Scam of the day – March 3, 2013 – Apple security updates

It is imperative to keep yourself up to date with the latest software security patches.  Security software developers are always a bit behind the developers of new viruses, but once the security software developers have found how to counteract these viruses, it is very important to install these security patches as soon as possible.  Identity thieves take advantage of the fact that many people delay or don’t even bother to install security patches and therefore are even more vulnerable to identity theft that occurs when you unwittingly download tainted software or click on tainted links.  Java, as I have described many times, has been a favorite target for hackers and identity thieves who have exploited vulnerabilities with Java software to make people victims of identity theft.


Here is a link to the latest Apple patch to protect yourself from the most recently discovered Java vulnerabilities for Apple computers.

You can trust this link to provide you with the information you need to protect yourself if you are an Apple user who also uses Java software.  With so many hackings tied to Java, you also may wish to consider disabling Java unless you absolutely need it.

Scam of the day – January 31, 2013 – Apple security dangers

Computer and software companies are constantly updating their security to keep pace with the scammers and identity thieves who are just as constantly searching for vulnerabilities in the systems of your computers, laptops, smart phones, tablets and other devices.  If you do not keep up with maintaining the security features of your devices as current as possible, you are in serious danger of identity theft through illegal access by identity thieves to your computer, smart phone or other devices.  Here at we strive to keep you informed of the latest security steps and patches you should be utilizing.  Apple has just announced that it has found vulnerabilities in its iPhone 3 GS, iPod Touch 4th generation and later and iPad 2 and later.


If you have one of the affected devices, click on the following link to Apple’s instructions for remedying the problems.