Tested.com was recently at PAX and got their hands on several Windows 7 Mobile handsets. Since PAX is a gaming convention they focus on the gaming features of the new operating system. However, they do spend a fair amount of time going over how the operating system looks and feels, how the mobile search and browsing work, conversations, calendaring and more. I remain cautiously optimistic that Microsoft can regain momentum in the mobile phone market, but think that the competition is a good thing for consumers. Plus if history is any guide, Microsoft will make their Windows 7 Mobile OS enterprise friendly, so perhaps there will be a worthy competitor to RIM and Blackberry. Watch the hands-on video after the break. Read more
There can be no denying that Facebook, like so many of the other New/Social Media tools available, is a force to be bargained with. With more than 500mil current users and the number climbing quickly daily, the networking power of Facebook has become an avenue of information, marketing and potential profit for any business.
EPC, Inc. would like to remind everyone about their Facebook presence online and invites YOU to “Like” EPC in an effort to grow the awareness and viability of our Facebook tether to the Internet.
It’s one of the best ways to find out about our current events, our charity efforts, our recycling initiatives and sales throughout the year. You won’t be sorry you did!
Do YOU have a Facebook account? Thought about creating a profile for yourself or your company? Tell us in the comments section below how YOU are using Facebook to change the way you communicate, network and do business. We’d love to hear about it!
Help us understand “the Value of Facebook” now.
For those of you that haven’t taken the time to attend any of EPC’s recent sales, the time has come. This weekend, is EPC’s 2010 Tax Free Holiday Sale providing you with the opportunity to get some of the best computer equipment you can imagine, at a significantly discounted rate – and pay NO SALES TAX. Read on below for more details and be sure to tell your friends and family with students going back to school/college about this great sale!
“Mark Your Calendars! Saturday, August 7th, 2010 is the date for the EPC NO SALES TAX Computer Sale, and you’re invited! In addition to saving 15% on all used computer equipment, YOU PAY NO SALES TAX! Get there early from 8am-2pm and take advantage of great deals! Also check out the new “CLEAR” 4G Wireless Internet access – the fastest mobile internet connection ever to be offered! If you sign up during our sale this weekend, you get to take an additional 5% off your used equipment purchase! It all happens THIS WEEKEND!”
Click here to link to view the event flyer…
Click here to view the Additional 5% CLEAR 4G Wireless Internet Coupon…
It sounds like a plot out of a summer spy movie, but security researcher Thomas Ryan tested what would happen when posting a fake profile of a real-life Abby Scuito. The results? Over 300 “friends” in the military, information security, and intelligence fields, a few job offers, and invitations to security conferences.
Ryan, the co-founder of Provide Security, said the goal of the study was to determine how effective social networking sites like Facebook, Twitter, and LinkedIn would be as tools in covert intelligence-gathering activities. He crafted “Robin Sage”, a 25 year old Navy cyber threat analyst who graduated from MIT. Even though the profile had some red flags, like a 25 year old having “10 years experience,” it took less than a month to make connections with many in security related fields. Virtual friends shared photos, personal information, invited Robin to conferences, and a few even expressed interest in hiring her.
If Robin were a foreign agent, she would have had access to a lot of very useful information, said Ryan, who is scheduled to present his findings at the upcoming BlackHat security conference in Las Vegas.
Even if you are not in the spy game, what can you learn from this?
- Like your momma said, “If it sounds too good to be true, it usually is.”
- If you don’t know them, don’t friend them.
- Always be mindful of how information posted online could be used against you by identity thieves. For example, how many answers to your security questions for your bank account can be gathered from your Facebook profile?
Social networking has the potential to bring friends together regardless of distance, just be careful who you invite to the party.
