Is Your Company At Risk For A Security Breach?

Business want to know whether they are potential targets for security breaches, and if so, they seek to identify the types of electric records that may be at risk.

The Trustwave 2012 Global Security Report sheds some light on these concerns by identifying top data-security risk areas. Highlights of the report include the following findings:

Continue reading “Is Your Company At Risk For A Security Breach?”

Don’t Fall Prey To Facebook “Timeline” Scams

You may be either “pro” or “con” when it comes to Facebook’s new Timeline feature. If you are in the “con” category, you may wish for a solution that will cause the service to revert back to how it was before it changed. But beware: In so doing, you could become the victim of a scam.

Indeed, ever since Facebook introduced Timeline, a variety of fraudulent Internet postings have cropped up, proclaiming they can restore your profile to its original pre-Timeline state.

Continue reading “Don’t Fall Prey To Facebook “Timeline” Scams”

FBI’s Social Media Monitoring Plan Must Balance Privacy, Security

A few weeks ago this blog pointed out that the Department of Homeland Security’s command center regularly monitors social networking sites such as Facebook and Twitter, popular sites like Hulu, controversial sites including WikiLeaks, and news and commentary sites like The Huffington Post and Drudge Report, according to a government document.

Now, there is an indication that the Federal Bureau of Investigation is developing a web application that will have the ability to monitor social media sites like Facebook and Twitter. Such an application supposedly will give the FBI intelligence about potential security threats.

Continue reading “FBI’s Social Media Monitoring Plan Must Balance Privacy, Security”

Steve Jobs Action Figure Will Not Come To Market

There is little doubt that Steve Jobs was at the forefront of the tech revolution. He was an innovator in the realms of computers, music, film and handheld devices. His passing in late 2011 led many to consider the incredible impact he had on modern society. A number of articles and books have covered the life and times of Mr. Jobs. But what about the creation of a Steve Jobs action figure?

Earlier this month, the head of In Icons, a company based in Hong Kong, announced the company was producing a Steve Jobs doll. The doll was to closely resemble Mr. Jobs, with his closely cropped beard, jeans, a dark turtleneck shirt and frameless spectacles.

Continue reading “Steve Jobs Action Figure Will Not Come To Market”

Is Homeland Security Watching You Online?

Are George Orwell’s fears of a governmental “Big Brother” from his novel 1984 coming true now? Well, let’s hope not, but read on.

Recent press has reported on a particular government document: a Privacy Compliance Review issued by the U.S. Department of Homeland Security in late 2011. The document reveals that the DHS command center regularly monitors social-networking sites like Facebook and Twitter, popular sites like Hulu, controversial sites including WikiLeaks, and news and commentary sites like Drudge Report and The Huffington Post.

Continue reading “Is Homeland Security Watching You Online?”

Long Live Tech In 2012

Happy New Year! We’re just a week into January, but 2012 seems to be firing on all tech cylinders.

The other night, I went to a shopping mall with my family. While most of the traditional retail stores were not terribly busy, the Apple store was an amazing hive of activity.

In the one room that makes up the store, I literally counted as many as 40 Apple employees who were swamped fielding questions from and helping a never-ending parade of customers. It seemed that everyone and their kid brother and sister was hunting for the latest iPad, iPod, and Apple computer.

Continue reading “Long Live Tech In 2012”

Will Your High-Tech Holidays Be Naughty Or Nice?

Well, it’s that holiday time of year again. Have you been naughty or nice?

If you have been naughty, perhaps we will give you the low-tech equivalent of a lump of coal — a broken typewriter.

That’s right, we are talking about an old machine that actually requires some finger strength when you push down on the keys. And you are correct, this baby is so wireless that it is not connected to anything, not even an electric outlet. To add insult to injury, not all of the keys even work.

Continue reading “Will Your High-Tech Holidays Be Naughty Or Nice?”

The Truth About Teen Cell Phone Use

Most of us have heard about sexting — the practice of people sharing naked pictures of themselves online. Indeed, there have been press reports that suggest texting has become the latest teenage craze. Fact or fiction? Perhaps a bit of both.

Recent studies by the journal Pediatrics show that 1% of children between the ages of 10 to 17 have engaged in sexting. About the same percentage have shared less explicit but still suggestive photos of themselves. And 7% report that they had been the recipient of either type of photo.

Continue reading “The Truth About Teen Cell Phone Use”

Fake News Websites Touting Weight Loss Shut Down By FTC

The FTC is intent on stopping online deceptive health claims. It has been especially interested in shutting down sites that make false and misleading dietary claims.

As part of its crackdown efforts, the FTC, along with the State of Connecticut, filed a complaint that sought to stop a specific operation based on Connecticut.

And the FTC has now announced that the parties have agreed to a court order that temporarily halts the allegedly illegal conduct.

Continue reading “Fake News Websites Touting Weight Loss Shut Down By FTC”

Major Computer Hijacking Revealed By Indictment

There is so much good about the Internet. It allows us to communicate instantly, freely and widely for business and personal purposes. Unfortunately, whether there is good, the forces of evil also lurk.

This point is driven home by an international plot to hijack millions of computers, as has been reportedly disclosed by a recently unsealed New York indictment. The aim of the plot has been to use malware to hijack computers in various countries such that people visiting common Web sites such as Netflix, ESPN, Amazon and IRS.gov are rerouted to other sites. These other sites have generated millions of dollars of wrongfully gained profits.

Continue reading “Major Computer Hijacking Revealed By Indictment”

© 2009- Duane Morris LLP. Duane Morris is a registered service mark of Duane Morris LLP.

The opinions expressed on this blog are those of the author and are not to be construed as legal advice.

Proudly powered by WordPress