Advanced Computer Services of Central Florida

Computer Services, Support, Repair and Networking

07/13/2022

Good morning

Have I Been Pwned: Check if your email has been compromised in a data breach 10/23/2018

I suggest that all my clients and friends go to https://haveibeenpwned.com/ and put in your email address and run a check on it. I did, and my company email and some other data were in three recent breaches. On one of the breach’s, the company didn’t bother to encrypt the passwords so they were in plain text when the breach happened.

About two week later I got an email with the bad guys using an old and very unique password of mine. Thankfully I use a trustworthy password manager (LastPass) and had already changed many of the passwords so no harm, no foul.

The part that really ticks me off is the fact that one of the compromised organizations left all the logon information with no encryption, a lot of the information stolen was in plain text.

Frank

Have I Been Pwned: Check if your email has been compromised in a data breach Have I Been Pwned allows you to search across multiple data breaches to see if your email address has been compromised.

11/23/2016

12 tips for safer Black Friday and Cyber Monday shopping

Great advice to help you get your Black Friday and Cyber Monday shopping done safely.

Frank

12 tips for safer Black Friday and Cyber Monday shopping

By Tim Greene

During Black Friday and Cyber Monday 2016, consumers should watch out for scams that come through spam, insecure public networks and apps that might seem legitimate but could be taking over your phones and computers, experts say.

Read more at http://www.networkworld.com/article/3144057/security/12-tips-for-safer-black-friday-and-cyber-monday-shopping.html

networkworld.com 12 cyber shopping tips because criminals will be using all the attacks they can this holiday season in order to score cash and gather valuable personal data that they can monetize later.

10/10/2016

3 replacement Galaxy Note 7 phones caught fire in the past week

This isn’t good at all. At this point it would impossible to give me a new Samsung phone, much less sell me one.

Frank

3 replacement Galaxy Note 7 phones caught fire in the past week

By Ms. Smith

Replacement Galaxy Note 7 phones may not be any safer than the Note 7 devices which caught fire and caused a recall, based on three replacement Note 7 devices catching fire in the past week.

Read more at http://www.networkworld.com/article/3129468/security/3-replacement-galaxy-note-7-phones-caught-fire-in-the-past-week.html

networkworld.com A teenager was burned when her replacement Note 7 melted in her hand; a Southwest Airlines plane was evacuated due to a replacement device spewing smoke; a Kentucky couple's bedroom filled with smoke after a replacement Note 7 caught fire.

10/10/2016

FCC to vote on strict privacy rules for ISPs in late October

Good! I hope it passes! The ISP’s charge us through the nose for their service and have the gall to track us and use are data as they please without the common decency of asking our permission.

Frank

FCC to vote on strict privacy rules for ISPs in late October

By Grant Gross

The U.S. Federal Communications Commission will push forward with controversial privacy regulations that would require broadband providers to get customer permission before using and sharing geolocation, browsing histories, and other personal information.

Read more at http://www.networkworld.com/article/3128806/fcc-to-vote-on-strict-privacy-rules-for-isps-in-late-october.html

networkworld.com The U.S. Federal Communications Commission will push forward with controversial privacy regulations that would require broadband providers to get customer permission before using and sharing geolocation, browsing histories, and other personal information.

08/08/2016

Hacking monitors for spying, stealing data, manipulating what you see on the screen

Incredible and totally diabolical, the thought of this kind of hack never crossed my mind.
Frank

Hacking monitors for spying, stealing data, manipulating what you see on the screen
By Ms. Smith

The list of ways we can be spied upon seems nearly endless, but you can add one more to that list: active screen snooping via your vulnerable monitor. And that’s just one flavor of attack that can be pulled off by exploiting monitors.

Please click on the link below to read more. Thank you

networkworld.com Researchers at DEF CON revealed that computer monitors can be hacked and used to actively snoop on you, to covertly steal data and even to manipulate what you see on the screen.

08/04/2016

Another bitcoin heist: Bitcoin worth $72 million stolen from Bitfinex

WOW! That is one hell of a heist! It sounds like an inside job to me.
Frank

Another huge bitcoin heist: Bitcoin worth $72 million stolen from Bitfinex
By Ms. Smith

The Hong Kong-based bitcoin exchange Bitfinex suspended trading on Tuesday after discovering a security breach. A hacker or hackers pulled off a massive heist of nearly 120,000 bitcoins. At the time of the theft, 119,756 bitcoins would have been worth about $72 million. After the breach announcement, the price of bitcoin crashed; current exchange rates place the value at around $65 million.

