breached. The good news is that they used what security experts call salt to add to the hash which from what I understand makes it more difficult to crack the password.

The company is also lucky in that they got the hacker to not sell it, and that they will create a program to better fix the issues that may have been found. Check this article out.

Zomato has become the latest victim of a massive cyberattack, as the details of 17m users are stolen, including email addresses.

Source: Hard to swallow: 17m user details stolen in Zomato security breach

Comments (1)

Serotek’s Position on Microsoft Edge | Serotek

Hi folks, I agree with this, although I’m not a Cerotek customer. I don’t believe that anyone is really supporting Edge, even Window-Eyes, which stopped development, doesn’t work with it as far as I know. I’m also not a 10 user, but this should be shared.

Source: Serotek’s Position on Microsoft Edge | Serotek

Comments (1)

WannaCry, What Is It?

Hi folks, my article WannaCry, What Is It? is now published on Vocal. It even has a world map as of last tuesday of the infection rate. Luckily, the attack has slowed down for now, but we do know there will be copycat variants, and the fact that it has been named means its out there somewhere. I published about that one the other day on the blog. You may find my preliminary thoughts on wannacry on this blog. Vocal has my longer thought process with resources at the end for you to read. I hope you enjoy it!

Comments Off on WannaCry, What Is It?

Ethics of Self-Driving Cars

This is a very interesting article I found on omni.media, one of many vocal related sites. While looking to see the status of something i published, I came across this. It raises some questions that I think we should discuss. As people with disabilities, what would be some of these answers?

Putting AI behind the wheel raises many questions and concerns, and on the verge of this becoming our reality, we must examine the ethics of self-driving cars.

Source: Ethics of Self-Driving Cars

Comments (1)

The Impact of Ransomware on Non-Profit Organisations

This is a great article in regards to what ransomware is, what you should do, and how to protect yourself. Its a bit lengthy, but not technical at all. If nothing else, people should read this article. Well done.

Source: The Impact of Ransomware on Non-Profit Organisations

Comments Off on The Impact of Ransomware on Non-Profit Organisations

And Now a Ransomware Tool That Charges Based On Where You Live

OK, Here’s something for you all on this blog. Not sure now what to think. If this is the case, my conversation yesterday with someone will make us doomed.

Malware is designed to charge more for victims in countries with a higher cost of living, Recorded Future says.

Source: And Now a Ransomware Tool That Charges Based On Where You Live

Comments Off on And Now a Ransomware Tool That Charges Based On Where You Live

IOS 10.3.2 is now out

Hi all,

We’ve been talking about security lately. I heard during Security Now that IOS 10.3.2 was released along with other apple releases. They fix some bugs. If I can find some more information in the coming day, I’ll make sure to post more. I’m going to update my phone to it now, and we’ll be in touch.

Comments Off on IOS 10.3.2 is now out

After WannaCry, UIWIX Ransomware and Monero-Mining Malware Follow Suit

OK folks, welcome to another post here on the blog. As Trend Micro predicted, we have a new ransomware based on wannaCry. After WannaCry, UIWIX Ransomware and Monero-Mining Malware Follow Suit is the name of the article. It does follow suit by having the same type of thing where ms17-10 is concerned, if they didn’t find anything else. Here is a portion of that article in which it explains a little bit of what this is.

“Contrary to recent news citing UIWIX as WannaCry’s new—even evolved—version, our ongoing analysis indicates it’s a new family that uses the same Server Message Block (SMB) vulnerabilities (MS17-010, code named EternalBlue upon its public disclosure by Shadow Brokers) that WannaCry exploits to infect systems, propagate within networks and scan the internet to infect more victims.

So how is UIWIX different? It appears to be fileless: UIWIX is executed in memory after exploiting EternalBlue. Fileless infections don’t entail writing actual files/components to the computer’s disks, which greatly reduces its footprint and in turn makes detection trickier.

UIWIX is also stealthier, opting to terminate itself if it detects the presence of a virtual machine (VM) or sandbox. Based on UIWIX’s code strings, it appears to have routines capable of gathering the infected system’s browser login, File Transfer Protocol (FTP), email, and messenger credentials.”

I’m still unsure really about this server message block and what it does, but criminals are going to take advantage of this for some time to come. Why? Because, as we’ve learned, patching is not as easy as it seems to be. We can tell people to patch, but patching can take anywhere from a month, to 6 months.

I really think that is too long, and even we were surprised on the fact that Windows XP and server 2003 were even patched, from this last outbreak, but Microsoft thought it to be a good idea because of how wide spread this problem is.

I’m not going to dwell on this issue, as patching should be a first resort on fixing a vulnerability once a patch is successfully created and made available, but systems as we learned must go through testing in the larger world, and if programs break that run on these systems, then the system can’t be patched.

According to Ransomware: What Are the Bad Guys After and How Do I Stop Them? they want to cause as much damage as possible, whether it is monitary, or whether it is physical. They want to hurt you at the worst possible time, when files matter to you. Backing up is the first step, and making sure your stuff is backed up on a regular basis.

e article WannaCry & The Reality Of Patching will go in to detail on why patching is becoming a problem today.

I’ll have my longer article out, but wanted to get some more information out now while it is still fresh.

Thoughts? Please give us a holler on the comment boards.

Comments Off on After WannaCry, UIWIX Ransomware and Monero-Mining Malware Follow Suit

showdan, what part does it have?

So I know its a little late to add it to the article being worked on with images and the like, but I did find something interesting out in regards to Wannacry that I thought was interesting. There is a search engine out there called shodan, and I’m not even sure of its spelling. From what I understand of this site, it is similar to Google, but yet, it populates all of the machines with open ports, among other things. Whatever this site is, it also does port scanning, where you can ask it who has a certain port open. Instead of phishing, I saw something that said the people involved searched for machines with port 445 open, and infected that way. I’m still thinking the possibility of a phish is still there, but anything is possible.

shodan

Comments Off on showdan, what part does it have?

Wannacry, an update

Hi folks,

I’m here to give everyone an update, although i just wrote a longer article linking to sources and other thoughts in regards to this big time ransomware, Wannacry. I didn’t cover everything, because I still want to see what Security Now has to say although I caught part of it. I’ve seen reports like North Korea having a part in this, and we know that Microsoft now patched XP and other operating systems that were vulnerable which they normally wouldn’t, but this was bad. As soon as the article is done and posted, you’ll get a link, as if I gave it now, its in rough draft form now and links wouldn’t work unless I took the painful time to do this. For now, there’s tons of media coverage on this, maybe some speculation, but we definitely know more than we did on Friday. I’m still in shock.

Comments Off on Wannacry, an update

« Newer PostsOlder Posts »

go to sections menu


navigation menu

go to sections menu