CFCS Computer Giveaway

Transcription

Your technology helper for almost 40 years.Vol. 115 No. 8(BUSSLINE is the term for the complex multifunctional circuitry on a computer motherboard, aPC’s heart.)Newsletter of the Central Florida Computer Society, Inc. [Non-Profit, 501(c)3]Nov. 2015y-CFCS Computer GiveawayFREE COMPUTERSWITH SOFTWARE TO MEET NEEDSThe Central Florida Computer Society is establishing acomputer donation program!New computers will be donated to organizations or individuals where a charitable need is established. Sufficientsoftware to meet the established need will be included.Computers will be delivered and set up free of charge.A limited number of computers will be available.All decisions as to number of computers, necessary software and charitable need shall be the responsibility ofthe CFCS Board of Directors.All decisions are final!For info email president@cfcs.orgOur next CFCS meetingis on Sunday, November 8:The Main Meeting is at 2:00, Nov. 8: Geeks on Tourwill present a program from their reservoir of computer knowledge. Geeks on Tour is well known for theirweekly educational broadcast about smartphones and tablets,which takes place at 2pm Eastern time on any Sunday, orcheck them out at geeksontour.orgHere is what our president, Jack Pearson, had to say in arecent email about the Geeks:“Meet Jim and Chris Guld, the Geeks on Tour. They areGeeks who will teach about really using your smart mobile technology. They call themselves "Geeks" but theyhave the ability to explain even complex technology invery plain, easy to understand language. You will learnhow they use Smart Phones and Tablets and the manythings they can do to enhance your life. The meeting is not system specific. Demonstrations use both Android and Apple devices. They are going to discuss howto get the most usage from your smart mobile devices,including both phones and tablets, and they will differentiate between the capabilities of iOS operating systembased devices (Apple) and Android. Their presentationwill include the user interfaces, supported apps, internetusage, camera capability and mobile payment systems,The Inside Stories:4. Next Months’ Meetings3. Special Interest Groups3. Future Sunday Speakers4. Erection Notice4. Medical Identity Theft4. Membership Renewal5. CFCS Details6. Android Security Bugs8. 10 Ways to Pretect Yourself from I.D. Theft10. Best Virus? Protection for Macs11. National Security Awareness Month13. Password Generation Hints16. Helpline Listings18. Windows 10: Setting Security Options24. Directions to the monthly general meeting23. Calendar for the next few months

PAGE 2CFCS BUSSLINE NEWSLETTERamong other things. They will also discuss technological advances for these products which are on the horizon. At the conclusion, the speakers will be available toanswer your questions.If you would like to actually see the Geeks onTour(ChrisandJimGuld).Come to CFCS Nov 8th, 2015 Meeting at Seminole Library , 215 Oxford Rd, Cassellberry, FLA1. Seminole Library opens at 1 pm2. We will not have the "Windows Sig" on Nov 8th3. You are welcome to arrive at Meeting anytime after 1pm, the "Geeks on Tour" will be setting up.4. At about 1:15-1:30 pm -We will start our businessbefore the "Geeks on Tour" broadcast (I will be askingmembers to sign up at this meeting to be on slate of officers for 2016.) We need a lot of candidates for 2016Elections, so please plan to Be an Officer in 2016Elections of new 2016 Officers will be held at theSunday Jan 10 General Meeting5. Main Meeting will start at about 2 pm. The "Geekson Tour" will do their live Nationwide WiFi broadcastfrom our Meeting.6. PLEASE PLAN TO ATTEND THE GENERALMETING ON SUNDAY NOV 8th AT SEMINOLELIBRARY LIVE.Thank you for your co-operation on the above matterSee you ThereJACK PEARSON - PRESIDENT CFCSNEXT MONTHS’ MEETINGSDec. 14: Glen Coffield of Smart Guys Computers willmake his annual Holiday visit to our elves society andpresent us with his always potent viewpoint on all thingshappening in our favorite place, the world of tech. Sinceit is Christmas Time, he may even surprise us with a fewgifts, but only if each member who has a pot belly andwhite hair dresses up like Satna Claus! LOLJan. 10: Staples Tech Adviser & Mgr. Everyone wasso impressed with the talk given several months agofrom the two Staples Wizards, that we have asked themNov. 