Please click on the link below to read more. Thank you

networkworld.com The Hong Kong-based bitcoin exchange Bitfinex suspended trading after discovering a security breach.

08/04/2016

Cisco report says ransomware attacks are costing millions - Silicon Valley Business Journal

This is quickly turning into a digital epidemic.
Frank

Cisco report says growing ransomware attacks are costing people and businesses millions
By Gina Hall

Cybercriminals are raking in $34 million annually by targeting individuals and businesses with ransomware.

An uptick in ransomware attacks is costing the average target $300, according to a new security report out from Cisco Systems Inc. More than 9,500 people pay ransoms to hackers each month.

Please click on the link below to read more. Thank you

bizjournals.com An uptick in ransomware attacks is costing the average target $300, according to the report. More than 9,500 people pay ransoms to hackers each month.

08/02/2016

Welcome to Advanced Computer Services

Interested in more relevant cyber-security news on Microsoft, Apple, and Android? Go to www.advcomputerservices.com

advcomputerservices.com Interpol has arrested a top Nigerian email scammer who stole more than US$60 million by tricking businesses into handing over funds by posing as trusted suppliers.

08/02/2016

Interpol arrests Nigerian email scammer who swindled $60 million

A little good news for a change.
Frank

Interpol arrests Nigerian email scammer who swindled $60 million
By Michael Kan

Interpol has arrested a top Nigerian email scammer who stole more than US$60 million by tricking businesses into handing over funds by posing as trusted suppliers.

Please click on the link below to read more. Thank you

networkworld.com Interpol has arrested a top Nigerian email scammer who stole more than $60 million by tricking businesses into handing over funds.

07/28/2016

Rival gang leaks decryption keys for Chimera ransomware

You have to love it when cyber-criminals don’t play well with each other.
Frank

Rival gang leaks decryption keys for Chimera ransomware
By Lucian Constantin

Aside from the efforts of security researchers and antivirus companies, malware victims can sometimes also benefit from the fighting between rival cybercriminal groups.

Please click on the link below to read more. Thank you

networkworld.com The creators of the Petya and Mischa ransomware programs leaked around 3,500 RSA private keys allegedly corresponding to systems infected with another ransomware program called Chimera.

07/26/2016

More than half the world is still offline

I guess it’s easy to take for granted everything we do with devices connected to the internet. I never had a clue that that this much of world’s population isn’t connected to the internet in some way.
Frank

More than half the world is still offline
By Stephen Lawson

While it may seem like half the world is chasing Pokemon right now, the other half is not even on the Internet.

About 3.9 billion people, or 53 percent of the population, will still be offline at the end of this year, the International Telecommunication Union estimates. Even in Europe, the most connected region, 20.9 percent of all people aren’t online. In Africa, the least connected continent, 74.9 percent are offline.

Read more at http://www.itnews.com/article/3099142/more-than-half-the-world-is-still-offline.html?token=%23tk.ITN_nlt_ITnews_Daily_2016-07-25&idg_eid=2181ed3ecfe5e3ad5dff19ffc513a5c6&utm_source=Sailthru&utm_medium=email&utm_campaign=ITnews%20Daily%202016-07-25&utm_term=ITnews_Daily

itnews.com While it may seem like half the world is chasing Pokemon right now, a majority of the world’s population doesn’t even use the internet. About 3.9 billion people, or 53 percent of the population, will still be offline at the end of this year, the International Telecommunication Union estimates.

07/25/2016

Researchers release free decryption tools for PowerWare and Bart ransomware

Outstanding work and thank you.
Frank

Researchers release free decryption tools for PowerWare and Bart ransomware
By Lucian Constantin

Security researchers have released tools this week that could help users recover files encrypted by two relatively new ransomware threats: Bart and PowerWare.

Please click on the link below to read more. Thank you

networkworld.com Security researchers have released tools this week that could help users recover files encrypted by two relatively new ransomware threats: Bart and PowerWare.

