<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Deemable Tech &#187; hackers</title>
	<atom:link href="/tag/hackers/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>Tech news worth talking about and tech help worth listening to</description>
	<lastBuildDate>Fri, 30 Sep 2016 19:24:05 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.3.28</generator>
	<item>
		<title>#102 We Don’t Need No Stinkin’ Producer</title>
		<link>/2015/11/102-we-dont-need-no-stinkin-producer/</link>
		<comments>/2015/11/102-we-dont-need-no-stinkin-producer/#comments</comments>
		<pubDate>Sat, 07 Nov 2015 22:18:28 +0000</pubDate>
		<dc:creator><![CDATA[Ray Hollister]]></dc:creator>
				<category><![CDATA[Listen]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[CIA]]></category>
		<category><![CDATA[Comcast]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Project Fi]]></category>
		<category><![CDATA[Tsu.co]]></category>

		<guid isPermaLink="false">http://deemable.com/?p=10340</guid>
		<description><![CDATA[<img width="150" height="150" src="/media/2015/11/IMG_6602-e1446948765227-150x150.jpg" class="attachment-thumbnail wp-post-image" alt="Ardis loves his new Nexus 6P on Google Project Fi." style="float:left; margin:0 15px 15px 0;" />It&#8217;s Sean Birch&#8217;s turn to venture through&#160;the Pacific Northwest, so he is out of the studio for this&#160;week and next. (When&#8217;s Ray&#8217;s turn? #justsayin.) But Ray and Tom press on none-the-less. The Deemable Duo&#160;were joined by long-time listener Ardis Meade <a href="/2015/11/102-we-dont-need-no-stinkin-producer/#more-'" class="more-link">more »</a><p class="more-link-p"><a class="more-link" href="/2015/11/102-we-dont-need-no-stinkin-producer/">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<img width="150" height="150" src="/media/2015/11/IMG_6602-e1446948765227-150x150.jpg" class="attachment-thumbnail wp-post-image" alt="Ardis loves his new Nexus 6P on Google Project Fi." style="float:left; margin:0 15px 15px 0;" /><!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html><body><div id="attachment_10345" style="width: 310px" class="wp-caption alignright"><a href="/media/2015/11/IMG_6602-e1446948765227.jpg" class="gallery_colorbox"><img class="size-medium wp-image-10345" src="/media/2015/11/IMG_6602-e1446948765227-300x300.jpg"  alt="Ardis loves his new Nexus 6P on Google Project Fi." width="300" height="300"></a><p class="wp-caption-text">Ardis loves his new Nexus 6P on Google Project Fi.</p></div>
<p>It&rsquo;s Sean Birch&rsquo;s turn to venture through&nbsp;the Pacific Northwest, so he is out of the studio for this&nbsp;week and next. (When&rsquo;s Ray&rsquo;s turn? #justsayin.) But Ray and Tom press on none-the-less. The <a href="//2013/02/episode-29-the-deemable-duo-rises/" target="_blank">Deemable Duo</a>&nbsp;were joined by long-time listener Ardis Meade who showed us his new phone, the Nexus 6P and told us all about his phone carrier, Google Project Fi. Very interesting stuff if you&rsquo;re in the market for a new phone or a new carrier. Stick around after the news for that.</p>
<p>By the way, we don&rsquo;t just have a subreddit page for the fame and the glory. We have it because we want to know what you want us to talk about! We know you&rsquo;re purusing the tech news all week.&nbsp;Go to our subreddit page, <a href="//reddit" target="_blank">reddit.com/r/deemable</a>, and submit a story, and vote other stories up or down.</p>
<p>And make sure to&nbsp;subscribe to the show and leave a review&nbsp;<a title="Subscribe to the Deemable Tech Podcast in iTunes!" href="http://dmbl.co/itunes">on iTunes</a>&nbsp;and&nbsp;<a title="Listen to Deemable Tech on Stitcher" href="http://dmbl.co/stitcher" target="_blank">on Stitcher</a>. The more subscribers we have and reviews we get, the more people will find our show.</p>
<p>If you have a&nbsp;response or&nbsp;comment for the show, give us a call and leave us a voicemail, 1-888-972-9868 or you can send us an email to feedback at deemable dot com.</p>
<p>The Deemable Tech Podcast is brought to you by A Small Orange, Homegrown Hosting. A refreshingly different approach to web hosting. On the web at&nbsp;<a href="http://asmallorange.com/">asmallorange.com</a>.</p>
<!--[if lt IE 9]><script>document.createElement('audio');</script><![endif]-->
<audio class="wp-audio-shortcode" id="audio-10340-1" preload="none" style="width: 100%; visibility: hidden;" controls="controls"><source type="audio/mpeg" src="http://mediad.publicbroadcasting.net/p/wjct/files/201511/DeemableTech_2015-11-06.mp3?_=1"></source><a href="http://mediad.publicbroadcasting.net/p/wjct/files/201511/DeemableTech_2015-11-06.mp3">http://mediad.publicbroadcasting.net/p/wjct/files/201511/DeemableTech_2015-11-06.mp3</a></audio><h1>THE RUN DOWN</h1>
<h3>Turns Out Disney Isn&rsquo;t That Bad After All</h3>
<p><a href="http://gawker.com/teen-stoner-who-reportedly-hacked-cia-head-i-am-pre-1737375743?utm_expid=66866090-62._DVNDEZYQh2S4K00ZSnKcw.0&amp;utm_referrer=https%3A%2F%2Fwww.google.com%2F#_ga=1.120775688.1425775626.1429542769"><span style="font-weight: 400;">CNN reports that one Star Wars superfan with terminal cancer got to screen the film early</span></a><span style="font-weight: 400;">. Daniel Fleetwood is a 32-year-old who lives in Spring, Texas and a Star Wars enthusiast who camped out to see new releases of the films and collected Star Wars paraphernalia. He is also dying of spindle cell sarcoma and is not expected to live to see the official release date of the new Star Wars film Episode VII: The Force Awakens. Hashtag &nbsp;ForceForDaniel promoted by actors Mark Hamill and John Boyega persuaded director J.J. Abrams and Disney studio execs to let Fleetwood view an early edit of the film according to a spokesperson from Disney Studios. </span></p>
<p><span style="font-weight: 400;">The film will be released to the public on December 18th.</span></p>
<h3>Chrome OS And Android OS To&nbsp;Become One</h3>
<p><a href="http://arstechnica.com/gadgets/2015/10/wsj-google-to-merge-chrome-os-into-android-unveil-unified-os-next-year/"><span style="font-weight: 400;">The Wall Street Journal reports</span></a><span style="font-weight: 400;"> that Google is planning to merge ChromeOS and Android OS starting in 2017, with a beta appearing next year. The first Chromebooks came out back in 2011. At the time, the idea that Google would release an OS that wasn?t Android created quite a stir. However Chromebooks soon made inroads thanks to their super-cheap, basic, and lightweight SKUs. Chromebooks have an OS that is essentially the Chrome browser plus a couple of simple add-ons. The Chrome app store has never really taken off, but the OS has delivered on its promises of being lightweight and receiving constant, invisible updates. While Android is also a relatively lightweight OS it works entirely differently from ChromeOS, and its update process is much more laborious. How the two operating systems will merge remains to be seen.</span></p>
<h3>Facebook Kicks More Competition To The Curb</h3>
<p><span style="font-weight: 400;">Facebook, and practically all companies on the web, stay in business from ad revenue. The more you are on the website, the more money they make. Yep, that&rsquo;s right, Facebook is making bank from all those pictures of your kids and stupid quizzes you fill out. </span></p>
<p><span style="font-weight: 400;">Well, another social media network, Tsu.co, decided to share its revenue with the users. The more that people view your content, the more money you make. And you make money off of inviting people to join Tsu.co. You make money off of the posts that the people you invited posted. If that sounds like a pyramid scheme, it&rsquo;s because it basically is.</span></p>
<p><span style="font-weight: 400;">And much like any other new social network that has started since Facebook took dominance, (Instagram, Pinterest, Vine, etc.) Tsu.co is trying to grow by letting its users share posts on Facebook. </span></p>
<p><span style="font-weight: 400;">This worked, right up until Facebook blocked them. Unlike how Facebook made YouTube videos look like crap on Facebook to make its own video platform stand out, Mashable is reporting that </span><a href="http://mashable.com/2015/11/06/facebook-blocks-tsu-co/#8CtVa4h.3uq6"><span style="font-weight: 400;">Facebook went with the nuclear option</span></a><span style="font-weight: 400;">. Users cannot even mention the website on Facebook. If you type Tsu.co into a post or comment, Facebook will not allowed it to be posted.</span></p>
<p><span style="font-weight: 400;">Facebook says it&rsquo;s because users posting links to Tsu.co are engaging in spammy behavior and Tsu.co encourages it. I will say after checking out Tsu.co, it doesn&rsquo;t seem very spammy. It&rsquo;s mostly the same type of posts I see on almost every social network: cats, muscle-heads, news, cats ? you get it. </span></p>
<h3>Don&rsquo;t Buy Things From The Guy In The Back Alley</h3>
<p><a href="http://gizmodo.com/newly-discovered-breed-of-android-malware-is-almost-imp-1740938991"><span style="font-weight: 400;">Gizmodo reports</span></a><span style="font-weight: 400;"> that a security research blog claims that in third-party Android stores, popular apps like Candy Crush, Facebook, Google Now, Twitter, WhatsApp, and more are infected with adware that gives itself root access to a user?s device. It appears that hackers are taking popular apps and repacking them with their own malicious Trojans and uploading them to these other stores. Right now the Trojans do nothing but serve up ads, but with root access much nastier things are possible. So far, no Trojanized apps have been found in the official Google Play store. So as always, people, you sideload apps at your own risk. Playing outside the official sandbox is still the #1 way to get your device infected with malware. Be very certain that you trust an app?s maker before you sideload it.</span></p>
<h3>One More Reason To Hate Comcast</h3>
<p><span style="font-weight: 400;">If you live in Little Rock, Arkansas; Houma, LaPlace and Shreveport, Louisiana; Chattanooga, Greenville, Johnson City/Gray, Tennessee; or Galax, Virginia you&rsquo;re about to have one more reason to hate Comcast. DSLReports says that the lucky customers in those cities will </span><a href="http://www.dslreports.com/shownews/Comcast-Dramatically-Expanding-Usage-Cap-Areas-December-1-135551"><span style="font-weight: 400;">no longer have unlimited Internet on Comcast</span></a><span style="font-weight: 400;">, but instead will have a cap of 300 GB per month starting in December. If you go over, you will be hit with $10 per 50 GB over the limit. </span></p>
