Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Click Here To Defeat Evil > NetSparsh - Viral Content you Love & Share

Click Here To Defeat Evil

Microsoft routinely releases new security updates, many of which are given it's highest severity rating "critical". Here's a typical announcement:

"A security issue has been identified that could allow an attacker to compromise a computer running Internet Explorer and gain control over it."

I'm not making this up. Is this funny to anyone else? They do this every month and they are still the most popular web browser in the world! Don't get me wrong, the browser is good, as long as you don't mind "attackers" gaining control over it once in awhile. Who are these attackers? Is it a cyber-geek with coke bottle glasses and an evil glint in his magnified eye? Could I tell if I saw one on the street? Would he have a lot of pens in the top pocket of his gangsta leather jacket? Does he have pentagrams sewn into his polyester leisure suit? I know only one hacker, but he swears he's a "Light-Side" hacker. He hacks only for good.

And what if we received these kinds of letters from other manufacturers? "A security issue has been identified that could allow a pirate to board all pleasure boats running an outboard Mercury 150 and joy ride it to Mexico for Cinco de Mayo. Install this jack screw on your rudder immediately."

So let's review with an analogy because this is "critical". If you had a steel combination safe (your computer) in which you stored precious belongings, (your data) and you towed this safe around in a wagon through many of the world's most dangerous cities (surfing the internet), Microsoft announced that there are 8 easy ways, and 4 just "so so" ways for thieves to break in and take everything you've got. But let's stay positive, the good news is, you can patch it all right up with a click. What could be easier? Maybe that's why we forgive them so often. Wouldn't it be great to get an email from GM saying your vehicle will soon be stolen but click here and it will be alright.

It's nice that they announce the holes and the patches together, that way I'm not so worried the whole time before, while I browsed Internet Explorer around care free down the mean streets of the internet completely innocent. I could have been E-jacked by I-marauders, demanding that I hand over every E & I in my wallet.

The truth is, the good guys are winning the security battle online, why? Because they are rich and can hire the best light-side hackers money can buy. Even hackers known for evil all wind up working for large corporations. A headline of one going to jail for 18 months is a resume item on the lap of every CEO in the world with computers to protect. Now they're a cyber security expert, with all the dark secrets for sale! The speaking engagements start pouring in, "Come meet the man (or woman) who sent a KaGillion emails from a billion computers to Microsoft during lunch break. He did his time at Club Fed, and now works for the Department of Defense.

So cyber villains may come and critical updates may go, I just click and fix my way along the information highway and say a little prayer that the world's "attackers" never know I exist until they're on the payroll of the good guys somewhere.

Rick David writes a humor column called, "Don't Laugh It Could Happen To You" for http://sandiego.merchantamerica.com

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

New York Times

No Passport or Ticket: How a Woman Evaded Airport Security and Flew to London
New York Times
After Ms. Hartman joined the security line and was screened by the T.S.A., she tried to board a flight to Connecticut around 2 p.m., attempting to conceal herself behind a passenger who was waiting in line, Ms. Simonton said. As Ms. Hartman tried to ...
How Marilyn Hartman Got Past O'Hare SecurityCBS Chicago
'Serial stowaway' arrested for 10th time after slipping past airport security, flies to LondonFox 2 Detroit
Notorious 'serial stowaway' pensioner evades airport security and flies from Chicago to London without a ticketEvening Standard

all 29 news articles »

Google's Advanced Protection Program Offers Security Options For High-Risk Users
EFF
Security is not a one-size-fits-all proposition, and features that are prohibitively inconvenient for some could be critical for others. For most users, standard account security settings options are sufficient protection against common threats. But ...


BBC News

Syria offensive: US seeks to address Turkey's 'legitimate' security concerns
BBC News
The US is willing to work with Turkey to address its "legitimate" security concerns in northern Syria, Secretary of State Rex Tillerson has said. He was speaking after Turkey's military incursion into northern Syria to fight the Kurdish YPG militia at ...
US Hopes to Work With Turkey on 'Security Zone' in SyriaU.S. News & World Report
US hopes to work with Turkey to create 'security zone' in Syria: TillersonDaily Sabah
Turkey has legitimate security concerns: MattisHurriyet Daily News

all 452 news articles »

ZDNet

After ignoring for months, Uber fixes two-factor bypass bug after all
ZDNet
Uber has fixed a security bug that could've allowed an attacker to hack into user accounts by bypassing two-factor authentication, after the ride-sharing company initially said the flaw wasn't a "particularly severe" issue. The company quietly issued a ...