2015back again, pending their corporate approval. Staytuned.Earlier on the same day of each presentation, theWINDOWS Special Interest Group (SIG) meeting isheld. The WinSIG now meets at 1:15 pm, and is hostedby Hewie Poplock, former president of both CFCS andFACUG, and author of Hewie’s Views and Reviews.Hewie, who has led the Central Florida Computer Society WinSIG for over 15 years, will start a little morethan an hour before the CFCS General Meeting.If you use or plan to use Windows, these discussions,demonstrations, and Q&A sessions will be of immensevalue to you. Geared to intermediate level Windows users, tips, tricks, and information on all versions of Windows are discussed. An e-newsletter is sent periodicallywith meeting information and links discussed at the meeting. You need not attend both meetings, but many members do. Non members are always welcome. Sign up forthe free e-newsletter at cfcs.org .Important Note: The WinSIG is now conducted via theInternet, with the usual useful info from Hewie. So either attend the meeting with your fellow club members,or join Hewie online:Meeting Name: WinSIG08NovInvited By: Hewie PoplockTo join the This month's Windows SIG Meeting scheduled topicswill be available later in the week on Hewie.net/winsigIf you have never attended an Adobe Connect meetingbefore:Test your connection: rt/meeting test.htmGet a quick overview: http://www.adobe.com/go/connectpro overviewAdobe, the Adobe logo and Adobe Connect are eithertrademarks or registered trademarks of Adobe SystemsIncorporated in the United States and/or other countries.

Nov. 2015CFCS BUSSLINE NEWSLETTERHewie’s Blog and many useful articles (including themeeting notes ) can be found at http://hewie.net/While you are checking out blogs, don’t forget MikeUngerman’s excellent one at:http://musings-from-mike.blogspot.com/The CFCS website is at http://www.cfcs.org . Be sure tocheck it out for up-to-date information.Bring your questions about Windows or any computerquestions to be fielded by a room full of computer enthusiasts. The questions will be answered during theWindows SIG or during the "Askit Baskit" portion ofthe main meeting. We even have a few lurking Macowners, and when we turn off the lights to better viewthe presentations, you may notice the glow of numerousiPods in the crowd. CFCS was the first to put the ‘YOU’in USER-friendly!OUR OTHER SPECIALINTEREST GROUPS (SIG)The TECH DISCUSSION SIG meets on the fourthTuesday of each month from 7 to 9 pm at Dennys on436 and Oxford Rd. SIG leader is Vice President StanWallner.This SIG is a non-structured, open conversational groupfor CFCS members, that has no specific topic orspeaker, but is simply a round table discussion. It is notan advanced group, but a place for people to come anddiscuss various tech subjects, such as new products andtechnologies, hardware, software, web-related, etc.Bring in articles from magazines, newsletters, unusualproblems/situations that have arisen, questions, etc.Also, new or ailing devices or notebook pc's are welcome, either for "show and tell" or discussion or demoof situations.A screen and projector are available, but not alwaysthere. If you want it to demo something, please E-mail:tech-sig@cfcs.org a day or 2 ahead.Another feature of this SIG is the Tech-SIG YahooGroup mail. We now have 64 people communicatingthrough this, with tips and tricks, "Ask-It Basket" typequestions, etc. Also, a second, on-line VIRTUAL meeting of the TechSIG is being experimented with on thePAGE 3second Tuesday of each month. Co-hosted by MikeUngerman and Stan Wallner, it may attract a long distance audience. Stay tuned to the e-Blast for times anddetails - it is not yet permanently scheduled, but will beannounced in the e-BLAST and on theTech-SIG YahooGroup mail. If you are not on that list and want tobe, please E-mail: tech-sig@cfcs.orgThe iSIG meets on the third Monday of each monthat 7:00 PM at Florida United Safety Council,1505 East Colonial Drive, Orlando FL 32803. Thisbuilding is located across from the Publix on ColonialDrive in the Colonialtown section of downtown Orlando. They have secured WiFi, and vending machinesare available. The iSIG meetings cover the products thatuse the iOS, which includes the iPhone, iPad, andiPod Touch. This is a combined effort of the CentralFlorida Computer Society http:// www.cfcs.org and theFlorida Macintosh Users Group http:// www.flmug.com.Other groups are invited to participate. Attendees areconsumers, developers, consultants, and publishers, whofind common interests and discuss how to handle topicsfrom both the consumer & the developer perspectives.The SIG leader is Sean Kane, Certified Apple TechnicalCoordinator, long-time Mac and iOS user, and a technologist and consultant to The Walt Disney Company.Android SIGThe new Android SIG is held at the Dennys on 436 inCasselberry, on the second Tuesday of each month, at 7pm. Each attendee is asked to prepare a five minute spielabout an Android discovery they have made. Suggestions include favorite apps, how-to-use residents apps,tricks and tips, etc.FUTURE SUNDAYMEETING SPEAKERSYour hard working Board of Directors has not obtaineda speaker for February, so please return the email JackPearson sent out to Tech-SIG asking for speaker suggestions.The board needs to appoint a program chairperson, butso far no one has volunteered to take the position. Perhaps YOU could volunteer for the job. The duties wouldbe to contact potential speakers proposed by any members, and remind said speaker several times before themeeting, so they can prepare and be there at the right

PAGE 4CFCS BUSSLINE NEWSLETTERtime and date.Even if you are not able to serve as Chairperson, everymember is encouraged and empowered to suggest aspeaker, and to ask anyone you happen to meet, to become one. If they seem interested, get their business cardor contact info and email such to your CFCS president,who is the de facto acting Program Chairperson until weget an official one.CFCS 25 Dollar GiveawayThere will be a 25 Giveaway drawing at the next GeneralMeeting. All paid-up members will be eligible to take part.Pay your dues this Sunday, if you haven't already done so.Dues are 25 a year.EACH MEMBER MAY WIN THIS GIVE AWAYONCE DURING YEARJack PearsonERECTION NOTICECFCS Elections will be held in January. See cfcs.org for slate.Notice that we have used the new politically correct spelling,since that is the way it is pronounced in the Middle East(where they don’t actually have elections).Nov. 2015MEMBERSHIP RENEWALMembership renewal invoices will be e-mailed from treasurer@cfcs.org approximately thirty (30) days prior to yourmembership expiration. Invoices will be snail mailed tomembers for whom there is no e-mail address in the membership database and to those members whose e-mail wasreturned to treasurer@cfcs.org for any reason. Please helpus by adding this address to your contacts list and settingyour spam filter to let our message get to your inbox. We donot share your e-mail address with others (We hate thattoo!), but it is necessary for full participation in the Society,including receiving your newsletter.Members will be requested to renew their membership bypaying dues on time. Dues may be paid by cash or check atthe meeting, by PayPal at http://www.cfcs.org/membership/membership.php or by mailing a check to:CFCSAddress: PO Box 520084,Longwood, FL 32752If you do not receive a renewal invoice, lose it or have questions about your dues and or membership status, pleaseinquire at the sign-in table or send an e-mail to: treasurer@cfcs.org.Membership Cards: A new membership postcard with themembership card included for the next year will be distributed at the meeting following your renewal. The Cards willbe mailed to those members who request same by e-mail totreasurer@cfcs.org.Slate of Officers for Jan 10th ElectionThe Rankin FilePresident – Arvin MeyerWhat is Medical Identity Theft?Bob Rankin, bob@rankin.orgVice President – Stan WallnerMedical Identity Theft on the RiseTreasurer - Betty Ann OgusYour credit and bank account balance are not the onlyvaluables that identity thieves are after. As health carecosts have soared, so have incidents of “medical identitytheft” in which crooks steal the credentials that enableone to obtain health care and sell them to other crooks.Here's what you need to know.Secretary - we need you to volunteerDirector – Forrest Cheeksimart guy.s to CFCSeudBe a s myrlayeases atpay yourlated purchYou couldrerteupmoBuy ang computers.Cply by makihsefreeyor Rith the monwseuSmart Guysdess, get frelaptop, or leyou saveMedical identity theft is on the rise. And sadly, it ismuch more difficult to guard against this type of IDtheft, and much harder to clean up the havoc it can create for a victim.The Medical Identity Theft Alliance estimates that over2.3 million Americans have been victims of medical ID(Continued on page 6)

