Miles Associates LLC

Jim Miles – IT & IT Security Consultant – Web Sites for Growing Organizations

Tag Archives: CIO Mag

4 Facebook Privacy Settings for the New Year

Facebook’s privacy settings are a pain point for many users: From the chaos it’s caused after a privacy breach to the confusing settings after the launch of Timeline in 2011, securing your data and understanding who can see which parts of your profile have never been easy.

While Facebook has taken some considerable missteps, the social network has also made strides in ensuring its privacy settings are more accessible and straight-forward. Most recently, Facebook launched a new set of privacy tools to help you more easily manage who can see what you share.

Here’s a look at those new privacy settings, plus three more you should revisit to ensure you start the New Year off safe and secure.

via 4 Facebook Privacy Settings for the New Year.

Your Complete Guide to Facebook Timeline

Facebook has been rolling out Timeline slowly since December, after first introducing it at its F8 developer conference in September. The project is one of Facebooks most ambitious and significant redesigns to date, as it seeks to become your digital scrapbook with the capability to document your life from birth to present day, and revisit old posts more easily.

While not everyone is on board with Timeline, the switch is inevitable. Heres our complete guide to Facebook Timeline, from making the switch to adjusting your privacy settings, in order to make the transition easier.

via Your Complete Guide to Facebook Timeline.

Keyboard Shortcuts: The Ribbon, Microsoft Word and IE

Here are some lesser-known keyboard shortcuts in Office and Internet Explorer to free you from all that mousing and clicking.

via Keyboard Shortcuts: The Ribbon, Microsoft Word and IE | CIO.

CIO Magazine’s SharePoint Bible

SharePoint Bible: Your Complete Guide to Microsoft’s Collaboration Software

via SharePoint Bible: Your Complete Guide to Microsoft’s Collaboration Software.

The BlackBerry-to-iPhone Switch: Converts Speak

I found this article very interesting in spite of the fact that I am a strictly Windows Mobile guy; my current phone is a Palm Treo Pro.  I have never used either a Blackberry OR an iPhone.  (My day-job company recently forbade users to use Blackberry for email access, citing the privacy dangers of the intermediate mail server).

…in light of a recent study that found that two out of five BlackBerry users are eager to switch from their Research In Motion (RIM) devices to shiny new Apple smartphones, I decided to revisit the iPhone v. BlackBerry war…

The people I hand-selected to appear in this story aren’t smartphone “newbies,” by any means. In fact, most of them have used not only one or two smartphones or BlackBerrys before making the iPhone switch; the majority of these gadgets geeks have employed handfuls of smartphones in the past, making them ideal subjects for this account…

And their experiences can serve to inform others curious about what a switch from BlackBerry to iPhone would mean to them–or vice versa. In addition to the six BlackBerry-to-iPhone converts profiled in this piece, I’ve included the accounts of two gadget-lovers who first swapped their BlackBerrys for iPhones, only to switch back to BlackBerry shortly thereafter.

via CIO Magazine: The BlackBerry-to-iPhone Switch: Converts Speak.

Adobe Admits Users Vulnerable After New Install

Adobe Admits Users Are Vulnerable After Downloading Reader.  From CIO Magazine.

Adobe leaves vulnerable versions of Reader (For example version 9.1) for download on its web site, and the user can only update (to, say 9.1.2) by patching.  But the automatic patching mechanism, for many users, does not run at first execution and may not update Adobe Reader for days or weeks, leaving those users unknowingly vulnerable.  Meanwhile, “Hackers continue to hammer Reader. According to New York-based CA today, there are “a vast number of malicious PDF files in circulation on the Internet,” many of them pitching multiple exploits at Windows users”.

Adobe is reevaluating its practices for updating Reader.

Meet the Laptop You’ll Use in 2015

I have concerns about touch-screen keyboards (but then, I am such a poor typist I wonder why I care? 🙂 )

The rules of notebook design and the components that go inside are being rewritten to make the road a better place to work and play.

“Between now and 2015, we expect to see a series of big changes that will redefine what a notebook is and what it looks like” — Intel

via Meet the Laptop You’ll Use in 2015.

Microsoft Update Removes Rogue Antivirus Program

Microsoft has taken aim at a rogue antivirus program called Internet Antivirus Pro.

The company’s latest update to its Windows Malicious Software Removal Tool, MSRT released Tuesday, adds detection for this dubious program, which masquerades as security software.

via Microsoft Update Removes Rogue Antivirus Program.

Twitter Targeted Again – Worm-Like Phishing Attack –

Watch out for “TwitterCut”…

Twitter users have been tricked into divulging their login and password details to a Web site that then spammed their contacts.

via Twitter Gets Targeted Again By Worm-Like Phishing Attack –

Gumblar-Hacked Sites Install Google-Targeting Malware

May 15, 2009:

A new round of Web sites hijacks is attempting to install malicious, Google-focused software on unpatched PCs, …cementing the drive-by-download approach as a bad-guy tactic of choice.

The attack, dubbed “Gumblar” by ScanSafe, starts by hijacking legitimate sites and inserting attack code. The more than 1,500 hacked sites, including and, don’t represent an especially huge number, but its growing rapidly. Since last week, the attack has grown by 80 percent, according to the company, and has spiked 188 percent since yesterday.

The attack code has largely gone after PDF and Flash flaws discovered in the last year … these particular assaults can be largely neutered by making sure you have the latest versions of the Adobe software.

… The PDF attack approach is more bad news for Adobe, whose programs have become a favorite target of late.

via Gumblar Hacked Sites Install Google-Targeting Malware.  (CIO Magazine)

%d bloggers like this: