Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Click Here To Defeat Evil > NetSparsh - Viral Content you Love & Share

Click Here To Defeat Evil

Microsoft routinely releases new security updates, many of which are given it's highest severity rating "critical". Here's a typical announcement:

"A security issue has been identified that could allow an attacker to compromise a computer running Internet Explorer and gain control over it."

I'm not making this up. Is this funny to anyone else? They do this every month and they are still the most popular web browser in the world! Don't get me wrong, the browser is good, as long as you don't mind "attackers" gaining control over it once in awhile. Who are these attackers? Is it a cyber-geek with coke bottle glasses and an evil glint in his magnified eye? Could I tell if I saw one on the street? Would he have a lot of pens in the top pocket of his gangsta leather jacket? Does he have pentagrams sewn into his polyester leisure suit? I know only one hacker, but he swears he's a "Light-Side" hacker. He hacks only for good.

And what if we received these kinds of letters from other manufacturers? "A security issue has been identified that could allow a pirate to board all pleasure boats running an outboard Mercury 150 and joy ride it to Mexico for Cinco de Mayo. Install this jack screw on your rudder immediately."

So let's review with an analogy because this is "critical". If you had a steel combination safe (your computer) in which you stored precious belongings, (your data) and you towed this safe around in a wagon through many of the world's most dangerous cities (surfing the internet), Microsoft announced that there are 8 easy ways, and 4 just "so so" ways for thieves to break in and take everything you've got. But let's stay positive, the good news is, you can patch it all right up with a click. What could be easier? Maybe that's why we forgive them so often. Wouldn't it be great to get an email from GM saying your vehicle will soon be stolen but click here and it will be alright.

It's nice that they announce the holes and the patches together, that way I'm not so worried the whole time before, while I browsed Internet Explorer around care free down the mean streets of the internet completely innocent. I could have been E-jacked by I-marauders, demanding that I hand over every E & I in my wallet.

The truth is, the good guys are winning the security battle online, why? Because they are rich and can hire the best light-side hackers money can buy. Even hackers known for evil all wind up working for large corporations. A headline of one going to jail for 18 months is a resume item on the lap of every CEO in the world with computers to protect. Now they're a cyber security expert, with all the dark secrets for sale! The speaking engagements start pouring in, "Come meet the man (or woman) who sent a KaGillion emails from a billion computers to Microsoft during lunch break. He did his time at Club Fed, and now works for the Department of Defense.

So cyber villains may come and critical updates may go, I just click and fix my way along the information highway and say a little prayer that the world's "attackers" never know I exist until they're on the payroll of the good guys somewhere.

Rick David writes a humor column called, "Don't Laugh It Could Happen To You" for http://sandiego.merchantamerica.com

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

Retirement Security: Fire And Fury In Telecommunications
Seeking Alpha
AT&T's merger with Time Warner has hit a brick wall and the market is celebrating. Here's what I'm doing. How about you? Subscribers to "Retirement: One Dividend At A Time" got an early look at this material via free instant text message trade alert ...

and more »

Forbes

How This Millennial Went From A High School Dropout To Cyber Security Expert
Forbes
Manan Shah, the 24-year-old founder of cyber security firm Avalance Global Solutions, is one of the top cyber security experts, but his path to the top was far from traditional. A high school dropout and former hacker, Shah had to overcome run-ins with ...


TechCrunch

Tortuga Logic raises $2 million to build chip-level security systems
TechCrunch
Tortuga Logic has raised $2 million in seed funding from Eclipse Ventures to help in their effort to maintain chip-level system security. Based in Palo Alto, the company plans to use the cash to build products that will find “lurking vulnerabilities ...