<p><span style="font-weight: 400;">Why is Comcast doing this, you ask? They say it is for ?fairness and providing a more flexible policy to our customers? </span></p>
<p><span style="font-weight: 400;">According to the email DSLReports obtained, Comcast believes &ldquo;that 300 GB is more than enough to meet your Internet usage needs.&rdquo;</span></p>
<p><span style="font-weight: 400;">All hope is not lost though. You can still get unlimited Internet from Comcast in those markets. All you have to do is pay $35 more each month for unlimited Internet than you were already paying for unlimited Internet.</span></p>
<h3>Teen Stoners Hack CIA Director&rsquo;s Email. Yeah, It&rsquo;s That Easy</h3>
<p><span style="font-weight: 400;">A pair of teenage hackers who enjoy ?recreational pot smoking? are apparently on a hacking roll, </span><a href="http://gizmodo.com/teen-hackers-strike-again-leak-info-of-government-em-1740871626"><span style="font-weight: 400;">according to Gizmodo</span></a><span style="font-weight: 400;">. Calling themselves CWA, short for ?Crackas With Attitude,? they </span><a href="http://gawker.com/teen-stoner-who-reportedly-hacked-cia-head-i-am-pre-1737375743?utm_expid=66866090-62._DVNDEZYQh2S4K00ZSnKcw.0&amp;utm_referrer=https%3A%2F%2Fwww.google.com%2F#_ga=1.120775688.1425775626.1429542769"><span style="font-weight: 400;">hacked CIA director John Brennan?s AOL email account last month</span></a><span style="font-weight: 400;">. This week they did one better, posting the contact information of 34,000 government employees online, including the phone numbers of FBI agents. So far it appears that all the data leaked is legitimate. </span></p>
<p><span style="font-weight: 400;">The hackers have been communicating at times with the press, often via disposable Twitter accounts. Asked how he felt about hacking the government, one of them told Gawker, ?since only 13 i am pretty hype about it.? He also said he had no problem with being labeled a ?teen stoner?, saying that he felt that ?it just kinda describes us in away.?</span></p></body></html>
]]></content:encoded>
			<wfw:commentRss>/2015/11/102-we-dont-need-no-stinkin-producer/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
<enclosure url="http://mediad.publicbroadcasting.net/p/wjct/files/201511/DeemableTech_2015-11-06.mp3" length="57158140" type="audio/mpeg" />
		</item>
		<item>
		<title>#93 Bro, You&#8217;ve Been Hacked</title>
		<link>/2015/07/93-bro-youve-been-hacked/</link>
		<comments>/2015/07/93-bro-youve-been-hacked/#comments</comments>
		<pubDate>Sun, 26 Jul 2015 20:39:01 +0000</pubDate>
		<dc:creator><![CDATA[Sean Birch]]></dc:creator>
				<category><![CDATA[Listen]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Ashley Madison]]></category>
		<category><![CDATA[drones]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Nest Thermostat]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://deemable.com/?p=10169</guid>
		<description><![CDATA[<img width="150" height="150" src="/media/2015/07/ashleymadison-150x150.jpg" class="attachment-thumbnail wp-post-image" alt="Image credit: Ashley Madison" style="float:left; margin:0 15px 15px 0;" />This week Ray, Tom and Sean discuss the hacking of the adultery-centric site Ashley Madison, drones causing problems for California firefighters, and security flaws in Jeep Cherokees. That and more on this episode of the Deemable Tech podcast. If you&#8217;re <a href="/2015/07/93-bro-youve-been-hacked/#more-'" class="more-link">more »</a><p class="more-link-p"><a class="more-link" href="/2015/07/93-bro-youve-been-hacked/">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<img width="150" height="150" src="/media/2015/07/ashleymadison-150x150.jpg" class="attachment-thumbnail wp-post-image" alt="Image credit: Ashley Madison" style="float:left; margin:0 15px 15px 0;" /><!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html><body><p>This week Ray, Tom and Sean discuss the hacking of the adultery-centric site Ashley Madison, drones causing problems for California firefighters, and security flaws in Jeep Cherokees. That and more on this episode of the Deemable Tech podcast.<span id="more-10169"></span></p>
<p>If you&rsquo;re listening to Deemable Tech on our website, make sure to&nbsp;subscribe to the show <a title="Subscribe to the Deemable Tech Podcast in iTunes!" href="http://dmbl.co/itunes">on iTunes</a>&nbsp;or&nbsp;<a title="Listen to Deemable Tech on Stitcher" href="http://dmbl.co/stitcher" target="_blank">on Stitcher</a>.&nbsp;And, while you&rsquo;re there, leave a review. The more subscribers we have and reviews we get, the more people will find our show.</p>
<p>If you have a&nbsp;response or&nbsp;comment for the show, give us a call and leave us a voicemail, 1-888-972-9868 or you can send us an email to feedback at deemable dot com.</p>
<p>The Deemable Tech Podcast is brought to you by A Small Orange, Homegrown Hosting. A refreshingly different approach to web hosting. On the web at <a href="http://asmallorange.com/">asmallorange.com</a>.</p>
<p><a title="Click here to subscribe to the Deemable Tech podcast on iTunes" href="http://dmbl.co/itunes" rel="attachment wp-att-5275"><img class="alignnone" title="Subscribe to Deemable Tech on iTunes" src="/media/2012/07/subscribe_on_iTunes.jpg" alt="Subscribe to Deemable Tech on iTunes" width="160" height="59"></a>&nbsp;<a href="http://dmbl.co/stitcher" target="_blank"><img class="alignnone wp-image-9769" title="Hear Deemable Tech On Stitcher Radio" src="/media/2015/02/HearUsOnStitcher.png" alt="Hear Deemable Tech On Stitcher Radio" width="183" height="61"></a></p>
<p>Make sure to&nbsp;share Deemable Tech on the forums, <a href="http://facebook.com/Deemable" target="_blank">Facebook</a>, <a href="http://twitter.com/Deemable" target="_blank">Twitter</a>&nbsp;and all over the interwebs.</p>
<p>Thank you to our Redditors&nbsp;who&nbsp;have been helping us decide what stories we talk about on the show. Go to our subreddit page and submit a story, and vote other stories up or down. <a title="Deemable Sub Reddit" href="//reddit" target="_blank">Deemable.com/reddit</a> will take you there. We&rsquo;re also looking for a new admin to help manage and moderate our subreddit page. Submit a text post to our subreddit explaining why you would make a great admin.</p>
<p>If you have a suggestion, or just have a comment for the show. Give us a call and leave us a voicemail, 1-888-972-9868 or you can send us an email to feedback at deemable&nbsp;dot com.</p>
<p>And, don&rsquo;t forget to help us to decide what stories we talk about on the show, go to our subreddit page and submit a story, and vote other stories up or down. <a href="http://www.google.com/url?q=http%3A%2F%2Fdeemable.com%2Freddit&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNFBdyzC8hbWRsh1Un-185M3JttYnQ">deemable.com/reddit</a>&nbsp;will take you there.</p>
<audio class="wp-audio-shortcode" id="audio-10169-2" preload="none" style="width: 100%; visibility: hidden;" controls="controls"><source type="audio/mpeg" src="http://cpa.ds.npr.org/wjct/audio/2015/07/DeemableTech_2015-07-24.mp3?_=2"></source><a href="http://cpa.ds.npr.org/wjct/audio/2015/07/DeemableTech_2015-07-24.mp3">http://cpa.ds.npr.org/wjct/audio/2015/07/DeemableTech_2015-07-24.mp3</a></audio><h1>THIS WEEK&rsquo;S RUNDOWN</h1>
<h3></h3>
<h3><b>Ashley Madison gets hacked</b></h3>
<p>Last week, hackers targeted AshleyMadison.com, an online dating site for married people looking to have an affair, and&nbsp;<a href="http://arstechnica.com/business/2015/07/cheaters-hook-up-site-ashley-madison-makes-account-deletion-confusing/" target="_blank">claimed to have&nbsp;downloaded its complete database of 37 million user profiles</a>. The hackers, who call themselves The Impact Team, are threatening to release all the profiles publicly unless Avid Life Media, the company that owns Ashley Madison, shutters the site permanently along with sister site EstablishedMen.com.</p>
<div id="attachment_10170" style="width: 310px" class="wp-caption aligncenter"><a href="/media/2015/07/ashleymadison.jpg" class="gallery_colorbox"><img class="size-medium wp-image-10170" src="/media/2015/07/ashleymadison-300x169.jpg"  alt="Image credit: Ashley Madison" width="300" height="169"></a><p class="wp-caption-text">Image credit: Ashley Madison</p></div>
<p>The hackers also take issue with Ashley Madison&rsquo;s paid &ldquo;full delete,&rdquo; where the site charges users $19 to full erase their profile. The hackers claim that Ashley Madison does not in fact purge all of their records from their database, even after a full delete has been paid for.</p>
<p>Strangely, as of this podcast, the hackers have released only two of the 37 million profiles. One belongs to a man in Brockton, Massachusetts, the other to a man in Mississauga, Ontario, in Canada.</p>
<h3><b>Stupid, stupid drones</b></h3>
<p><a href="http://gizmodo.com/firefighters-cant-save-people-burning-in-cars-because-o-1718675039?rev=1437224396454" target="_blank">Drones prevent firefighters from putting out a fire on the 15 Freeway in Southern California&rsquo;s Cajon Pass</a>. Cars were stopped on the 15 because of a wildfire and several caught fire. Firefighters were unable to get water to the cars because five drones were hovering over the site. Apparently this has been an ongoing issue with the wildfire that is so bad it&rsquo;s been given a name, North Fire.</p>
<p>Drone operators have been flying around while firefighter helicopters have been trying to do their job. This particular incident was so bad, several people were severely burned, and twenty vehicles were completely destroyed. Two of the drones even pursued the helicopter.</p>
<p>In equally stupid drone news, an 18-year-old decided to attach a gun to a drone and fire the gun. He probably would have been fine if he hadn&rsquo;t also decided to <a href="http://gizmodo.com/the-feds-are-investigating-a-teen-who-weaponized-a-quad-1719265092" target="_blank">video record it and post the video to YouTube</a>. The FAA is investigating the case to see if any federal laws were broken.</p>
