I've had many people ask me about e-mails they've received and how they got hacked.
These e-mails can be pretty convincing if they display a password that you use. It is worrisome because this is a piece of private information.
The content of the e-mail might be pretty alarming to some people. It gave me a good laugh. Remotely accessing a computer is entirely possible, but in this case, not likely. If you are running windows, a good anti-virus/malware program should detect such incursions. The things claimed in the e-mail would be entirely possible given level of sophistication today's hackers possess.
Prior to this article I have received 1 of these myself in the past 3 years. Today, I received 3 in a row.
So what happened? Did I get hacked? No -- but obviously a site that I've used in the past did. Clearly hackers were able to access sensitive information: my online account, my email address and password.
In practice, I use different passwords for different groups of online services. Sometimes I'll include a few letters to hint at the name of the service. This narrowed the suspects. Next, I can check one of several databases that keep track of websites that have been hacked:
Scanning the list, I found two websites that I used that password for. I hadn't visited those websites in over 4 years. I'd like to think it took them this long to decrypt my nifty password!
Whether or not you ever received such an e-mail, I recommend looking at the list. Sites include the IRS, the United States Post Office, Facebook, Dominos, Walmart, Yahoo... and the list goes on and on.
We all have heard the lectures of good passwords and bemoan all those password character requirements, but ultimately, it will keep your online profiles safer. Even strongly encrypted passwords can find themselves vulnerable to brute force password guessing.
Lastly, so many people have confessed to me they use the same password for everything. If you look at the list of compromised servers, you can imagine how this practice can magnify your risks of identity theft.
A new threat has emerged that is being called "Bad Rabbit"
This is a variant of other viruses that disable a user's computer by encrypting all the files.
More information is available by googling "Bad Rabbit" but the main thing to keep in mind is that this virus poses as an Adobe Update.
Avoid clicking on any adobe updates in the mean time.
Before Google there were few search engines that stood above its peers. Alta Vista was one such.
In 1995 it was a forerunner in websearch technology. It was one of the first search engines to offer online translations through its Babelfish.
Since the rise of Google, the once mighty search engine has become nearly forgotten. With the advent of Google, many users were lured away and AltaVista declined. By 2001 Google overtook AltaVisa in number of searches. Some believe its troubles started 1998 when AltaVista went through a long line of owners, each changing the product little. In 2003 MSN was competing for the acquisition of AltaVista against Overture. Overture won its bid, but in turn was acquired by Yahoo!
Now, Yahoo! has decided (again) to put an end to the Internet legend once and for all. It has announced that starting July 8, 2013, AltvaVista.com will just recommend searchers to use Yahoo! instead.
As Heartbleed has been making waves in the news and through-out the Internet community, we'd like to inform our users that our servers are not, nor ever were vulnerable to the attack.
For more information on the exploit, visit http://heartbleed.com/
Sometimes it is necessary to interrupt services so updates can be done. Every effort is made to perform these updates at off peak hours and to mitigate down time. Unfortunately, not everything can be done feasibly in the dark of night.
When service windows or emergency maintenance is planned, we send out notices 24 to 48 hours in advance, or as early as possible. If you are not already on our notify list and would like to know about upcoming events that affect your services, please take a moment to submit a request form. More information can be found by clicking here.