In a crazy move of brazenness, a would be criminal steals a laptop.
The location? A security trade show.
Two members from the cleaning crew stole a laptop.
The entire heist was videotapped!
Reminds me of a country song by Bill Engvall, "Here's Your (Stupid) Sign".
1. Don't EVER leave a laptop unattended - at a trade show, in your car, in a hotel room.
2. Stealing is never a good thing to do but you also add dumb to the equation to steal at a security trade show.
Other Links of Interest
Contributors
Showing posts with label Tech. Show all posts
Showing posts with label Tech. Show all posts
Friday, October 22, 2010
Thursday, August 12, 2010
New Facebook Bug Invades Your Privacy...Again
Does the title of my post sound like a repeat? New bug, repeat problem - privacy issues.
The Facebook community learned this week that a new bug at the login point to Facebook will reveal names and photos -- even if you have locked your privacy settings down tightly.
Here is how it works:
1. Someone logs into Facebook using your email address & they guess the wrong password
2. Facebook displays a screen that tells them to try the password again and displays the picture you have on file and the name you have put on your profile
This is a treasure trove of information that cybercreeps and cybercriminals can use.
The bug is now fixed but this is a friendly reminder to do the following:
1. Go to your Facebook account and choose "Preview My Profile". What does it say about you? Does it say anything you would NOT want a cybercreep to read?
An example might include: You may not want to list your full birthdate, including year
2. Check your privacy settings to make sure they are set to the level you feel most comfortable with.
You have a lot of settings to choose from and can lock down information to just "friends", or "friends of friends" or you can go wide open
3. Review any pictures you have posted - do they identify you in a way the compromises you to fraudsters? Are you giving too much identifiable information about your children and their schedules? Are you providing too much information that could be used for social engineering?
4. Go to your favorite search engine and type in "your name, Facebook" to double check. Do the same for your loved ones.
You can stay on top of the latest security and privacy issues by tracking Facebook's security page and the page updated by Sophos.
1. Security Page on Facebook
2. Sophos Security Suggestions for Facebook
As always, I'm open to questions & suggestions.
The Facebook community learned this week that a new bug at the login point to Facebook will reveal names and photos -- even if you have locked your privacy settings down tightly.
Here is how it works:
1. Someone logs into Facebook using your email address & they guess the wrong password
2. Facebook displays a screen that tells them to try the password again and displays the picture you have on file and the name you have put on your profile
This is a treasure trove of information that cybercreeps and cybercriminals can use.
The bug is now fixed but this is a friendly reminder to do the following:
1. Go to your Facebook account and choose "Preview My Profile". What does it say about you? Does it say anything you would NOT want a cybercreep to read?
An example might include: You may not want to list your full birthdate, including year
2. Check your privacy settings to make sure they are set to the level you feel most comfortable with.
You have a lot of settings to choose from and can lock down information to just "friends", or "friends of friends" or you can go wide open
3. Review any pictures you have posted - do they identify you in a way the compromises you to fraudsters? Are you giving too much identifiable information about your children and their schedules? Are you providing too much information that could be used for social engineering?
4. Go to your favorite search engine and type in "your name, Facebook" to double check. Do the same for your loved ones.
You can stay on top of the latest security and privacy issues by tracking Facebook's security page and the page updated by Sophos.
1. Security Page on Facebook
2. Sophos Security Suggestions for Facebook
As always, I'm open to questions & suggestions.
Tuesday, May 4, 2010
Guest Post - Nick Volpe - Summary of What's Hot in the Security Headlines
Guest Post from Nick Volpe. Spring Semester Intern at Fortalice®, LLC. Attending Immaculata University.
Facebook Expect to Launch Location-Aware Feature
It seems as if Facebook has long been put into the hot seat over its data privacy features. More specifically, what settings Facebook deem are appropriate defaults have come under scrutiny with less sophisticated users not knowing what information from their profile is available to whom and how to change that selection of information. In April 2010, Facebook will begin to allow its registered users to share their geographical location with their friends in their news feeds. The supposed location-based feature(s) are expected to be unveiled in late April at Facebook’s annual f8 developer conference in San Franscisco. According to company reports, the feature will be opt-in allowing users to choose if they wish to participate or not. Given the companies track record on security, however, users should be vigilant and check changes to privacy policies and settings. The news comes after popular micro blogging competitor, Twitter, announced a similar location-based feature for their offering. Officially, Facebook will neither confirm nor deny the anticipated announcement.Sources:
AllFacebook.com: “Facebook Prepares To Release Location Service At f8” by Nick O’Neil http://www.allfacebook.com/NYTimes.com Bits Blog: “Facebook Will Allow Users to Share Location” by Nick Bilton http://bits.blogs.nytimes.com/
PC Magazine: “Report: Facebook to Add Location Info to Updates” by Brian Heater http://www.pcmag.com/article2/
New Statistics Show About 12% of Employees Willingly Violate Company IT Policy
One of the biggest and most difficult to address points of failure in terms of IT security problems is employee error. According to a new survey conducted by firm Harris Interactive, 12% of the United States workforce claimed to have willingly violated their companies IT policies. The employees are something that IT departments need to worry about maybe even more so, in some sense, than antivirus and malware infection in the network. IT departments and companies simply are not tough enough on enforcing their policies as they should be thus making employees the largest cause of corporate data loss.Sources:
Ars Technica: “Bad employee! 12% knowingly violate company IT policies” by Jacqui Cheng http://arstechnica.com/Pivotal Payments: “12% of employees intentionally breach corporate IT policy, study shows” by Kristen Lawrence http://www.pivotalpayments.
Highly Marketed Identity Protection Agency LifeLock Fined by FTC
The identity protection industry is highly lucrative and popular amongst individuals that aim to keep their confidential information private. There are firms that, for a monthly fee, claim to protect your identity by closely monitoring credit reports and other identifying accounts and information in order to protect your identity or at least attempt to do so.LifeLock, one of these identity protection services, was fined by the US Federal Trade Commission for false advertising. The company guaranteed its clients that for as long as they paid, their identity would never be stolen and they would not be susceptible to fraud. As it turns out, you really can’t guarantee that a person’s identity can’t or won’t be stolen. There are simply too many factors in that. Ironically, the CEO of LifeLock, who freely gave out his social security number publicly as a testament to his service, fell victim of identity theft himself.
Sources:
Total Bankruptcy: “LifeLock Fined for Inappropriate Identity Theft Protection Claims” http://www.totalbankruptcy.Ars Technica: “LifeLock fined $12 million over lack of life-locking ability” by Jacqui Cheng http://arstechnica.com/tech-
Saturday, March 20, 2010
Big Brother Has the Power to...turn off your car
Turn off your car? What?
As our world becomes more automated and every day gadgets are infused with computer machinery, you are more at risk of a glitch, or worse.
Over 100 car owners in Austin, TX had the worst surprise ever recently. Cars began behaving badly - they would not turn on or the horns were honking.
How could this happen?
Many consumers have no idea that their dealerships are installing a little black box on cars. This little black box allows the dealerships to disable YOUR car if you fall behind on payments. It is the modern day alternative to the Repo Man.
The culprit? Not a technology glitch but a ticked off employee who had been fired. Police in Austin's High Tech Crime Unit arrested 20 year old, Omar Ramos-Lopez. Police tracked him down using access logs and then tracing the traffic back to his IP address.
Martin Garcia, Texas Auto Center manager where Omar worked said, "Omar was pretty good with computers". Really? Maybe Mr. Garcia was taken out of context, let's hope so.
I have said it before, sometimes the greatest risk in cybersecurity is the INSIDER THREAT - from the model employee to the displaced employee.