Article Inspiration: CIO.com – Fake ‘Femme Fatale’ Shows Social Network Risks
In a recent blog post on Blue Planet Green Living entitled Computer Recycling – The Downside of Upgrading, Caryn Green discusses many of the hurdles we face as an electronics recycler. She does a good job of highlighting the major issues – overseas dumping, identity theft and data privacy, organized crime elements, and the environmental impact. However, even with all those potential issues, we still run into potential clients that say “I will not pay for electronic recycling!” Read more
Federal prisoners and prison staff members were exposed to toxic levels of heavy metals for years, says a new report from the National Institute of Occupational Safety and Health. Read more
Well, here we are again. A few weeks after Microsoft pushed out a critical patch to all versions of Internet Explorer, Jorge Luis Alvarez Medina, a security consultant with Core Security Technologies provided details of another attack against the beleaguered browser. This time, an attacker “may be able to access files with an already known file name and location.” If that sounds a bit scary, it should. It falls into a class of attacks called “Local File Disclosure” and can be exploited by sending the victim to a malicious site at attempts to access files stored on your computer. The attacks leverage different design features of Internet Explorer that can be combined to do serious damage. Secunia has rated this as “Moderately critical” Read more
In honor of Data Privacy Day (January 28), Cintas published 10 tips for protecting confidential business data. This list is a good starting point to creating your own data security program. I will list the tips below with additional recommendations on each. Many of these tips are written with paper documents in mind, but nearly all apply to digital storage as well. To see the see the original list, see Cintas’ site.
- Implement a document management program. This falls in the category of “identify your treasures.” Make a list of the different types of documents you need to keep – invoices, receipts, contracts, etc. Next determine who needs access to these documents in order to do their job. Identify security measures needed to maintain privacy of the data. Lastly, train all employees on responsible information-handling. Many certifications like PCI and Red Flag require this secure document management training to be compliant. Read more
When you replace your computers, what happens to the data on them? With increased legal scrutiny and identity theft protections, it is important for you to know exactly what happens to the information on your end of life computers. Some companies prefer to keep this responsibility in-house, using tools like Blancco, KillDisk, or dBan. Software drive wiping can take a long time, and if you have a large number of machines to wipe, dedicating an employee to wipe drives can be costly. Read more
Much has been written about the recent hack targeting Google, but somewhat lost in the shuffle is that the attack specifically targets Internet Explorer 6 on Windows 2000 and Windows XP. Based on their analysis of the attack, Microsoft’s Security Research and Defense blog urges users to upgrade to a newer platform or enable DEP (only available on Windows XP Service Pack 2 or later).
In their blog post, Assessing risk of IE 0day vulnerability, Microsoft outlines the potential impact on the main OS and browser combinations.
|Windows 2000||Windows XP||Windows Vista||Windows 7|
|Internet Explorer 6||Exploitable||Exploitable (current exploit effective for code execution)||N/A
(Vista ships with IE7)
(Windows 7 ships with IE 8)
|Internet Explorer 7||N/A
(IE 7 will not install on Windows 2000)
|Potentially exploitable (current exploit does not currently work due to memory layout differences in IE 7)||IE Protected Mode prevents current exploit from working.||N/A
(Windows 7 ships with IE 8)
|Internet Explorer 8||N/A
(IE 8 will not install on Windows 2000)
|DEP enabled by default on XP SP3 prevents exploit from working.||IE Protected Mode + DEP enabled by default prevent exploit from working.||IE Protected Mode + DEP enabled by default prevent exploit from working.|
In spite of this, Microsoft still has no plans to drop support for IE6, leaving it up to the individual to upgrade if they desire. Because of this, there are still many major corporations that have not yet upgraded from this now ancient browser – IE 7 was released over 3 years ago.
Even though this event is likely to not change their behavior, if upgrading the operating system is not an option, they should at least consider deploying Firefox and the awesome extension IE Tab for those times when they just have to use Internet Explorer.
Also – Google doesn’t get a free pass here. How is it that the maker of the most secure browser still has workstations running IE6?
- What Makes EPC a Great Choice for ITAD?August 2, 2019 - 8:30 am
- The Risks of SSDs (and How to Keep Your Data Safe)June 26, 2019 - 2:02 pm
- How to Remove a Google Account (FRP) from an AndroidJune 20, 2019 - 9:33 am
- Why We Charge For RecyclingMay 20, 2019 - 11:46 am
- EPC – Recycling Practices You Can TrustApril 3, 2019 - 12:30 pm