Search this Blog

How To Avoid "Getting Gamed"

By Carl Weiss
Courtesy of Flickr


In 2012 we wrote about how the public's "app-etite"  for free games and other apps could bring with it lots of serious consequences.  In that article we, (and the radio show from the same time) we wrote about the dangers of free android apps. Now many gaming app developers are targeting your kids as well.  Would you give your eight year old a credit card?  Of course not.  But that is what in essence has happened to many parents who allowed their children to play “free” game apps online, only to discover the following month that they had been billed hundreds or even thousands of dollars. 

Chinese Hack Attack!

English: Air Force Flag of the People's Republ...
English: Air Force Flag of the People's Republic of China (Photo credit: Wikipedia)

Just when you thought it was safe to go back to the Internet, a news story breaks about how foreign governments are now hacking us companies, even going after their employee's computers.  This time it wasn’t inspired by teenage pranksters on the prowl.  Nor was it the Russian mob trying to break into financial institutions once again.  No, this time the culprits were state-sponsored hackers who wore military uniforms and lived in military barracks.  What I’m talking about is the latest hack attack by the Chinese People’s Liberation Army, which came to light to the nation at large on Monday, March 11, when Tom Donilon, President Obama’s national security adviser stated in a speech in New York City: 

“Increasingly, U.S. businesses are speaking out about their serious concerns about sophisticated, targeted theft of confidential business information and proprietary technologies through cyberintrusions emanating from China on an unprecedented scale. The international community cannot tolerate such activity from any country.” (Click here to read the slate.com blog.)

The New Crash Course on Copyright Laws

By Carl Weiss
Courtesy of Flickr


If you work the web you need to be cognizant about copyright issues. What most people who publish blogs and social posts online do not realize is that for the most part, the writer relinquishes all rights to the publisher when it comes to online publications.  That's right, Virginia, all the blogs and tweets you sent out to the Internet now belong to the folks at Google and Twitter and Facebook.  Add to this the fact that you can still be held liable for copyright infringement or even sued for libel for anything you post and this adds up to double indemnity for everyone online.

Trick or Tweet? The Vulnerabilities Inherent to Twitter and All Social Networks

By Hector Cisneros
Courtesy of Pixabay

You may have read that LinkedIn was hacked last year. Twitter was recently hacked, and then it happened  to Facebook as well. Whose turn is it next?  In this article, we will look at the inherent vulnerabilities of all social networks, as well as what can happen should your account get compromised.  We will also discuss how vulnerable your data is on social sites and what you need to do to keep from being hacked, when it's your turn to answer the question, “Trick or 'Tweet?'"