They can put Ramos in jail but until businesses address the risk of insider threat, Ramos will not be the last.
This leaves another question open, if Ramos was able to access the system using another employee's account, what could someone with a real plan have done to immobilize drivers?
Who needs an EMP (electomagnetic pulse) to take out computer systems when you can just hack into devices?
Comments? Questions? Please send me your reaction to this story.
As our world becomes more automated and every day gadgets are infused with computer machinery, you are more at risk of a glitch, or worse.
Over 100 car owners in Austin, TX had the worst surprise ever recently. Cars began behaving badly - they would not turn on or the horns were honking.
How could this happen?
Many consumers have no idea that their dealerships are installing a little black box on cars. This little black box allows the dealerships to disable YOUR car if you fall behind on payments. It is the modern day alternative to the Repo Man.
The culprit? Not a technology glitch but a ticked off employee who had been fired. Police in Austin's High Tech Crime Unit arrested 20 year old, Omar Ramos-Lopez. Police tracked him down using access logs and then tracing the traffic back to his IP address.
Martin Garcia, Texas Auto Center manager where Omar worked said, "Omar was pretty good with computers". Really? Maybe Mr. Garcia was taken out of context, let's hope so.
I have said it before, sometimes the greatest risk in cybersecurity is the INSIDER THREAT - from the model employee to the displaced employee.
They can put Ramos in jail but until businesses address the risk of insider threat, Ramos will not be the last.
This leaves another question open, if Ramos was able to access the system using another employee's account, what could someone with a real plan have done to immobilize drivers?
Who needs an EMP (electomagnetic pulse) to take out computer systems when you can just hack into devices?
Comments? Questions? Please send me your reaction to this story.
Thursday, March 4, 2010
Avoid the nightmare of losing your address book. Helpful tips.
Link the WBTV Video
n the US, over 12 million cell phones are lost each year and 700,000 are stolen.
This is a nightmare scenario. You need to make a phone call and find out that your address book is suddenly empty or your cell phone is missing. If your job counts on you having a large rolodex this situation can be overwhelming.
What would happen to you if your contacts were lost?
Former White House Cyber Security Expert, Theresa Payton has some options for saving your contacts to a safe place and recovery options in the event something happens to your cell phone.
How to avoid a BAD situation:
B - Back up files. Most smart phones and cell phones come with software that you can use on your computer so you can create a back up file.
A - Access to your contacts may be available another way. You may have files on your computer or Mac that you could use. For example:
."ipd" at the end, that file has BlackBerry contacts.
."csv" at the end, that file can be imported into most address book and email programs and then synchronized to your phone.
vCard files can be imported into most contact programs.
D - Don't rely on just having your contacts on your phone or computer. Keep a copy in multiple places. Have a hard copy of the 5 most important contacts in the event of an emergency.
The following are resources that can help you build or re-build your list of contacts on your phone and computer.
See this link for helpful resources on how to back up your contacts: Website Tips & Resources
As always. please make comments and suggestions on what you want to hear about!
Thank you!
n the US, over 12 million cell phones are lost each year and 700,000 are stolen.
This is a nightmare scenario. You need to make a phone call and find out that your address book is suddenly empty or your cell phone is missing. If your job counts on you having a large rolodex this situation can be overwhelming.
What would happen to you if your contacts were lost?
Former White House Cyber Security Expert, Theresa Payton has some options for saving your contacts to a safe place and recovery options in the event something happens to your cell phone.
How to avoid a BAD situation:
B - Back up files. Most smart phones and cell phones come with software that you can use on your computer so you can create a back up file.
A - Access to your contacts may be available another way. You may have files on your computer or Mac that you could use. For example:
."ipd" at the end, that file has BlackBerry contacts.
."csv" at the end, that file can be imported into most address book and email programs and then synchronized to your phone.
vCard files can be imported into most contact programs.
D - Don't rely on just having your contacts on your phone or computer. Keep a copy in multiple places. Have a hard copy of the 5 most important contacts in the event of an emergency.
The following are resources that can help you build or re-build your list of contacts on your phone and computer.
See this link for helpful resources on how to back up your contacts: Website Tips & Resources
As always. please make comments and suggestions on what you want to hear about!
Thank you!
Friday, February 19, 2010
Looking for a job? Don't work for a Botnet Herder! Criminals are posting help wanted ads online.
HOW TO AVOID THE BOTNET HERDERS
Would you know if your child was a botnet herder?
There’s a new game in town offering jobs to anyone with a home office and a computer. Be careful what you or your kids accept when applying for jobs online. You or your kids may be accepting a job working for a Cybercriminal outfit.
Cybercriminals are posting help wanted ads on the internet and they are hiring people to help them infect computers across the Carolinas and even across the globe.
The going rate? $180 for every 1,000 PCs infected.
Link to TV segment: http://www.wbtv.com/Global/story.asp?S=11980960
YOU NEED TO PROTECT YOURSELF AND YOUR KIDS FROM THIS SCAM:
Some of the ads are obvious and you know you are infecting computers. Some, are not so obvious and may sound more like you are working for a marketing company. Kids looking to earn money over spring break and summer months could fall into a trap and they may not realize they are doing something wrong.
HOW TO SPOT THE ADS:
In the more obvious ads, Cybercriminals are hiring individuals willing to infect people’s computers with malicious software. In the less obvious, the ads may look like you are doing marketing and you just need to get the message out through emails and web pages.
The job duties may include:
Send spam or socially engineered emails
Include a link to malicious software
Job performance is determined by how many PCs they can infect.
PCs in the UK and the US are considered the target group.
They will even pay your wages to you via services such as PayPal and Western Union.
Once the PC is infected, the cybercriminals can come in after that and do what they want.
They may provide you with:
-A kit or directs you to places where you can buy a kit to create your web page or emails.
-Instructions on how to hide their software behind the link.
HOW TO AVOID THE SCAM
One way to avoid this scam is to check in with your Better Business Bureau.
Remind your kids not to apply for jobs online without discussing it with you first.
Follow the rule: If it sounds to good to be true, it probably is.
WORD FOR THE WEEK
Botnet Herder
A botnet herder is a person that has installed software on thousands of machines and has them in their control. They may use the herd of machines, which they call zombies, for attacks on other machines. Like to create mail sent to people in your address book that looks like it is from you, or to steal your information. Botnet herders will also rent out their herd to cybercriminals to use.
SIGNS THAT YOUR PC MAY BE UNDER THE CONTROL OF A BOTNET HERDER
Computer programs taking longer than usual to load
Computer locks up or reboots itself
Odd error messages
Peripheral devices such as printers and scanners are not recognized
Lots of internal noise such as disk writing or beeping or clicking
Computer seems to be running tasks even when you have no programs open
Files corrupted or missing
Friends call or email to tell you they are getting a lot of strange email traffic from your account
Your antivirus software runs too quickly or not at all
WHAT TO DO IF YOUR COMPUTER HAS THESE SYMPTOMS
If your computer has any of these symptoms, run your Antivirus software. If it continues, contact your antivirus software provider and the company that services your machine for professional assistance.
HOW TO SPOT THESE JOB SITES:
Where are some of these criminal jobsites? Many of them change their names to avoid detection. The key is to check site history on your computer and look up any companies your kids may be visiting online.
The more obvious sites describe “Pay Per Install” as part of their payment model on their website.
Two of the more recent sites that you want to check for and block are:
Pay-Per-Install.org
earning4u.com. (formerly known as InstallsCash)
WHAT TO DO IF YOU SPOT ONE OF THESE COMPANIES:
If you think you have received an email solicitation, you can report it to at least two places:
The Federal Trade Commission at spam@uce.gov.
