123 Simples News
|Scams E-Mails and Hoaxes
If you should receive an email headed with FEDX (or Fedex) claiming that they tried to deliver a parcel, or collect a parcel from them, then be warned. The chances are that you are being scammed. It's easy to be tricked into clicking links like this, especially if you are actually waiting for a parcel.
This particular email scam relies on you clicking on the actual link. This email typically starts with:
Order Date: Thursday, 17 January 2013, 11:10 AM
Your parcel has arrived at the post office at January 18. Our courier was unable to deliver the parcel to you.
To receive your parcel, please, go to the nearest office and show this receipt.
GET & PRINT RECEIPT
Best Regards, The FedEx Team.
However, the emails are not from FedEx and the claim that a package has been returned is a lie designed to fool the recipient into opening attached files or clicking links. The attachments do not contain a mailing label. Instead, they contain a malicious .exe file, usually hidden inside a seemingly innocuous .zip file, that can install malware on the user's computer. Alternatively, links in the messages may open compromised websites that harbour the malware. Typically, this malware can modify the registry on the infected computer, connect to remote servers and download and install additional malware. Wording of the malware emails may vary, although all make reference to a package that could not be delivered.
More details about this scam can be viewed by visiting Hoax Slayer at: http://www.hoax-slayer.com/fake-fedex-invoice-malware.shtml or on the FedEx website: http://www.fedex.com/bs/fraud/virusalert.html
| 0 Comments
|Software & Security
You may have recently seen some of the extensive news coverage, including statements from the United States Department of Homeland Security, regarding a vulnerability in Java. Java is both a language and a platform to run websites and programs used by many computer users, both on the PC and Mac operating systems. This vulnerability leaves millions of computers open to malware attacks and can lure online traffic to virus-infected websites.
This Security Alert addresses security issues CVE-2013-0422 (US-CERT Alert TA13-010A - Oracle Java 7 Security Manager Bypass Vulnerability) and another vulnerability affecting Java running in web browsers. These vulnerabilities are not applicable to Java running on servers, standalone Java desktop applications or embedded Java applications. They also do not affect Oracle server-based software.
The fixes in this Alert include a change to the default Java Security Level setting from "Medium" to "High". With the "High" setting, the user is always prompted before any unsigned Java applet or Java Web Start application is run.
These vulnerabilities may be remotely exploitable without authentication, i.e., they may be exploited over a network without the need for a username and password. To be successfully exploited, an unsuspecting user running an affected release in a browser will need to visit a malicious web page that leverages these vulnerabilities. Successful exploits can impact the availability, integrity, and confidentiality of the user's system.
Due to the severity of these vulnerabilities, the public disclosure of technical details and the reported exploitation of CVE-2013-0422 "in the wild," Oracle strongly recommends that customers apply the updates provided by this Security Alert as soon as possible.
Here is how you can check your installation of Java if using Windows 7:
Go to the Start Globe (lower left corner)
Choose Control Panel
Depending on how you may have your control panel setup you can find Java by -
View by Category > Programs > Java
View by Small Icons > Java
Left click on Java and then choose the Update Tab
On the update tab choose Update Now
The program will check to see if Java is up to date, and if not, it will download the latest version of Java.
When (or if it does need updating) then unless you want the free toolbar from Ask (which the install will suggest you have), then simply untick the box asking you to install the Ask Toolbar
Complete the installation, and you should be good to go and all updated.
| 0 Comments
|Newsletters - General, Newsletters - TechSquad
|123 Simples News
EU Cookie Directive, is your Website Ready?
Effective from 26th May 2012 UK websites will be required to comply with the EU Cookie Directive as outlined on the UK Information Commissionaire’s Office (ICO) website. UK websites will be given up to 12 months to comply with the new Directive. If your website is not in compliance you could be fined up to £500,000.
Under the EU Cookie Directive any cookie deemed as 'non-essential' that is set by your website or through scripts embedded in your webpages will need to be opt-in and would require consent from the visitor before you can set cookies in their browser.
Many websites owners may not realise that their website set cookies, but if you use Google AdSense, Google Analytics or similar then your website will be settings cookies in the browsers of people visiting your website.
More information on the EU Cookie Directive and how to comply with the guidance can be found on the websites below:-
To help website owners comply with the EU Cookie Directive why not contact 123 Simples for further advice and information
If you would like to know which cookies are used on the 123 Simples site, and check if your browser is setup to accept or reject cookies, then follow this link and you can find more information on how to deal with cookies!
| 0 Comments
|123 Simples News
You may probably notice as you navigate around the 123 Simples website, that something is changing. We are having a few moments out to redesign the website with a new look, easier (hopefully easier) to navigate menus, and just having a summer clear-out.
We hope you like the new layout that will be taking shape over the next week or so, and thank you in advance for your patience whilst the new changes are being uploaded. Chat soon
| 0 Comments