Monday, March 27, 2017

Apple updates available today (3/27/2017)

 Security updates available from Apple today.

 IOS 10.3 and a few updates for MacOS. Though most media touts ability to find earbuds, security updates are part of today's updates.
 It is best practice to apply security updates.

 For IOS devices the conversion from HFS+ to APFS as the filesystem may be a step in the more secure posture.

Tuesday, March 21, 2017

iCLOUD accounts and passwords stolen??

 News reports today (3/21/2017) that hackers have stolen an unspecified number of iCLOUD account names and passwords. If true, and there are indications the reports are true, the hackers can view, alter and erase any data stored in iCLOUD in addition to remotely wiping any associated idevice.
 It is always best practice to change passphrases on sensitive accounts on a periodic basis. It would be a good time to change iCLOUD passphrases. The hackers threaten action on April 7.

Thursday, March 16, 2017

Microsoft Patch Tuesday

 An important step in Cyber Security is keeping patched. Microsoft normally provides patches on the second Tuesday of each month. Last month (February) the patch cycle was postponed for the first time in a long time. So this month, March 2017, the patch cycle has two months of patches to issue.
Eighteen patches, most Critical. Suggest patching as soon as possible and a reboot to take full effect.

GMAIL Phishing may steal Google login credentials

News recently. A big increase in emails to gmail users delivered via using gmail via web browser. The email has an embedded image in the email that opens to a page identical to the Google login page. Problem is - it is NOT the Google login page. Unsuspecting users that provide their account name and password are providing that information to the scammer.
These attacks look very real, since it is trivial to capture the real web page and provide it to the user.
The graphic presented to the user looks like the graphic in emails when there is an attachment to the email. In this case the graphic is an embedded image with the code to display the Google login page.
The image will have data:text/htyml in the browser bar.
If you have suspicion, exit GMAIL, supply the GMAIL or Google address in the browser bar, login, then delete the suspicious email.

Tuesday, March 14, 2017

Why is my Windows PC slow?

duno

I do think computers run the same speed most of the time. So "running slow" usually means one or more resources are at or near maximum. When you notice "slowness" how to determine which resource(s) are being taxed?

Use Task Manager to determine why. Task Manager is a misnomer as Windows does not have the concept of Task as do other operating systems.

Task Manager can be invoked in several ways. CTRL-ALT-DEL brings up the Task Manager in cases where other attempts may fail due to resource exhaustion. After CTRL-ALT-DEL (press and hold the CTRL, ALT and DEL keys at the same time) you should get a screen with:
Lock
Switch User
Sign Out
Change Password
Task Manager
Cancel
Task Manager can also be invoked with the Search window or right click on the task bar. Once invoked you should see a new window similar to:

The first tab shows the processes on the system and their percentage of maximum. In this case 100% of the CPU is being used. Other resources are Memory, Disk and Network. It is important to note memory and CPU can be 100% used but not taken. The processes that have multiple windows open or instances will have an arrow to expand that selection.

On the Performance tab you will see the window similar to:
at the bottom is a link Open Resource Monitor. Using this link brings up another window:
By having both Task Manager and Resource Monitor open you can investigate the cause of your "slowness". Click on any column to sort in that column.

To return to the point made before of CPU and Memory using or taking 100% of the available.
System cache will use unused memory for filesystem and other caches. Background processes will use any unused CPU cycles. The scheduler monitors these two resources with an attempt to maximize the use of the limited resources.

Once you have determined the processes utilizing the constrained resource you can determine the course of action (if any) you can take to restore the resource usage level to "normal".

In the process of using these tools to determine resource utilization, I hope you get the User Access Control (UAC) popup window to supply an Administrator password.

Cyber Security Presentation 3/2/17