The FBI’s Internet Crime Center at www.ic3.gov.
If you believe you or your kid was duped and that you might be working for a Botnet herder, please contact your Local Law Enforcement immediately and send information to the FBI Internet Crime Center listed above.
Would you know if your child was a botnet herder?
There’s a new game in town offering jobs to anyone with a home office and a computer. Be careful what you or your kids accept when applying for jobs online. You or your kids may be accepting a job working for a Cybercriminal outfit.
Cybercriminals are posting help wanted ads on the internet and they are hiring people to help them infect computers across the Carolinas and even across the globe.
The going rate? $180 for every 1,000 PCs infected.
Link to TV segment: http://www.wbtv.com/Global/story.asp?S=11980960
YOU NEED TO PROTECT YOURSELF AND YOUR KIDS FROM THIS SCAM:
Some of the ads are obvious and you know you are infecting computers. Some, are not so obvious and may sound more like you are working for a marketing company. Kids looking to earn money over spring break and summer months could fall into a trap and they may not realize they are doing something wrong.
HOW TO SPOT THE ADS:
In the more obvious ads, Cybercriminals are hiring individuals willing to infect people’s computers with malicious software. In the less obvious, the ads may look like you are doing marketing and you just need to get the message out through emails and web pages.
The job duties may include:
Send spam or socially engineered emails
Include a link to malicious software
Job performance is determined by how many PCs they can infect.
PCs in the UK and the US are considered the target group.
They will even pay your wages to you via services such as PayPal and Western Union.
Once the PC is infected, the cybercriminals can come in after that and do what they want.
They may provide you with:
-A kit or directs you to places where you can buy a kit to create your web page or emails.
-Instructions on how to hide their software behind the link.
HOW TO AVOID THE SCAM
One way to avoid this scam is to check in with your Better Business Bureau.
Remind your kids not to apply for jobs online without discussing it with you first.
Follow the rule: If it sounds to good to be true, it probably is.
WORD FOR THE WEEK
Botnet Herder
A botnet herder is a person that has installed software on thousands of machines and has them in their control. They may use the herd of machines, which they call zombies, for attacks on other machines. Like to create mail sent to people in your address book that looks like it is from you, or to steal your information. Botnet herders will also rent out their herd to cybercriminals to use.
SIGNS THAT YOUR PC MAY BE UNDER THE CONTROL OF A BOTNET HERDER
Computer programs taking longer than usual to load
Computer locks up or reboots itself
Odd error messages
Peripheral devices such as printers and scanners are not recognized
Lots of internal noise such as disk writing or beeping or clicking
Computer seems to be running tasks even when you have no programs open
Files corrupted or missing
Friends call or email to tell you they are getting a lot of strange email traffic from your account
Your antivirus software runs too quickly or not at all
WHAT TO DO IF YOUR COMPUTER HAS THESE SYMPTOMS
If your computer has any of these symptoms, run your Antivirus software. If it continues, contact your antivirus software provider and the company that services your machine for professional assistance.
HOW TO SPOT THESE JOB SITES:
Where are some of these criminal jobsites? Many of them change their names to avoid detection. The key is to check site history on your computer and look up any companies your kids may be visiting online.
The more obvious sites describe “Pay Per Install” as part of their payment model on their website.
Two of the more recent sites that you want to check for and block are:
Pay-Per-Install.org
earning4u.com. (formerly known as InstallsCash)
WHAT TO DO IF YOU SPOT ONE OF THESE COMPANIES:
If you think you have received an email solicitation, you can report it to at least two places:
The Federal Trade Commission at spam@uce.gov.
The FBI’s Internet Crime Center at www.ic3.gov.
If you believe you or your kid was duped and that you might be working for a Botnet herder, please contact your Local Law Enforcement immediately and send information to the FBI Internet Crime Center listed above.
Gangs Are Targeting Your Kids Via the Internet - Quick Quiz to test your Cyber Banging Saavy
Word for the Week: Cyber Banging
Also called Net Banging - This refers to the internet recruiting process that gangs use to target kids. Gangs typically target high school and middle school kids but there are cases where kids as young as 8 have been recruited.
1.6 Million, that’s the number of employees, across the globe that support Walmart.
1 Million and growing, that’s the number of gang members in the United States.
Are your kids looking at gang propaganda online? Chances are you would not know, a recent study says that 62% of kids lie to their parents about what they do online.
As a parent, you protect your kids by teaching them safety rules, checking on their friends, and keeping tabs on their activities. Gangs know this to so they have a new recruiting tool to get around you and directly to your kids – the internet.
Link to WBTV segment: Gangs Targeting Your Kids Via The Internet
One example of how glorified gang life is can be seen on YouTube.com. Lil Slim’s “Getting $” music video, which glorifies gang activities, has over 30,000 views.
Think you know how Gangs target their new recruits?
Test your knowledge with this quick quiz:
1) Q: What are the colors worn by the MS-13 gang?
A: Blue and White
2) Q: Gang Identifiers Include which of the following:
a) Wearing a specific color or colors regularly
b) 5-Pointed Star
c) Star of David
d) Playboy bunny
e) None of the Above
f) All of the above
A: All of the above
3) True or False: If you see someone wearing Charlotte Hornets gear they might be a member of a gang.
True. Don’t jump to conclusions that everyone that wears Charlotte Hornets gear is a gang member but this logo is popular with the Spanish Cobras and the 4 Corner Hustlers.
4) True or False: If you see a cap that looks like a NY Yankee’s cap but the tail of the Y is off so it looks like VN instead of NY, that’s just a kid having fun.
Most likely False. This is what the LA gang called Van Nuys is doing to mark their members. You can see this NY Yankee-like symbol touted on Facebook and YouTube. You may seen this worn by a gang member or a wannabe.
5) True or False: Your kid would not go to gang music sites to download songs.
Could be True or False. You should check. Kids are downloading gang songs from places such as 818 Gangland Musik Page for free.
GANGS HAVE NEW RECRUITING TOOLS:
The Bait: Social networking via the internet is the new recruiting tool for MS-13 and other gangs and they ARE targeting your kids.
The Hook: Young people that are surfing online may come across pictures, music, or videos about gangs. Of course kids are curious so they click and see something that glorifies gang life…That’s when a gang member may strike up a chat with them online and try to lure them into their club.
GANG STATISTICS:
Think this is an overplayed issue? Here are some startling statistics from a recent survey:
70% of gang members say it is easier to make friends online
89% of kids say they are the major user of technology at their house
41% of kids say they do not share with their parents what they are doing on the internet
HOW TO PROTECT YOUR CHILD:
TALK: Talk with your child about the places they visit while online. Look at some of the gang propaganda together and talk about why it is false or glorified.
TEACH: Keep your home PC in a central location so you can keep an eye on what they search. Teach your kids that where they go online is just as important as the rules you have for them offline.
TELL: Be familiar with what your local gangs wear, such as certain colors, jewelry, or logos, to show they are a member. Tell your kids not to dress like gang wannabes so they will not be targeted while at school or play.
WARNING SIGNS:
APPEARANCE: Your kid’s clothing preferences change dramatically. Your kid suddenly insists on wearing a specific color or a logo. A new tattoo, permanent or henna. Unexplained injuries. Begins using gang slang.
SOCIAL: Starts withdrawing from school, family, and possibly even their friends. Talks about gang life in an idolized way.
INTERESTS: Gang music or gang insignias on their phones and music lists. Likes to watch gang related movies.
