June 3, 2013    /    by

States' top cyber challenge remains spear phishing

Yes, spear phishing is hot all over the USA - very hot. In fact, this threat may be #1 on the list.

Last fall, one Huffington Post headline read: “White House Hacked In Cyber Attack That Used Spear-Phishing To Crack Unclassified Network.”

 Earlier this year, the Federal Times led with the article: Feds’ chief cyberthreat: spear phishing attacks. They described it this way: “The weapon of choice for most cyber hackers is a malicious email disguised as a friendly email.” READ MORE

May 27, 2013    /    by

Cyberwear Privacy: How Will Google Glasses and Wearable Technology Transform Society?

For those who worry that individual privacy rights and personal freedoms are already being eroded by the Internet and new technology hold on to your virtual safety belts. Many experts are predicting almost everything will be recorded in public in the near future with wearable tech, whether you like it or not.

For those who worry that individual privacy rights and personal freedoms are already being eroded by the Internet and new technology – hold on to your virtual safety belts. Many experts are predicting almost everything will be recorded in public in the near future with wearable tech, whether you like it or not.

Coming soon – wearable computers (with cameras) that could be as common as Facebook accounts.   READ MORE

May 21, 2013    /    by

The Best Career Advice I Ever Received

For some reason, there seems to be an abundance of career advice floating around social media web pages right now. What are some of these good career tips, and what is the best career advice I ever received?

 For some reason, there seems to be an abundance of career advice floating around social media web pages right now. I’m not sure why, but perhaps it is because college seniors are looking for their first “real professional” job. Or, perhaps the job market is heating up and more people are interviewing or looking for a new role. Or, maybe there are millions of people just looking for some practical advice or words of
wisdom.

 Regardless of the reason, the google search “career advice” now yields over 436 million page results that are full of tips,  tricks, dos and don’ts for getting ahead or making progress or having a vision for the future. READ MORE

May 11, 2013    /    by

Hackers and Mother's Day: Honoring Hacker-Moms

What do hackers and Mother's Day have in common? According to the wealth of cyberspace knowledge that is defined by Wikipedia, a hacker can mean many things...

According to the wealth of cyberspace knowledge that is defined by Wikipedia, a “hacker” can mean many things:

READ MORE

May 4, 2013    /    by

OpUSA: A Promise of Cyber Events to Come?

What will actually happen in (or to) cyberspace on May 7, 2013? Is this the new normal in cyber threats?

What will actually happen in (or to) cyberspace on May 7, 2013?

That is the question that many are asking as they prepare for a promised attack from the hacktivist groups this coming week. According to an announcement in an April 24 Pastebin threat to US and Israeli Governments, “We gonna launch a big attack against The USA Network and we gonna make some Damages.” READ MORE

April 27, 2013    /    by

Fake Tweet? Dealing with the AP Twitter feed hack

There has been a lot of discussion over the past week about Twitter and the power of social media following the breach of the Associated Press (AP) Twitter feed last Tuesday. Bottom line, each of us still needs to decide: Can I trust that tweet?

There has been a lot of discussion over the past week about Twitter and the power of social media following the breach of the Associated Press (AP) Twitter feed last Tuesday.

After the verified AP Twitter feed was hacked, a message was sent out that read, “Breaking: Two explosions in the White House and Barrack Obama is injured.”   READ MORE

April 21, 2013    /    by

After Boston: Relief, Thanks, Questions and Early Lessons

After the unprecedented events of that took place in and around Boston last week, where are we now and where are we going?

After the unprecedented events that took place in and around Boston last week, where are we now and where are we going?

As an American living in Michigan who closely watched the events unfolding from Monday through Saturday, my thoughts and emotions are mixed. READ MORE

April 16, 2013    /    by

BYOD for You: New Guidebook for Employees to Bring Your Own Device

I am excited to announce the release of my new eBook on the hot topic of mobile technology and specifically bringing your own device to work (BYOD).

BYOD for You Book Cover I am excited to announce the release of my new eBook on the hot topic of mobile technology and specifically bringing your own device to work (BYOD). As described yesterday by Sarah Rich in this piece called BYOD Recommendations and Dilemmas, the focus of the book is to provide a guide for employees who use their own smartphone, tablet or other mobile device for both personal and professional tasks.

  The new eBook is called BYOD for You: The Guide to Bring Your Own Device to Work. The specific details on the eBook, as well the introduction, can be found at the “BYOD for You” book website: www.byod4u.com or Facebook.com/byod4u. READ MORE

April 7, 2013    /    by

What if George Washington's rules of decency were adapted for social media?

Recently, my family was discussing lesser known facts about our first President, George Washington. The intriguing conversation centered on George Washingtons 110 Rules of Civility & Decent Behavior in Company and Conversation. How can we apply these rules to online decency today?

Recently, my family was discussing lesser known facts about our first President, George Washington.  The intriguing conversation centered on George Washington’s 110 Rules of Civility & Decent Behavior in Company and Conversation.

If you’re not familiar with this important corner of history, here’s a brief excerpt from the introduction to George Washington’s rules, drawn from Foundations Magazine online: READ MORE

March 31, 2013    /    by

Futurists: In-body computers and higher-stakes for security

What are futurists predicting regarding technology? And for security, what is coming down the road?

The book 1984 was written by George Orwell in the 1940s. Words and concepts such as; “Big Brother, doublethink, thoughtcrime, Newspeak and even Orwellian” come from this famous literary work.  

More than sixty years later, philosophers still argue about what Orwell would say about the Internet, technology in 2013 or our future, if Orwell were alive today. Students continue to read and learn from Orwell and debate questions about security, privacy and monitoring on the Internet today. READ MORE