Hiring someone to do your web development? I pulled together a bunch of interview questions intended to help hiring managers (and businesspeople who are not necessarily techie) find the dream CMS pro.They should help, whether you’re looking to hire somebody to function in out-of-the-box template land or you need a content management system integrated-with-everything-but-the-septic-system kind of specialist. No, [...]
Posted on 2012-04-11 Think security’s too technical to teach to everybody? Think again. That misperception leads to a plague of problems, from USB-introduced viruses, to spending a fortune on fixing products after they’ve shipped. In this, the first in a series on teaching security to the nontechnical, I start with converting the security heathens. Read it [...]
Posted on 2012-04-10 To wit: How to prep your important presentation for blown bulbs, laptops left in taxis, projectors that get indigestion over your digital input, and viruses that spasmodically stream porn video. I share several horror stories because I know you love to point and laugh at others’ pain. But you’ll learn useful lessons, too, if you [...]
Posted on on 2012-04-05 Know the potential for wiggle room, avoid selling yourself short, and pretend that the employer is some hot thing with whom you’re about to get lucky if you know how to work the bargaining/romancing. Read the story.
Posted on 2012-03-27 It’s not that you mind being called over when their monitors are unplugged. It’s that it’s happened multiple times — to the same users. Herein, I explain how to let users know they’re idiots without a) telling them they’re idiots and b) getting a reputation as a jerk. Yes, it’s possible. Read the [...]
Posted on April 27, 2012 The proposed US bill doesn’t stop the carriers from handing over location data, but it does require that police get a warrant first. So what is CTIA’s problem with it? Read the article.
Posted on April 24, 2012 A few thoughts on the “hacktivist” group Anonymous that came out of Josh Corman and Brian “Jericho” Martin’s keynote at the SOURCE security conference in Boston last week. Read the article.
Posted on April 23, 2012 iPhone users are being tricked into buying a phony screen-lock app, which is actually nothing more than a wallpaper. Read the story here.
Posted April 23, 2012 Eight men have been arrested for running a secret online store that sold more than $1 million worth of narcotics. It’s alleged that the gang hid its tracks by operating on the Tor network. Read the full story on Naked Security.
Posted April 17, 2012 Two teenagers have been arrested following a series of prank calls and DoS (denial-of-service) attacks launched against the Anti-Terrorist Hotline. Read the full story.