<p>This isn&rsquo;t the first time someone has weaponized a drone. In 2013 a company that creates screen protection built a drone, attached a gun to the gimble and shot some video of the <a href="http://io9.com/this-video-of-a-drone-with-a-gun-will-freak-you-the-hel-513442074" target="_blank">Skynet-esque monstrosity shooting soda bottles</a> and cans, and a Samsung Galaxy.</p>
<h3><b>Hackers demonstrate exploit that allows them to remotely control Jeep Cherokee</b></h3>
<p>Wired reports that white hat hackers Charlie Miller and Chris Valasek <a href="http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/">were able to take control of a Jeep Cherokee using the Chrysler Uconnect system installed in the vehicle</a>. The hackers performed their exploit remotely while Wired&rsquo;s journalist was inside. The hacker&rsquo;s code reportedly allows them to control the AC, change the volume of the stereo, control the transmission, disable the brakes, and kill the engine.</p>
<p>The hack comes just as senators Ed Markey and Richard Blumenthal are introducing new legislation that will mandate digital security standards for cars and trucks.</p>
<h3><b>Apple kicks Nest out of bed</b></h3>
<p>Re/Code is reporting that the <a href="http://recode.net/2015/07/23/apple-kicks-nest-thermostats-from-its-shelves-for-now/">Apple Store no longer carries the Nest Thermostat, Nest Protect or Nest Cam</a> online or in its retail stores.</p>
<p>This all happens of course after Google bought Nest last year, and Apple is about to launch the first of its HomeKit automation enabled products. No surprise, around the same time as the Nest Thermostat was taken off the shelves, the Ecobee 3, a wireless thermostat that does work with HomeKit quickly took its place.</p>
<p>Unfortunately, none of this is terribly surprising. Apple sold tons of fitness bands like the Jawbone Up and the Nike FuelBand&hellip; right up until they launched the Apple Watch when they quickly dumped the products off their shelves.</p>
<p>This could be a sign that Nest won&rsquo;t support HomeKit. Which is sad for iPhone users who were looking forward to the day when we could tell Siri to turn the temperature down, like their&nbsp;Android friends can do with Google Now.</p>
<p>&mdash;</p>
<p>If you have a suggestion, or just have a comment for the show. Give us a call and leave us a voicemail, 1-888-972-9868 or you can send us an email to feedback at deemable&nbsp;dot com.</p>
<p>And, don&rsquo;t forget to help us to decide what stories we talk about on the show, go to our subreddit page and submit a story, and vote other stories up or down. <a href="http://www.google.com/url?q=http%3A%2F%2Fdeemable.com%2Freddit&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNFBdyzC8hbWRsh1Un-185M3JttYnQ">deemable.com/reddit</a>&nbsp;will take you there.</p></body></html>
]]></content:encoded>
			<wfw:commentRss>/2015/07/93-bro-youve-been-hacked/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="http://cpa.ds.npr.org/wjct/audio/2015/07/DeemableTech_2015-07-24.mp3" length="30463550" type="audio/mpeg" />
		</item>
		<item>
		<title>Ask Deemable Tech: How Can I Safely Shop Online?</title>
		<link>/2015/07/ask-deemable-tech-how-can-i-safely-shop-online/</link>
		<comments>/2015/07/ask-deemable-tech-how-can-i-safely-shop-online/#comments</comments>
		<pubDate>Thu, 16 Jul 2015 12:47:37 +0000</pubDate>
		<dc:creator><![CDATA[Sean Birch]]></dc:creator>
				<category><![CDATA[Listen]]></category>
		<category><![CDATA[Questions]]></category>
		<category><![CDATA[Radio Segments]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Credit Cards]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[online shopping]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[question]]></category>
		<category><![CDATA[radio segments]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://deemable.com/?p=10146</guid>
		<description><![CDATA[<img width="150" height="150" src="/media/2015/07/credit_cards_flickr-150x150.jpg" class="attachment-thumbnail wp-post-image" alt="Image credit: Sean MacEntee / Flickr" style="float:left; margin:0 15px 15px 0;" />Andrew writes, &#8220;It seems like every week there&#8217;s another scary news story about a big bank or a major company getting hacked. Is there any way to safely shop online, or should I just stay off the internet altogether?&#8221; You&#8217;re <a href="/2015/07/ask-deemable-tech-how-can-i-safely-shop-online/#more-'" class="more-link">more »</a><p class="more-link-p"><a class="more-link" href="/2015/07/ask-deemable-tech-how-can-i-safely-shop-online/">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<img width="150" height="150" src="/media/2015/07/credit_cards_flickr-150x150.jpg" class="attachment-thumbnail wp-post-image" alt="Image credit: Sean MacEntee / Flickr" style="float:left; margin:0 15px 15px 0;" /><!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html><body><p><em><strong>Andrew writes, &ldquo;It seems like every week there&rsquo;s another scary news story about a big bank or a major company getting hacked. Is there any way to safely shop online, or should I just stay off the internet altogether?&rdquo;</strong></em></p>
<audio class="wp-audio-shortcode" id="audio-10146-3" preload="none" style="width: 100%; visibility: hidden;" controls="controls"><source type="audio/mpeg" src="http://cpa.ds.npr.org/wjct/audio/2015/07/adt_20150716_shop_safely_online.mp3?_=3"></source><a href="http://cpa.ds.npr.org/wjct/audio/2015/07/adt_20150716_shop_safely_online.mp3">http://cpa.ds.npr.org/wjct/audio/2015/07/adt_20150716_shop_safely_online.mp3</a></audio><p><span id="more-10146"></span></p>
<p>You&rsquo;re right, Andrew, there have been a few pretty severe hacks of some large corporations recently. Unfortunately, we probably haven&rsquo;t seen the last of them. But here&rsquo;s the thing: staying off the internet probably won&rsquo;t help you at all.</p>
<div id="attachment_10159" style="width: 310px" class="wp-caption alignright"><a href="/media/2015/07/credit_cards_flickr.jpg" class="gallery_colorbox"><img class="size-medium wp-image-10159" src="/media/2015/07/credit_cards_flickr-300x169.jpg"  alt="Image credit: Sean MacEntee / Flickr" width="300" height="169"></a><p class="wp-caption-text">Image credit: Sean MacEntee / Flickr</p></div>
<p>Most of the businesses that have been hacked lately were retail stores, and the people affected were those who had shopped in the stores&rsquo; brick and mortar locations, not online. Hackers found their way into the companies&rsquo; servers, and were able to skim credit card numbers as they were scanned into the database.</p>
<p>Banks similarly store your information in databases that are connected to the internet. While they take security precautions, those defenses are sometimes compromised by hacking groups that have become more organized and sophisticated.</p>
<p>You see, Andrew, you don&rsquo;t even have to be online for businesses or banks to store your information online.</p>
<p>All of this can understandably seem pretty scary. Luckily there are systems in place to protect you if your information is stolen. The Federal Deposit Insurance Corporation, or FDIC, says that customers can only be held responsible for a maximum of $50 for a fraudulent transaction, provided they report it to their bank or credit card company quickly. In fact, most credit card companies will rarely hold someone responsible for any fraudulent charges on their card, as long as they report those charges in a timely manner.</p>
<p>The trick is to keep an eye on your bank account and credit card statements. Be on the lookout for transactions you don&rsquo;t remember making. Remember, the sooner your report a fraudulent transaction, the more likely you are to get all of your money back.</p>
<p>It really is okay to shop online, just as long as you use some common sense. For example, only give your credit card information to reputable online retailers. And make sure you use good, unique passwords.&nbsp;<a href="//2013/05/greg-asks-how-can-i-have-strong-secure-passwords/" target="_blank">Like we&rsquo;ve said before</a>, long passwords of 15 characters or more are best. You should also avoid using easily guessable names or words for passwords. Have&nbsp;different passwords for different websites, especially the important ones like your bank, your favorite online store and your primary email account. We also recommend using a password manager like LastPass or DashLane.</p>
<p>Stay safe, and happy shopping!</p>
<p><em>Photo Credit: &ldquo;<a href="https://www.flickr.com/photos/smemon/12696032183" target="_blank">Credit Cards</a>&rdquo;&nbsp;by&nbsp;<a href="https://www.flickr.com/photos/smemon/" target="_blank">Sean MacEntee</a>&nbsp;is used under <a href="https://creativecommons.org/licenses/by/2.0/" target="_blank">CC BY 2.0.</a></em></p></body></html>
]]></content:encoded>
			<wfw:commentRss>/2015/07/ask-deemable-tech-how-can-i-safely-shop-online/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
<enclosure url="http://cpa.ds.npr.org/wjct/audio/2015/07/adt_20150716_shop_safely_online.mp3" length="3353129" type="audio/mpeg" />
		</item>
		<item>
		<title>#86 The Episode Where We Did Not Run Out of News</title>
		<link>/2015/06/86-the-episode-where-we-did-not-run-out-of-news/</link>
		<comments>/2015/06/86-the-episode-where-we-did-not-run-out-of-news/#comments</comments>
		<pubDate>Fri, 05 Jun 2015 22:19:05 +0000</pubDate>
		<dc:creator><![CDATA[Sean Birch]]></dc:creator>
				<category><![CDATA[Listen]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Amazon]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Federal government]]></category>
		<category><![CDATA[GIFs]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Lego Worlds]]></category>
		<category><![CDATA[Minecraft]]></category>
		<category><![CDATA[NetFlix]]></category>
		<category><![CDATA[Steam]]></category>
		<category><![CDATA[ThinkGeek]]></category>
		<category><![CDATA[Valve]]></category>

		<guid isPermaLink="false">http://deemable.com/?p=10067</guid>
		<description><![CDATA[<img width="150" height="150" src="/media/2015/06/Apple_I_Computer-150x150.jpg" class="attachment-thumbnail wp-post-image" alt="An example of an early Apple I computer on display in the Smithsonian Museum.

