Courtesy of Flickr |
Search this Blog
How To Avoid "Getting Gamed"
By Carl Weiss
In 2012 we wrote about how the public's
"app-etite " for free games and other apps
could bring with it lots of serious consequences. In that article we, (and the radio show from the
same time) we wrote about the dangers of free android apps. Now many gaming app
developers are targeting your kids as well.
Would you give your eight year old a credit card? Of course not. But that is what in essence has happened to
many parents who allowed their children to play “free” game apps online, only
to discover the following month that they had been billed hundreds or even
thousands of dollars.
Chinese Hack Attack!
English: Air Force Flag of the People's Republic of China (Photo credit: Wikipedia) |
By Carl Weiss
“Increasingly, U.S. businesses are speaking out about their serious concerns about sophisticated, targeted theft of confidential business information and proprietary technologies through cyberintrusions emanating from China on an unprecedented scale. The international community cannot tolerate such activity from any country.” (Click here to read the slate.com blog.)
The New Crash Course on Copyright Laws
By Carl Weiss
If you work the web you need to be cognizant about copyright issues. What most people who publish blogs and social posts online do not realize is that for the most part, the writer relinquishes all rights to the publisher when it comes to online publications. That's right, Virginia, all the blogs and tweets you sent out to the Internet now belong to the folks at Google and Twitter and Facebook. Add to this the fact that you can still be held liable for copyright infringement or even sued for libel for anything you post and this adds up to double indemnity for everyone online.
Courtesy of Flickr |
Trick or Tweet? The Vulnerabilities Inherent to Twitter and All Social Networks
By Hector Cisneros
You may have read that LinkedIn was hacked last year. Twitter was recently hacked, and then it happened to Facebook as well. Whose turn is it next? In this article, we will look at the inherent vulnerabilities of all social networks, as well as what can happen should your account get compromised. We will also discuss how vulnerable your data is on social sites and what you need to do to keep from being hacked, when it's your turn to answer the question, “Trick or 'Tweet?'"
Courtesy of Pixabay |
Subscribe to:
Posts (Atom)