go to sections menu

The Technology blog and podcast

This is for the technology blog and podcast Commentary, articles, and podcasts

header picture for Ingegno theme

You are here: Home [0]

Go to contents or to navigation menu

The New Features, Changes, Improvements, and Bugs in macOS Catalina for Blind and Low Vision Users

A little bit of Mac news coming across our desk while perusing Apple vis. This blog post with the same article title has all of the details.

What I really like are the functions that remind me of Dragon during voice dictation. That is awesome! I tried Dragon with Jaws many years ago, but its been a long time.

There are some bugs in regards to playing podcasts, and another bug, but a lot of enhancements with this update.

Give it time, update at your convenience, and feel free to report any bugs to the AppleVis community so they’re aware of it and to Apple so they can fix it.

Do let me know if you find this info of value.

Comments (0)

NCSAM: Part 2: Scott Schober’s latest book is a must read

If you read nothing else this month, I’ve been referencing Scott Schober’s second book Cybersecurity’s Everyone’s Business and I read part 2. Part 2 of the book covered several breaches including the biggest in health care, Anthom Blue Cross, Equifax, and more.

Equifax still has a bunch to say for itself, and I have two articles myself I wrote through the Vocal platform. They are: Equifax Breach: Why You Should Be Worried After the Latest Breach September 15, 2017 and <a href=”More On the Equifax Breach: Why It’s Time to Keep that Software Up to Date which was posted to 01.media on September 26th of that same year. I’m sure you can find other articles and Krebs was also cited in this part in numerous breaches.

What I found amazing ws the details or lack there of when it came to DynDNS, which took half the net down, or so it seemed.

Some of these breaches we have no control of, especially the equifax breach. Some people even went so far as to call them equifish, (equiphish) and this is no joke. Steve Gibson, the guy behind Security Now on the twit network was at a loss. Nobody can really explain the hack, and the fact they paid millions of dollars doesn’t explain the piss poor job there.

Uber I was not a customer of when that breach happened. The fact they went through several CEO’s and the future of the company is still uncertain because it blows through money should probably not surprise me. I know I’ve blown through money when I was younger, and I bet you we all do it. I’ve had some great experiences with Uber, even at my new location, so I have nothing bad to say. A couple of times were interesting, but I was never stranded, thats paratransit for you.

The goal of this post is not to cover paratransit, but to cover the portion of the book I’ve read to date. These chapters are short, but delve out the information you need to know. I still feel the book is a must read for everyone. Have you gotten your copy?

Some articles this brings me back to include but not limited to:

Podcast 288 talks about Equifax one year later, in articles i’ve read and a whole lot more about the cybersecurity incident.

This also brings me back to the article I posted recently: Cybersecurity: 99% of email attacks rely on victims clicking links where one of the hacks was the cause of phishing or social engineering. This I feel is only going to get worse, and I don’t know what the solution is besides training. NCSAM: Is training to stay safe not sinking in? that is the big question here. I feel we all can use training. Every single one of us. It has to start somewhere.

Comments (0)

Technology podcast 325: Door dash, Commentary, NCSAM, Scotts New Book, and A Braille Transcription update

Welcome to the technology blog and podcast.

  • Doordash is the latest major breach, lots of coverage on it. It happened between the release of 324 and now. Is this the beginning of the end? Here is the blog post on it.
  • There is some commentary left by Joseph. We’d love to hear more on what you have to say, so please leave thoughts on segments.
  • Password managers and phone calls is the third segment as we start NCSAM. Here is the blog post on phone numbers which should be really discussed. JHere is the blog post on password managers as well.
  • Scott Schober wrote a new book. Here is the blog post on this book. I talk about chapter 3 specifically, and my thoughts on it, as it did hit home for me.
  • Finally, I’ve got a braille transcription update as I continue to struggle with assignment 15. I think I’m almost there! Thoughts?

My contact information is available at the end of the program, and thanks for listening.

Comments (0)

The court allowed the FCC to kill net neutrality because washing machines can’t make phone calls

I read a good portion of this, and I know the person who wrote this, I believe he was on This Week in Law on Twit. That podcast I quit listening to for some reason, I really should pck that podcast up. Check this article out, its lengthy, but yet goes in to the Net Neutrality debate, again. Oh Boy.