Photo credit: Ed Uthman / Flickr" style="float:left; margin:0 15px 15px 0;" />This week, Ray, Tom and Sean discuss the Federal&#160;Office of Personnel Management being hacked, Facebook finally adding support for GIFs, and a woman who didn&#8217;t realize the old computer she was throwing out was really a piece of Apple history <a href="/2015/06/86-the-episode-where-we-did-not-run-out-of-news/#more-'" class="more-link">more »</a><p class="more-link-p"><a class="more-link" href="/2015/06/86-the-episode-where-we-did-not-run-out-of-news/">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<img width="150" height="150" src="/media/2015/06/Apple_I_Computer-150x150.jpg" class="attachment-thumbnail wp-post-image" alt="An example of an early Apple I computer on display in the Smithsonian Museum.

Photo credit: Ed Uthman / Flickr" style="float:left; margin:0 15px 15px 0;" /><!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html><body><p>This week, Ray, Tom and Sean discuss the Federal&nbsp;Office of Personnel Management being hacked, Facebook finally adding support for GIFs, and a woman who didn&rsquo;t realize the old computer she was throwing out was really a piece of Apple history worth $200,000. The guys are also joined by Ryan Thompson of <a href="http://gamesartandmusic.com/" target="_blank">GAAM (Games Arts and Music)</a> to look at some of the week&rsquo;s top video games news, including Lego&rsquo;s new &ldquo;Minecraft killer&rdquo; game, Lego Worlds. All that and a whole lot more on this week&rsquo;s Deemable Tech!</p>
<p>If you&rsquo;re listening to Deemable Tech on our website, would you subscribe to the show <a title="Subscribe to the Deemable Tech Podcast in iTunes!" href="http://dmbl.co/itunes">on iTunes</a>&nbsp;or&nbsp;<a title="Listen to Deemable Tech on Stitcher" href="http://dmbl.co/stitcher" target="_blank">on Stitcher</a>? And, while you&rsquo;re there, would you leave a review and say a few nice things about us? The more subscribers we have and reviews we get, the more people will find our show.</p>
<p>The Deemable Tech Podcast is brought to you by A Small Orange, Homegrown Hosting. A refreshingly different approach to web hosting. On the web at <a href="http://asmallorange.com/">asmallorange.com</a>.</p>
<p><a title="Click here to subscribe to the Deemable Tech podcast on iTunes" href="http://dmbl.co/itunes" rel="attachment wp-att-5275"><img class="alignnone" title="Subscribe to Deemable Tech on iTunes" src="/media/2012/07/subscribe_on_iTunes.jpg" alt="Subscribe to Deemable Tech on iTunes" width="160" height="59"></a><a href="http://dmbl.co/stitcher" target="_blank"><img class="alignnone wp-image-9769" title="Hear Deemable Tech On Stitcher Radio" src="/media/2015/02/HearUsOnStitcher.png" alt="Hear Deemable Tech On Stitcher Radio" width="183" height="61"></a></p>
<p>Make sure to&nbsp;share Deemable Tech on the forums, <a href="http://facebook.com/Deemable" target="_blank">Facebook</a>, <a href="http://twitter.com/Deemable" target="_blank">Twitter</a>&nbsp;and all over the interwebs.</p>
<p>Thank you to our Redditors&nbsp;who&nbsp;have been helping us decide what stories we talk about on the show. Go to our subreddit page and submit a story, and vote other stories up or down. <a title="Deemable Sub Reddit" href="//reddit" target="_blank">Deemable.com/reddit</a> will take you there. We&rsquo;re also looking for a new admin to help manage and moderate our subreddit page. Submit a text post to our subreddit explaining why you would make a great admin.</p>
<audio class="wp-audio-shortcode" id="audio-10067-4" preload="none" style="width: 100%; visibility: hidden;" controls="controls"><source type="audio/mpeg" src="http://cpa.ds.npr.org/wjct/audio/2015/06/DeemableTech_2015-06-05.mp3?_=4"></source><a href="http://cpa.ds.npr.org/wjct/audio/2015/06/DeemableTech_2015-06-05.mp3">http://cpa.ds.npr.org/wjct/audio/2015/06/DeemableTech_2015-06-05.mp3</a></audio><h1>THIS WEEK&rsquo;S RUN DOWN</h1>
<h3><b>Woman junks $200,000 Apple I prototype</b></h3>
<p>Okay, so you&rsquo;re cleaning out the attic and you spot an old computer moldering in the corner, so you decide to cart if off to the electronics recycler. Stop! Is that an Apple I computer? Because if it is, it might be worth as much as $200,000!</p>
<p>Now the chances that you have an Apple I in your attic are slim, because only about 200 were ever made and they weren&rsquo;t commercially available like their predecessor, the Apple II. But a woman in Silicon Valley apparently did have one lying around, as <a href="http://news.wjct.org/post/silicon-valley-recycling-firm-seeks-mystery-apple-i-donor">she showed up last month at a local recycler on dropped one off along with a bunch of junk</a>, saying her husband had died and she was cleaning up.</p>
<p>The recycler is now searching for the woman because it is their policy to split half the proceeds of any sales with donors. Unfortunately, the woman left no information. In fact, when they asked her if she wanted a tax receipt, she said &ldquo;No, I don&rsquo;t need anything.&rdquo;</p>
<div id="attachment_10077" style="width: 410px" class="wp-caption aligncenter"><a href="/media/2015/06/Apple_I_Computer.jpg" class="gallery_colorbox"><img class="wp-image-10077" src="/media/2015/06/Apple_I_Computer-300x182.jpg"  alt="An example of an early Apple I computer on display in the Smithsonian Museum. Photo credit: Ed Uthman / Flickr" width="400" height="243"></a><p class="wp-caption-text">An example of an early Apple I computer on display in the Smithsonian Museum.<br> Photo credit: Ed Uthman / Flickr</p></div>
<h3><b>Science teacher suspended for using cellphone jammer to crack down on cell phones in class</b></h3>
<p>This next news story was submitted by redditor <i>FrakinBeast</i>:</p>
<p><a href="http://www.news4jax.com/news/teacher-suspended-for-jamming-cell-phones/33371066">A Tampa Bay area science teacher has been suspended after he allegedly used a signal jammer to prevent his students from using their cellphones during class</a>. The school board issued instructor Dean Liptak a five day suspension without pay, saying that he might have interfered with people trying to dial 9-1-1. It is not clear where Liptak acquired the jamming device, but they are available online. On its website, the FCC reminds consumers that &ldquo;It is a violation of federal law to use a cell jammer or similar devices that intentionally block, jam, or interfere with authorized radio communications such as cell phones, police radar, GPS, and Wi-Fi.&rdquo;</p>
<p><a href="http://arstechnica.com/tech-policy/2015/06/florida-science-teacher-suspended-for-signal-jamming-students-cell-phones/">This is not Dean Liptak&rsquo;s first run-in with the school board</a>. He is a former professional wrestler and has previously been reprimanded for test questions referencing the velocity of a student thrown against the wall by a teacher, and the mass of a car running over a baby.</p>
<h3><b>Facebook adds GIF support</b></h3>
<p>After years of waiting, you can now share animated GIFs on Facebook! The site finally added <a href="http://www.forbes.com/sites/amitchowdhry/2015/06/01/facebook-starts-supporting-animated-gifs/">support for GIFs</a> this past week, and using it is as easy as posting a link.</p>
<p><img class=" aligncenter" src="http://www.reactiongifs.com/wp-content/uploads/2012/09/orson_wells_Slow-Clap.gif" alt=""></p>
<p>Just like videos from YouTube, you simply copy and paste the link for a GIF into your status update window, wait for it to load, and hit post.</p>
<p>Also like videos, your auto-play settings affect animated GIFs. Depending on how you have those set, GIFs will either automatically start looping or they will show up as a still image with a little white circle that says &ldquo;GIF&rdquo; in the middle which you have to click to play.</p>
<p>We should note that while you can now post animated GIFs using links, you still can&rsquo;t upload them directly from your computer or phone.</p>
<h3><b>Facebook also tests pronunciation tool</b></h3>
<p>In other Facebook news, they have started testing <a href="https://www.yahoo.com/tech/facebook-testing-new-name-pronunciation-advice-116664180304.html">a feature that will let you tell the world how to pronounce your name</a>. On certain profiles, a phonetic pronunciation of the user&rsquo;s name is displayed in their details. You can also click that pronouncer to hear an audio clip of how to say the name.</p>
<p>They are just focusing on English speakers in the US at the moment. It looks like most people who fall into that category have this feature, which you can find in the About tab on your profile. Look under the &ldquo;Details About You&rdquo; menu for the &ldquo;How do you say your name?&rdquo; feature.</p>
<p>You&rsquo;ll see that Facebook offers three suggestions on how they think your first and last names are pronounced, or you can enter your own pronunciation.</p>
<h3><b>Amazon Prime launches same day delivery in 14 cities</b></h3>
<p>Good news for Amazon Prime members living in New York City, Seattle, San Francisco, Tampa Bay, and ten other select cities &ndash; you never have to leave your home again! <a href="http://arstechnica.com/business/2015/05/amazon-prime-launches-free-same-day-shipping-in-14-cities/">Amazon is rolling out free same day delivery in your area</a> for orders of $35 and up. For orders that don&rsquo;t qualify for free same day delivery, it costs $5.99, truly a bargain when it comes to avoiding the unwashed masses! In fact, even if you live in one of the chosen fourteen cities you may not qualify for same day delivery, depending on <i>where</i> in town you are. <a href="http://www.amazon.com/b?ie=UTF8&amp;node=8729023011">Amazon has a zip code search page</a> where you can check your eligibility.</p>
<p>Amazon has been rumored to be working on same day delivery for years. Expect these fourteen cities to just be the tip of the iceberg.</p>
<h3><b>IRS and OPM hacked</b></h3>