RESOURCES:
FBI Gang Threat Site: http://www.fbi.gov/page2/feb09/ngta_020609.html
Department of Justice – Community Services: www.cops.usdoj.gov
Violence Prevention Institute: http://www.violencepreventioninstitute.org/youngpeople.html
National Youth Gang Prevention Center: http://ojjdp.ncjrs.gov/pubs/gun_violence/sect08-f.html
NC Gang Awareness:
http://www.ncgangcops.org/NCGangAwareness.pdf
Parents Universal Resource Experts (PURE™):
http://www.helpyourteens.com/index.php
Parent Advocate Sue Scheff on Avoiding the Gangs:
http://www.suescheff.info/
Organization focused on consumer safety, security, and privacy:
http://ilookbothways.com/
Dr. Michele Borba, Child Expert Talks About Kids and Conflict:
http://www.micheleborba.com/blog/
Mary Kay Hoal, Internet Safety Expert, Offers Advice About Social Networks and Gang Exposure:
http://internet-safety.yoursphere.com/tips/can-social-networking-expose-your-children-to-gangs
Social Networks and Your Kids – The Risks from SchooGo:
http://www.schoogo.com/blog/it-safe-9-10-11-year-olds-be-social-networking-websites
Also called Net Banging - This refers to the internet recruiting process that gangs use to target kids. Gangs typically target high school and middle school kids but there are cases where kids as young as 8 have been recruited.
1.6 Million, that’s the number of employees, across the globe that support Walmart.
1 Million and growing, that’s the number of gang members in the United States.
Are your kids looking at gang propaganda online? Chances are you would not know, a recent study says that 62% of kids lie to their parents about what they do online.
As a parent, you protect your kids by teaching them safety rules, checking on their friends, and keeping tabs on their activities. Gangs know this to so they have a new recruiting tool to get around you and directly to your kids – the internet.
Link to WBTV segment: Gangs Targeting Your Kids Via The Internet
One example of how glorified gang life is can be seen on YouTube.com. Lil Slim’s “Getting $” music video, which glorifies gang activities, has over 30,000 views.
Think you know how Gangs target their new recruits?
Test your knowledge with this quick quiz:
1) Q: What are the colors worn by the MS-13 gang?
A: Blue and White
2) Q: Gang Identifiers Include which of the following:
a) Wearing a specific color or colors regularly
b) 5-Pointed Star
c) Star of David
d) Playboy bunny
e) None of the Above
f) All of the above
A: All of the above
3) True or False: If you see someone wearing Charlotte Hornets gear they might be a member of a gang.
True. Don’t jump to conclusions that everyone that wears Charlotte Hornets gear is a gang member but this logo is popular with the Spanish Cobras and the 4 Corner Hustlers.
4) True or False: If you see a cap that looks like a NY Yankee’s cap but the tail of the Y is off so it looks like VN instead of NY, that’s just a kid having fun.
Most likely False. This is what the LA gang called Van Nuys is doing to mark their members. You can see this NY Yankee-like symbol touted on Facebook and YouTube. You may seen this worn by a gang member or a wannabe.
5) True or False: Your kid would not go to gang music sites to download songs.
Could be True or False. You should check. Kids are downloading gang songs from places such as 818 Gangland Musik Page for free.
GANGS HAVE NEW RECRUITING TOOLS:
The Bait: Social networking via the internet is the new recruiting tool for MS-13 and other gangs and they ARE targeting your kids.
The Hook: Young people that are surfing online may come across pictures, music, or videos about gangs. Of course kids are curious so they click and see something that glorifies gang life…That’s when a gang member may strike up a chat with them online and try to lure them into their club.
GANG STATISTICS:
Think this is an overplayed issue? Here are some startling statistics from a recent survey:
70% of gang members say it is easier to make friends online
89% of kids say they are the major user of technology at their house
41% of kids say they do not share with their parents what they are doing on the internet
HOW TO PROTECT YOUR CHILD:
TALK: Talk with your child about the places they visit while online. Look at some of the gang propaganda together and talk about why it is false or glorified.
TEACH: Keep your home PC in a central location so you can keep an eye on what they search. Teach your kids that where they go online is just as important as the rules you have for them offline.
TELL: Be familiar with what your local gangs wear, such as certain colors, jewelry, or logos, to show they are a member. Tell your kids not to dress like gang wannabes so they will not be targeted while at school or play.
WARNING SIGNS:
APPEARANCE: Your kid’s clothing preferences change dramatically. Your kid suddenly insists on wearing a specific color or a logo. A new tattoo, permanent or henna. Unexplained injuries. Begins using gang slang.
SOCIAL: Starts withdrawing from school, family, and possibly even their friends. Talks about gang life in an idolized way.
INTERESTS: Gang music or gang insignias on their phones and music lists. Likes to watch gang related movies.
RESOURCES:
FBI Gang Threat Site: http://www.fbi.gov/page2/feb09/ngta_020609.html
Department of Justice – Community Services: www.cops.usdoj.gov
Violence Prevention Institute: http://www.violencepreventioninstitute.org/youngpeople.html
National Youth Gang Prevention Center: http://ojjdp.ncjrs.gov/pubs/gun_violence/sect08-f.html
NC Gang Awareness:
http://www.ncgangcops.org/NCGangAwareness.pdf
Parents Universal Resource Experts (PURE™):
http://www.helpyourteens.com/index.php
Parent Advocate Sue Scheff on Avoiding the Gangs:
http://www.suescheff.info/
Organization focused on consumer safety, security, and privacy:
http://ilookbothways.com/
Dr. Michele Borba, Child Expert Talks About Kids and Conflict:
http://www.micheleborba.com/blog/
Mary Kay Hoal, Internet Safety Expert, Offers Advice About Social Networks and Gang Exposure:
http://internet-safety.yoursphere.com/tips/can-social-networking-expose-your-children-to-gangs
Social Networks and Your Kids – The Risks from SchooGo:
http://www.schoogo.com/blog/it-safe-9-10-11-year-olds-be-social-networking-websites
Friday, February 5, 2010
Cybercreeps Grab Your Stash, Hide the Cash, While Using Bogus Bank Statements
Cybercrooks have a new trick up their sleeve!
Cybercriminals are rewriting your bank statement so it looks like small transfers have been taken out and your balance looks okay.
A Security firm called, Finjan, found that cybercriminals stole $440K from online banking customers in Germany last year.
To fake out the customer and the bank, the cybercreeps transacted small transfers. They used money mules to help them move the money out. (More on money mules in another post but they are usually good people doing "work at home" and have no idea that they are a pawn in this scheme).
To continue the fake out, these cybercreeps displayed altered statements showing only a small amount transferred.
“They successfully evaded the banks' anti-fraud systems," says Ben-Itzhak. "We dubbed it anti anti-fraud."
Link to original USA Today story: http://blogs.usatoday.com/technologylive/2009/09/cybercriminals-rewriting-bank-statements.html
Follow us on Twitter: twitter.com/fortalicellc
Fan us on Facebook: FortaliceLLC
Website: Company Website
Follow us on Twitter: twitter.com/fortalicellc
Fan us on Facebook: FortaliceLLC
Website: Company Website
Thursday, January 14, 2010
President Barack Obama has declared January - National Slavery and Human Trafficking Prevention Month
How CyberTraffickers Target Their Victims:
It is hard to believe that, in America, we have people trapped and forced to work as laborers or prostitutes as slaves of human traffickers. North Carolina has been ranked in the top 8 most common sites for human trafficking. One of the reasons we are so popular is I85 and I95.
