Posts

,

How To Legally Use Images and Graphics Created By Others

After locating Google images to illustrate a presentation on appropriate use and attribution of images belonging to others, I ran a malware scan on my computer.  The scan identified 469 malicious items that weren't there before the search.…
, ,

4 Simple Home and Work Cyber Safety Tips

Upon arrival at the Riverside County Sheriff's Department for cyber security training by a division of Homeland Security, I asked for a password to access wireless internet but my request was denied. I was surprised by the lack of Internet…
, ,

How to Avoid Identity Theft – Prevention is so much Better than Cure

When it comes to Identity Theft, I unfortunately write from a position of experience.  The good news is that in spite of having to cancel my personal credit card after someone enjoyed a $5,000 shopping spree in New York with a counterfeit…
, ,

Chase Phishing Scam Close Call

I usually get phishing emails from Bank of America, but today I got an alert from Chase that almost had me fooled.  Following my own advice from a previous article, How to Avoid Phishing Scams , I logged onto Chase on-line by typing in…
, , , , , , ,

Internet Privacy Issues: Think twice before launching into Cyberspace

It is becoming increasingly easy to get into trouble in the Cyber World with its exponentially diminishing privacy and associated dangers.  Today got off to a rocky start when I opened up a stern and upset Facebook message from my brother ordering…