There is also a quote from Macbeth? Let’s experience this together.

Source: The court allowed the FCC to kill net neutrality because washing machines can’t make phone calls

Comments (0)

NCSAM: Get Serious with owning your data

A very well written article Get Serious About Cybersecurity: Take Ownership of Your Personal Data is being spotted through my twitter. The author of the article did a great job in talking about what we, as citizens, can do to help minimize the risk. Nothing is fullproof, but it must start somewhere.

Headings within this article include:

  • Too Much Information
  • Protecting Data
  • Check Privacy Settings
  • Own IT on Social Media

This can be broken down to a few points:

  • Don’t share what you wouldn’t share publically
  • Don’t make your profile public unlessyou have a good reason
  • Don’t post pictures of your vacation until you get back
  • and

  • always use caution when using a new app whether PC or mobile

I know about the oversharing way too much. There are people I have followed who tell us what they have had for breakfast, lunch, dinner and or snack. While I did check out the sharing of my whereabouts, I’ve since stopped that habit. I’ve never checked in at my own home, but I have checked in to a business to see what the game was, and I ended up being duke. After I saw that, I quit. I see someone travel across the country and they check in everywhere they can. Why? I have no idea.

We should know how our data is used. While we all hate reading privacy policies, mainly because they’re written in legal language and hundreds of pages, I’m proud to say that The Jared Rimer Network and MENVI, Bridging the Gap Between the Blind and Music do not write our policies in legaleese. I’ve made sure to mention what we collect, why, and what we’ll do if we can’t contact you for any reason.

Thats really all a privacy policy should have, unless the business collects payment info. If so, state this, what type of info you collect, how customers can update it if something changes, and what the policy is when the customer chooses to leave.

We’ve talked about one company quite a lot in their blunders. Without mentioning names, this company holds on to every piece of data on you, and can and has acertained other info without the customer’s concent. The company has called people based on caller ID data they have. Would nost companies do this?

There are other links to other aspects of this story, so I’ll stop here. What tips would you add to the conversation that I have not covered here?

Find me on social media through my web site hit me up by Email, or other methods should you have them.

Comments (0)

NCSAM Passwords and innocent conversation

I’ve been thinking about something that resonates with me in the latest book by Scott Schober Cybersecurity Is Everybody’s Business and I thought I’d put this up for discussion on the blog.

Innocent conversation, asking about your family, or pets may seem to be regular day to day OK. In this book, Scott talks about a skit that was later played on TV.

Someone asked someone else about their password. They mentioned that it was the dog’s name, and the year they graduated high school. While these types of passwords are not recommended, I’m not about to tell people how to use their passwords at all.

The person then asked two innocent questions and they were answered. Boomb! There is the password.

Would I use this password today? Probably not. I’m surely thinking that they felt comfortable and they had no idea they were about to reveal their password. Today, I still use a combination of a couple of passwords on a few sites, mainly because I never changed them, and on one, I’ve got two factor. On one email account, I have a very strong password, even though its for list communications only.

One account, I really need to change that password, but I don’t feel its necessary. The point is here that we should observe what we should do or not do. There are always things we should do, but it is our choice.

What do you think of innocent conversation that could reveal ones passwords or password habits without even asking for it?

Comments (0)

15 minutes of farting … dealing with bullying?

In this very interesting video, Steve Dotto talks about bullying in his youtube videos where he talks about tech stuff in short videos. Some of the videos I’ve caught. While this video is dated, I saw it in my twitter feed on the 4th of October. Here is the page on his web site which has a video player to play the video. I found it interesting, please feel free to comment.

Comments (0)

How Uzbekistan’s security service (allegedly) began developing its own malware

I am going to use the same article as found on Cyberscoop as this article title was interesting enough and the article is quite facinating.

I’ve never heard of this place, where the hell is it?

Wherever this place is, they develop malware. which means that it can’t be good. You are telling me that this is supposed to be a company in this country or territory and it doesn’t do security? It does malware and ships it out?

There are a lot of links within this article, but I just found the whole thing interesting and thought I’d share it. You can comment on this one at any time.

Comments (0)

We’ve got another breach, this time a tech support platform?

