Yahoo’s “On Demand” Passwords

YahoosigninYahoo has just unveiled a new system that bypasses the need for a password when logging into Yahoo Mail. The new service, which has been dubbed “on demand passwords,” simply sends you a password on an as-needed basis, which are texted to your mobile phone when you need them. You no longer have to memorize a difficult password to sign in to your account.

Simply follow the steps below:

1) Sign in to your Yahoo.com account.

2) Click on your name at the top right corner to go to your account information page.

3) Select “Security” in the left bar.

4) Click on the slider for “On-demand passwords” to opt-in.

5) Enter your phone number and Yahoo will send you a verification code.

6) Enter the code and you are good to go!

The next time you sign-in, Yahoo will send a password to your phone when you need it to log in. On-demand passwords is now available for U.S. users.

Top Cyber Threat Predictions for 2014

As a hands on, “out in the field” technician, I have to ask: “Who hasn’t been hacked”? (Target, Apple, Energy networksSony, government websites…) And this year just means there will be more, not less cyber threats. Cyber Warfare… there will be collateral damage.

Cyber warfare

Let’s review some of Top Cyber Threats, shall we?

PREDICTION #2: Service-Impacting Interruptions for Online Services Will Persist
By David Bills, Chief Reliability Strategist, Trustworthy Computing

Online services across the industry and around the world have experienced service disruptions during the past year. I expect this trend to continue.

PREDICTION #6: Cybercrime that Leverages Unsupported Software will Increase
By Tim Rains, Director Trustworthy Computing

The most effective way to protect systems in the current environment, where drive-by download attacks are so popular with attackers, is to keep all software installed on them up-to-date with security updates.

PREDICTION #8: Ransomware will Impact More People
By Tracey Pretorius, Director, Trustworthy Computing

I predict more attackers will embrace this business model in 2014 and ransomware infections will rise. The impact of a ransomware infection on businesses of all sizes could be highly disruptive if they aren’t prepared for this type of threat.

To read the full article:

Security Professionals: Top Cyber Threat Predictions for 2014

BONUS TIP: Replace your XP/Vista systems

They are no longer supported and broken. The risk you take will not be rewarded.

Just Another Reason: We Don’t Do McAfee

Tech mega mogul John McAfee, wanted by Belizean police in connection to the murder of a U.S. expatriate, revealed where he has been hiding for the past six days: at his compound, in Belize. And police tell FoxNews.com they’re on the way over.

It’s a fresh twist on the increasingly bizarre tale of McAfee, the former security software mogul who founded the company of the same name. McAfee has spent six days out of sight yet hiding in plain sight, chatting on the phone with Joshua Davis, a reporter from Wired magazine. Late Friday night, McAfee told CNBC where he had been hiding the whole time.

NO McAfee

via FoxNews

Why I Don’t Use McAfee – McAfee Uninstall Tool – Uninstall McAfee Security Scan Plus

Genuine Windows Validation Error With MS Security Essentials

This issue may occur if the WGA (Windows Genuine Advantage) engine does not have permission to access the data.dat file. In order to confirm this point and resolve the issue, do the following:

1. Log on to the computer using an Administrator user account.
2. Click “Start”, and click “My Computer”.
3. On the “Tools” menu, click “Folder Options”.
4. Click the “View” tab.
5. Under “Hidden files and folders”, check on “Show hidden files and folders”.
6. Click to clear the “Hide extensions for known file types” check box, and then click “OK”.
7. We will find the file named “data.dat” under the following folder:

C:\Documents and Settings\All Users\Application Data\Windows Genuine Advantage\data

8. Right-click the “data.dat” file, and click “Properties”.
9. Click the “Security” tab.

Note: If the “Security” tab cannot be viewed, please refer to the information after Step 12.

10. Click “Advanced”.

11. In the “Name” tab, please check if “Everyone” is listed. If so, please click the “Exit” button, and check on “Full Control”. If “Everyone” is not listed, please click the “Add” button, enter the name “Everyone” (without the quotation marks), press “enter “from the keyboard, choose “Full Control” in the pop-up window, and click “OK”.

12. Please click “OK” to accept the changes.

Please also check the information below regarding viewing of the Security Tab in Window XP Professional Edition.

1. Click “Start”, and click “My Computer”.
2. On the “Tools” menu, click “Folder Options”.
3. In the “View” tab, uncheck the option “Use simple file sharing (Recommended)” at the bottom of the list.
4. Click “OK”.

In order to access the Security Tab in XP Home Edition, you have to restart the computer into Safe Mode.  In Safe Mode, only accounts with Computer Administrator privileges are presented on the friendly logon screen.  Log onto Windows using one of these Computer Administrator accounts, then make the changes to the data.dat file’s permissions as described in the above post.  When done, restart, and resume what you were doing with MSE.

Thanks go to our Test Monkey of the Day, Ja! (For validating this fix works)