Redundancy, Backups, And Redundancy

You’re all doing backups. Good job! (You’re not doing backups? Pfft. That’s just foolish. Call me – don’t put it off, just call me.) Let’s go through the backup strategies that you have in place. I have some anecdotes that lead me to think that a single backup plan...

Privacy And Geotagged Photos

Many people instinctively protect their privacy. In their minds, it’s not anybody else’s business where they shop, who they visit, what they talk about, or what movies they watch. The divide is getting wider between naturally private people and the rapidly growing...

Making Millions With Scareware

If you’ve ever wondered what motivates the creators of malware, you should read a fascinating article by Benjamin Wallace over at Wired.com, “How Two Scammers Built An Empire Hawking Sketchy Software.” It’s the story of a couple of run-of-the-mill scam artists who...

Anatomy Of A Scam Investigation

There is a fascinating and informative series of articles by a lawyer and former federal prosecutor about his efforts to unearth information about a scammer who sent a phony “invoice” to his firm. It’s a well-known and simple scam – send something that looks like an...

Sudden Decline In Fake Antivirus Malware

The world has made a bit of temporary progress against the bad guys. Almost every week during 2010 and the first six months of 2011, I cleaned malware off computers after it was installed by poisoned web sites. It usually started with a window designed to resemble a...