Hello everyone,

I’ve been pondering how to write this article for a few days. This article I’m talking about was posted to Cyberscoop on the 2nd of October. This article talks about a platform that has been used by many different companies. Zendesk announces data breach impacting years-old accounts is the name of the article and its unfortunate too. Mistakes happen, but making sure your software like this one should be updated whenever a patch is out. Have you seen this, and what have you thought about it?

Comments (0)

NCSAM: your own phone number calling

I want to put my own NCSAM post up, and maybe others have seen this. Since last Friday, I’ve seen my own telephone number call me. Yesterday, I decided to answer it, just to see what it was about.

“Hello, this is Anna from Microsoft,” it said. “We’ve been trying to reach you. Your IP will be shut down due to violations,” it continues and it says that I should press 1 to speak to a representitive.

I’m saying it, because it was a TTS engine, not a real girl. I knew this. I also knew that Microsoft, along with most major businesses, don’t call you for things of this nature. If they were going to shut off your IP, I’m sure an investigation would be involved, and maybe an investigator at your place of residents or business. They wouldn’t actually shut off your IP, they’d actually discontinue your internet service, or even seize your computer.

To clarify, Microsoft can’t shut down your IP or your Internet service, that would be with the provider you’re with such as AT&T, Comcast, Verizon, or any others across the country I’ve not mentioned. Microsoft, as most know, is a company developing software. They’ve help investigate suspicious activity, but they themselves can’t shut you down. I’m sure you can find on your own, articles where Microsoft may have had a hand in investigations where their networks were used, or other things of that nature.

Other things to read:

The first call, came in Friday afternoon as I was going from the underground portion of the train station to the street to catch a bus to continue my journey home. The second call came in some time later. I believe I’ve had a couple of others before yesterday, all displaying my own cellular telephone number.

I figured since no voice mail was left, then I wasn’t dealing with it. When you call your own cell number, you’re actually connected to the voice mail platform to check voice mail.

I’m confident it was one of these things to try and get personal information out of me, but I wasn’t biting. Now that I heard what it had to say, I’m hoping I don’t see that again.

  • Phishing and social engeneering happen through voice and text.
  • Text even SMS can contain links to places that may be questionable.
  • Telephone calls may say they’re from a prominent company, and tell you a story about something like the above, and get you to connect with someone.

I’ve never seen this, and I thought, why not write my own NCSAM post? The phone is just as valuable now as the Internet, as the phone also connects to the Internet, whether its yours or the network of your provider that you pay for your phone.

Your thoughts are welcome. Let me know what you think.

Comments (0)

Fileless malware, is this the wave of the future?

There is an old/new game in town. According to this article New Fileless Botnet Novter Distributed by KovCoreG Malvertising Campaign which I read today, this is making me a little bit concerned. I just wonder what type of thing this would do to our computers? Some of us who read or write on this blog use assistive technology, and from this article, it doesn’t drop anything, but yet it can do havoc.

This brings me back to the question of programs like Microsoft Security Essentials. MSE, or windows defender can’t protect us from this type of threat. Programs like Trend Micro can, because it looks for suspicious behavior. I’m wondering how Windows Defender or MSE for those on older operating systems can protect us from this?

This botnet was dismantled in 2018 according to the article, but yet its back more pervasive than ever. I’m curious on how we can protect ourselves, because fileless stuff would probably not get caught by these products which are it for us with access technologies.

Headings in this article include:

  • KovCoreG’s attack chain
  • Analysis of the Novter malware
  • Analysis of Novter’s module “Nodster”
  • Correlating Nodster’s traffic
  • and

  • Defending against Novter

Under Defending against Novter it says:

Advertisements are an innocuous online staple, but KovCoreG’s campaign demonstrates how they can be intrusive, not to mention how Novter can expose the
user’s system to other and actual threats. Given how KovCoreG engages in click fraud, it can significantly affect businesses. A single
mobile ad fraud incident in 2018, for instance, cost Google and its partners around
US$10 million in losses.

Novter also exemplifies fraudsters’ maturing techniques with its use of fileless infection methods and obfuscating its C&C connections and fraud-related
traffic. Users, for their part, should adopt best practices, especially against socially engineered threats like

There are lots of terms and links within this entire article to different things, but this honestly concerns me. I’m beyond words on how we as disabled people can protect ourselves from this if the program, which is accessible, can’t probably do the job?