07/22/2016

Edward Snowden has developed an iPhone case meant to kill surveillance

What a grand idea! Keep up the good work.
Frank

Edward Snowden has developed an iPhone case meant to kill surveillance
By Michael Kan

National Security Agency whistleblower Edward Snowden has come up with a concept iPhone case that could prevent the government from finding your location.

Please click on the link below to read more. Thank you

networkworld.com NSA whistleblower Edward Snowden has come up with a concept iPhone case that can help prevent the government from finding your location.

07/21/2016

Brake pedal data can fingerprint drivers with 87% accuracy in 15 minutes

Interesting and a little frightening!
Frank

Brake pedal data can fingerprint drivers with 87% accuracy in 15 minutes
By Ms. Smith

Have you opted for lower car insurance premiums via installing an insurance-supplied dongle? If so, then did you realize that dongle could narc you out when brake pedal usage is used as a biometric identifier?

Please click on the link below to read more. Thank you

networkworld.com Have you considered brake pedal data provided by sensors in your car to be a biometric identifier? Maybe you should since researchers found that brake pedal data can fingerprint drivers with 87% accuracy in just 15 minutes.

07/21/2016

Feds shut down tech support scammers, freeze assets

It’s about time you shut these scumbags down! I’ve had these weasels try to con a few of my clients, but they were to savvy to fall for their crap.
Frank

Feds shut down tech support scammers, freeze assets
By Gregg Keizer

Federal authorities have shut down several alleged tech support scammers working out of Florida, Iowa, Nevada and Canada, freezing their assets and seizing control of their businesses.

Please click on the link below to read more. Thank you

networkworld.com Federal authorities have shut down several alleged tech support scammers working out of Florida, Iowa, Nevada and Canada, freezing their assets and seizing control of their businesses.

07/19/2016

Algorithm to predict at birth if a person will be a criminal?

Interesting concept, but I wonder if I would really want to know.
Frank

Algorithm to predict at birth if a person will be a criminal?
Ms. Smith

Technology is not a bad thing; it’s not inherently scary. Sometimes new technology gets misused or tainted with mission creep. Most of the time, tech actually makes our lives easier and better. Here are two tales about “new” tech that could potentially predict the future. One seems scarier than the other.

Please click on the link below to read more. Thank you

networkworld.com Two tales about 'new' tech that could potentially predict the future. One is an algorithm that predicts criminals, and the other helps smart cities measure factors that impact livability.

07/18/2016

This Android Trojan blocks the victim from alerting banks

FYI to all Android users.
Frank

This Android Trojan blocks the victim from alerting banks
By Michael Kan

A new Trojan that can steal your payment data will also try to stymie you from alerting your bank.

Please click on the link below to read more. Thank you

networkworld.com A new Trojan that can steal your payment data will also try to stymie you from alerting your bank.

07/12/2016

Welcome to Advanced Computer Services

Interested in more relevant cyber-security news on Microsoft, Apple, and Android? Go to www.advcomputerservices.com

advcomputerservices.com After months of uncertainty, businesses will once again have a simple, legal way to export the personal information of European Union citizens to the U.S. for processing from Aug. 1.

07/12/2016

Auto thieves adopting cybercrime-like tactics

I think this is going to get a lot worse before it gets better.

Frank

Auto thieves adopting cybercrime-like tactics

By Patrick Nelson

In addition to recently publicized hacks of electronic auto ignitions with laptops, car thieves have several other high-tech techniques they’ve put to use—or will soon unleash upon their victims,
according to stolen vehicle recovery firm CalAmp LoJack Corp.

Please click on the link below to read more. Thank you

networkworld.com Vehicle ransoms are among startling new tech-oriented car-theft trends, according to an automotive security specialist.

07/12/2016

Victims of terrorist attacks in Israel sue Facebook for $1 billion

Interesting, even possible.

Frank

Victims of terrorist attacks in Israel sue Facebook for $1 billion

By Grant Gross

The families of victims of five recent attacks in Israel are suing Facebook for more than US$1 billion, saying the social media site helps terrorists plan their violence.

Please click on the link below to read more. Thank you

networkworld.com The families of victims five recent attacks in Israel are suing Facebook for more than US$1 billion, saying the social media site helps terrorists plan their violence.