Nov. 2015CFCS BUSSLINE NEWSLETTERPAGE 5Board of DirectorsTHE CENTRAL FLORIDA COMPUTER SOCIETY is a charitable,scientific and educational, nonprofit organization, founded in 1976 andincorporated in 1982 to encourage interest in the operation and developmentof computers through meetings with free exchange of information andeducational endeavors.Newsletter: The CFCS Newsletter 2008 is the official newsletter of theCentral Florida Computer Society, Inc. It is published every month byCFCS for the purpose of keeping members and others informed ofcomputer-related news and activities of the Society. Circulation: 25,000.THE CFCS Mailing Address:CFCSPO Box 520084, Longwood, FL 32752PresidentJack Pearson407-880-7339president@cfcs.orgVice Pres.Stan Bess MacConnell 407-252-5624secretary@cfcs.orgTreasurerBetty Ann Ogustreasurer@cfcs.orgDirector 1Tom Ault251515100*Members are responsible for sending a change-of-address notification(including e-mail) to:membership@cfcs.org.Gifts to CFCS are welcome, and because of the Society's nonprofit taxstatus, are tax deductible.Meetings: CFCS meets each month on the 3rd Sunday at 2:00 p.m. at thelocation described on page 24. Guests and the general public are invitedto attend. Special Interest Groups (SIGs) within the Society meet regularly.See Special Interest Groups listings on pages 6 & 7.CFCS Web site:Director 2Ted Goodwin407-894-1180dir2@cfcs.orgForrest Cheek407/629-4139dir3@cfcs.orgNewsletter EditorRobert Black407-421-4213editor@cfcs.orgPresident EmeritusArvin Meyer407-327-3810presidentemeritus@cfcs.orgSIG ChairKen Larrabee407-365-2660sigs@cfcs.orgChairpersons and CoordinatorsSpecial Interest GroupsAPCUGKen LarrabeeHewie Poplock407-365-2660 sigs@cfcs.orgapcug@cfcs.orgEducation(Open)(e-mail only)education@cfcs.orgFACUGArvin MeyerHardware ManagerHelpline VolunteersArvin MeyerGriff Moore407-327-3810 hardware@cfcs.org(e-mail only) helpline@cfcs.orgMembershipPhotographerDon VanDemarkRobert Blackmembership@cfcs.org407-421-4213) photographer@cfcs.orgProgram CoordinatorHewie Poplock(e-mail only)programs@cfcs.orgReviews (S/W & Books)Mike Ungerman(e-mail only)reviews@cfcs.orgWebmasterCheryl Wilson(e-mail ewsletter CommitteeEditorial: Articles for publication in the CFCS Newsletter should beemailed to the Editor at: editor@cfcs.org. Please use Microsoft Wordformat, Times New Roman font, 12 point, if possible. The deadline forsubmitting articles is the first of each month.Articles by authors other than directors of CFCS and the Newsletter staff donot necessarily reflect the policies or sanction of the Society. Unlessotherwise indicated, articles in the CFCS Newsletter may be reprinted innewsletters of other nonprofit organizations, without permission, providedcredit is given.This issue was created using Microsoft Office2013 Edition. dir1@cfcs.orgDirector 3Membership: CFCS membership includes participation in the Society'sactivities and subscription to this Newsletter.Annual Dues Schedule:Individual . Extra family member . . .Student (Full time) Corporate membership . .*Includes free business card ad407– 247-91652003 and MS PublisherInterested in making a difference?Then volunteer with CFCS! The programsand benefits that members receive would notexist without members also volunteering.There are vacancies for a Program Chair/Coordinator, Education Chair and AdvertisingChair. Please contact Jack Pearson, if youhave any questions, comments, or suggestions. president@cfcs.orgEditor: Robert BlackAssociate Editor:Proofreader: CFCS BoDCFCS Newsletter AdvertisingComputer ready rates, for one time insertion, Electronic Edition:Full Page 200.00 Quarter Page 75.00Half Page 125.00 Business Card 25.00Advertising deadline: the first day of month of issue. Electronic copyisrequired.All ad copy and correspondence should be sent by email to:advertising@cfcs.org*Annual Rates, Paid in Advance, for 12 insertionsFull Page 1200 Quarter Page 450Half Page 750 Business Card 150CFCS is associated with bothInternational & Florida User Group Associations:www.apcug.net

