Computer News & Safety tips  – Harry Waldron MVP Rotating Header Image


AMD – New 2017 Ryzen CPU chipset announced

AMD has recently announced their new 2017 Ryzen CPU processor series  

AMD Unveils Cheap, Powerful Flagship Ryzen CPUs

After four years of development and amidst the building speculation of gamers and PC enthusiasts, AMD today announced that its Ryzen CPUs are now available for pre-order and will ship on March 2  Like their chief competition—Intel’s Core i7 processors—Ryzen will come in several flavors, which you can pre-order starting at $329. That price gets you the base model, the Ryzen 7 1700, an eight-core, 16-thread processor with a base clock speed of 3GHz that can be boosted to 3.7GHz. The next step up is the $399 Ryzen 7 1700X, which increases the clock speed to 3.4GHz with a 3.8GHz boost. Finally, there’s the top-of-the-line $499 1800X, which runs at 3.6GHz and can be boosted to 4.0GHz. Like the 1700, the 1700X and 1800X both have eight cores and 16 threads.

Microsoft Security Updates – FEBRUARY 2017 to be bundled with MARCH 2017 release

During final QA testing apparently some issues was discovered that warranted further improvement prior to distribution to millions of users.  Microsoft will merged the FEBRUARY 2017 security updates into MARCH 2017 release, allowing time to resolve all issues.

Our top priority is to provide the best possible experience for customers in maintaining and protecting their systems. This month, we discovered a last minute issue that could impact some customers and was not resolved in time for our planned updates today. After considering all options, we made the decision to delay this month’s updates. We apologize for any inconvenience caused by this change to the existing plan.

Microsoft – Proposes Global Cybersecurity Accord for 2017

Microsoft & other vendors have proposed improved cybersecurity initiatives on a collective basis during coming year.

Microsoft has called on governments around the world to create a “digital Geneva Convention” as a way to normalize international cybersecurity rules and protect civilian use of the Internet.   President Brad Smith, who is also Microsoft’s chief legal officer, addressed the issue at the annual RSA conference, saying that governments — with the assistance of technology companies in the role of NGOs — need to establish international rules to protect civilians from cyberthreats during peacetime.

“The tech sector plays a unique role as the Internet’s first responders, and we therefore should commit ourselves to collective action that will make the Internet a safer place, affirming a role as a neutral Switzerland that assists customers everywhere and retains the world’s trust,” Smith wrote in an appeal posted online.   There are two key focal points:

1 — Economic Damage Seventy four percent of the world’s businesses expect to be hacked every year, with the economic losses from cybercrime averaging US$3 trillion per year, according to Microsoft.  Cyberattacks historically have focused on military and economic espionage, Smith noted.

2 — Institutional Threat — Microsoft is not alone in promoting cybersecurity cooperation among government institutions.  The Electronic Privacy Information Center earlier this week announced a new Democracy and Cybersecurity project, designed to address growing alarm about the impact of cyberattacks on democratic institutions.  The organization has urged the U.S. Congress to update federal data protection laws, and to establish a data protection agency designed to address the increased risks of identity theft and data breaches, said Marc Rotenberg, executive director of EPIC.

Windows 10 – Edge Browser Improvements coming in Creators Update

Windows 10 Creators Update will provide Microsoft Edge with some of the following improvements for end users and developers

Microsoft said that once the next major Windows 10 update releases, the company’s Edge browsers will also be receiving a slew of new features and tweaks.  There will be enhancements for end users, along with standards support for Web application developers. Many of the improvements are showing up now for “fast-ring” Windows Insider Program testers. Some Edge features will make the “Redstone 2” (creators update) release of Windows 10, which is thought to be arriving in April.

1. On the end user side, the Microsoft Edge browser will have the ability to preview multiple open tabs in a thumbnail view when the Windows 10 creators update arrives, Microsoft announced on Tuesday. Open tabs can be set aside as a group, to be revisited later, which Microsoft sees as a way of staying organized and not losing tabs. A screenshot in Microsoft’s announcement showed that tab collections can be saved from different time periods, such as “yesterday,” “3 hours ago” and “just now.”

2. Users possibly will be able to block Flash use with the Windows 10 creators update. Microsoft had announced this capability back in December, but it wasn’t mentioned in its announcements on Tuesday. The Microsoft Edge browser already has the capability to automatically pause Flash ad content that’s not deemed essential.

3. Developers can expect to see Content Security Policy Level 2 (CSP2) support in Microsoft Edge when the Windows 10 creators update is released. CSP2 is a World Wide Web Consortium (W3C)-recommended approach that’s designed to help ward off content injection attacks, as well as cross-site scripting exploits, because developers can “lock down the resources that can be used by their web application,” Microsoft explained, in a Jan. 10 blog post.