07/11/2016

Smartwatches not secure, give away PIN numbers

Gee, what a surprise!

Frank

Smartwatches not secure, give away PIN numbers

By Patrick Nelson

Sensors, such as accelerometers, found in wearable devices can be used to reverse engineer a human hand’s movements and trajectories while at an ATM, thus giving away the PIN code, researchers say.
Please click on the link below to read more. Thank you

networkworld.com How you move your hand at an ATM when entering the PIN gives away the supposedly secure number to your sensor-packed wearable device, scientists say.

07/11/2016

Sideloaders beware: a Pokemon Go knock-off contains malware

It’s been all over most of the local news stations, but I’ll post it just in case anyone missed it.

Frank

Sideloaders beware: A Pokemon Go knock-off contains malware

By Michael Kan

The new smash-hit game "Pokemon Go" could become bait for hackers wanting to take over your phone.

Please click on the link below to read more. Thank you

networkworld.com The hit game Pokemon Go could end up becoming bait for hackers wanting to take over your phone.

07/06/2016

11 signs your kid is hacking -- and what to do about it

Mine was trying to, is yours?

Frank

11 signs your kid is hacking -- and what to do about it

By Roger A. Grimes

I've shared a lot of security knowledge in my tenure as InfoWorld's Security Advisor. But what I've never shared before is that much of my initial computer security defense knowledge, which I turned into my first book, came from trying to stop my teenage stepson from being a malicious hacker.

Please click on the link below to read more. Thank you

networkworld.com Here’s how to find out if your child is involved in malicious online activity -- before the authorities do

06/30/2016

Wormable flaws in Symantec products expose millions of computers to hacking

I wouldn’t use any Symantec products if they were free.

Frank

Wormable flaws in Symantec products expose millions of computers to hacking

By Lucian Constantin

A Google security researcher has found high severity vulnerabilities in enterprise and consumer products from antivirus vendor Symantec that could be easily be exploited by hackers to take control of computers.

Please click on the link below to read more. Thank you

networkworld.com A Google security researcher has found high severity vulnerabilities in enterprise and consumer products from antivirus vendor Symantec that could be easily be exploited by hackers to take control of computers.

06/30/2016

Dangerous keyboard app has more than 50 million downloads

FYI

Frank

Dangerous keyboard app has more than 50 million downloads

By Maria Korolov

The Flash Keyboard app has been downloaded more than 50 million times -- but is capable of some extremely dangerous behaviors.

Please click on the link below to read more. Thank you

networkworld.com The Flash Keyboard app has been downloaded more than 50 million times -- but is capable of some extremely dangerous behaviors.

06/27/2016

Researchers steal data from a PC by controllng the noise from the fans

Diabolically ingenious!
Frank

Researchers steal data from a PC by controlling the noise from the fans
By Michael Kan

Even the noise from your PC’s fans could be used to steal the data inside. Researchers in Israel have found a way to do just that by hijacking the fans and manipulating the sounds they create.

Please click on the link below to read more. Thank you

networkworld.com Even the noise from your PC’s fans could be used to steal the data inside. Researchers in Israel have found a way to do just by hijacking the fans inside and manipulating the sounds they create.

06/22/2016

Welcome to Advanced Computer Services

Interested in more relevant cyber-security news on Microsoft, Apple, and Android? Go to www.advcomputerservices.com

advcomputerservices.com Don’t be surprised if you see spam coming from the top websites in the world. Lax security standards are allowing anyone to "spoof" emails from some of the most-visited domains, according to new research.

06/22/2016

Top website domains are vulnerable to email spoofing

This explains a lot of why most of us are yet again getting flooded with spam emails.

Frank

Top website domains are vulnerable to email spoofing

By Michael Kan

Don’t be surprised if you see spam coming from the top websites in the world. Lax security standards are allowing anyone to "spoof" emails from some of the most-visited domains, according to new research.

Please click on the link below to read more. Thank you

networkworld.com Don’t be surprised if you see spam coming from the top websites in the world. Lax security standards are allowing anyone to “spoof” emails from some of the most-visited domains, according to new research.

06/15/2016

Don’t run JS email attachments: they can carry potent ransomware

FYI my friends.