This leads me back to my article Antivirus and the disabled computer user from blog The Technology blog and podcast (June 4, 2017) because in it, I’m wondering what people are using and accessible that could now protect us from this type of thing.

This article I base this post on, talks about watering hole web sites. I’m not even sure what these things are or if I’ve ever encountered it.

Has anyone encountered this, and if so, what did you do?

Comments (2)

NCSAM: Is training to stay safe not sinking in?

The second post I found of interest deals with Phishing and the training behind it. In the question that Phishlabs posts for their first post in their series Training Not Sinking In? Try a Programmatic Approach Phishlabs dives in to several different topics they’ll be covering during the week. Headings in this blog post include:

  • Choosing a Training Program
  • Designing a Captivating Awareness Campaign
  • Implementing a Reward & Remediation Strategy

Each section is quite ointeresting in this endeavor to train each and every one of us on how to stay safe as well as getting training that would benefit everyone in a company setting.

One tip is to take it slow, and not give a bunch of stuff in one setting.

Choosing the best training program isn’t enough, though. It’s critical that you understand how the organizational climate impacts training success. In
a later blog post, we’ll discuss this in detail.

I think this is very important. You may have older people involved in your company, and they may not understand this. I think that shorter lessons will be the key.

Just like my struggles in my braille course, training to spot problems before they are a problem for your small business, yourself as an individual, or even if you work for another business of any size, you need to understand what you’re looking for. In the braille course, its understanding the certain parts, and trying to put it all together. My mistake in this was to put it together based on my understanding of the thing, they wanted the typeforms. The same type of thing is crucial on protecting your business and even your personal finances. You don’t want to figure out how to pay bitcoin to someone just because you clicked on a link that said you did something, or you’re accused of something and it locks up your files.

There are different types of phishing, and I’m really not familiar with the different kinds too well. But this is why we’re learning together, and I’m happy to share what I can understand and of course what I think we should do.

Under the heading of designing a campaign: some of the bulleted points include:

• Choose a cohesive brand
• Include a mix of mediums
• Start marketing your program early

There are two things. First, I am not a marketer. Second, I don’t really have mediums, except for the blog (text) and audio (the podcast) which are both good. But I’d like to develop something and either sell it or offer it for free, but I just don’t know how.

Phishlabs has been doing this a long time, and I give them props. They’ve called me to let me know of issues, and I reached out to them for something. I love the work they do, so I want to pass their knowledge of this to my readers.

Under the rewards program, they write:

What drives your workforce to participate in security training or to practice good security hygiene? What keeps them accountable if they slip up? An effective
reward and remediation strategy that fits within your organizational culture is critical to achieving your learning objectives. As every organization is
different, there is no one-size-fits-all approach. Later this month, we’ll cover this topic in detail.

I’m definitely looking forward to see what they have to say on this. There is no one size fits all approach to teaching, so lets go!

Your thoughts are welcome, and I will await comments and suggestions. Thanks for reading!

Comments (2)

Philmore Update: does Phil need training?

I just got an update on the Philmore Productions saga over in Chicago.

I want to ask a very important question. How many webmasters and developers do you know that do not back up their web site code, development processes, and other aspects of business?

Philmore admitted that he lost the email forwarding capability, and the code that powers his web site.

As its discussed on a telephone line, Philmore continues to display such stupidity. I don’t understand what type of brain is in his Head. This doesn’t make any type of sense. I just can’t wait to see what else he’ll admit that we probably have called in the last few months. What a tragedy!

Comments (0)

NCSAM: lets start with password managers

Last Pass’s first article to kick off National Cyber Security Awareness Month deals with the password manager. While their article talks about their own product, lets just talk about password managers in general.

The Last Pass article is entitled Owning Your Digital Profile by Setting Up LastPass. What if you don’t have Last Pass?

First, take a look at the password manager that you have decided to use. Why a password manager? According to Lastpass, it is safer to use a password manager like theirs instead of the browser. The article The Eternal Question: Why Can’t I Just Use my Browser? should answer why the browser isn’t a good choice. If you’ve listened to Twit’s Security Now you’ll also understand why this is a bad idea.

The goal here is not to force you away from what you know, but to educate you on why it is a good idea to think about it. I have moved away from the browser and had even paid for Lastpass Premium at one point until I realized that I could have most of the features for free. The premium offerings I wasn’t using, but the faster time for support was nice but I hardly used it. It is a benefit to support the companies, and I plan to do this at some point again.