PAGE 6CFCS BUSSLINE NEWSLETTERtheft, and 2014 saw 500,000 more cases than the previous year. That bad news is sure to get much worse. TheMITA’s latest survey was conducted in November, 2014,before the disastrous leak of 80 million patients’ personal health information from Anthem. And just yesterday, I read that an "error" on Amazon's Web Servicesplatform exposed 1.5 million people's private medicalrecords.Criminals can use victims’ birth dates, Social SecurityNumbers, and the ID numbers found on insurance cardsto obtain medical services and prescriptions at hospitals,clinics, and doctors’ offices. While medical providerstoday routinely scan your driver’s license, you may notice that they aren’t very diligent about verifying its authenticity.Nov. 2015are replaced frequently, rendering them useless to fraudsters after a short time. But Social Security numbers andpersonal health information don’t change; a crook canuse them practically forever.There is no way to “freeze” health care credentials as onecan freeze a credit card account. There are no centralizedreporting agencies analogous to Experian, TransUnion,and Equifax that collect health care activity and canmonitor it for suspicious patterns. Health care providersare trained to be helpful to patients, not skeptical of theiridentities.In short, there are very few protections against medicalID theft and little help resolving its consequences. My 10Tips to Avoid Identity Theft will help you safeguardyour personal and financial records.Medical Identity TheftA fake license that wouldn’t fool a liquor store clerk canbe used to rack up thousands of dollars in health carecosts very easily. Insurance cards, generally, don’t bearphotos or signatures. Using stolen medical credentials, acrook may visit multiple hospitals, pharmacies, and doctors to obtain services and drugs – often narcotics.The records of these transactions are added to victims’health care records, and should be visible on your Explanation of Benefits letters, but bogus healthcare transactions often go undetected for months or even years.The MITA’s survey found that the average victim didnot learn of medical ID theft until three months after ithappened, and 30 percent victims could not determinewhen their health care credentials were improperly used.Health care privacy laws force victims to be intenselyinvolved in investigations of medical fraud.Can't Get No SatisfactionIf you’ve ever challenged a hospital bill, you know howhard it can be to prove that you did not authorize or receive the treatment claimed. Only 10 percent of victimsin MITA’s survey indicated they were “completely satisfied” with the resolutions of their cases. About 65 percent of respondents said they ended up paying an average of over 13,000 to resolve disputed claims.MITA estimates that medical ID theft crimes are a 5.6billion industry. Larry Ponemon, head of The PonemonInstitute that conducts MITA’s annual surveys, believesthat “a medical record is considered more valuable thaneverything else" to cybercrooks. Credit cards expire andAside from that, the most important thing you can do toguard against medical ID theft is reactive: read all ofthose “explanation of benefits” letters that come fromyour health care providers and insurance company assoon as they arrive. If you see anything suspicious, donot delay in challenging it.Are you concerned about other forms of identity theft?Your best defense is knowledge and a proactive stance.See my articles Free Credit Reports Online and 10 TIPS:Identity Theft Protection to learn what steps you cantake, both online and offline, to protect yourself.ANDROID SECURITY BUGSBy Ira WilskerSecurity bug could threaten 950 million Android devicesIra Wilsker, Assoc. Professor, Lamar Institute of Technology; technology columnist for The Examiner newspaper www.theexaminer.com; deputy sheriff who specializes in cybercrime, and has lectured internationally incomputer crime and security.In recent weeks, at least two potentially frightening newvulnerabilities have been discovered that could threatenan estimated 95 percent of the one billion devices running the Android operating system. The good news isthat as of this writing, there have been no documentedattacks on Android devices that take advantage of thesetwo security vulnerabilities. The bad news is that nowthat information on these security vulnerabilities hasbeen widely published, as well as presented at the recentBlack Hat hacker and security convention in Las Vegas,