The problem in the U.S. is so serious, that President Barack Obama has declared January - National
Slavery and Human Trafficking Prevention Month
Human trafficking is the modern day version of slavery. These criminals force their victims into labor and it can be in any industry. The most common forms of enslavement include labor, such as farming or working in a sweatshop, and sex trade.
Human traffickers love the I85 and I95 highways in North Carolina and they also use another highspeed highway to recruit, enslave, and find new customers-the internet.
Human traffickers target those who are society’s most vulnerable, have the quietest voices and find it hard to fight back. Often, victims include immigrants and children. Children who are loners or runaways are also a popular target of cybertraffickers.
North Carolina passed a bill in 2007 which makes human trafficking a felony and offers state assistance to victims.
In the last several months there were several cases in human trafficking uncovered in North Carolina.
One recent case was a spa in Union County who was using Craiglist to advertise services and the clients had no idea the staff there had been coerced into a human trafficking scheme.
We also had the tragic case of Shaniya Davis who was allegedly sold into sex trafficking via the internet by her mother.
Human trafficking via the internet to enable their crime rings has long been on the radar of the law enforcement community.
Statistics:
2,300 Arrests: The FBI has been diligently fighting this evil crime resulting in 2,300 arrests. They have also recovered 170 kids during sting operations.
15,000-18,000: The number of people drafted into slavery each year in the U.S. (Source: U.S. Department of Health and Human Services)
2 Million: Estimated number of people worldwide drafted into slavery via Human Trafficking
A Few Recent NC Cases:
Sex Ring:
April 2009, a man was sentenced to 24 years in prison for operating a human trafficking sex trade between Charlotte and Washington. Girls were as young as 16 and smuggled in from Mexico.
Child Sex Case – Internet Sting:
June 2009, a Duke University official, was arrested after an Internet sting. He was charged with trafficking a 5 year old boy for sex. His name was provided by a defendant in a different trafficking case.
Spa case in Monroe – Ads on Craigslist:
In 2008, a spa in Union County was using Craiglist to advertise services that were offered by people who had been coerced into a human trafficking scheme.
Shaniya Davis – Mother allegedly sold her into sex trade via internet:
In NC we have the pending case and trial regarding the alleged human trafficking of Shaniya Davis. Her own mother alledgedly sold her daughter into the sex trade using the internet to find a buyer and to send messages. This case should be a wake up call to parents, teachers, and all caregivers.
THE DIRTY TOOLKIT THAT CYBERTRAFFICKERS USE:
Online Ads: Ads offering great jobs at high pay in big cities. Often they hide behind ads for modeling, singing, or acting. Sometimes they will offer to fly the person to the other city for the “interview”.
Online Auctions: Craigslist is considered a magnet for international sex trade of children via the adult services section.
Photo Sharing Sites: Bypasses printing photos and allows operations to disseminate photos online for viewing by prospective buyers.
Social Media: Cybercreeps will use Chatrooms, social sites such as Facebook and MySpace, to recruit or trick kids into joining their trafficking scheme. They use these sites and blogs to connect to other cybercreeps to barter, trade, and sell their victims.
HOW TO SPOT THE WARNING SIGNS:
Many of the warning signs that a child is a victim of trafficking, or is being recruited, are similar to signs that the child is being cyberbullied or being groomed by a pedophile. They may include one or more of the following:
Unexplained absences
Runs away or discusses running away from home
Exhibits bruises, suddenly withdraws from social gatherings, displays depression
Demonstrates a sudden change in attire
Behavior becomes erratic, severe mood swings
Suddenly has material possessions given to them by a “friend”
Hides emails, text messages, or other online posts
Extreme change in online behavior – suddenly online all the time or suddenly not interested in
being online
PUT AN END TO TRAFFICKING:
E: Engage your kids in a conversation about trafficking. Targets start as young at 12 years old.
N: Notify and advocate for change. Notify your elected officials and ask what they are doing to improve awareness, catching cybertraffickers, and convicting them.
D: Don’t fuel the criminal economy. Where possible, research and choose free trade or slave-free certified products.
HOW TO REPORT SUSPECTED TRAFFICKING:
1. Contact local law enforcement
2. If you are unsure and want to talk through the situation first, you can start with the National 24/7 Human Trafficking Resource Center at 1-888-373-7888.
3. If you want to report an incident, you can do so at the National Center’s CyberTipline at 1-800-the-lost or online at www.CyberTipLine.org
4. The FBI Human Trafficking Hotline is open 24 hours: 866.252.6850.
OTHER RESOURCES:
There are several websites that provide helpful information about Human trafficking. We have highlighted a few of them below:
Organizations:
Global Awareness, Outreach, and Victim Services: Polaris Project at www.PolarisProject.org
Check Your Chain Store’s Policies and write them letters about Human Trafficking at www.ChainStoreReaction.com
Sites that include tips plus blogs that cover human trafficking:
http://www.veritate-et-virtute.com/
http://ilookbothways.com
Information on Global and U.S. Issues: FightSlaveryNow.org
North Carolina Focus:
NC Stop Human Trafficking: http://ncstophumantrafficking.wordpress.com/
Triad Ladder of Hope: http://www.triadladderofhope.org/
Government Sites:
U.S. Department of Justice Web site: http://www.usdoj.gov/whatwedo/whatwedo_ctip.html.
U.S. Department of State, Office to Monitor and Combat Trafficking in Persons http://www.state.gov/g/tip
U.S. Department of Health and Human Services, Campaign to Rescue and Restore Victims of Human Trafficking http://www.acf.hhs.gov/trafficking/index.html
National Center for Missing and Exploited Children http://www.ncmec.org
United Nations Office on Drugs and Crime http://www.unodc.org/unodc/en/human-trafficking/what-is-human-trafficking.html
Presidential Proclamation:
The White House
Office of the Press Secretary
For Immediate Release
January 04, 2010
Presidential Proclamation - National Slavery and Human Trafficking Prevention Month
A PROCLAMATION
The United States was founded on the principle that all people are born with an unalienable right to freedom -- an ideal that has driven the engine of American progress throughout our history. As a Nation, we have known moments of great darkness and greater light; and dim years of chattel slavery illuminated and brought to an end by President Lincoln's actions and a painful Civil War. Yet even today, the darkness and inhumanity of enslavement exists. Millions of people worldwide are held in compelled service, as well as thousands within the United States. During National Slavery and Human Trafficking Prevention Month, we acknowledge that forms of slavery still exist in the modern era, and we recommit ourselves to stopping the human traffickers who ply this horrific trade.
As we continue our fight to deliver on the promise of freedom, we commemorate the Emancipation Proclamation, which became effective on January 1, 1863, and the 13th Amendment, which was sent to the States for ratification on February 1, 1865. Throughout the month of January, we highlight the many fronts in the ongoing battle for civil rights -- including the efforts of our Federal agencies; State, local, and tribal law enforcement partners; international partners; nonprofit social service providers; private industry and nongovernmental organizations around the world who are working to end human trafficking.
The victims of modern slavery have many faces. They are men and women, adults and children. Yet, all are denied basic human dignity and freedom. Victims can be abused in their own countries, or find themselves far from home and vulnerable. Whether they are trapped in forced sexual or labor exploitation, human trafficking victims cannot walk away, but are held in service through force, threats, and fear. All too often suffering from horrible physical and sexual abuse, it is hard for them to imagine that there might be a place of refuge.
We must join together as a Nation and global community to provide that safe haven by protecting victims and prosecuting traffickers. With improved victim identification, medical and social services, training for first responders, and increased public awareness, the men, women, and children who have suffered this scourge can overcome the bonds of modern slavery, receive protection and justice, and successfully reclaim their rightful independence.