4. Developers also will see WebRTC 1.0 API support in the Edge browser coming with the Windows 10 creators update, Microsoft explained, in a second announcement on Tuesday. In essence, Microsoft will enable video and audio communications in peer-to-peer scenarios, such as Skype calls between devices, which will work “across browsers and platforms.”

5. Microsoft Edge also will get support for the “H.264/AVC and VP8 video codecs” for real-time communications (RTC). The added support “means video communications are now interoperable between Microsoft Edge and other major WebRTC browsers and RTC services.”

6. Microsoft also plans to bring Brotli compression to the Edge browser with the Windows 10 creators update release. It’s a lossless data compression format spearheaded by the Internet Engineering Taskforce. Brotli compression is expected to improve browser load times because of “20% better compression ratios

Apple – iPhone 7 wireless headphone products review

Several third party products are reviewed as alternatives to Apple’s new innovative ear buds which will soon become more widely available.,2817,2497785,00.asp

The iPhone 7 and iPhone 7 Plus are two of the world’s most popular music players, packed with exclusive technology. One technology that’s missing, however, is the good old 3.5mm headphone jack. That’s driving a lot of iPhone owners over to wireless headphones, but not every pair will make the most of your phone’s audio capabilities. These headphones are our best picks specifically for the iPhone 7.

Why Go Wireless? — Getting rid of the headphone jack on the iPhone 7 means that in almost all cases, if you’re not using the earbuds that came with your phone, you’ll have to use an annoying $9 dongle to connect your headphones to your iPhone. Wired headphones that use Apple’s Lightning port exist, but they aren’t very common. We’ve reviewed one pair so far, the ridiculously expensive (but also awesome) Audeze iSine 20.

The iPhone 7 uses a special W1 Bluetooth pairing chip to make wireless connections easier, and it uses the AAC music encoding scheme to transmit high-quality audio. No Android phones have the W1, and the AAC situation is an iPhone thing.  The W1 is Apple’s proprietary chip for easier Bluetooth pairing. Once they’re set up, W1 headphones connect and disconnect from iPhones automatically, without fiddling with settings and without fail. That gets rid of one of the major complaints about Bluetooth headphones, which is that you may periodically, mysteriously have to dig into your phone’s settings and manually connect.

We’ve reviewed all three of the first set of W1 headphones: Apple’s Airpods, the Beats Solo3, and the Beats Powerbeats3. They’re not bad, but you’re definitely paying a premium for the easier pairing and improved range the W1 provides. Looking at the chart above, between the Beats Solo3 and the Bowers & Wilkins P5 Wireless, you’re basically trading that W1 connection on the Beats for better all-around audio quality and a more comfortable fit on the Bowers & Wilkins P5 Wireless.

Telephone Scam – Can you hear me

The Better Business Bureau warns of a new “Can you hear me” scam circulating, where the attackers can capture a “YES” response and play back the victim’s voice affirmation to link them to fake purchases of goods or services. Users should always avoid answering unknown or suspicious phone calls.

SEATTLE — A growing “Can you hear me?” phone scam can make you a victim if you utter just one word: “Yes.”  This is how it works, according to the Better Business Bureau:  An automated call provides an introduction and identifies a business or agency. After the intro, the recording will ask if you can hear clearly. If you answer yes, the scammer behind the call may have recorded you, could plan to use your affirmation to sign you up for a product or service you never knew about and then will demand payment. If you refuse, the scammer may produce your recorded “yes” response to confirm your purchase agreement.

How to prevent phishing scams — The best advice from the BBB:

Hang up on any unsolicited robocall. If you are on the federal Do Not Call List and a company calls out of the blue to ask questions, it’s likely a scam.

Avoid responding with “yes,” “sure” or “OK.”

Hang up if you’re asked to press a button to be placed on the Do Not Call registry. Doing anything else could help scammers identify an active phone number. No government agency will ever solicit for the Do Not Call Registry.

Write down the phone number and file a scam report with the BBB Scam Tracker and the Federal Trade Commission’s Do Not Call List.

College students are prime targets of ID thieves, scammers.  That doesn’t always help because these scammers also often know how to fool phones’ caller ID features.

MALWARE – New GMAIL PDF based phishing scam captures passwords

A new GMAIL PDF based phishing scam is widely circulating.  When users click on a PDF attachment that appears to be in genuine email message of a trusted contact, it launches a FAKE GMAIL login page that is designed to captures ID and password information.  Attackers can later use those captured credentials to break into the users email and send out legitimate looking emails to contacts in the address book.

