Samsung Galaxy Note 2 nearly burns down airplane in mid-flight

Samsung

Samsung

IndiGo 6E-054 flight from Singapore to Chennai nearly caught fire when a Samsung Galaxy Note 2 emitted smoke from the overhead compartment. Fortunately passengers aboard the flight noticed the smoke and responded in time to save the place from making a forced landing. IndiGo Airlines conformed the incident and  Continue reading Samsung Galaxy Note 2 nearly burns down airplane in mid-flight

Yahoo hacked, change your passwords Now!

Hack!

Hack!

Yahoo, a major email service provider among other things, has admitted to a major hack that resulted in at least half a billion users’ person identification being stolen by hackers. Although Yahoo is attempting to calm down the general public’s fear by touting the advantage of the advantage of the BCRYPT encryption software that they now use, Yahoo is not admitting to their dark secret which is that Continue reading Yahoo hacked, change your passwords Now!

macOS Sierra Flash Drive Installer Instructions

macOS Sierra

macOS Sierra

Apple has released the official version of macOS Sierra but before you hit the Instal button, you might want to create a flash drive installer. Having a bootable flash drive is convenient to save on download costs if you are in a capped or tiered Internet access plan (to install Sierra on multiple Macs in your home), or if you like to have a safety net just in case your disk crashes at any time. The normal process that Apple offers for any operating system install will automatically erase the installer, when the install in completed, so a special procedure is needed to create the flash drive, as follows. Continue reading macOS Sierra Flash Drive Installer Instructions

More hacks means that its time to change your passwords again

Hack!

Hack!

So far this year these have been 21 (twenty one) major hacks that have been publicly disclosed. From my own experience in Silicon Valley when California pass the Database Breach Notification Act (California S.B. 1386) the very first public law anywhere in the world that compels companies to disclose to the public if hackers have hacked them (unauthorized access to the company’s database). What I found disheartening is that the Fortune 100 companies that I worked for would go far out of their way to disclose anything to anyone. In the end I realized that because of these dishonest tactics that there are probably ten times as many hacks as are being reported. One problem Continue reading More hacks means that its time to change your passwords again

Transmission BitTorrent software tries to attack Macs once again

Malware

Malware

Hackers have used Transmission a BitTorrent client as a hijack vehicle in an attempt to infect Macs. This follows a similar attempt a few months ago that was detected and thwarted by Apple’s security team. In this attempt, hackers infected Transmission right on their website so users would download an infected app and then infect their systems. In the previous attempt to infect Macs, the folks at Transmission caused their users to be vulnerable to their own hijacked software by instructing downloaders to deactivate Apples built-in security defense known as Gatekeeper. This time Continue reading Transmission BitTorrent software tries to attack Macs once again

Apply Pay usage guide

Apple Pay

Apple Pay

Apple Pay has been taking the world by storm this year. Its the first new payment system that actually is different, providing ease of use as well as demonstrably improved security for you and your bank account. All the major banks have already signed up their credit cards and the smaller banks are already linked up to become part of the only system right now that demonstrable secure. Here is how you can easily transition to this safe and convenient payment system. Continue reading Apply Pay usage guide

Patent Trolls, What are they and why do we care?

Troll

Troll

Patent Trolls are companies that don’t actually produce products or services but uses patents that they purchased to beat up on other companies to extort money out of them. They take advantage of filing the lawsuits in a very specific district (in Marshall and also in Tyler) Texas which is infamous for always siding with petite trolls. It’s so bad that I’m surprised that there has not been a federal investigation about this ridiculousness. Continue reading Patent Trolls, What are they and why do we care?

Australia is moving faster that GPS can keep up

Dock for iPhone 5C & 5S

Dock for iPhone 5C & 5S

So many people treat GPS as being utterly infallible but the truth I that its a tool and like any other , the outcome depends on the skills of the person using it. I find that the problem is not with the GPS system itself, its accurate and reliable, the actual problem is with the map making companies and that si where our story begins today. Continue reading Australia is moving faster that GPS can keep up

iPhone security trouncing Droid’s lack of security [Updated]

Google Don't Be Evil

Google Don’t Be Evil

Once again its time for the security refresher course that teaches us that iOS users are far safer on their iPhones and iPads than Droids are on any of their generic hardware. This is no surprise to those that actually pay attention but its surprising to still see anyone buy a Droid device even after the numerous security breaches that the Droid platform has and is still suffering. Continue reading iPhone security trouncing Droid’s lack of security [Updated]

Uninstalling Mac apps demystified

Crucial Technology by Micron

Crucial Technology by Micron

Its always a strange phone call I get when a former Windows user calls me as asks the ridiculously simple question, “How do I uninstall an app from my new Mac”. I hold back the chuckle and calmly tell them, in my most serious voice: you simply drag the app to the Trash my friend. Yes it really is that easy and yes, just like everything else in life, there are he rare exceptions that mess up the purity of that rule, but on macOS, they are few and far between. Here is the the rest of the story. Continue reading Uninstalling Mac apps demystified

Subscribe via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.