<p>The Office of Personnel Management, basically the HR department of the entire Federal government, was hacked this week. According to a letter released by the OPM,<a href="http://www.cbsnews.com/news/officials-administration-hit-by-massive-data-breach/"> almost 4 million current and former federal employees may have been impacted</a>, including yours truly. The source of the hack has not been confirmed yet, but CBS News White House Correspondent Major Garrett is saying all signs point to Chinese hackers.</p>
<p>As a former IRS employee, Ray is terriefied. The Office of Personnel Management has more personally identifiable information on him than his wife and his mother combined.</p>
<h3><b>Netflix probably not planning to ruin everything</b></h3>
<p>This week some <a href="http://mashable.com/2015/06/01/netflix-not-getting-ads/">news outlets reported that Netflix was experimenting with pre- and post-credits-roll advertising</a>. This had some folks in an uproar &ndash; was Netflix about to devolve into a Hulu Plus-style cesspit of insidious advertising? Well, probably not. Think less Hulu Plus, more HBO. Netflix says it is experimenting, just experimenting mind you, with showing previews for Netflix&rsquo;s own original series at either the beginning or end of streaming content. If this is in fact the case, this seems fairly innocuous to us and could even be welcome if the previews are well done and well targeted.</p>
<h3><b>How did Vanity Fair keep Caitlyn Jenner a secret?</b></h3>
<p>According to Mashable, Vanity Fair went to great lengths to make sure <a href="http://mashable.com/2015/06/01/caitlyn-jenner-protected-exclusive/">the story did not leak out</a>. The story and photos were edited on a computer that was air-gapped. All network connections, Wi-Fi and bluetooth connections were disabled, and every night the files were deleted from the computer. The photos were even hand delivered to the printer.</p>
<h3>GameStop to purchase ThinkGeek</h3>
<p>In a surprise turn of events, game retailer GameStop appears to be <a href="http://arstechnica.com/business/2015/06/gamestop-outbids-hot-topic-for-thinkgeek-parent-company-purchase/" target="_blank">buying nerd-themed online retailer ThinkGeek</a>. ThinkGeek was set to be acquired for a cool $122 million by mall retailer HotTopic when GameStop swooped in and topped them with a $140 million offer. The acquisition will allow GameStop to display ThinkGeek merchandise in its stores, a move which has obvious synergies.</p>
<h3><b>Valve begins offering refunds for all Steam games</b></h3>
<p>Valve, the company behind the popular Steam PC game store and download client, announced this week that it is <a href="http://arstechnica.com/gaming/2015/06/valve-begins-offering-refunds-for-all-steam-games/" target="_blank">changing its refund policy</a>.</p>
<p>It used to be that Valved that only offered refunds for games purchased through Steam in extreme circumstances. Their new policy, however, applies to all games.</p>
<p>&ldquo;Maybe your PC doesn&rsquo;t meet the hardware requirements; maybe you bought a game by mistake; maybe you played the title for an hour and just didn&rsquo;t like it,&rdquo; the policy reads. &ldquo;It doesn&rsquo;t matter. Valve will, upon request via help.steampowered.com, issue a refund for any reason, if the request is made within 14 days of purchase, and the title has been played for less than two hours.&rdquo;</p>
<p>This does not necessarily mean you can try out games for free, though. Steam said they reserve the right to decline a refund if they think a user is abusing the system.&nbsp;BUT they will allow you to return a game right before one of the famous ridiculous sales and then repurchase that game for the newer, lower price.</p>
<h3><b>Lego Worlds Launches</b></h3>
<p><a href="http://lego.gizmodo.com/lego-worlds-is-basically-minecraft-but-with-those-plast-1708195154">TT Games and the Lego Group have made Lego&rsquo;s hotly anticipated &ldquo;Minecraft Killer,&rdquo; Lego Worlds, available as an early access beta on Steam</a>. For under $15 you too can help TT Games and The Lego Group debug their open world plastic brick building paradise. <a href="http://www.engadget.com/2015/06/01/lego-worlds/">Lego Worlds lets players</a> build existing sets, do free-form building and even customize your own mini-figs. Still missing from the game is any form of multiplayer. Possibly Lego is concerned about players sharing certain types of <a href="http://www.exquisitetweets.com/tweets?eids=SOlZp2L8I8.SOl4CsO6YC.SOmhNAiuES.SOmlJ2T2Gq.SOmpjeGn1w.SOmwta15gX.SOmB4207kO.SOmJPgkOFU.SOmOl1j08a.SOmW0jPTRA.SOm72fKFfE.SOncwNl2SP.SOnlkgH05k.SOntnuAhGw.SOqg0uZR8K.SOqkXGJtbU.SOqrXBJruS" target="_blank">anatomically-correct&nbsp;tall buildings</a>.</p>
<p>&mdash;</p>
<p>&nbsp;</p>
<p>If you have a suggestion, or just have a comment for the show. Give us a call and leave us a voicemail, 1-888-972-9868 or you can send us an email to feedback at deemable&nbsp;dot com.</p>
<p>And, don&rsquo;t forget to help us to decide what stories we talk about on the show, go to our subreddit page and submit a story, and vote other stories up or down. <a href="http://www.google.com/url?q=http%3A%2F%2Fdeemable.com%2Freddit&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNFBdyzC8hbWRsh1Un-185M3JttYnQ">deemable.com/reddit</a>&nbsp;will take you there.</p>
<p><em>Photo Credit: <a href="https://www.flickr.com/photos/euthman/281712899/in/photolist-qTRqX-8Yg65f-5VKByX-5LaoaK-cs6BwA-4vMCqL-n9ZpnN-oa2Tf1-atEdpR-5sh5MY-3mDkS3-51zkT3-8TWp2c-5tBAg4-4CckKu-aw8CwB-5GJo64-4Bfxya-96mYuq-hzB1t-5KWjsg-z8z6J-oybqk-729b4-4CeU33-9hHpjg-4BdXk9-5n9at-5E8otF-cJXbXw-4nficR-atvnG7-6QWc7V-pTGr2-5whRwW-PBm9R-5BkosD-4CeU5L-6UQ4Gb-CRZe6-4w9tXh-7x8Cg-4sbJ3S-4BfNv1-4LWkRy-2xnYty-55d1tu-7VR3pU-5yhFqq-5yk9cA" target="_blank">&ldquo;Apple I Computer&rdquo;</a> by <a href="https://www.flickr.com/photos/euthman/" target="_blank">Ed Uthman</a> is used under <a href="https://creativecommons.org/licenses/by-sa/2.0/" target="_blank">CC BY-SA 2.0.</a></em></p></body></html>
]]></content:encoded>
			<wfw:commentRss>/2015/06/86-the-episode-where-we-did-not-run-out-of-news/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="http://cpa.ds.npr.org/wjct/audio/2015/06/DeemableTech_2015-06-05.mp3" length="60105161" type="audio/mpeg" />
		</item>
		<item>
		<title>Nancy asks, &#8220;Can Macs get viruses?&#8221;</title>
		<link>/2014/10/nancy-asks-can-macs-get-viruses/</link>
		<comments>/2014/10/nancy-asks-can-macs-get-viruses/#comments</comments>
		<pubDate>Sun, 19 Oct 2014 00:12:00 +0000</pubDate>
		<dc:creator><![CDATA[Sean Birch]]></dc:creator>
				<category><![CDATA[Listen]]></category>
		<category><![CDATA[Questions]]></category>
		<category><![CDATA[Radio Segments]]></category>
		<category><![CDATA[Anti-virus software]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Mac]]></category>
		<category><![CDATA[Mac OS X]]></category>
		<category><![CDATA[question]]></category>
		<category><![CDATA[radio segments]]></category>

		<guid isPermaLink="false">http://deemable.com/?p=9325</guid>
		<description><![CDATA[<img width="150" height="150" src="/media/2014/10/mac_glow-150x150.jpg" class="attachment-thumbnail wp-post-image" alt="Image credit: Ricky Romero / Flickr" style="float:left; margin:0 15px 15px 0;" />Q: I&#8217;m fairly new to Apple computers, and one of the reasons I made the switch from PC was to avoid viruses, hackers and other bad stuff. Should I install an antivirus program on my Apple laptop? A: If you&#8217;re <a href="/2014/10/nancy-asks-can-macs-get-viruses/#more-'" class="more-link">more »</a><p class="more-link-p"><a class="more-link" href="/2014/10/nancy-asks-can-macs-get-viruses/">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<img width="150" height="150" src="/media/2014/10/mac_glow-150x150.jpg" class="attachment-thumbnail wp-post-image" alt="Image credit: Ricky Romero / Flickr" style="float:left; margin:0 15px 15px 0;" /><!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html><body><p><script id="prx-p132861-embed" src="http://www.prx.org/p/132861/embed.js?size=small"></script></p>
<p><strong>Q: </strong>I&rsquo;m fairly new to Apple computers, and one of the reasons I made the switch from PC was to avoid viruses, hackers and other bad stuff. Should I install an antivirus program on my Apple laptop?<span id="more-9325"></span></p>
<p><strong>A: </strong>If you&rsquo;re like us, Nancy, you&rsquo;ve probably heard a lot of people say that Macs don&rsquo;t get viruses. While this isn&rsquo;t entirely true, there is a lot to back this claim up. Macs are safer on average, and it has to do with a couple of factors.</p>
<div id="attachment_9326" style="width: 310px" class="wp-caption alignright"><a href="/media/2014/10/mac_glow.jpg" class="gallery_colorbox"><img class="size-medium wp-image-9326" src="/media/2014/10/mac_glow-300x210.jpg"  alt="Image credit: Ricky Romero / Flickr" width="300" height="210"></a><p class="wp-caption-text">Image credit: Ricky Romero / Flickr</p></div>
<p>When hackers write a virus or a piece of malware, their goal is to make money. The most efficient way to make money is to get the virus on as many computers as they can. Apple has always had a pretty low market share in the world of home computers, usually around 10 percent. So, if you were trying to write a virus, what would make the most sense: writing it for the majority of computers running a version of Windows, or writing it for the small number of Macs?</p>
<p>Also, Mac OS X is based on Unix, which (without getting into all the nerdy technical details) makes it much harder to hack than Windows. However, this does not mean that Macs are unhackable.</p>
<p>You may have heard about the recently-discovered bug called Shellshock, which can let a hacker gain unauthorized access to computers running Mac OS or Linux. Although it impacts very few Mac users, it is just one of several bugs and security vulnerabilities that have been discovered in Mac OS X lately. Apple does a fairly good job of patching these up once they&rsquo;ve been discovered, but it usually takes a little while.</p>
