The Internet Patrol default featured image
Continue Reading

About the Gmail “Recently Accessed From” Warning

It can be a pretty scary thing to log into your Gmail account and be met with a blazing red banner that says “Warning: We believe your account was recently accessed from:” followed by a geographic location that you decidedly aren’t, often a place such as Russia, Poland or China, and that followed by the options “Show details and preferences” and “Ignore”. Usually you can be certain that at that moment, the first thing you need to do is change your password, because your account was almost certainly hacked or otherwise compromised. However, that’s not always true if you get a warning of a remote access in the U.S., such as “We believe your account was recently accessed from: United States (CA).”

The Internet Patrol default featured image
Continue Reading

Why Contact Pictures in Your Email Address Book Can Be Dangerous

It’s kind of fun to see a friend’s smiling face as their email address picture when you open an email from them. But there is a little-known danger to having a contact picture associated with someone who sends you email. That’s because those contact images are displayed even if the email is from someone who has hijacked your friend’s email address, which happens all the time with phishing, scamming and spamming. It’s called “spoofing”, and any scammer or spammer can put your friend’s email address as their own “from” address. What this means is that any scammer can send you email “from” your friend’s email address, and your email program will display the address book picture you have set as the contact image. And many, if not most, people, seeing their friend’s email address image in that email, will have a false sense of security that the email really is from their friend. It’s as if the address book image being present in the email somehow proves it’s really from their friend. Well, it doesn’t. And here are real-life examples to prove it.

The Internet Patrol default featured image
Continue Reading

Court Finds Bank Has No Liability for Allowing Hackers to Drain Customer’s Bank Account

A Magistrate has recommended to the Federal court in Maine that a bank (in this case Ocean Bank of Maine) has no liability, even though it allowed hackers to remove more than $500,000 from one of the bank’s customers accounts. The customer, Patco Construction, had been the victim of the Zeus trojan, which steals passwords once surreptitiously installed on a victim’s computer.

The Internet Patrol default featured image
Continue Reading

President Proposes National Cybersecurity Legislation

Earlier this month the White House released what it is calling its “Cybersecurity Legislative Proposal”. It makes for an interesting read, and so we thought we would share it with you. Let us know what you think.

The Internet Patrol default featured image
Continue Reading

Massive Android Security Hole Affects up to 99% of All Android Users

Three researchers in Germany at the University of Ulm have discovered a massive security hole in Android – so big, in fact, that it affects at least 97%, and as many as 99%, of all Android users. The researchers, Bastian Könings, Jens Nickels, and Florian Schaub, have discovered that the security flaw allows anyone who is sniffing around your connection on an unsecured wireless network to acquire your Google authorization credentials from a specific token (the authToken), giving them access to your contacts, your calendar and, well – really any application that authenticates you by using your Google authorization credentials contained within that authToken.

The Internet Patrol default featured image
Continue Reading

The “Vote for Nicole Santos” Spam on Facebook – DON’T Click That Link!

Nicole Santos is getting quite a name for herself, and deservedly so. Her name has been spammed all across Facebook, in wall posts that are full of profanities, and also almost always exhort the spammed to “Vote for Nicole Santos”. The trick, of course, is that at the bottom of the post, next to the “Comment” and “See Friendship” links, is a link to “Remove this app”. Because the language in the wall posts is so foul, one’s first instinct is to hit that link as quickly as possible – but don’t click that link because that is how the virus infects your machine. (There is also a similar virus spam going around Facebook right now that exhorts you to “Please do your part in PREVENTING SPAM by VERIFYING YOUR ACCOUNT. Click VERIFY MY ACCOUNT right next to comment below to begin the verification process”.)

sony playstation network hacked
Continue Reading

Why The Hacked Sony PlayStation Network (PSN) is a Big Deal Security Issue for You

Lots of you are asking lots of questions about the Sony PlayStation Network (“How was the Sony Play Station Network taken down?”, “Who hacked the the Sony PlayStation Network?”, “Is it true that it was done with rooted Sony PSP handhelds?”, and, perhaps most importantly, “Is the Sony PSN secure now?” To bring you up-to-date, if you are scratching your head right now, first, the Sony PlayStation Network (referred to in shorthand as the “PSN”) was taken down last month in a concerted cyber attack which, at first Sony claimed was down due to “maintenance” but, eventually, they admitted that a hacking attack had taken them down. The hacker or hackers also caused Sony’s Qriocity services to go down. Oh, and wait – it also extended to the Sony Online Entertainment network. In short, if you have ever completed any transaction online with Sony, you need to treat your identity and credit card information as compromised.

The Internet Patrol default featured image
Continue Reading

“Web Security” Pop-Up Trojan Making Rounds Again, This Time Attacking Both Windows and Macs

The “Security Alert” trojan, sometimes known as a ‘rogue antivirus’ attack, is making the rounds again. First spotted a few years ago, until recently the “web security” antivirus alert trojan targeted mainly PCs, tricking Windows users into downloading the evil ‘BestAntivirus2011.exe’ file by telling them that “To help protect your computer Windows web security have detected trojans and ready to remove them.” (Note the poor language usage.) Now this same tactic is being used to attack Mac users – all that has changed is the “Windows” to “Apple” and the file name (‘MacProtector.mpkg for Macs’) – even the poor language remains the same! “To help protect your computer Apple web security have detected trojans and ready to remove them.” says the pop-up. Don’t fall for it, and whatever you do, don’t click on “Remove all”, which will cause the malware to be downloaded to your computer.