Security researchers have identified a “highly effective” phishing scam that’s been fooling Google Gmail customers into divulging their login credentials. The scheme, which has been gaining popularity in the past few months and has reportedly been hitting other email services, involves a clever trick that can be difficult to detect.  Here’s how the swindle works. The attacker, usually disguised as a trusted contact, sends a boobytrapped email to a prospective victim. Affixed to that email, there appears to be a regular attachment, say a PDF document. Nothing seemingly out of the ordinary.

But the attachment is actually an embedded image that has been crafted to look like a PDF. Rather than reveal a preview of the document when clicked, that embedded image links out to a fake Google login page. And this is where the scam gets really devious.  Everything about this sign-in page looks authentic: the Google logo, the username and password entry fields, the tagline. By all indications, the page is a facsimile of the real thing. Except for one clue: the browser’s address bar.

In fact, the text in the address bar is what’s known as a “data URI,” not a URL. A data URI embeds a file, whereas a URL identifies a page’s location on the web. If you were were to zoom out on the address bar, you would find a long string of characters, a script that serves up a file designed to look like a Gmail login page. This is the trap. As soon as a person enters her username and password into the fields, the attackers capture the information. To make matters worse, once they gain access to a person’s inbox, they immediately reconnoiter the compromised account and prepare to launch their next bombardment. They find past emails and attachments, create boobytrapped-image versions, drum up believable subject lines, and then target the person’s contacts.

Malwarebytes v3.0 – New version resource links

During December 2016, a new version of Malwarebytes was released.  As last version release was in 2014, this is an important milestone for one of best free cleaning tools available.

Malwarebytes v3.0 – HOME PAGE

Malwarebytes v3.0 – PRODUCT ANNOUNCEMENT

Malwarebytes v3.0 – FAQ

RECENT REVIEW – PC MAGAZINE rates as Excellent as free tool,2817,2455505,00.asp

I am thrilled to announce the launch of our next-generation product, Malwarebytes 3.0! This product is built to provide comprehensive protection against today’s threat landscape so that you can finally replace your traditional antivirus. Our engineers have spent the last year building this product from the ground up and have combined our Anti-Malware, Anti-Exploit, Anti-Ransomware, Website Protection, and Remediation technologies all into a single product which we simply call “Malwarebytes.” And it scans your computer 4 times faster

Leadership – Problem Solving improved by asking right questions

John Maxwell reflects on the need to focus on problems by asking the right questions, which focus on the root cause analysis process

When problem-solving, it’s so easy to fall into the rut of uncreative thinking. We can focus so much on answers and solutions that we lose sight of the question. And if we’re asking the wrong questions, we’ll often end up with the wrong answers.

How creative is your thinking? When faced with a problem, do you immediately turn to the tried-and-true solutions that you’ve always used? Or do you open your mind to new ideas?

A good way to do that is to start asking some right questions, like these:

*   Why must it be done this way?
*   What is the root problem?
*   What are the underlying issues?
*   What does this remind me of?
*   What is the opposite?
*   What metaphor or symbol helps to explain it?
*   Why is it important?
*   What’s the hardest or most expensive way to do it?
*   Who has a different perspective on this?
*   What happens if we don’t do it at all?

Google – Blocked 1.7 billion fake ads in 2016

Google employed automation and human effort in removing over 1.7 billion ‘bad ads’ in 2016 and banned 200 publishers.  This was over twice the volume of 2015 and illustrates the need for users to constantly keep safety in mind, as they use web resources.

Google purged itself of 1.7 billion bad ads last year – more than double the number it axed in 2015 – a fact which belies a problem set to swell unless more advertisers refuse to turn a blind eye to inflated numbers caused by ad fraud. The online behemoth’s latest update on its own efforts to curb ad fraud highlights the scale of a problem; for all Google’s efforts last year, is blocking a greater volume of ads just a consequence of there being more bad ads in the first place?

Expanded policies, better detection and sharper internal expertise investments in 2016 suggest it’s a conundrum not lost on the advertising business as the industry starts to understand its own involvement in ad fraud.  “While we took down more bad ads in 2016 than ever before, the battle doesn’t end here,” continued Spencer. “As we invest in better detection, the scammers invest in more elaborate attempts to trick our systems. Continuing to find and fight them is essential for creating a sustainable, open web from which we all enjoy.”

To stress the point, Google pointed out that over 1,300 accounts were suspended last year for attempting to game its system by pretending to be news, a trick known as “tabloid cloaking”.  Any quality ad tech platform will have multiple layers of defence in place in the form of both human and technology review systems that work to eliminate bad ads.