Nov. 2015CFCS BUSSLINE NEWSLETTERit may only be a matter of time until some bad guys startto take advantage of these security vulnerabilities.Google, the progenitor of Android, was promptly madeaware of the vulnerabilities as soon as they were uncovered, and has produced patches and fixes for many of theAndroid devices that have these vulnerabilities. Theproblems is that with the exception of a few models ofNexus smart phones supported directly by Google, it isup to the phone manufacturers or the cell phone carriersto release the upgrades and patches to close these vulnerabilities. At present, none of the major third party security software publishers provide any protection, leavingmany of us vulnerable.One of these newly discovered Android vulnerabilitieswas given the moniker “Stagefright” by its finder,Joshua Drake, vice president of platform research andexploitation at Zimperium. Drake first reported on theStagefright vulnerability in April, disclosing his findingsto Google, which quickly developed and provided security patches to its Android partners. Most of theseGoogle partners who have not yet provided the patchesto their respective customers may not do so for months,if at all; many phone manufacturers and carriers haveexplicitly stopped supporting and patching older Android phones, which are still in use by the millions. Inseveral media interviews, as well as his Black Hat presentation, Drake explained that, “All devices should beassumed to be vulnerable.” As stated in a July 27 Forbesmagazine interview, Drake said that he believes that asmany as 950 million of the one billion Android phonescurrently in use may be vulnerable to the Stagefright vulnerability. Drake went on to say that only older Androidphones running versions of Android below version 2.2will not be potentially affected by this bug.It is important for Android users to understand thatStagefright is not a virus or other form of malware thatcould infect a phone, but is instead a bug, or unexpectedand unforeseen security vulnerability in the Androidsoftware itself. This vulnerability is in the heart of theAndroid software that processes, plays and records multimedia files.According to Drake, the security vulnerability may allowa hacker to illicitly access the targeted device by simplysending an MMS message (text message) or multimediafile. What is especially nefarious about the Stagefrightvulnerability is that it can be taken advantage of by ahacker without any action by the user; the victim doesnot have to open or click on anything in order for thehacker to access a device. It is also theoretically possiblePAGE 7for a hacker to capitalize on this vulnerability when anunsuspecting victim opens a purloined video file on awebsite. Once a hacker has taken advantage of this security gap in Android, he can access the victim’s camera,microphone, and any data or images in the device’s external storage. On some devices the hacker can also gain rootaccess to the inner workings of the device.In order to easily determine if a particular Android deviceis vulnerable to the Stagefright vulnerability, Zimperiumhas released a free “Stagefright Detector App” availablefrom the Google Play Store. A similar detector utility wasjust released by the security software company Lookout,which it simply calls “Stagefright Detector.” While theseutilities will detect the vulnerability, it will still require apatch or other fix from the phone maker or the cell phonecarrier supporting and updating the device.When I first read of this Stagefright vulnerability and theavailability of the detector, I downloaded and installed thedetector. My year old Huawei Ascend Mate 2 phone,which had previously been upgraded by Huawei to Android Lollipop 5.1 (from 4.4), had the Stagefright vulnerability; coincidently, just yesterday (the day before typingthis column), I received a patch from Huawei that, amongother benefits, closed the Stagefright vulnerability on