The Internet Patrol default featured image
Continue Reading

How to Password Protect and Disable Wifi on an iPod Touch and iPad

If you are a conscientious parent who wants to let their child use an iPod Touch (or “iTouch”) or iPad, but who wants the iPod Touch wifi disabled before you give it to them, you may be frustrated at the lack of any way to disable wifi so as to lock down the iPad or iPod Touch internet access. You can’t password protect the internet access on an iPod Touch or iPad, as there are no passwords for iPod iTouch wifi. In fact, natively, there is no way to disable or password protect the iPod Touch internet access (how stupid, Apple, get on the ball here! Give us some iPod Touch wifi apps to disable wifi!) Oh sure, you can put parental control restrictions on individual applications (Safari, Email), but your child can still turn the iPod Touch wireless internet on, and for some parents, that’s still too much of a risk (and we say “Bravo!” to them for ‘getting’ it). There is, however, an iPod Touch hack that will allow you to disable wifi on your iPod Touch or iPad, by password protecting the iPod Touch wifi on/off switch, and here it is.

The Internet Patrol default featured image
Continue Reading

Why You Should Never EVER Send Someone an Online Greeting Card

Over the course of the past week, we have received four – count ’em – 4 online greeting cards. We’ve been cautioning against the evils of the online greeting card industry industry for years, but apparently it’s time to do it again.

The Internet Patrol default featured image
Continue Reading

List of Companies Affected by the Epsilon Data Breach

If you received a notice from one or another company with whom you do business or have done business in the past, saying that your email address has been compromised due to a data security breach at email service provider (ESP) Epsilon (due to their customers’ email lists being hacked and stolen), you’re not alone. Oh, you are so not alone. Banks, large merchants, and others, have all had their entire list of customers’ email addresses swiped and leaked due to the Epsilon data breach. Chase Bank, Citi Bank, Best Buy, Krogers – even Disney, have all been affected – as have their customers. Of course, lots of people receiving these notices will assume that they are phishing attempts (and there will undoubtedly be phishing attempts riding on the coat tails of this fiasco). Here is the complete list as we know it today – if you have received a notice saying that your email address has been compromised, please add the name of the company involved to the list here.

The Internet Patrol default featured image
Continue Reading

Police Advise Know Your Child’s Facebook Password, Even If You Have to Steal It!

We have often taken flack for saying that children have no business being on Facebook (or the Internet in general), and that parents really don’t understand the dangers of letting your child on the Internet without adequate supervision and precautions. Now a group of police officers is saying the same thing, going so far as to say that you need to have your child’s Facebook password, and monitor their activity on Facebook – even if it means stealing their Facebook password to do it.

The Internet Patrol default featured image
Continue Reading

Proposed National “Internet ID” Plan All Talk, Little Substance

There’s been a lot of talk this week about the announcement of President Obama’s planned “Internet ID”, but very little of it actually contains any substance about how such an Internet identity plan would actually work. That’s because nobody really knows. There really is no plan yet; as far as anybody can tell at this point it’s all just a proposal to plan to have a plan to create a national Cyber ID, although that proposed plan does have a name, the “National Strategy for Trusted Identities in Cyberspace”, and is said to be being drafted as we speak. Really, the most important part of the announcement of the national cyber identity plan is that it names the U.S. Commerce Department as having authority over any such plan, rather than Homeland Security or the NSA.

The Internet Patrol default featured image
Continue Reading

How to Apply Parental Controls to Restrict Web Access, Calls and Texts on Your Child’s T-Mobile Cell Phone

If you are wanting or needing to give your child a cell phone, but want to be able to apply parental controls to restrict access, or even to make their access fully restricted access with them being able to call just a few numbers that you designate, then here is how to do it with T-Mobile. It is important that you understand these steps, and that you both a) don’t let Tmobile tell you that it can’t be done, and (equally important), b) don’t believe T-Mobile when they tell you that it has been done. You will need to do it – or at least check that T-Mobile has really done it – yourself. Here is how to lock down your child’s cell phone account and access, and apply full parental controls, so that they have no Internet access, and can only call and text to pre-approved numbers.

The Internet Patrol default featured image
Continue Reading

Gizmodo, Lifehacker, Gawker and other Gawker Media User Accounts Compromised in Security Breach

If you have ever had an account – even just to leave comments to articles and posts – on Gizmodo, Lifehacker, Gawker, Jezebel, io9, Kotaku, Deadspin, Fleshbot or Jalopnik, then you are in for a nasty surprise. Odds are good that your account has been compromised, and your user name and password posted on the Internet, as the result of security breach of Gawker Media’s servers that happened over the weekend. Gawker media does get points for alerting all of their users as soon as they discovered the breach (about 10 minutes ago as of the time of this posting on 6:20 p.m. PST on Monday, December 13th, 2010).