Fighting modern slavery and human trafficking is a shared responsibility. This month, I urge all Americans to educate themselves about all forms of modern slavery and the signs and consequences of human trafficking. Together, we can and must end this most serious, ongoing criminal civil rights violation.
NOW, THEREFORE, I, BARACK OBAMA, President of the United States of America, by virtue of the authority vested in me by the Constitution and the laws of the United States, do hereby proclaim January 2010 as National Slavery and Human Trafficking Prevention Month, culminating in the annual celebration of National Freedom Day on February 1. I call upon the people of the United States to recognize the vital role we can play in ending modern slavery, and to observe this month with appropriate programs and activities.
IN WITNESS WHEREOF, I have hereunto set my hand this fourth day of January, in the year of our Lord two thousand ten, and of the Independence of the United States of America the two hundred and thirty-fourth.
BARACK OBAMA
It is hard to believe that, in America, we have people trapped and forced to work as laborers or prostitutes as slaves of human traffickers. North Carolina has been ranked in the top 8 most common sites for human trafficking. One of the reasons we are so popular is I85 and I95.
The problem in the U.S. is so serious, that President Barack Obama has declared January - National
Slavery and Human Trafficking Prevention Month
Human trafficking is the modern day version of slavery. These criminals force their victims into labor and it can be in any industry. The most common forms of enslavement include labor, such as farming or working in a sweatshop, and sex trade.
Human traffickers love the I85 and I95 highways in North Carolina and they also use another highspeed highway to recruit, enslave, and find new customers-the internet.
Human traffickers target those who are society’s most vulnerable, have the quietest voices and find it hard to fight back. Often, victims include immigrants and children. Children who are loners or runaways are also a popular target of cybertraffickers.
North Carolina passed a bill in 2007 which makes human trafficking a felony and offers state assistance to victims.
In the last several months there were several cases in human trafficking uncovered in North Carolina.
One recent case was a spa in Union County who was using Craiglist to advertise services and the clients had no idea the staff there had been coerced into a human trafficking scheme.
We also had the tragic case of Shaniya Davis who was allegedly sold into sex trafficking via the internet by her mother.
Human trafficking via the internet to enable their crime rings has long been on the radar of the law enforcement community.
Statistics:
2,300 Arrests: The FBI has been diligently fighting this evil crime resulting in 2,300 arrests. They have also recovered 170 kids during sting operations.
15,000-18,000: The number of people drafted into slavery each year in the U.S. (Source: U.S. Department of Health and Human Services)
2 Million: Estimated number of people worldwide drafted into slavery via Human Trafficking
A Few Recent NC Cases:
Sex Ring:
April 2009, a man was sentenced to 24 years in prison for operating a human trafficking sex trade between Charlotte and Washington. Girls were as young as 16 and smuggled in from Mexico.
Child Sex Case – Internet Sting:
June 2009, a Duke University official, was arrested after an Internet sting. He was charged with trafficking a 5 year old boy for sex. His name was provided by a defendant in a different trafficking case.
Spa case in Monroe – Ads on Craigslist:
In 2008, a spa in Union County was using Craiglist to advertise services that were offered by people who had been coerced into a human trafficking scheme.
Shaniya Davis – Mother allegedly sold her into sex trade via internet:
In NC we have the pending case and trial regarding the alleged human trafficking of Shaniya Davis. Her own mother alledgedly sold her daughter into the sex trade using the internet to find a buyer and to send messages. This case should be a wake up call to parents, teachers, and all caregivers.
THE DIRTY TOOLKIT THAT CYBERTRAFFICKERS USE:
Online Ads: Ads offering great jobs at high pay in big cities. Often they hide behind ads for modeling, singing, or acting. Sometimes they will offer to fly the person to the other city for the “interview”.
Online Auctions: Craigslist is considered a magnet for international sex trade of children via the adult services section.
Photo Sharing Sites: Bypasses printing photos and allows operations to disseminate photos online for viewing by prospective buyers.
Social Media: Cybercreeps will use Chatrooms, social sites such as Facebook and MySpace, to recruit or trick kids into joining their trafficking scheme. They use these sites and blogs to connect to other cybercreeps to barter, trade, and sell their victims.
HOW TO SPOT THE WARNING SIGNS:
Many of the warning signs that a child is a victim of trafficking, or is being recruited, are similar to signs that the child is being cyberbullied or being groomed by a pedophile. They may include one or more of the following:
Unexplained absences
Runs away or discusses running away from home
Exhibits bruises, suddenly withdraws from social gatherings, displays depression
Demonstrates a sudden change in attire
Behavior becomes erratic, severe mood swings
Suddenly has material possessions given to them by a “friend”
Hides emails, text messages, or other online posts
Extreme change in online behavior – suddenly online all the time or suddenly not interested in
being online
PUT AN END TO TRAFFICKING:
E: Engage your kids in a conversation about trafficking. Targets start as young at 12 years old.
N: Notify and advocate for change. Notify your elected officials and ask what they are doing to improve awareness, catching cybertraffickers, and convicting them.
D: Don’t fuel the criminal economy. Where possible, research and choose free trade or slave-free certified products.
HOW TO REPORT SUSPECTED TRAFFICKING:
1. Contact local law enforcement
2. If you are unsure and want to talk through the situation first, you can start with the National 24/7 Human Trafficking Resource Center at 1-888-373-7888.
3. If you want to report an incident, you can do so at the National Center’s CyberTipline at 1-800-the-lost or online at www.CyberTipLine.org
4. The FBI Human Trafficking Hotline is open 24 hours: 866.252.6850.
OTHER RESOURCES:
There are several websites that provide helpful information about Human trafficking. We have highlighted a few of them below:
Organizations:
Global Awareness, Outreach, and Victim Services: Polaris Project at www.PolarisProject.org
Check Your Chain Store’s Policies and write them letters about Human Trafficking at www.ChainStoreReaction.com
Sites that include tips plus blogs that cover human trafficking:
http://www.veritate-et-virtute.com/
http://ilookbothways.com
Information on Global and U.S. Issues: FightSlaveryNow.org
North Carolina Focus:
NC Stop Human Trafficking: http://ncstophumantrafficking.wordpress.com/
Triad Ladder of Hope: http://www.triadladderofhope.org/
Government Sites:
U.S. Department of Justice Web site: http://www.usdoj.gov/whatwedo/whatwedo_ctip.html.
U.S. Department of State, Office to Monitor and Combat Trafficking in Persons http://www.state.gov/g/tip
U.S. Department of Health and Human Services, Campaign to Rescue and Restore Victims of Human Trafficking http://www.acf.hhs.gov/trafficking/index.html
National Center for Missing and Exploited Children http://www.ncmec.org
United Nations Office on Drugs and Crime http://www.unodc.org/unodc/en/human-trafficking/what-is-human-trafficking.html
Presidential Proclamation:
The White House
Office of the Press Secretary
For Immediate Release
January 04, 2010
Presidential Proclamation - National Slavery and Human Trafficking Prevention Month
A PROCLAMATION
The United States was founded on the principle that all people are born with an unalienable right to freedom -- an ideal that has driven the engine of American progress throughout our history. As a Nation, we have known moments of great darkness and greater light; and dim years of chattel slavery illuminated and brought to an end by President Lincoln's actions and a painful Civil War. Yet even today, the darkness and inhumanity of enslavement exists. Millions of people worldwide are held in compelled service, as well as thousands within the United States. During National Slavery and Human Trafficking Prevention Month, we acknowledge that forms of slavery still exist in the modern era, and we recommit ourselves to stopping the human traffickers who ply this horrific trade.
