Profile

Scrapbook photo 1
Scrapbook photo 2
Dave Kal
Lives in Southern ,, USA
647 followers|37,966 views
AboutPostsPhotosVideos

Stream

Dave Kal

Shared publicly  - 
2
Add a comment...

Dave Kal

Shared publicly  - 
 
 
WARNING! A lottery #phishing #scam is flooding inboxes these days. Allegedly from The National Lottery Commission, the bait lures users not only with a link to the official lottery page, but also with what seems to be a legit e-mail address of the chief executive.
View original post
2
Scott Reiboldt's profile photo
 
anybody that falls for these now days deserves to get ripped off IMO
Add a comment...

Dave Kal

Shared publicly  - 
 
Find Out Which Websites are Tracking You Across the Web.

Have you ever wondered where the websites you visit send your information? Well, if you have, read on to find out about this new extension from Mozilla that will tell you how you are tracked across websites.

Editor’s Note: Most websites use cookies of some type, and all online advertisers do, including the advertisers on this site. You’re welcome to block cookies if that’s a worry.

http://www.howtogeek.com/117337/find-out-which-websites-are-tracking-you-across-the-web/

#security
3
1
Dave Kal's profile photoLee Munson's profile photo
 
HTG Explains: Learn How Websites Are Tracking You Online.
http://www.howtogeek.com/115483/htg-explains-learn-how-websites-are-tracking-you-online/
Add a comment...

Dave Kal

Shared publicly  - 
 
 
On June 6, we joined other websites and ISPs in launching the next version of the Internet, IPv6—which is crucial to keep the Internet growing and sustainable. Take a look at this infographic about World IPv6 Launch for a snapshot of why we need IPv6 and where we are in its rollout. 
42 comments on original post
1
1
Lee Munson's profile photo
Add a comment...

Dave Kal

Shared publicly  - 
 
28 Types of Computer Security Threats and Risks.

There are many types of computer security threats in this world. Some are pretty harmful while some are totally harmless although annoying. There are also some which does not do any damage to your computer, but has the capability to empty the numbers in your bank account.

http://www.itscolumn.com/2012/03/28-types-of-computer-security-threats-and-risks/
Blog post at IT Security Column : There are many types of computer security threats in this world. Some are pretty harmful while some are totally harmless although annoying. [..]
3
Add a comment...

Dave Kal

Shared publicly  - 
 
Gmail accounts targeted by 'state-sponsored attackers' using Internet Explorer zero-day vulnerability.

Both Google and Microsoft have put out alerts about an unpatched, zero-day hole in Internet Explorer that didn't get fixed on Patch Tuesday and is actively being exploited in the wild.

http://nakedsecurity.sophos.com/2012/06/15/internet-explorer-zero-day-hijack-gmail-accounts

#security
1
1
Dave Kal's profile photoErik Kim's profile photoGeorge Heindel's profile photo
5 comments
 
There's two main point discussed in the link you provided.  1, when password recovery is successful the 2-step-verification is disabled and 2, the inherent weakness in using a mobile line to receive text and/or voice mail for your 2nd password to access the 2-step-verification.

On point 1, it's not inherently Google's 2-step-v weakness here.  If like the person described in the link used a non Gmail account (no 2-step) or another Gmail but without the 2-step, then that's foolish.  This is the break in security.  Why would anyone want to use 2-step-v but ultimately rely on a non 2-step-v email to recover your password.  User error.

On point 2, I've and along others have known the pathetic so called security features wireless companies has.  It would again be foolish to rely on them for your PRIMARY front line account to receive your 2nd password.  Google Authenticator (properly protected on your Android phone) is the only way to go.  I do suggest using the text/vm usage on the secondary recovery Google account running 2-step-v.  Even if the secondary account gets compromised, it will not affect the primary account.  This will give you time to handle the security breach on the secondary and resecure it.  Do not have secondary account leading back to primary for password recovery.  Have it designed where it's a one way street, primary to secondary only.  Again point 2 is due to user error.

