This is just plain funny, but probably not for the reason you would guess. Sure none of us really believe big companies when they say they want your feedback, but this takes it to a whole new level. Here we have a recent Sprint mailer that says my voice matters and gives me a link…
Read more
Public sentiment towards Edward Snowden, source of the leak on the NSAs PRISM Program, varies between Traitor and Hero. As a result I’ve been asked numerous times in the last few weeks what the technology perspective is on him. First I have to say we don’t have all the facts. One side can jump to…
Read more
Spear-Phishing, targeted phishing, attacks are on the rise. The increase in these attacks is in many ways being linked to the increased use of mobile devices for online banking, browsing and email. Many of the attacks are taking aim at employees with administrative access to their business networks from their mobile devices. Criminals are using…
Read more
December 2011 the Economic Development Administration was notified by the Department of Homeland Security that there was a malware infection spreading around it’s network, referred to in the report as a “cyber-incident”. Malware infections happen, it’s why you keep a trusted computer company with IT professionals around to fix these problems. The Federal Gov’t, on…
Read more