Facebook – DeepFace software improves Facial recognition in photos

Uncategorized Comments Off on Facebook – DeepFace software improves Facial recognition in photos

Facebook has introduced new software to improve facial recognition http://www.huffingtonpost.com/2014/03/18/facebook-deepface-facial-recognition_n_4985925.html http://facecrooks.com/Internet-Safety-Privacy/Facebook-Announces-%e2%80%9cDeepFace%e2%80%9d-Photo-Matching-Technology.html/ QUOTE: Facebook owns the world’s largest photo library, and it now has the technology to match almost all the faces within it.   Facebook announced last week that it has developed a program called “DeepFace,” which researchers say can determine whether two photographed faces are […]

Facebook – Spam controls for newly installed applications

Uncategorized Comments Off on Facebook – Spam controls for newly installed applications

When special Facebook applications are installed they may email friends and contacts excessively.  These links provide helpful controls: http://www.businessinsider.com/prevent-apps-from-updating-on-facebook-2014-3 http://facecrooks.com/Internet-Safety-Privacy/How-Stop-Your-Facebook-Apps-From-Spamming-Your-Friends.html/ QUOTE: That’s why Business Insider published a valuable blog post this week telling readers how they can stop their Facebook apps from spamming their friends. First, open your Facebook page and click on the “Settings” […]

SmartTV Security – improved controls for Wi-Fi and other vulnerabilities needed

Uncategorized Comments Off on SmartTV Security – improved controls for Wi-Fi and other vulnerabilities needed

While a specific manufacturer is noted, improved security is needed for all Television sets with internet connectivity.  Key vulnerability cited were weak WiFi controls that hackers could tap into within radio range. http://arstechnica.com/security/2014/03/philips-smart-tvs-wide-open-to-gmail-cookie-theft-other-serious-hacks/ http://grahamcluley.com/2014/03/philips-tv/ QUOTE: Internet-connected TVs manufactured by Philips running the latest firmware update are wide open to browser cookie theft and other serious […]

WINDOWS SUPPORT TELEPHONE SCAM – 2014 ADDITIONAL LINKS

Uncategorized Comments Off on WINDOWS SUPPORT TELEPHONE SCAM – 2014 ADDITIONAL LINKS

Several additional links shared by a friend and documenting historically that Microsoft is not monitoring your PC and will not fix it as the scammers claim during these random phone calls to scare individuals into action. RECENT ASSISTANCE TO FRIEND:  A friend reccently called me in panic regarding this scam actively circulating … While it’s […]

Facebook – New Threat Data Protective Framework for users

Uncategorized Comments Off on Facebook – New Threat Data Protective Framework for users

Facebook recently announced it’s new Threat Data protective framework as noted below: http://www.zdnet.com/facebook-intros-threatdata-framework-to-standardize-security-7000027697/ http://facecrooks.com/Internet-Safety-Privacy/Facebook-Builds-Standardized-Security-Wall.html/ https://www.facebook.com/notes/protect-the-graph/understanding-online-threats-with-threatdata/1438165199756960 QUOTE: Facebook has unveiled its latest security wall built from the ground up: ThreatData, a framework intended to standardize security research and prevention.  ThreatData essentially pools data related to malware, phishing, and other online risks across the Internet for both […]

Malware – Linksys Moon worm update MAR2014

Uncategorized Comments Off on Malware – Linksys Moon worm update MAR2014

The ISC shares update on Linksys Moon worm https://isc.sans.edu/forums/diary/A+few+updates+on+The+Moon+worm/17855 QUOTE: It has been over a month since we saw the “Moon” worm first exploiting various Linksys routers. I think it is time for a quick update to summarize some of the things we learned since then. Infected systems will run an additional https server on […]

Microsoft XP – Five Key tips for Corporate Migration

Uncategorized Comments Off on Microsoft XP – Five Key tips for Corporate Migration

Legacy applications may or may not be supported in newer Windows versions and this insightful article is helpful in corporate planning http://betanews.com/2013/10/14/legacy-apps-holding-you-hostage-7-ways-to-safely-migrate-off-windows-xp/ QUOTE: Here are a few commonsense best practices that any organization looking forward to an XP migration should be outlining before a single system is touched: 1. Inventory your organization 2. Evaluate your […]

Microsoft – New Privacy Protection initatives for 2014

Uncategorized Comments Off on Microsoft – New Privacy Protection initatives for 2014

Based on customer feedback, Microsoft is taking additional measures to improve privacy and protection of sensitive information http://blogs.technet.com/b/microsoft_on_the_issues/archive/2014/03/28/we-re-listening-additional-steps-to-protect-your-privacy.aspx QUOTE: Effective immediately, if we receive information indicating that someone is using our services to traffic in stolen intellectual or physical property from Microsoft, we will not inspect a customer’s private content ourselves. Instead, we will refer […]

Programming Languages – Top 10 for job seekers in 2014

Uncategorized Comments Off on Programming Languages – Top 10 for job seekers in 2014

Having learned and worked with over a dozen languages in my IT career, found this article interesting.  Still do some programming (web pages) and enjoy the creativity side of software development, even though professional am more on the project and business sides http://www.eweek.com/developer/slideshows/top-10-programming-languages-for-job-seekers-in-2014.html QUOTE: Looking for a job as a programmer? An eWEEK study found […]

Malware – Word RTF attack circulating MAR2014

Uncategorized Comments Off on Malware – Word RTF attack circulating MAR2014

A new RFT exploit has surfaced and is circulating in the wild on limited and targeted attack basis.  Users should be careful with any WORD document they may receive unexpectedly (even from trusted sources). As the “Rich Text Format” can be saved with RTF, DOC, and DOCX extensions, any word document may be potentially infected. […]


© 2021 Computer Safety & News.
WordPress Theme & Icons by N.Design Studio. Provided by WPMU DEV -The WordPress Experts   Hosted by Microsoft MVPs
Entries RSS Comments RSS Log in