Google Security Issue Email

In the past few days, Google has been busy sending me emails letting me know that they have found security issues on my email accounts.


The “2-minute checkup” is worth a look see for everyone, because there maybe some apps you gave access to that don’t need access anymore and/or you haven’t setup the 2 step verification for your Google accounts.


I do want to note, however, that if you use Outlook, DO NOT turn off less secure app access. That will turn off your GMAIL email use on Outlook.

After the Meltdown Update

As always, the BETA testers that we are, the KB 4056892 was installed on a few primary system computers. This was to thwart off the zealous zero day that has everyone in a breathless state of “Oh My God”. MELTDOWN!

I know they want to alleviate the “zero day” attack, and we are not running any unknown configurations to conflict with the known antivirus issue, but it affected one of our systems.

After a System Restore we were back to normal.

I recommend anyone running Windows 10, pick up a flash-drive, with at least 8GB’s and then create a Windows 10 recovery USB drive.

Using the tool to create installation media
Select Download tool now, and select Run. You need to be an administrator to run this tool.
If you agree to the license terms, select Accept.
On the What do you want to do? page, select Create installation media for another PC, and then select Next.
Select the language, edition, and architecture (64-bit is typical) for Windows 10.

Select which media you want to use:
Attach a blank USB flash drive with at least 8GB of space. Any content on the flash drive will be deleted. After the installation media is created, keep the USB handy, in case you need it later.



Security Planner

Security Planner is an easy-to-use guide with expert-reviewed advice for staying safer online. It provides recommendations on implementing basic online practices, like enabling two-factor authentication on important accounts, making sure software stays updated, and using encrypted chats to protect private communications. More advanced users can receive advice on where to go for more help.

Answer a few simple questions to get personalized online safety recommendations. It’s confidential – no personal information is stored and they won’t access any of your online accounts.

via Schneier on Security

Yahoo’s “On Demand” Passwords

YahoosigninYahoo has just unveiled a new system that bypasses the need for a password when logging into Yahoo Mail. The new service, which has been dubbed “on demand passwords,” simply sends you a password on an as-needed basis, which are texted to your mobile phone when you need them. You no longer have to memorize a difficult password to sign in to your account.

Simply follow the steps below:

1) Sign in to your account.

2) Click on your name at the top right corner to go to your account information page.

3) Select “Security” in the left bar.

4) Click on the slider for “On-demand passwords” to opt-in.

5) Enter your phone number and Yahoo will send you a verification code.

6) Enter the code and you are good to go!

The next time you sign-in, Yahoo will send a password to your phone when you need it to log in. On-demand passwords is now available for U.S. users.

Top Cyber Threat Predictions for 2014

As a hands on, “out in the field” technician, I have to ask: “Who hasn’t been hacked”? (Target, Apple, Energy networksSony, government websites…) And this year just means there will be more, not less cyber threats. Cyber Warfare… there will be collateral damage.

Cyber warfare

Let’s review some of Top Cyber Threats, shall we?

PREDICTION #2: Service-Impacting Interruptions for Online Services Will Persist
By David Bills, Chief Reliability Strategist, Trustworthy Computing

Online services across the industry and around the world have experienced service disruptions during the past year. I expect this trend to continue.

PREDICTION #6: Cybercrime that Leverages Unsupported Software will Increase
By Tim Rains, Director Trustworthy Computing

The most effective way to protect systems in the current environment, where drive-by download attacks are so popular with attackers, is to keep all software installed on them up-to-date with security updates.

PREDICTION #8: Ransomware will Impact More People
By Tracey Pretorius, Director, Trustworthy Computing

I predict more attackers will embrace this business model in 2014 and ransomware infections will rise. The impact of a ransomware infection on businesses of all sizes could be highly disruptive if they aren’t prepared for this type of threat.

To read the full article:

Security Professionals: Top Cyber Threat Predictions for 2014

BONUS TIP: Replace your XP/Vista systems

They are no longer supported and broken. The risk you take will not be rewarded.

Just Another Reason: We Don’t Do McAfee

Tech mega mogul John McAfee, wanted by Belizean police in connection to the murder of a U.S. expatriate, revealed where he has been hiding for the past six days: at his compound, in Belize. And police tell they’re on the way over.

It’s a fresh twist on the increasingly bizarre tale of McAfee, the former security software mogul who founded the company of the same name. McAfee has spent six days out of sight yet hiding in plain sight, chatting on the phone with Joshua Davis, a reporter from Wired magazine. Late Friday night, McAfee told CNBC where he had been hiding the whole time.

NO McAfee

via FoxNews

Why I Don’t Use McAfee – McAfee Uninstall Tool – Uninstall McAfee Security Scan Plus

Genuine Windows Validation Error With MS Security Essentials

This issue may occur if the WGA (Windows Genuine Advantage) engine does not have permission to access the data.dat file. In order to confirm this point and resolve the issue, do the following:

1. Log on to the computer using an Administrator user account.
2. Click “Start”, and click “My Computer”.
3. On the “Tools” menu, click “Folder Options”.
4. Click the “View” tab.
5. Under “Hidden files and folders”, check on “Show hidden files and folders”.
6. Click to clear the “Hide extensions for known file types” check box, and then click “OK”.
7. We will find the file named “data.dat” under the following folder:

C:\Documents and Settings\All Users\Application Data\Windows Genuine Advantage\data

8. Right-click the “data.dat” file, and click “Properties”.
9. Click the “Security” tab.

Note: If the “Security” tab cannot be viewed, please refer to the information after Step 12.

10. Click “Advanced”.

11. In the “Name” tab, please check if “Everyone” is listed. If so, please click the “Exit” button, and check on “Full Control”. If “Everyone” is not listed, please click the “Add” button, enter the name “Everyone” (without the quotation marks), press “enter “from the keyboard, choose “Full Control” in the pop-up window, and click “OK”.

12. Please click “OK” to accept the changes.

Please also check the information below regarding viewing of the Security Tab in Window XP Professional Edition.

1. Click “Start”, and click “My Computer”.
2. On the “Tools” menu, click “Folder Options”.
3. In the “View” tab, uncheck the option “Use simple file sharing (Recommended)” at the bottom of the list.
4. Click “OK”.

In order to access the Security Tab in XP Home Edition, you have to restart the computer into Safe Mode.  In Safe Mode, only accounts with Computer Administrator privileges are presented on the friendly logon screen.  Log onto Windows using one of these Computer Administrator accounts, then make the changes to the data.dat file’s permissions as described in the above post.  When done, restart, and resume what you were doing with MSE.

Thanks go to our Test Monkey of the Day, Ja! (For validating this fix works)