<p>To answer your question, Nancy: we actually wouldn&rsquo;t recommend installing any antivirus software, unless you are using your computer to run a business. This may sound strange considering what we just said about recent bugs, but it has to do with the cost-to-benefit ratio. As we said, the chance of you getting a virus is very low. When you take those odds into account with the cost of antivirus software, and the amount of resources that software takes making the computer slower and less productive, it just doesn&rsquo;t make sense to invest that much into it.</p>
<p>We do recommend, though, that you install antivirus software if you use your computer to run a business, especially if you work in the medical field or if the data on your computer is incredibly sensitive. Avast and Kasperky both make highly rated antivirus software for Mac OS X. Avast is free, and Kasperky starts at $39.95.</p></body></html>
]]></content:encoded>
			<wfw:commentRss>/2014/10/nancy-asks-can-macs-get-viruses/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Deemable Tech Tips: Hacker-Proof Your Phone</title>
		<link>/2014/06/deemable-tech-tips-hacker-proof-phone/</link>
		<comments>/2014/06/deemable-tech-tips-hacker-proof-phone/#comments</comments>
		<pubDate>Sun, 29 Jun 2014 17:00:38 +0000</pubDate>
		<dc:creator><![CDATA[Tom Braun]]></dc:creator>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Tech Tips]]></category>
		<category><![CDATA[Apps]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[June 2014 Radio Special]]></category>
		<category><![CDATA[Location tagging]]></category>
		<category><![CDATA[smartphones]]></category>
		<category><![CDATA[Wi-Fi]]></category>
		<category><![CDATA[WiFi]]></category>

		<guid isPermaLink="false">http://deemable.com/?p=8932</guid>
		<description><![CDATA[<img width="150" height="150" src="/media/2014/06/iphone_5s_fingerprint-150x150.jpg" class="attachment-thumbnail wp-post-image" alt="Image credit: Kelvinsong / Wikimedia" style="float:left; margin:0 15px 15px 0;" />Every once in a while we like to cover something everyone should know, and this time we wanted to talk about securing your personal information &#8211; on your smartphone. If you own a smartphone, you probably keep tons of personal <a href="/2014/06/deemable-tech-tips-hacker-proof-phone/#more-'" class="more-link">more »</a><p class="more-link-p"><a class="more-link" href="/2014/06/deemable-tech-tips-hacker-proof-phone/">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<img width="150" height="150" src="/media/2014/06/iphone_5s_fingerprint-150x150.jpg" class="attachment-thumbnail wp-post-image" alt="Image credit: Kelvinsong / Wikimedia" style="float:left; margin:0 15px 15px 0;" /><!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html><body><p>Every once in a while we like to cover something everyone should know, and this time we wanted to talk about securing your personal information &ndash; on your smartphone.<span id="more-8932"></span></p>
<div id="attachment_8956" style="width: 310px" class="wp-caption alignright"><a href="/media/2014/06/iphone_5s_fingerprint.jpg" class="gallery_colorbox"><img class="size-medium wp-image-8956" src="/media/2014/06/iphone_5s_fingerprint-300x210.jpg"  alt="Image credit: Kelvinsong / Wikimedia" width="300" height="210"></a><p class="wp-caption-text">Image credit: Kelvinsong / Wikimedia</p></div>
<p>If you own a smartphone, you probably keep tons of personal information on it: your address book, emails, passwords, maybe even credit card data. Your phone knows where you work and where you live and who is texting you. It&rsquo;s a gold mine for everyone from phone thieves to advertisers to hackers.</p>
<p>Many smartphone owners would be surprised at how easy it is to learn some basic hacks which allow you to extract data from someone else&rsquo;s smartphone. But there are a few simple steps that they can take to make it much harder.</p>
<p>We want to emphasize that it&rsquo;s probably impossible to completely hacker-proof your phone. If government spies are trying to break into your phone, they are probably going to get in. But you <em>can</em> stop your run of the mill identity thieves.</p>
<h3>Tip #1: Lock your smartphone!</h3>
<p>It&rsquo;s so simple, and yet so effective!&nbsp;Why should someone bother hacking into your phone when they can just pick it up and see everything on it? You need a lockscreen with a password or an unlock pattern or a fingerprint scanner.&nbsp;Using a password is the <em>most</em> secure technique, and the more characters you have to enter, the better. But even a simple pin code or unlock pattern is better than nothing.</p>
<p>Most Android phones support unlock patterns. If you use one, though, you should take one extra step for security: wipe down your phone?s screen frequently! This way a thief can&rsquo;t simply follow the smudged fingerprints on the screen to determine your unlock pattern.</p>
<p>Here&rsquo;s another lock screen tip for those of you with iPhones:&nbsp;by default, iPhones allow you to do a few things without unlocking your phone, like voice dialing and previewing texts. You can disable this, though, and you should.&nbsp;Unless you like the idea of a stranger at the coffee shop reading your texts!</p>
<h3>Tip #3: Don&rsquo;t connect to open Wi-Fi networks!</h3>
<p>Avoid that free coffee shop Wi-Fi if it doesn&rsquo;t have a password!&nbsp;Any device, whether it?s a phone or a tablet or a laptop, which is connected to an open Wi-Fi is a hacker?s dream. With some basic software installed, a hacker can see almost everything anyone on the Wi-Fi network is doing &ndash; sending emails, logging into Facebook, etc.</p>
<p>The good news is, people are wising up to the fact that having unsecured Wi-Fi is not a good idea. Some places still offer it, though. If you don?t have to ask for a password to get in, it?s probably not a good idea to use that Wi-Fi.</p>
<p>Speaking of Wi-Fi: if you got your iPhone from AT&amp;T it has an interesting extra feature.&nbsp;Any time an AT&amp;T iPhone detects a Wi-Fi network called <em>attwifi</em>, it will automatically try to connect to it.&nbsp;That&rsquo;s a problem, to put it bluntly. A hacker could just setup a network, call it <em>attwifi</em>, and wait for people?s phones to automatically connect to it so they can extract information. The good news is, this is a feature you can turn off on your iPhone, and you should. Just open the Settings app, tap Wi-Fi, and tap the check box next to ?Ask to join networks?. And contact AT&amp;T customer support and tell them that you don&rsquo;t approve of them making their customers&rsquo; phones vulnerable in this way.</p>
<h3>Tip #4: Turn off location tagging on your smartphone&rsquo;s camera</h3>
<p>When&nbsp;you&nbsp;take a picture with your smartphone, it adds the GPS coordinates of the place where you&nbsp;took the picture to the image file. Later on, that can help you&nbsp;remember where you&nbsp;took the picture at.&nbsp;That&rsquo;s convenient, but many times when you upload that picture to a website or email it to a friend, the GPS coordinates remain embedded in the file. Anyone who has that picture can figure out where you took it. And if it&rsquo;s your house, well, now they know where you live.&nbsp;And that?s no good.</p>
<p>You can turn this feature off on Android phones, although the details depend on what phone you have. You should be able to find instructions with a Google search.&nbsp;On an iPhone, go&nbsp;to Settings, and then privacy, and then Location services and then you should see an option for the camera. Switch that to off.</p>
<h3>Tip #5: Require a password for purchases</h3>
<p>This&nbsp;is something we&rsquo;ve talked about before, but it?s worth repeating: both Android and iPhone allow you to set a password on the phone that must be entered before you can make purchases on the phone. Stopping kids or others from running up charges on your phone is always a great idea.</p>
<h3>Tip #6: Disable third party cookies</h3>
<p>Everybody likes cookies, right?&nbsp;Well, maybe not if they are cookies on your computer which can allow advertisers to track what websites you visit.&nbsp;For those readers&nbsp;who don?t know, a cookie is a small text file that a website places on your computer or smartphone. They can be used to help websites remember to automatically log you in, which is great. But they can also help advertisers to track you which not everybody likes.</p>
<p>On the iPhone&rsquo;s Safari browser you can stop this. Safari lets you&nbsp;disable &lsquo;third party cookies&rsquo;, which are the kind of cookies that many&nbsp;people don&rsquo;t want, the kind that help advertisers offer targeted ads.&nbsp;Most browsers now offer a &lsquo;DO NOT TRACK&rsquo; option as well. It&rsquo;s a good idea to turn this on. Now here?s the thing, the &lsquo;do not track&rsquo; option is not universally respected. There are some advertisers that will ignore it and track you anyway. But it can?t hurt to have it turned on.</p>
<h3>Tip #7: Wipe your personal data before you return your phone to the store</h3>
<p>Occasionally you may need to take your smartphone somewhere to get it repaired or to swap it for a working model. Before you do this, it&rsquo;s a really good idea to wipe all of your personal data from your phone! What you need to do is reset your phone to factory defaults. Your smartphone should come with instructions on how to do this.&nbsp;Of course you should backup all your personal data before you do this as it WILL be erased!</p>
<p>So these are just a few tips that will help you keep the personal data on your smartphone more secure from thieves, from hackers and even from advertisers. And if nothing else, you should always,&nbsp;<em>always &ndash;</em></p>
<p><strong>LOCK YOUR PHONE.</strong></p></body></html>
]]></content:encoded>
			<wfw:commentRss>/2014/06/deemable-tech-tips-hacker-proof-phone/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Linda writes, &#8220;Help! My computer says someone is using my IP address!&#8221;</title>
