Tricks on your iPad

December 16, 2010

Although this is a blog about data privacy, I ran across this article today. I use an iPad with many of my clients to show presentations or within the office to share documents. Here is an article with some great tips and tricks you can use on your iPad. I am a big fan of the tips about reading .pdf files in iBooks!

Advertisements

Can a Worm Take Down a Nuclear Power Plant?

December 15, 2010

There were recent media reports that a computer worm called the Stuxnet Worm had been released by our government to launch a cyber attack against a nuclear power plant in Iran. The worm, which was transported by using thumb drives and computers that weren’t connected to the internet, targeted the software the operated the plant. After further research, the worm actually spread to many countries and raised concerns about our own national security.

If the Stuxnet Worm or a similar worm were to attack a private business that provides critical infrastructure to the government, it could greatly hamper their ability to provide national security. The emergence of the Stuxnet Worm raises many questions about this new type of warfare. Should an international treaty be drafted? What is the best way for the government to work with the private sector to help protect our critical infrastructure?

You can read the entire report on the CRS website.


Who’s tracking your traffic?

December 6, 2010

Looks like more people might know where you’re spending time on the web than you think… http://ow.ly/3kT9v


Do you use the same password for all your accounts?

February 8, 2010

According to Trusteer, an online security firm, almost 3/4 people reuse their banking passwords on other, less secure sites. This can lead to cyber thiefs stealing your information from a less secure site and using it to crack into your bank account. So be careful and use different passwords!

To read the article, click here.


Online Developers Scammed the iTunes Store

December 9, 2009

It seems as though illegitimacy is everywhere in cyberspace these days. Recently Apple pulled over 1,000 apps developed by the Chinese company Molinker for giving away free versions of their apps in exchange for high ratings. Because ratings are the only way for customers to judge the quality of an app, skewed ratings can mean big bucks for developers. Interestingly enough, Molinker made 1% of all apps for the iPhone and Apple had no problems deleting every app from the store.

To read more about this story, click here.


Change your Gmail, Yahoo, or Hotmail PW IMMEDIATELY!

October 6, 2009

Microsoft recently learned that your e-mail password may have been exposed to a third party site due to a phishing scheme. It is also reported that some passwords on gmail or yahoo mail have been exposed also. All of these sites are recommending that you go in a change your password as soon as possible. I’ve attached the post on Microsoft’s website if you want more information. Just a reminder, it’s advised that you change your passwords every 90 days and at least include 3 of the following: uppercase letters, lowercase letters, numbers, and symbols.

The Microsoft article is linked here.


5 Thoughts on Social Media

September 22, 2009

Brian Solis was in Kansas City last week to discuss the state of social media. Although I wasn’t able to attend, Spiral 16’s Kelly Kearney posted a great recap of the speech on her blog. I really like her final point which talks about social media being a privilege. She writes, “It’s important to interact with people online as you would in person.”

To read Kelly’s blog post, click here.