As we continue our fight to deliver on the promise of freedom, we commemorate the Emancipation Proclamation, which became effective on January 1, 1863, and the 13th Amendment, which was sent to the States for ratification on February 1, 1865. Throughout the month of January, we highlight the many fronts in the ongoing battle for civil rights -- including the efforts of our Federal agencies; State, local, and tribal law enforcement partners; international partners; nonprofit social service providers; private industry and nongovernmental organizations around the world who are working to end human trafficking.
The victims of modern slavery have many faces. They are men and women, adults and children. Yet, all are denied basic human dignity and freedom. Victims can be abused in their own countries, or find themselves far from home and vulnerable. Whether they are trapped in forced sexual or labor exploitation, human trafficking victims cannot walk away, but are held in service through force, threats, and fear. All too often suffering from horrible physical and sexual abuse, it is hard for them to imagine that there might be a place of refuge.
We must join together as a Nation and global community to provide that safe haven by protecting victims and prosecuting traffickers. With improved victim identification, medical and social services, training for first responders, and increased public awareness, the men, women, and children who have suffered this scourge can overcome the bonds of modern slavery, receive protection and justice, and successfully reclaim their rightful independence.
Fighting modern slavery and human trafficking is a shared responsibility. This month, I urge all Americans to educate themselves about all forms of modern slavery and the signs and consequences of human trafficking. Together, we can and must end this most serious, ongoing criminal civil rights violation.
NOW, THEREFORE, I, BARACK OBAMA, President of the United States of America, by virtue of the authority vested in me by the Constitution and the laws of the United States, do hereby proclaim January 2010 as National Slavery and Human Trafficking Prevention Month, culminating in the annual celebration of National Freedom Day on February 1. I call upon the people of the United States to recognize the vital role we can play in ending modern slavery, and to observe this month with appropriate programs and activities.
IN WITNESS WHEREOF, I have hereunto set my hand this fourth day of January, in the year of our Lord two thousand ten, and of the Independence of the United States of America the two hundred and thirty-fourth.
BARACK OBAMA
Tuesday, December 15, 2009
Holiday Shopping: How to Get the Best Bargains Without the Boobytraps
You want to fill everyone’s Christmas stocking with good cheer but be careful of cybercriminals. We can help you find the best bargains without the boobytraps!
Some of the best deals of the season are online this year.
47% of merchants said they will use social media such as Twitter and Facebook to advertise the best deals.
This year offers some fantastic ways to find where the best bargains are and you can shop at home in your pajamas, while stuck at the airport, or even on your lunch break all with the touch of your finger!
Some companies are creating online exclusive offers. One example is Sears. Sears gave out fan only deals and a drawing for a gift card exclusively to their Facebook fans this year.
Here are 4 tips to find the best deals without the boobytraps!
1. One card: Use a specific credit card for your online purchases. Set up alerts to be sent to your phone and email so you know every time your card is used.
2. Keep a record: Save a screen shot or print out all receipts and hold for at least 90 days, longer if there is a warranty.
3. Be A Secure Shopper with CIS: Computer, Internet, Secure
Computer: Know the computer – do not use a communal computer or one that is not up to date on antivirus protection
Internet: Check your internet access – know how you access the internet – only make a purchase if you know your connection is safe
Secure: Secure Sites only - Check the Webname – it should include HTTPS: the S stands for secure. The website should include an icon of a padlock
4. Instant Access to Deals: Sign up for email alerts from your favorite stores. If you use social media sites such as, Twitter or Facebook, there are a lot of great deals posted on those sites.
Finding the Best Bargains:
There are several wonderful sites that you can use to help you find the best online bargains without tripping on the cybercriminal booby traps.
We have highlighted several sites that you may want to check out this year:
Etsy.com
RetailMeNot.com
Dealio.com
Offers.com
Cheaptweet.com
Savings.com
Extrabux.com
PriceGrabber.com
Shop.org
Dealnews.com
Fatwallet.com
SlickDeals.net
Amazon.com
Walmart.com
Target.com
Social Media:
Facebook:
On Facebook, you will find many vendors with pages you can become a fan of. Some are offering EXCLUSIVE deals for their Facebook fans.
Some highlights include:
ToysRUs
Best Buy
Sears
Macy’s
JCPenney
Twitter offers some great tips about upcoming sales and special offers.
Some Twitter accounts you may want to follow include:
@ToysRUs -
@SearsDeals -
@AmazonDeals
@WalmartSpecials
@NeweggHotDeals
@DellOutlet
Some of the best deals of the season are online this year.
47% of merchants said they will use social media such as Twitter and Facebook to advertise the best deals.
This year offers some fantastic ways to find where the best bargains are and you can shop at home in your pajamas, while stuck at the airport, or even on your lunch break all with the touch of your finger!
Some companies are creating online exclusive offers. One example is Sears. Sears gave out fan only deals and a drawing for a gift card exclusively to their Facebook fans this year.
Here are 4 tips to find the best deals without the boobytraps!
1. One card: Use a specific credit card for your online purchases. Set up alerts to be sent to your phone and email so you know every time your card is used.
2. Keep a record: Save a screen shot or print out all receipts and hold for at least 90 days, longer if there is a warranty.
3. Be A Secure Shopper with CIS: Computer, Internet, Secure
Computer: Know the computer – do not use a communal computer or one that is not up to date on antivirus protection
Internet: Check your internet access – know how you access the internet – only make a purchase if you know your connection is safe
Secure: Secure Sites only - Check the Webname – it should include HTTPS: the S stands for secure. The website should include an icon of a padlock
4. Instant Access to Deals: Sign up for email alerts from your favorite stores. If you use social media sites such as, Twitter or Facebook, there are a lot of great deals posted on those sites.
Finding the Best Bargains:
There are several wonderful sites that you can use to help you find the best online bargains without tripping on the cybercriminal booby traps.
We have highlighted several sites that you may want to check out this year:
Etsy.com
RetailMeNot.com
Dealio.com
Offers.com
Cheaptweet.com
Savings.com
Extrabux.com
PriceGrabber.com
Shop.org
Dealnews.com
Fatwallet.com
SlickDeals.net
Amazon.com
Walmart.com
Target.com
Social Media:
Facebook:
On Facebook, you will find many vendors with pages you can become a fan of. Some are offering EXCLUSIVE deals for their Facebook fans.
Some highlights include:
ToysRUs
Best Buy
Sears
Macy’s
JCPenney
Twitter offers some great tips about upcoming sales and special offers.
Some Twitter accounts you may want to follow include:
@ToysRUs -
@SearsDeals -
@AmazonDeals
@WalmartSpecials
@NeweggHotDeals
@DellOutlet
Holiday Shopping: Buying Tech Gadgets that are Fun & Educational for your kids
Still shopping for your kids and grandkids? Do you want to buy them a new tech gadget that is both fun and might help them with school or afterschool activities? You are not alone!
A recent survey said that the average shopper plans to spend around $200 on tech gadgets during the holidays. Tech gadgets are at the top of holiday wish lists for most kids. How do you sort through the ads and the gimmicks to find tech gadgets that are both fun and help with your kids’ education?
Kids want to have the latest gadgets that they see on TV commercials, in the movies, the ones that their friends are using, and most of all, they want to copy and be like you which means they want what you use.
There are some great gadgets this year on both the low end and high end of the budget that support both fun and education.
I have grouped a selection of fun and educational tech gadgets into four categories: Practical, Cool, Hands On and Games.