		<link>/2014/06/linda-asks-help-computer-says-someone-using-ip-address/</link>
		<comments>/2014/06/linda-asks-help-computer-says-someone-using-ip-address/#comments</comments>
		<pubDate>Sun, 29 Jun 2014 17:00:09 +0000</pubDate>
		<dc:creator><![CDATA[Tom Braun]]></dc:creator>
				<category><![CDATA[Questions]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[IP Address]]></category>
		<category><![CDATA[June 2014 Radio Special]]></category>
		<category><![CDATA[question]]></category>
		<category><![CDATA[wireless router]]></category>

		<guid isPermaLink="false">http://deemable.com/?p=8930</guid>
		<description><![CDATA[<img width="150" height="150" src="/media/2014/06/using_your_ip-150x150.jpg" class="attachment-thumbnail wp-post-image" alt="using_your_ip" style="float:left; margin:0 15px 15px 0;" />Q:&#160;When ever I go on my computer I get a message that someone else is using my IP address. I am terrified. Is someone else pretending to be me? Please help!!!!!! A:&#160;Linda, first of all, don&#8217;t panic: if a hacker <a href="/2014/06/linda-asks-help-computer-says-someone-using-ip-address/#more-'" class="more-link">more »</a><p class="more-link-p"><a class="more-link" href="/2014/06/linda-asks-help-computer-says-someone-using-ip-address/">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<img width="150" height="150" src="/media/2014/06/using_your_ip-150x150.jpg" class="attachment-thumbnail wp-post-image" alt="using_your_ip" style="float:left; margin:0 15px 15px 0;" /><!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html><body><p><strong>Q:</strong>&nbsp;When ever I go on my computer I get a message that someone else is using my IP address. I am terrified. Is someone else pretending to be me? Please help!!!!!!<span id="more-8930"></span></p>
<p><a href="/media/2014/06/using_your_ip.jpg" class="gallery_colorbox"><img class="alignright size-medium wp-image-8954" src="/media/2014/06/using_your_ip-300x180.jpg"  alt="using_your_ip" width="300" height="180"></a><strong>A:</strong>&nbsp;Linda, first of all, don&rsquo;t panic: if a hacker wanted to pretend to be you, they wouldn&rsquo;t steal your IP address. It?s unlikely you are being hacked. What is more likely is that you have two devices on your home network that are conflicting with each other.</p>
<p>Your&nbsp;mysterious IP address thief is much more likely to be a misbehaving wireless printer or mobile device that is using your WiFi network than a hacker. Wireless printers are sometimes the culprit, because some of them have pre-set IP addresses. If the WiFi router hands out that preset address to another computer or device, the router will get confused about who to send data to. Of course it doesn&rsquo;t have to be a printer to blame, it could be anything that is using your Wi-Fi.</p>
<p>Try disconnecting your&nbsp;laptop from the Wi-Fi and then reconnecting. That should cause the router to assign it a clean IP address. Actually it wouldn&rsquo;t be a bad idea to do that for every device connected to the Wi-Fi.</p>
<p>It?s possible, though, that this problem stems from either your&nbsp;laptop or another device on the network having a static IP address set. If that?s the issue you&nbsp;will probably need a technician to come out and look at it, as that starts to get a little bit complicated.</p>
<p>It?s also possible your wireless router is having problems, in which case it will need to be replaced. While that can be a pain, the good news is that you aren&rsquo;t having your identity stolen by hackers!</p></body></html>
]]></content:encoded>
			<wfw:commentRss>/2014/06/linda-asks-help-computer-says-someone-using-ip-address/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>David writes, &#8220;Help! My Twitter account was hacked!&#8221;</title>
		<link>/2013/10/david-writes-help-twitter-account-hacked/</link>
		<comments>/2013/10/david-writes-help-twitter-account-hacked/#comments</comments>
		<pubDate>Thu, 03 Oct 2013 10:40:51 +0000</pubDate>
		<dc:creator><![CDATA[Sean Birch]]></dc:creator>
				<category><![CDATA[How To]]></category>
		<category><![CDATA[Listen]]></category>
		<category><![CDATA[Questions]]></category>
		<category><![CDATA[Radio Segments]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[question]]></category>
		<category><![CDATA[questions]]></category>
		<category><![CDATA[radio segments]]></category>
		<category><![CDATA[Twitter]]></category>

		<guid isPermaLink="false">http://deemable.com/?p=8333</guid>
		<description><![CDATA[<img width="150" height="150" src="/media/2013/10/twitter_hacked-150x150.jpg" class="attachment-thumbnail wp-post-image" alt="twitter_hacked" style="float:left; margin:0 15px 15px 0;" />Q: The other day I received a direct message on Twitter from a colleague of mine that said, &#8216;Is this what you were talking about?&#8217; and a link to a web page. Like a dummy, I clicked the link. It <a href="/2013/10/david-writes-help-twitter-account-hacked/#more-'" class="more-link">more »</a><p class="more-link-p"><a class="more-link" href="/2013/10/david-writes-help-twitter-account-hacked/">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<img width="150" height="150" src="/media/2013/10/twitter_hacked-150x150.jpg" class="attachment-thumbnail wp-post-image" alt="twitter_hacked" style="float:left; margin:0 15px 15px 0;" /><!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html><body><p><script id="prx-p104108-embed" src="http://www.prx.org/p/104108/embed.js?size=small"></script></p>
<p><strong><a href="/media/2013/10/twitter_hacked.jpg" class="gallery_colorbox"><img class="alignright wp-image-8334" alt="twitter_hacked" src="/media/2013/10/twitter_hacked-300x300.jpg"  width="270" height="270"></a>Q:</strong> The other day I received a direct message on Twitter from a colleague of mine that said, &lsquo;Is this what you were talking about?&rsquo; and a link to a web page. Like a dummy, I clicked the link. It took me to some random web page that didn&rsquo;t have anything to do with me. I messaged him back, and he had no idea what I was talking about. Then, I started getting messages from other friends on Twitter asking what I was talking about. Somebody hacked our Twitter accounts! What can we do to fix it?</p>
<p><strong>A:</strong> Ouch! You&rsquo;re not alone though. In fact, Amanda Bynes, Britney Spears, Justin Beiber, Kim Kardashian, Miley Cyrus, Donald Trump, Burger King, Jeep, NBC News, the Associated Press, the New York Times, and even President Obama have all had their Twitter accounts hacked. Anthony Weiner, MTV, BET and Chipotle all lied about their Twitter accounts being hacked, each for their own reasons, but let&rsquo;s not get into all that.</p>
<p>So, how do you fix it? There&rsquo;s a lot to do, but we&rsquo;ll help you get your Twitter account straightened out and secure.</p>
<p>The first things you need to do are log into your Twitter account and change your Twitter password. In case you may have downloaded a virus, you may want to do that from a different computer than the one you normally use. Make sure to pick a strong password, and make sure you change your password in your password management system (like Lastpass, Dashlane or 1Password) too. Also, in case you did download a virus, make sure to update your virus software and run a full scan.</p>
<p>If you can&rsquo;t log into your Twitter account because the hacker changed the password, submit a password reset request. You should receive an email with a link to change your password. If you don&rsquo;t, it&rsquo;s because the hacker also changed the email address associated with your Twitter account. Now you&rsquo;ll have to contact Twitter with a support ticket to get access to your account.</p>
<p>Once you&rsquo;ve gotten into your account and changed your password, you want to revoke the access of any and all third party applications that have permissions on your Twitter account. Go to Settings and click Apps. You should find a list of all of the applications that you and the hackers have given access to your account. You could just revoke the permission of the applications that you don&rsquo;t recognize, but the smartest thing to do is revoke all of them and then add them back one by one.</p>
<p>Now that you&rsquo;re finished revoking your apps&rsquo; access to your Twitter account, start adding them back. You&rsquo;ll need to go into each app and sign into Twitter again. Make sure that you change your password on any apps that have it saved. You will get locked out of Twitter for too many failed attempts to login if you don&rsquo;t.</p>
<p>Finally, be a friend, and make sure to delete the direct messages that your account sent out while it was compromised. Also, make sure to send another direct message letting the person know that if they clicked the link they&rsquo;ll need to get their account straightened out too. You might want to post something publicly on your Twitter feed as well.</p></body></html>
]]></content:encoded>
			<wfw:commentRss>/2013/10/david-writes-help-twitter-account-hacked/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Franklin asks &#8220;How do I make my Gmail login more secure?&#8221;</title>
		<link>/2013/03/franklin-asks-how-do-i-make-my-gmail-login-more-secure/</link>
		<comments>/2013/03/franklin-asks-how-do-i-make-my-gmail-login-more-secure/#comments</comments>
		<pubDate>Sun, 10 Mar 2013 13:00:41 +0000</pubDate>
		<dc:creator><![CDATA[Ray Hollister]]></dc:creator>
				<category><![CDATA[Listen]]></category>
		<category><![CDATA[Radio Segments]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Gmail]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[two-step verification]]></category>

		<guid isPermaLink="false">http://deemable.com/?p=7218</guid>
