Mar 28, 2013

Social Privacy: What Does This Really Mean?

If Facebook has learned one thing from its social media reign, it’s that users take the appearance of the platform very seriously. As a company this is great since it means users are loyal and inspired to stay connected with Facebook. The universal rollout ofTimeline in 2012 created havoc in the social media community, as hoards of Facebookers took to Internet chat rooms and profiles to voice their opinions about the visual appeal of the format change, as well as the increased visibility of uploaded content on profiles. With the introduction of a redesigned News Feed and plans to update the Timeline appearance and implement Facebook Graph Search, users once again responded with their honest feedback. Some of the most common user concerns relate to unknown individuals viewing private content through friends’ comments, as well as social reader and movie viewing app publications on the News Feed.

Read more on Huffington Post

Mar 12, 2013

Besides Music, What Do Rihanna, Miley and Taylor Have in Common?

   In the world of pop culture, nothing entices the public more than celebrity gossip. Search Google Trends on any given day, and famous sports figures, reality stars, singers and actors undoubtedly top the list of the most sought-after Internet topics. Sadly, the global appeal of celebrity serves as the ideal niche for eager hackers and cyber criminals looking to uncover personal information from unsuspecting celebrity inquirers. One such emergent trend in phishing scams targets the public fascination with celebrity scandal, as fabricated videos and newsfeeds tempt Internet users to access corrupted content containing viruses and other hacker material aimed at collecting personal information.

read more on Huffington Post

Mar 4, 2013

60 Days of Hacker Assaults

Within the first 60 days of 2013, an alarming number of International corporations and government agencies faced serious security violations from Internet hacking.  Beyond the Twitter, Apple and Facebook invasions, a more ominous threat attacked the State Department, Federal Reserve, Department of Energy and some of the largest U.S.-based news organizations.  The evolution of Internet hacking from small-time criminal initiatives focused on individual businesses and consumers to global cyber-offenders targeting national infrastructures is well documented and represents a growing concern for governments and citizens alike.

The computer security firm, Mandiant, recently released a study focused on the activities of a Chinese hacker collective referred to as the “Comment Crew” or “Shanghai Group,” which sheds light on security risks to agencies with access to essential U.S. infrastructures such as electrical, gas and water distribution.  The study also highlights the expansive nature of cybercrime and reinforces the need to protect public systems from unlawful invasions.  The most critical U.S. agencies and structures are increasingly vulnerable to cyber-attacks, and experts emphasize growing concerns for the nation’s power systems and other vital infrastructures.

Although the average computer user has little involvement with such significant security threats, the increasing prevalence of cybercrime places greater responsibility on consumers to protect their individual identities and personal information from hackers.  Cybercrime represents a daily reality for all Americans, as hackers pursue financial data, location details, social media content and business material at staggering rates.  Fortunately, basic computer security efforts help protect most consumers from cybercrime and hacking risks.  By following the few tips below, consumers may strengthen their defenses against such crimes:


  • Utilize up-to-date anti-virus and anti-phishing software, as well as operating systems and application software
  • Carefully investigate the information received from any unknown user (hackers easily manipulate email addresses and contacts to appear legitimate)
  • Avoid downloading content from unknown users, especially when content was not directly requested (attachments and PDFs may contain viruses that enable hackers to access personal information or even take control of computers)
  • Operate on a secured wireless network with active firewall settings
  • Do not keep password information on computers and maintain stringent and unique passwords for all system logins



For more information on digital warfare and the evolution of the Internet hacker, see also