Tuesday, March 26, 2013

Speedtest.net - The Global Broadband Speed Test

Speedtest.net - The Global Broadband Speed Test: Are you getting the speed you pay for? Our Promise Index™ and Speedtest.net help keep your ISP honest!

Sunday, March 17, 2013

Social Media, Common Sense, and the Law

Social Media, Common Sense, and the Law: And then, down the road, you discover that this person you’ve been having work-related conversations with is not really your customer but someone who has stolen your client’s identity

Nerd Chick Adventures: Be on lookout for these social media scams � Redding Record Searchlight

Nerd Chick Adventures: Be on lookout for these social media scams � Redding Record Searchlight: Don’t fall victim. Here’s how to identify and avoid the most common social media ploys.

Internet, social media least trusted industries for privacy | Security & Privacy - CNET News

Internet, social media least trusted industries for privacy | Security & Privacy - CNET News: Internet and social media ranked at the bottom on a list of the most trusted industries for privacy, according to the Ponemon Institute.

Twitter Hacks Force Companies to Confront Security on Social Media - NYTimes.com

Twitter Hacks Force Companies to Confront Security on Social Media - NYTimes.com: What happened to Burger King — and, a day later, to Jeep — is every brand manager’s nightmare.

What you 'Like' in Facebook can come back to haunt you - CSO Online - Security and Risk

What you 'Like' in Facebook can come back to haunt you - CSO Online - Security and Risk: "Commercial companies, governmental institutions, or even one's Facebook friends could use software to infer attributes such as intelligence, sexual orientation

Thursday, March 14, 2013

Wednesday, March 13, 2013

Tuesday, March 12, 2013

Scammers’ new target: your cell phone - Jennifer Waters's Consumer Confidential - MarketWatch

Scammers’ new target: your cell phone - Jennifer Waters's Consumer Confidential - MarketWatch: If you’ve got a mobile phone that receives text messages, chances are you’ve been hit with the latest scam from the bad guys: smishing

RSA 2013: Security wonks debate whether China will get the message to stop hacking - SC Magazine

RSA 2013: Security wonks debate whether China will get the message to stop hacking - SC Magazine: The jury is out on whether China will scale down its cyber espionage activity after the country was called out in a well-publicized report on a military hacking unit

HP Launches Big Data Security Products, Threat Research - Security -

HP Launches Big Data Security Products, Threat Research - Security -: HP this week released new big data tools designed to provide businesses with better information security intelligence gathering capabilities, and launched a new information security research group that's been tasked with providing better threat intelligence for HP's own security products.

Changes to cookies on our website - ICO

Changes to cookies on our website - ICO: The aim is to help us collect reliable information to make our website better, while remaining compliant with the rules on cookies and our own guidance.

Changes to cookies on our website - ICO

Changes to cookies on our website - ICO: The aim is to help us collect reliable information to make our website better, while remaining compliant with the rules on cookies and our own guidance.

Thursday, March 7, 2013

Wealth Inequality in America

I thought graphic illustration of the distribution of wealth in America quite shocking. It makes me think of Czarist Russia, before the revolution. Is that where we are heading?
When the middle class are hardly better off than the poor, and the richest people are 300 times better off than the middle class, it becomes blatantly obvious that this situation cannot last. My only questions are:
1) How long will this situation last?
and
2) What is going to be the "last straw" that brings on the revolution?

How Safe Is Your Phone From Hackers | NBC 7 San Diego

How Safe Is Your Phone From Hackers | NBC 7 San Diego:

Phones with popular operating systems may be more susceptible to hackers.