Archive | Uncategorized RSS feed for this section

We (this includes teens) need a safe way to sext, but Snapchat isn’t it

It’s all about the context. If your new photo-sharing app is heralded in, say, GQ or Cosmo, you might be pleased with the headline “Snapchat Makes Sexting Easy.” A site devoted to Internet safety and parenting? Not so much. Snapchat is a relatively new photo-sharing app that allows users to take a photo and share […]

Leave a comment Continue Reading →

Don’t Bother Being Honest in Exit Interviews

Posted 10-07-2012 If your employer couldn’t find the time to ask you what was good or bad about working at the company while you were still working there, why bother withhonesty and potentially burned bridges now? (If they did ask, give them constructive feedback before you leave this job; they deserve it). Read the feature story on HP Input/Output.

Leave a comment Continue Reading →

Woman gets 2.5 years in prison for managing ATM-sucking gang of fraudsters

Posted August 28, 2012 Over $9 million was stolen from cash machines in 280 cities around the world in less than 12 hours, using a mixture of a gang of low-level operatives and high-tech hacking. Read more here.

Leave a comment Continue Reading →

Apple patents clone-making technology to sabotage electronic profiling

June 22, 2012 Apple has filed a patent for making clones of your online identity that will serve up misinformation to data collectors, thus polluting the data stream that feeds electronic profiling. Read.

Leave a comment Continue Reading →

US man confesses to part in $1.3M bank and payroll phishing scam

Posted May 8, 2012 A 31-year-old US man from Atlanta, Georgia, admitted last week that he and his gang stole more than $1.3 million USD by phishing confidential account information from e-commerce sites. Be careful, particularly if you do your banking at a large online bank, because those are now scammers’ favored phishing grounds. The Anti-Phishing […]

Leave a comment Continue Reading →

How to Give a Catastrophe-Free Presentation

Posted on 2012-04-10 To wit: How to prep your important presentation for blown bulbs, laptops left in taxis, projectors that get indigestion over your digital input, and viruses that spasmodically stream porn video. I share several horror stories because I know you love to point and laugh at others’ pain. But you’ll learn useful lessons, too, if you […]

Leave a comment Continue Reading →

How to (Kindly! Gently!) Tell Users That Their IT Problems Are Their Own Fault

Posted on 2012-03-27 It’s not that you mind being called over when their monitors are unplugged. It’s that it’s happened multiple times — to the same users. Herein, I explain how to let users know they’re idiots without a) telling them they’re idiots and b) getting a reputation as a jerk. Yes, it’s possible. Read the […]

Leave a comment Continue Reading →

Mobile phone carriers oppose law requiring warrants for location data

Posted on April 27, 2012 The proposed US bill doesn’t stop the carriers from handing over location data, but it does require that police get a warrant first. So what is CTIA’s problem with it? Read the article. 

Leave a comment Continue Reading →

New US counter-terrorism guidelines can hold data on citizens for years

Posted March 26, 2012 Last week, US counter-terrorism officials were granted permission to increase the period of time they can retain information about citizens, even if those citizens aren’t tied to terrorism. Here’s my writeup. I can only repeat the headline for Wired’s cover story: Watch what you say. BTW, do read the Wired piece […]

Leave a comment Continue Reading →

Detecting phone scammers automatically through keyword and voice tone analysis

Posted March 22, 2012 Fujitsu says it has created a system that can recognise when somebody is being victimized by a phone scammer, by combining voice intonation analysis with keyword recognition. Read the full story on Naked Security. 

Leave a comment Continue Reading →