		<description><![CDATA[What if someone hacked into your email, and stole all of your personal information? Luckily, many sites like Gmail and Facebook offer an extra layer of protection to make sure that you, and only you, can log in to your <a href="/2013/03/franklin-asks-how-do-i-make-my-gmail-login-more-secure/#more-'" class="more-link">more »</a><p class="more-link-p"><a class="more-link" href="/2013/03/franklin-asks-how-do-i-make-my-gmail-login-more-secure/">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html><body><p>What if someone hacked into your email, and stole all of your personal information? Luckily, many sites like Gmail and Facebook offer an extra layer of protection to make sure that you, and only you, can log in to your account. So how can you make your login more secure? The hosts of Deemable Tech, Ray Hollister and Tom Braun, look into two-step verification in this week&rsquo;s Ask Deemable Tech.</p>
<p><script id="prx-p94566-embed" src="http://www.prx.org/p/94566/embed.js?size=full"></script></p>
<p>RAY: Hi, I&rsquo;m Ray Hollister, </p>
<p>TOM: I&rsquo;m Tom Braun, </p>
<p>RAY: and we&rsquo;re the hosts of Deemable Tech. On the show, we answer your questions about computers, tablets, mobile phones and the Internet, like this question: </p>
<p>FRANKLIN asks: My Gmail account was recently broken into by hackers who guessed my password. I have regained access to the account through Google Support and changed my password, but I am concerned that something like this could happen again. Is there any way to increase the security of my online accounts? </p>
<p>RAY: Yes Franklin, you could have stopped the hackers from getting into your Gmail account if you had enabled two-step verification. Many online services are now offering two-step verification, and it&rsquo;s a great idea. The way it works with Gmail is that you provide Gmail with a phone number. Then, if anyone tries to either reset your password or access your account from a new computer or device, Gmail will contact you through either a text or a phone call. They will give you a pin # which must be used in addition to your password to proceed. </p>
<p>With two-step verification, any time you or someone else tries to access your Gmail account from a new computer, phone or tablet, not only do they have to enter the password but they also have to enter the special pin code they send to your phone. You can set up special, single use passwords for apps and devices that don&rsquo;t have the ability to input pin codes.<br>
Two-step verification allows you to greatly enhance the security of your personal accounts. I have enabled it, so if somebody tries to reset my Gmail password, or attempts to login to those accounts from a different computer or phone, I will be immediately notified by text. Meanwhile, they won&rsquo;t be able to log into my account without that all-important pin code. Even if they know my actual password. </p>
<p>Setting up two-step verification for Gmail takes a few minutes, but is well worth your time. Sign into your Google account, go to settings, and under Personal Settings, then under Security there&rsquo;s a link that says &ldquo;Using 2-step verification.&rdquo;<br>
Once you&rsquo;re there it will ask you for a phone number to either send you a text message or call you to give you a pin number for verification. Once you get the pin number, enter it back into your Gmail account. Now you are &lsquo;double verified&rsquo;. </p>
<p>TOM: Facebook has a very similar system under their security settings. They call them &lsquo;login approvals&rsquo;. To turn on login approvals, login to Facebook and click the &lsquo;gear&rsquo; icon in the upper right hand corner of the web page. Then click on &lsquo;Account Settings&rsquo;. Now, on the left side of the screen you should see &lsquo;Security&rsquo; right under &lsquo;General&rsquo;. Click that. On this page you should see the &lsquo;Login Approvals&rsquo; section. Check the box next to it and click &lsquo;save&rsquo;.<br>
You will then be asked to enter a mobile phone number where you can receive text messages. Facebook currently requires this to activate Login Approvals. However once it is activated you can also receive login approval pin codes through the Facebook app on your phone. </p>
<p>RAY: Now, we don&rsquo;t want to make you completely paranoid that hackers are out to get you. But Franklin&rsquo;s story is a sobering reminder that we need to take all the steps we can to protect our most valuable online accounts. And two-step authentication, or &lsquo;login approval&rsquo;, is a great way to add an extra layer of security to your Gmail and Facebook accounts. </p>
<p>TOM: Now we just gave you a lot of directions, so if you want to hear this segment again when you&rsquo;re in front of your computer, go to Deemable.com and click the radio segments link. </p>
<p>RAY: To hear more answers to questions like this one, listen to our show at Deemable dot com, that&rsquo;s D-E E-M A-B-L-E dot com. There you can listen to all of our previous episodes and, of course, subscribe to our podcast. </p>
<p>TOM: If you have a question for Deemable Tech give us a call us at One Eight Eight Eight, Nine Seven Two, Nine Eight Six Eight, or you can send us an email at questions at deemable dot com. </p>
<p>RAY: For Deemable Tech, I&rsquo;m Ray Hollister </p>
<p>TOM: And, I&rsquo;m Tom Braun.</p>
<p><img src="http://s3.amazonaws.com/production.mediajoint.prx.org/public/piece_images/222478/google_two_step_medium.png" title="It takes two, baby!"></p></body></html>
]]></content:encoded>
			<wfw:commentRss>/2013/03/franklin-asks-how-do-i-make-my-gmail-login-more-secure/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Al-Qaeda Gets Caked</title>
		<link>/2011/06/al-qaeda-gets-caked/</link>
		<comments>/2011/06/al-qaeda-gets-caked/#comments</comments>
		<pubDate>Fri, 03 Jun 2011 21:08:50 +0000</pubDate>
		<dc:creator><![CDATA[David Ahn]]></dc:creator>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Humor]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[al qaeda]]></category>
		<category><![CDATA[Bomb]]></category>
		<category><![CDATA[CIA]]></category>
		<category><![CDATA[Cupcake]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Jihad]]></category>
		<category><![CDATA[magazine]]></category>
		<category><![CDATA[MI6]]></category>
		<category><![CDATA[Mission]]></category>
		<category><![CDATA[recipe]]></category>
		<category><![CDATA[terrorist]]></category>

		<guid isPermaLink="false">http://deemable.com/?p=3453</guid>
		<description><![CDATA[Earlier this week, it was revealed to the public that the downloadable al-Qaeda magazine, Inspire, was infiltrated by the UK&#8217;s Government Communications Headquarters and British MI6 intelligence hackers in 2010. The mission, called &#8220;Operation Cupcake&#8221;, replaced a lethal tutorial on <a href="/2011/06/al-qaeda-gets-caked/#more-'" class="more-link">more »</a><p class="more-link-p"><a class="more-link" href="/2011/06/al-qaeda-gets-caked/">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html><body><p><img class="aligncenter" src="http://i.zdnet.com/blogs/killer-bomber-cupcake-mi6-zaw2.png" alt="" width="460" height="250"></p>
<p>Earlier this week, it was revealed to the public that the downloadable al-Qaeda magazine, <em>Inspire,</em> was infiltrated by the UK&rsquo;s Government Communications Headquarters and British MI6 intelligence hackers in 2010. The mission, called &ldquo;Operation Cupcake&rdquo;, replaced a lethal tutorial on ?How to Make a Bomb in the Kitchen of Your Mom? with an encrypted, heart-attack inducing recipe for &ldquo;The Best Cupcakes in America,&rdquo; which came from the Ellen DeGeneres talkshow website.</p>
<p>The 67-page al-Qaeda magazine originally contained articles such as ?What to expect in Jihad,&rdquo; and articles written by Osama bin Laden and his right-hand man Ayman al-Zawahiri. As mentioned before, the al-Qaeda tutorial also included a recipe showing how to make  a   deadly pipe bomb with sugar, match heads, and a miniature  lightbulb      attached to a timer &ndash; all ingredients that could be easily found in  the  home. As the first English-language Jihadist online magazine, the purpose of the propaganda was to attract and recruit al-Qaeda supporters throughout the Arabian Peninsula and even &ldquo;lone-wolf&rdquo; terrorists in the US and UK.</p>
<p>As humorous as the mission sounds, &ldquo;Operation Cupcake&rdquo; was a failure in several ways. The <em>Inspire, </em>run by the extremist preacher Anwar al-Awlaki,  was reissued with the correct bomb recipe only two weeks later, had four additional editions that followed, and the intelligence agencies missed a golden opportunity to alter the ingredients subtly so that al-Qaeda may not have realized that the magazine was on the radar. In response to the operation, user &ldquo;Symbiote&rdquo; <a title="comment" href="http://www.boingboing.net/2011/06/03/mi6-hackers-replace.html#comment-1128635" target="_blank">commented online</a>, &ldquo;Why not replace the bomb recipes with harmless things that look  like they could be bombs, but have no chance of working?  Or perhaps  require large quantities of strange ingredients, to help trace where the  people using the recipe are&hellip; MI6 (if this was them) should be better than this.&rdquo; A similar Pentagon operation was blocked by the CIA last year because  they believed that it would have exposed sources of valuable  information&hellip; and they were right.</p>
<p>Even though today is <a title="Doughnut Day" href="http://www.huffingtonpost.com/2011/06/03/celebrate-national-doughn_n_870861.html" target="_blank">National Doughtnut Day</a>, if you&rsquo;re at least looking to make some delicious Mojito and Rocky Road cupcakes, you know to search for &ldquo;The Best Cupcakes in America&rdquo; by Main Street Cupcakes.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><a title="Photo" href="http://i.zdnet.com/blogs/killer-bomber-cupcake-mi6-zaw2.png" target="_blank">Photo</a> by <a title="Zack" href="http://www.zdnet.com/blog/igeneration/british-mi6-replace-bomb-website-with-cupcake-recipe/10453" target="_blank">Zack Whittaker</a> via <a title="ZDNet" href="http://www.zdnet.com/?tag=header;header-pri" target="_blank">ZDNet</a></p></body></html>
]]></content:encoded>
			<wfw:commentRss>/2011/06/al-qaeda-gets-caked/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