myphone. I reran the Stagefright detector from Zimperium toconfirm the fix, and the vulnerability on my phone hasdefinitely been patched by the recent update.Another Android security vulnerability was disclosed atthe recent Black Hat security convention. Well-knownsecurity company Check Mate disclosed this newly recognized bug, which it named “Certifi-Gate,” which may potentially allow a hacker to take control of a victim’s phoneby utilizing the “Remote Support Tools (RSTs)” softwarethat was installed on the phones by the manufacturers, often at the behest of the cell phone carriers selling thoseparticular phones. Check Mate promptly notified the device makers and cell phone companies of the vulnerability.According to Check Mate, there are millions of phonesand tablets made by Samsung, ZTE, HTC, LG and othermanufacturers that have incorporated this vulnerable“remote support” function software on their phones; according to Google, Nexus phones do not have this particular vulnerability. Using a security method known as digital certificates, hackers can spoof or counterfeit these supposedly secure digital certificates, allowing them the sameaccess to the internals and functions of the phone that hadpreviously only been allowed to legitimate support personnel. Once the hacker has tricked the phone or tablet

PAGE 8CFCS BUSSLINE NEWSLETTERinto accepting a spurious digital security certificates, heor she now has direct access to personal informationstored on the phone and can turn on the microphone toremotely record conversations, track the location of thedevice and its user, and otherwise threaten the securityand privacy of the victim.While the device manufacturers and cell phone carrierswere promptly notified of the vulnerability, it may bemonths, if ever, before they push the patches to thisnewly discovered vulnerability. Users can download afree utility that will show the user if a device is vulnerable to this remote support vulnerability. Written byCheck Mate, the utility “Certifi-Gate Scanner” can bedownloaded directly from the Google Play Store.According to Check Mate, in order for hackers to takeadvantage of this vulnerability, the user must firstdownload and install an application that contains thecode that gives the hacker the access. The Google PlayStore continuously monitors the apps that it makes available, checking them to make sure that they do not contain any malware. Check Mate advises that users to install applications from a trusted source, such as GooglePlay.”With the continual battles among users who seem tolove arguing iOS and iPhones versus Android devices,iPhone users should not gloat over these Android vulnerabilities. At the Black Hat convention in 2013, whichis where many hackers and crackers rub shoulders withsecurity experts, the vulnerabilities of iOS devices, specifically iPhones, was discussed. In one of the presentations, despite the false but widely held belief thatiPhones are immune to attack and are very secure bynature, researchers from the Georgia Institute of Technology were able to inject persistent, undetectable malware into iPhones, iPads and other iOS devices using thelatest generation of the iOS operating system. Using amodified USB charger, nicknamed “Mactans” after atype of black widow spider, the researchers were able tocompromise any current generation Apple device in under a minute.Free in-store diagnostics on your computerFree telephone tech supportLowest price name brand computers in the U.S.A.5% discount for CFCS membersTHREE LOCATIONS: 407-478-82001) near UCF, 2) on 434 near 17/92Details at refreshcomputers.net/10% discount on most non-sale items for CFCS membersNov. 2015Check your smart phone for these vulnerabilities, and donot download apps from any source other than reputablesources such as the Google Play Store or the AmazonApp Store. Do not open any text messages from peoplethat you do not recognize, although text messages canbe spoofed just as e-mails are frequently spoofed. I

the CFCS Board of Directors. All decisions are final! For info email president@cfcs.org Our next CFCS meeting is on Sunday, November 8: The Main Meeting is at 2:00, Nov. 8: Geeks on Tour will present a program from their reservoir of com-puter knowledge. Geeks on Tour is well known for their