Fox News

Schools adept at shoring up security at any hint of danger
Fox News
Schools have become adept at rapidly shoring up security, measuring responses against the toll it could take on students' learning and sense of safety. The president of the National Association of School Resource Officers says schools regularly ...

and more »

New York Times

Homeland Security Official Resigns Over Remarks on African-Americans and Muslims
New York Times
WASHINGTON — The Department of Homeland Security's head of outreach to religious and community organizations resigned on Thursday after audio recordings revealed that he had previously made incendiary remarks about African-Americans and ...
Homeland Security Official Who Blamed Slums On 'Lazy Blacks' QuitsHuffPost
Homeland Security official Jamie Johnson resigns after comments ...Washington Post
Homeland Security's head of community outreach resigns over past controversial comments on black community, IslamCNN
Fort Dodge Messenger -New York Daily News -The Hill -FEMA.gov
all 71 news articles »

North Darfur security: Swiss aid worker released, kidnappers held
ReliefWeb
The security authorities in North Darfur announced on Wednesday that kidnapped Swiss aid worker Margaret Schenkel has been “released from her captors in a mountainous area during a professional security operation”. The head of the National ...

and more »

UN News Centre

Russia again vetoes extension of chemical experts in Syria
ABC News
And it was Russia's 11th veto of a Security Council resolution dealing with Syria, its close ally. Russia cast its latest veto Friday night on a last-ditch resolution by Japan to extend the mandate for 30 days for further discussions. It was supported ...
Security Council fails at fresh attempt to renew panel investigating chemical weapons use in SyriaUN News Centre
Security Council Considers 30-day Extension on Syria ExpertsVoice of America
The Investigation Into Chemical Attacks in Syria Is Fizzling Out After a Security Council ShowdownTIME

all 599 news articles »

UN News Centre

At Security Council, UN chief urges cooperation to tackle security challenges in Mediterranean
UN News Centre
17 November 2017 – The Mediterranean – a confluence of civilizations, cultures, religions, trade and migration – is facing multiple security challenges, such as terrorism, illicit trade in narcotics, environmental degradation and forced displacement ...

and more »

Computerworld

Strong and stable: The iOS security guide
Computerworld
So, what's the weakest point in mobile device security? Sadly, it's you. From tapping links in phony emails to accessing confidential password-protected information using open public Wi-Fi hotspots to simply using the same password everywhere: All ...

and more »

KING5.com

Seattle police plan security for tree lighting ceremony
KING5.com
Seattle police have a plan to secure next week's holiday tree lighting ceremony in Westlake Park, and it makes room for protesters to exercise their first amendment rights. "It's the kickoff for the holiday season," said James Sido, DSA spokesperson ...

Google News

Make Money Online - Latest Scam Disclosed

Before we start, I want to make it clear that... Read More

Make Money Online - Defend Against The Latest Scam

First, let's do a little recap'. As I stated in... Read More

A Basic Introduction To Spyware

Spyware is the most troublesome software to appear on the... Read More

Ransom Trojan Uses Cryptography for Malicious Purpose

Every day millions of people go online to find information,... Read More

Delete Cookies: New-Age Diet or Common Sense Internet Security?

No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More

Social Engineering - The Real E-Terrorism?

One evening, during the graveyard shift, an AOL technical support... Read More

How Free Scripts Can Create Security Problems

With the Internet entering our lives in such an explosive... Read More

A Painless Plagiarism Solution

A crowded marketplace can lead to unethical webmasters using underhand... Read More

Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is

A week or so ago, I received an inquiry from... Read More

Spy Scanners ? Don?t Compromise your Privacy

Spies, spyware, internet parasites are among what they are usually... Read More

Don?t Become An Identity Fraud Statistic!

"You've just won a fabulous vacation or prize package! Now,... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More

Arming Yourself Against Spyware

While clicking from site to site on the internet you... Read More

Identity Theft -- 10 Simple Ways to Protect Your Good Name!

Identity Theft is one of the most serious problems facing... Read More

Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers

I am the victim of an internet scam. It is... Read More

How to Protect Yourself Against Online Criminals

Credit card fraud is a growing problem for online businesses... Read More

Internet Privacy

Over the past few years as the internet has become... Read More

Firewalls: What They Are And Why You MUST Have One!

A firewall is a system or gateway that prevents unauthorized... Read More

Securities

NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More

Phishing - A High Tech Identity Theft With A Low Tech Solution

Have you ever got an email asking you to confirm... Read More

Click Here To Defeat Evil

Microsoft routinely releases new security updates, many of which are... Read More

Hacking the Body Via PDA Wireless Device

First I would like to stress I am condoning the... Read More

Phishing ? Its Signs and Your Options

Phishing is the act of some individual sending an email... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

5 Simple Steps to Protect your Digital Downloads

A couple of days ago, I was searching for a... Read More