Engadget

Uber security flaw compromised two-factor authentication
Engadget
Two-factor authentication only works if it's strictly enforced in software, and it sounds like Uber might have fallen short of that goal for a while. In a chat with ZDNet, security researcher Karan Saini has revealed a flaw in Uber's two-factor ...

and more »

NBCNews.com

Report: Afghan security forces committed 75 rights abuses, including child sex assault
NBCNews.com
The report from the Special Inspector General for Afghanistan Reconstruction (SIGAR), which was first released to Congress last year but made public Tuesday, says that at least seven of the violations were child sexual assault, but also says "the full ...

and more »

CNBC

Soldiers, snipers and security at Davos: Protecting the world's rich and powerful
CNBC
Ensuring the safety of more than 2,500 high-profile political, economic and business guests at an event is never easy; ensuring the safety of more than 70 heads of state and government is a nightmare. The World Economic Forum (WEF) has said security is ...

and more »

New York Times

Prison Guards in France Continue Strike Over Security and Pay
New York Times
PARIS — A labor strike by prison guards around France entered its second week on Monday, as the guards vented anger over their pay and dangerous working conditions, an issue that erupted into the open this month after a string of violent assaults by ...

and more »

Sun Sentinel

Security guard shot colleague in Hollywood in fight over gate lock, police say
Sun Sentinel
Andres Aviles, 26, drove to Mexico and flew to El Salvador where he was detained while trying to reach Nicaragua, police said. Tonya AlanezContact Reporter · Privacy Policy. The security guard accused of shooting his colleague during a shift change at ...
Security guard accused of shooting colleague gets caught in El SalvadorWPLG Local 10
Fugitive security guard fled Florida. His crime caught up with him in El Salvador.Miami Herald

all 5 news articles »

Fox News

US says it wants to help Indonesia provide maritime security
Fox News
JAKARTA, Indonesia – U.S. Defense Secretary Jim Mattis says the Trump administration wants to help Indonesia play a central role in maritime security in the Asia-Pacific region. Mattis spoke briefly to reporters Tuesday after meeting with his ...
US to work with Indonesia on maritime security, counter-terrorismThe Straits Times

all 168 news articles »
Google News

Free Spyware Removal - Its Not As Easy As It Sounds

Nobody wants to pay to remove spyware. At the very... Read More

Steganography ? The Art Of Deception & Concealment

The Message Must Get Through ----------------------------- The year is 300A.D.,... Read More

An Open Letter From a So-called Stupid

Someone recently told me, "You would have to be a... Read More

Website Security - Creating a Bulletproof Site in 5 Easy Steps

When it comes to a secure website and passwords it... Read More

Cyber Crooks Go Phishing

"Phishing," the latest craze among online evil-doers, has nothing to... Read More

Corporate Security for Your Home Business

The words Corporate Security may conjure up images of a... Read More

Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers

I am the victim of an internet scam. It is... Read More

Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders

Can you protect your computer from all possible viruses and... Read More

Personal Firewalls for Home Users

What is a Firewall?The term "firewall" illustrates a system that... Read More

40 Million People Hacked - YOU as Identity Theft Victim

Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More

Is The Internet Over Regulated

Today's Internet or World Wide Web is being over regulated.But,... Read More

Spy Scanners ? Don?t Compromise your Privacy

Spies, spyware, internet parasites are among what they are usually... Read More

Dont Get Hacked - A Guide to Protecting Your Business from Thieves

You've seen it in the news - 40 million credit... Read More

Another Fine Mess!

I'm in the Anti-Spyware business, and I'm doing a lot... Read More

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

The Move to a New Anti-Virus Model

This is the second in a series of articles highlighting... Read More

Lottery Scam, What It is and how to Avoid It?

Internet scams and frauds are on the rise! The quantity... Read More

Be Alert! Others Can Catch Your Money Easily!

So called phishers try to catch the information about the... Read More

3 Pervasive Phishing Scams

Scams involving email continue to plague consumers across America, indeed... Read More

The Top Twelve Threats No Computer User Should Ignore

The internet is undoubtedly a fantastic resource for families and... Read More

Virus and Adware - Fix them Both!

We all get the odd virus now and then, but... Read More

Securing Your Accounts With Well-Crafted Passwords

In the past I've never really paid much attention to... Read More

How to Protect Yourself Against Online Criminals

Credit card fraud is a growing problem for online businesses... Read More

Spyware Protection Software

Spyware protection software is the easiest way of removing spyware... Read More

Passwords or Pass Phrase? Protecting your Intellectual Property

Much has been said on the theory of password protection... Read More