July 7, 2012    /    by

What Can We Learn from Malware Monday?

Over the past few weeks, global news outlets have been warning users about Malware Monday and the pending Internet shutdown on July 9, 2012, for computers still infected with the DNSChanger malware. While the issue is certainly real, this blogger believes many headlines were (and still are) too alarmist. Can we learn anything from this?

Over the past few weeks, global news outlets have been warning users about Malware Monday and the pending Internet shutdown on July 9, 2012, for computers still infected with the DNSChanger malware. While the issue is certainly real, this blogger believes many headlines were (and still are) too alarmist.

For example, I view much of this material as “Fear, Uncertainty and Doubt” (FUD): READ MORE

June 30, 2012    /    by

Vacation WiFi: What Networks Can We Trust?

I was recently on vacation with my family in Ocean City, Maryland. As I powered up my iPad from our fifth floor condo on 136th Street, more than a half dozen wireless networks popped up. I asked myself: Can I use (or trust) any of these? Are they free? Is it worth the risk, if they are?

 I was recently on vacation with my family in Ocean City, Maryland. As I powered up my iPad from our fifth floor condo on 136th Street, more than a half dozen wireless networks popped up.  I asked myself: Can I use (or trust) any of these? Are they free? Is it worth the risk, if they are?

The names were intriguing to me, ranging from Netgear58-5G to Oceanside136 to OceanNet Public Internet ST to Wireless Beach Access.  Some of these networks had locks next to them and others did not.  Clicking on a few of the options, I received a splash screen asking for a credit or debit card numbers. The price for access ranged from $4.99 for one hour to $9.99 for 24 hours to $42.99 for one month (31 days). READ MORE

June 16, 2012    /    by

Favorite Survival Tips for Using Social Media

What's appropriate and what's not regarding the use of social networks? Beyond formal codes of conduct at work, what behaviors and attitudes will likely lead to trouble? What tips can we share from those who have gone before us and learned about the good, the bad and the ugly? What good habits enable a positive experience in the long run? And, what are some examples of social media technology being used in destructive ways that undermine relationships?

  What’s appropriate and what’s not regarding the use of social networks? Beyond formal codes of conduct at work, what behaviors and attitudes will likely lead to trouble? What tips can we share from those who have gone before us and learned about the good, the bad and the ugly?  What good habits enable a positive experience in the long run? And, what are some examples of social media technology being used in destructive ways that undermine relationships?

These are topics that need more attention, in my opinion. READ MORE

June 10, 2012    /    by

Advice Following LinkedIn Hack: Change, Don't Reuse, Your Passwords

Computer experts from around the world are warning users to change passwords immediately following the announcements that millions of passwords from LinkedIn, eHarmony and Lastfm were posted on hacker websites.

Computer experts from around the world are warning users to change passwords immediately following the announcements that millions of passwords from LinkedIn, eHarmony and Lastfm were posted on hacker websites.

The Internet is full of stories about various topics surrounding the breaches as well as articles on how to effectively protect passwords. Here’s an excerpt from a Washington Post article on the password breaches: READ MORE

June 4, 2012    /    by

Front Page Cyber: Stuxnet and Flame have Changed the Discourse

A new era began this weekend in cyberspace. Starting with the New York Times article dated June 1, 2012, which proclaimed: Obama Order Sped Up Wave of CyberAttacks Against Iran, the global discourse regarding cyber attacks has now shifted.

A new era began this weekend in cyberspace. Starting with the New York Times article dated June 1, 2012, which proclaimed: Obama Order Sped Up Wave of CyberAttacks Against Iran, the global discourse regarding cyber attacks has now shifted. 

This NY Times article openly discusses cyberweapons and the efforts that the US Government took to derail the computers that run Iranian nuclear enrichment facilities. Here’s a brief excerpt: READ MORE

May 28, 2012    /    by

How Do Social Networks Get Hacked? A Lulzsec Case Study

How do social networking sites get attacked by hackers? What methods are used? Why are attacks successful? What can be done to improve security on social networks?

How do social networking sites get attacked by hackers? What methods are used?  Why are attacks successful? What can be done to improve security on social networks?

These are just some of the questions that are addressed in a recently-published Hacker Intelligence Report by Imperva. The report’s executive summary offers an intriguing glimpse into the hacktivist world that threatens almost every online service. Here’s an excerpt: READ MORE

May 20, 2012    /    by

Reinventing (or Removing) Cash Registers with new Shopping Security

Ever since I read Megatrends in 1988, Ive been fascinated by predictions about how technology will alter our daily lives in the near-future. One area that is evolving quickly is our shopping experiences both online and offline.

Ever since I read Megatrends in 1988, I’ve been fascinated by predictions about how technology will alter our daily lives in the near-future.  One area that is evolving quickly is our shopping experiences both online and offline.

 What’s next? Get ready for the reinvention of the cash register – with competing visions for how that will happen. What’s fairly certain is that our smartphones, iPads and/or other mobile devices will become an integral part of the new check-out process. READ MORE

May 12, 2012    /    by

How Multitasking Hurts Our Productivity

Most of us always trying to do multiple activities at the same time. But is it really working?

  Most of us are trying to do multiple activities at the same time. But is it really working?

  For example, I like to keep “to do” lists. I get special satisfaction when I complete one action item and the result is that multiple items come off of my list. More often than not, I’m tempted to multitask, especially at work. On top of that, I’m instinctively looking for new tips and shortcuts that can help me gain a further edge in accomplishing my personal and professional goals. READ MORE

May 6, 2012    /    by

Listening to the Noobs on Security - Or Not?

How much attention should cyber pros pay to comments from the "noobs" about technology and security?

How much attention should cyber pros pay to comments from the "noobs" about technology and security?

I started thinking about this topic after reading an intriguing Computerworld article entitled: Dispatch from the technology culture wars: What geeks and noobs need to understand about each other.  In case you’re wondering, a noob is slang for newbie or, as Erin Elgin describes in this piece, “nontechnical people who want gadgets to just work.” READ MORE

April 28, 2012    /    by

Poll: What's Happening With BYOD in Government?

Opinions are all over the map on "Bring Your Own Device" (BYOD) to work. Here are some viewpoints and a poll.

Opinions are all over the map on "Bring Your Own Device" (BYOD) to work. I've heard those who insist that 80% of us will adopt this new approach to mobile devices within a few years. Others believe that the letters BYOD stand for "Bring Your Own Disaster..."

Here are a few viewpoints and a quick poll to gauge your opinion. READ MORE