Like I stated, a properly set up Google account have not been compromised yet.  It can be but it is so difficult that you'll probably not be targeted.
Add a comment...
Have him in circles
647 people
Ahmed Elsaka's profile photo
Andy Page (DarkUFO)'s profile photo
Maxim Retunskiy's profile photo
David Tribe's profile photo
Jessica Martins's profile photo
Phil Taylor's profile photo
Gareth Murfin's profile photo
Switz AntivirusUK's profile photo
Sachin Shinde's profile photo

Dave Kal

Shared publicly  - 
 
 
Two more members of the Zeus #malware operation have been identified and held in custody following a complaint by Microsoft.

Yevhen Kulibaba and Yuriy Konovalenko have been added as defendants in one of the largest malware operation to date, according to the company.
View original post
1
Add a comment...

Dave Kal

Shared publicly  - 
 
Anatomy of a bug: latest Firefox 'new tab' feature thumbnails HTTPS pages.

About a week ago, popular IT news site The Register announced a security hole in Firefox.
Under the headline Firefox 'new tab' feature exposes users' secured info: Fix promised, El Reg decried the most recent Firefox release as "unlucky version 13".

http://nakedsecurity.sophos.com/2012/06/29/anatomy-of-a-bug-firefox-new-tab-feature-thumbnails-https-pages

#security
1
Add a comment...

Dave Kal

Shared publicly  - 
 
 
Welcome to the next generation of the #1 ranked antivirus technology!

For 2013, Bitdefender takes #privacy and #security to new levels with Safepay —an exclusive, hacker-proof browser that automatically engages to shield all of your online banking and e-shopping transactions from cyber-criminals.  All the while, Autopilot’s Silent Security makes all the optimal security related decisions with no input from you.

Bitdefender 2013 is LIVE now on our website: http://bit.ly/Bitdefender2013

Feel free to share the good news! 
View original post
1
Scott Reiboldt's profile photoErik Kim's profile photoDave Kal's profile photo
3 comments
 
I try never to use the word 'best' when talking about AV programs, i prefer - whatever works best for you an what you like.
I have used AVG for years now after trying out several other AV programs , including Avast.
Its really up to the individual an what they like, i always suggest trying several out - when dealing with all the free ones - an pick the one you like.
Add a comment...

Dave Kal

Shared publicly  - 
 
 
Mozilla Releases Firefox 13.0.1 http://www.malwareteks.com/news.php?extend.627.11
MalwareTeks: Mozilla Releases Firefox 13.0.1 - Firefox 13.0 updated to 13.0.1
View original post
2
Add a comment...

Dave Kal

Shared publicly  - 
 
Spokeo "people search" site has until next week to cough up $800,000,

Imagine you're trying to find a long lost friend.
Or someone you haven't seen for ages but whom you know will be a soft touch to lend you money.


http://nakedsecurity.sophos.com/2012/06/16/spokeo-people-search-site-has-until-next-week-to-cough-up-800000
1
Add a comment...

Dave Kal

Shared publicly  - 
 
 
Want to enhance your browser experience? Read this before you do.
View original post
4
1
Lee Munson's profile photo
Add a comment...
People
Have him in circles
647 people
Ahmed Elsaka's profile photo
Andy Page (DarkUFO)'s profile photo
Maxim Retunskiy's profile photo
David Tribe's profile photo
Jessica Martins's profile photo
Phil Taylor's profile photo
Gareth Murfin's profile photo
Switz AntivirusUK's profile photo
Sachin Shinde's profile photo
Places
Map of the places this user has livedMap of the places this user has livedMap of the places this user has lived
Currently
Southern ,, USA
Previously
Nashville - Atlanta
Story
Tagline
blogger - computer/internet security
Introduction
I blog on several sites, Multiply and  Blogger mainly,, i have  computer/internet security groups in Multiply and  Facebook.
I use G+ to post security an other info, and to interact with others users thats why i follow others.

I share a lot on computer and internet security , so a lot of my post will be on security items that i find on the web. I also share what i have learned over the years about online/computer security. The more you know the better off you are in most cases.

I am rather slow on the following back process because i am careful. I speak an read English only, i dont translate so some post must be in English. I want to read post first - so some public post are a must - no public post no follow. I dont follow just to end up blocking.

I dont like spammers of any kind an do report an block them.

I do like to plant things, esp flowers, and other things just to watch them grow, my backyard is a wildlife friendly habitat and it usually stays busy.
I work in my yard every weekend.
Basic Information
Gender
Male
Looking for
Friends