Phishing – Part 2
A number of readers were surprised to learn about phishing, and more than one suggested that I send the example to eBay. Actually, I am quite confident that eBay is on top of this issue. I suspect they scan continuously to find eBay fraud of all kinds — including phishing emails. eBay is an incredibly […]
Phishing
In the Inside ID Conference report (part 4) I mentioned "phishing" as one of the types of fraudulent activity that is happening on the Internet. Today I received an example personally. This is such a blatant example of fraud I hope and suspect that the Federal Trade Commission is taking swift action. I also hope […]
Inside ID Conference – Part 5
I am planning this and one more story about things I learned at the Inside ID conference in Washington, D.C. and then I will continue to write stories that are part of the Privacy and Trust series. There were more than sixty exhibitors at the conference. Naturally, they all claimed to have *the* key ingredient […]
Linux In School – Part 2
It was privilege once again to be able to speak to students at the IT Leadership Academy program at Naugatuck Valley Community College. A show of hands indicated that about 20% of the students had some familiarity with Linux. Michael Mino, the program director, had provided a laptop with Red Hat Linux to each of […]
Inside ID – Part 4
The next story in the Privacy and Trust series will be coming shortly, after a couple more updates from the Inside ID conference in Washington, D.C. In my keynote on the opening day of the conference I asserted that organizations and individuals should be spending more time and money on the security of their systems. […]