Frank

Don’t run JS email attachments: they can carry potent ransomware

By Lucian Constantin

Attackers are infecting computers with a new ransomware program called RAA that's written entirely in JavaScript and locks users' files by using strong encryption.

Please click on the link below to read more. Thank youl

networkworld.com Attackers are infecting computers with a new ransomware program called RAA that's written entirely in JavaScript and locks users' files using strong encryption.

06/14/2016

Company wants full access to your social media accounts to spy for landlords, employers

This is insane!

Frank

Company wants full access to your social media accounts to spy for landlords, employers

By Ms. Smith

If a UK startup has its way, then you will hand over full access to your social media accounts – “including entire conversation threads and private messages” – so it can be scraped and analyzed to help potential landlords and employers decide if you are a risk worth taking.

Please click on the link below to read more. Thank you

networkworld.com Would you hand over complete access to your private social media messages so a landlord or employer can decide if you are worthy of housing or a job? A UK startup believes you will and that you have nothing to worry about if you live ‘a normal life.’

06/10/2016

Hackers could have changed Facebook Messenger chat logs

Very interesting and extremely disturbing.

Frank

Hackers could have changed Facebook Messenger chat logs

By Peter Sayer

Here's a Facebook hack straight from the pages of the novel 1984: A way to rewrite the record of the past.

Please click on the link below to read more. Thank you

networkworld.com Here's a Facebook hack straight from the pages of the novel 1984: A way to rewrite the record of the past.

06/07/2016

Hackers breach social media accounts of Mark Zuckerberg and other celebrities

Mark, do you need someone to show you how to change your passwords?

Frank

Hackers breach social media accounts of Mark Zuckerberg and other celebrities

By Lucian Constantin

Over the weekend hackers managed to access Facebook founder Mark Zuckerberg's Twitter and Pinterest accounts, as well as the social media accounts of other celebrities.

Please click on the link below to read more. Thank you

networkworld.com Over the weekend hackers have managed to gain access to Facebook founder Mark Zuckerberg's Twitter and Pinterest accounts, as well as the social media accounts of other celebrities.

06/06/2016

TeamViewer denies hack, blames hijacked accounts on password reuse

I will never understand why companies lie about things like this, in my opinion, this only damages their reputation more. Come clean by telling the truth, do what you can to make it right with your clients, and do what you can to prevent it from happening again. After all, it’s the right thing to do.

Frank

TeamViewer denies hack, blames hijacked accounts on password reuse

By Ms. Smith

A plethora of people with the remote desktop tool TeamViewer have been in an uproar after their machines were remotely hijacked; in some cases, over the past month or so, users had their bank or PayPal accounts sucked dry. TeamViewer denied it has been hacked and launched two new security measures.

Please click on the link below to read more. Thank you

networkworld.com TeamViewer denies hack, blames hijacked accounts on password reuse, stolen megabreach credentials, and launches two new security features.

06/02/2016

93% of phishing emails are now ransomware

This is getting to be a more serious issue than most people realize. I recently had a client get infected with ransomware, fortunately we had good backups to replace the encrypted with. Please don’t be suckered into opening an infected email.

Frank

93% of phishing emails are now ransomware

By Maria Korolov

As of the end of March, 93 percent of all phishing emails contained encryption ransomware, according to a report released today by PhishMe.

Please click on the link below to read more. Thank you

networkworld.com As of the end of March, 93 percent of all phishing emails contained encryption ransomware, according to a report released today

06/01/2016

Welcome to Advanced Computer Services

Interested in more relevant cyber-security news on Microsoft, Apple, and Android? Go to www.advcomputerservices.com

advcomputerservices.com If something goes wrong with a patch, it's usually a problem that emerges after people download and install the patch. But in this case, fixes issued for May's Patch Tuesday batch just plain won't install at all for some people.

Want your business to be the top-listed Computer & Electronics Service in Winter Haven?
Click here to claim your Sponsored Listing.

Address


322 4th Street NW
Winter Haven, FL
33882

Other Computer Companies in Winter Haven (show all)
Casey's Technology Solutions Casey's Technology Solutions
Winter Haven

Do you need help with your home tech?Tired of the geek squad? Hire me. 5+ yrs Technology experience.