Quantcast
 
Mexico Prison Stormed By Gunmen, Nine Dead

Mexico Prison Stormed By Gunmen, Nine Dead

By Jasmine Allen January 3, 2014 | 3 Comments

An exchange of gunfire occurred on Friday at a prison in Guerrero, Mexico. Six men disguised as police officers commuted to the facility in a stolen pickup truck and pretended to transport an inmate. Once inside the doors of the …

“Mortified” Six Apart CEO Makes Apologies
· 3 Comments

All right.  I know there are a lot of passionate LiveJournal users out there, and I know censorship is bad.  But in this case, it was also somewhat funny.  LiveJournal claimed it had blocked access to around 500 journals on the basis that they supported pedophilia – turns out, some of them were just discussing Lolita.

When Somebody Steals Your Copy or Design

If you read my earlier post on having my copy swiped by other companies I’m sure you feel my righteous indignation.

MySpace To Protect Users

MySpace is trying to make users experience more secure. They have announced plans to partner with Sentinel Tech Holding Corp, an online identity and background verification company. They are jointly working on Sentinel Safe, software that will block the access of convicted sex offenders to MySpace.

Protecting Your Lap top

If anything makes an argument for disk drive level encryption, or synching a laptop back to the head office better than the recent news and meetings over the ability of US Border Guards being able to seize and inspect a companies laptop I cannot think of one.

Protect Employees Against Identity Theft

As more and more Americans are becoming victims of identity theft, many employers are increasing their level of security to protect their employees.

‘Blogswana’ Gives Voice To AIDS Fight

For Curt Hopkins and Brian Schartz, a meeting between U2 rocker Bono and President Bush doesn’t go quite far enough to highlight Africa’s ongoing struggles with HIV/AIDS. What is needed, they say, is a view from the inside, utilizing the point-of-view power of the weblog.

Future of Credit Cards and Anti-wifi Laws

Phillip Torrone writes about the future of credit cards. Oh, I so want one. Patrick and I were having lunch with Tara Hunt, Rachel Clarke, Ernie Svenson Adriana Linares (lawyer tech expert), and Chris Messina. Patrick leans over and says “can I have more money?”

House Committee Chairman Upbraids Google

Virginia Republican Tom Davis, chair of the House Government Reform Committee, called out Google for cooperating with China but not the US on its requests.

Blogged! Googled! Busted!

The problem with blogs is anyone can read them and they do. The recent adventures of an Iranian man who became a Canadian citizen on the U.S./Canadian border were all based on his blog. Customs found out about him, googled him and found his blog.

Review: Automating Security Patches and Spyware Management

You may have heard of a company called Shavlik. They were recently named as one of the fastest growing technology companies in North America.

Google AdSense Fraud – How to protect Your PPC Account
· 7

It’s worthwhile to examine Google’s definition of Google AdSense and Click Fraud , before delving deeper into “AdSense Fraud” .

How Do You Protect Your Business From the Loss of a Key Employee?

Key people are vital to your business. The loss of one or more of your key employees can cause disastrous problems. Sales may be lost. Credit can become more difficult to obtain. Profits may shrink, momentum may be lost, and training a replacement will cost you time and money.

CSPI Tries To Protect People From Soda

The federal government is being urged by the Center for Science in the Public Interest (CSPI) to require warning labels on bottled and canned soda.

How to Protect Yourself from Phishing, the most dangerous kind of Spam

Spam is one of the curses of the Internet age. But if the clogging of mail boxes with useless emails was bad enough, unsolicited emails aimed at tricking you into giving your valuable passwords, banking and PIN numbers is the most dangerous variety of email that you will ever encounter.

Flip the Switch: Your PC Can Now Better Protect Itself

Your computer is full of confidential data, hard work, and critical information. Hackers, thieves and scammers are itchy to get their fingers into this treasure trove.