There are other password managers out there, so search around and decide which one works best for you.

What do you think of password managers? Have you utalized them? Which one do you use and why? Lets discuss!

Comments (0)

NCSAM, today is the first day

Hello everyone, NCSAM is this month, and its already October! Can you believe it?

Each and every one of us needs to do our part to make sure that our online lives are kept safe and secure. That’s what National Cybersecurity Awareness
Month (NCSAM) – observed in October – is all about!

One thing I really love is Lastpass’s coverage of NCSAM. Each week, they cover a very different topic dealing with cyber security, and I’ll share these like I did last year.

To learn more about National Cyber Security Awareness MNonth Visit this page on Stay Safe Online and lets continue to do our part to keep each other safe.

Comments (0)

Crime Does Not Pay … The Shadow Knows

I’ve been meaning to write about the latest in the cyber community who has gotten caught. According to Cyber Scoop Former U.S. Army contractor sentenced to prison for destroying IT system has been posted and its more great news.

According to the article, the gentleman mentioned here was working on a U.S. army IT system and was recently sentenced for illegal access of his employers network. The DOJ is linked here with an article entitled Man Sentenced to Prison for Cyber Sabotage which I have not read. The link can be also found as “U.S. Army IT system” was linked to that page I’ve also linked here.

The shadow may not be a radio show anymore, but he’s still there watching, and knows who the guilty is. He will let you know when your time has come.

Thoughts on this one?There are lots of links here, so trying to quote and talk about everything that caught my attention will be hard. Feel free to leave that feedback.

Comments (0)

Apple Releases iOS and iPadOS 13.1.2 With Camera, iCloud Backup, Flashlight, Shortcuts Fixes and More

On the heals of 13.1.1, we’ve got more fixes for those who use IOS 13. This Apple Vis post goes in to detail in regards to what has been fixed. From what I’m reading, there may not be any accessibility fixes, but the release notes are general by the looks of it. I want to pass this along, so you know things are out.

Comments (0)

Identity Skimming: Old Threats Made New Through Technology

Consumers looking to avoid skimmer fraud are often left in the dark and vulnerable to identity theft

Source: Identity Skimming: Old Threats Made New Through Technology

This is the beginning of an article written by Scott Schober. I can’t wait for the book to be available on Kindle, but this blog post i found of interest. ATM skimming is what we need to worry about, however, since I don’t use ATM’s, I don’t know how they work. Read this article carefully, and feel free to comment on this.

Comments (0)

Tech podcast 324: two books of interest, and two articles of interest

Podcast 324 is now out, and I hope each and every one of you can get it. RSS and Mixcloud will have the cast. It is also available on my show on Live Wire and the bulletine board 974 ill have it as well.

Welcome to podcast 324 of the technology blog and podcast. On this podcast, we’ve got two different books that are talked about. The first is one that I’ve already read, the second is one that I’m going to read and preordered through Amazon. Finally, I’ve got two articles that I talk about. One is in regards to a school system teaching the parents of their students the dos and don’ts of social media. Finally, an article which wasn’t tech related, but yet it was bullying. What would have happened if this turned to online bullying and the same type of injury took place because of some cyberbully(s) who wanted to cause him harm? The only issue is that this child was 8 years of age. All of this, on this edition of the tech podcast.

One thing I should mention is that Scott’s book is available on Amazon as a non-kindle purchase, Kindle will be released October 1. He offered to send me a released copy, but since I can’t read print, I’ll wait for the digital version. Thanks Scott for offering to send it, it was appreciated. Thanks for reading the notes, and feel free to leave those comments! Contact information is available at the end of each and every podcast.

Comments (0)

Why the fate of online accessibility may rest with a Domino’s Pizza lawsuit

I think I’ve covered this before, but this seems to be an update. I know the person involved although I’ve not talked to him in a long time. We’ll be watching to see what happens, and of course, we’ll see if there is pushback.

The pizza chain is asking the Supreme Court to review a case that could push business websites to better serve people with disabilities.

Source: Why the fate of online accessibility may rest with a Domino’s Pizza lawsuit

Comments (0)

« Newer PostsOlder Posts »

go to sections menu

navigation menu

go to sections menu