Practical: Computers, Electronic Readers, Computer Accessories
Cool: Smartphones, Gaming Systems, Power Mats, Virtual Keyboards, Smart Pens, Portable Secure Wireless
Hands On: Cameras that have Still & Video, Robots
Games: Fun and educational such as problem and puzzle solving
As with all purchases, make sure you have the following with you before you purchase:
1. Budget – how much you are willing to spend
2. Price – do your homework so you know if you are getting a good deal
3. Service – how will the child receiving the gift be able to get it serviced if there is a problem
4. Warranty – if you know the child will be hard on the gadget, including an extended warranty may
be a good option
Practical: Computers, Electronic Readers, Computer Accessories
Computers – Desktop or Laptop but Laptops are usually asked for more frequently by kids.
Electronic Readers – Your kids can download newspapers and books and tag key research items that they might need for homework such as quotes and statistics.
Computer
Most kids are asking for laptops so they have the ultimate in flexibility and portability.
Windows 7 on a Desktop under $1200: HP TouchSmart 600 has touch applications where your kid can use a touch of the screen instead of a mouse. Sleek all-in-one design packs a nice PC into a 23.5 inch monitor.
Mac on a Desktop: the iMac starts at under $1200 and offers a wireless keyboard and their newly designed Magic Mouse. Screens start at 21.5 inches and go up to 27 inches. Great all-in-one design fits on desks short for space.
Windows 7 Laptops under $600: Dell Studio 15, HP Pavilion dm3, Lenovo G550 2958
Mac Laptops under $1200: Apple MacBook Pro has a longer batter life with a sleep aluminum unibody design.
Electronic reader
The top 3 choices this year are: Amazon Kindle, Sony Reader, and Barnes & Noble Nook
Accessories
Accessories to consider are: extra batteries, carrying cases, adapters for car use, printers, copier/fax, scanners, mouse, headsets.
Cool – Smartphones, Gaming Systems, Power Mats, Virtual Keyboards, Smart Pens, Portable Secure Wireless
Smartphones can provide your kids with easy access to educational information and use it as a device where they can call or text you to let you know they are safe. Some of the top choices are iPhone, BlackBerry Storm, Motorola Droid. Your purchase will also include a monthly service charge so make you understand contract options before buying the device.
Gaming Systems can provide your kids with a platform to surf the net, communicate with friends, store pictures, and play educational games. Some of the top choices are PlayStation, Wii Nintendo, and Xbox.
Power Mats are designed to recharge many devices such as phones, computers, music players on one mat saving space and eliminating cords.
Virtual Keyboards project an image of a keyboard onto a desktop so you can do away with a separate keyboard. Using Bluetooth technology, you can project a virtual keyboard to use with your computer or smartphome. If your kids watch CSI, they will have seen this cool capability on that show. You can find more information at ThinkGeek.com
Smart Pens offer different features and functions. Some can record what you say and translate it to text. Others can take short videos. Some can copy printed words that you can upload to your computer. For younger users, Poingo and the LeapFrog tag reading system use smart pens to help your budding reader. For older kids, look at SpyNanny, LiveScribe and Oregon Scientific,
Portable Secure Wireless: You can use a broadband access card as a cheaper option. If more than one device needs to connect, consider the Sprint or Verizon MiFi option. With the purchase of a small device and a monthly fee, you can connect up to 5 devices at a time on a secure wireless network.
Hands On: Cameras that have Still & Video, Robots
Unique: Pets-Eye View Camera from National Geographic allows you to see what your dog or cat sees.
Cameras for Younger Kids: Lego and Vtech Kidizoom Plus
Cameras for Older Kids: Nikon D300, Panasonic Lumix, Sony CyberShot, Canon PowerShot
Robot for Younger Kids: Matchbox has a Rocky the Robot Truck that is an interactive robot and dump truck or you can program a soft and furry friend such as the My Pal Scout by LeapFrog.
Robot for Older Kids: Tin Can Robot kit from Green Science. The Lego and Roborover allow your kids to build robots that can also be programmed to do different tasks and functions.
Games: Fun and educational such as problem and puzzle solving.
This season you have many choices. We have highlighted a few for you. A tip to make sure your game is Family Friendly is to check the rating. When shopping for a game, look for “E” somewhere on the box or the website. The “E” means the Entertainment Software Rating Board has reviewed it and it is suitable for “Everyone”. If it says "E10+", this means that the game is meant for Everyone 10 and older.
Family Friendly & Educational Games:
ItzaZoo: Teaches children how to read or improves their reading skills. Your kid goes on adventures with zoo animals.
Dora Saves the Crystal Kingdom: Learn problem solving and Spanish. Kids join Dora for adventures.
LittleBigPlanet : Great for teaching problem solving. You help a little boy named Sack Boy navigate by solving puzzles.
Scribblenauts: Puzzle solving and spelling. You study a puzzle and spell an object that you need to have to resolve the puzzle.
Mattel’s Mind Flex: Using mind and body, this game uses NeuroSky technology to measure your theta-wave brain activity. As you concentrate, you can power a fan with your mind that pushes a ball.
KidZui.com: This is a web browser designed to keep kids safe online. It also provides access to kid friendly games, social networking, and filters youtube videos for age appropriateness.
Video:
http://www.wbtv.com/Global/story.asp?S=11666296
A recent survey said that the average shopper plans to spend around $200 on tech gadgets during the holidays. Tech gadgets are at the top of holiday wish lists for most kids. How do you sort through the ads and the gimmicks to find tech gadgets that are both fun and help with your kids’ education?
Kids want to have the latest gadgets that they see on TV commercials, in the movies, the ones that their friends are using, and most of all, they want to copy and be like you which means they want what you use.
There are some great gadgets this year on both the low end and high end of the budget that support both fun and education.
I have grouped a selection of fun and educational tech gadgets into four categories: Practical, Cool, Hands On and Games.
Practical: Computers, Electronic Readers, Computer Accessories
Cool: Smartphones, Gaming Systems, Power Mats, Virtual Keyboards, Smart Pens, Portable Secure Wireless
Hands On: Cameras that have Still & Video, Robots
Games: Fun and educational such as problem and puzzle solving
As with all purchases, make sure you have the following with you before you purchase:
1. Budget – how much you are willing to spend
2. Price – do your homework so you know if you are getting a good deal
3. Service – how will the child receiving the gift be able to get it serviced if there is a problem
4. Warranty – if you know the child will be hard on the gadget, including an extended warranty may
be a good option
Practical: Computers, Electronic Readers, Computer Accessories
Computers – Desktop or Laptop but Laptops are usually asked for more frequently by kids.
Electronic Readers – Your kids can download newspapers and books and tag key research items that they might need for homework such as quotes and statistics.
Computer
Most kids are asking for laptops so they have the ultimate in flexibility and portability.
Windows 7 on a Desktop under $1200: HP TouchSmart 600 has touch applications where your kid can use a touch of the screen instead of a mouse. Sleek all-in-one design packs a nice PC into a 23.5 inch monitor.
Mac on a Desktop: the iMac starts at under $1200 and offers a wireless keyboard and their newly designed Magic Mouse. Screens start at 21.5 inches and go up to 27 inches. Great all-in-one design fits on desks short for space.
Windows 7 Laptops under $600: Dell Studio 15, HP Pavilion dm3, Lenovo G550 2958
Mac Laptops under $1200: Apple MacBook Pro has a longer batter life with a sleep aluminum unibody design.
Electronic reader
The top 3 choices this year are: Amazon Kindle, Sony Reader, and Barnes & Noble Nook
Accessories
Accessories to consider are: extra batteries, carrying cases, adapters for car use, printers, copier/fax, scanners, mouse, headsets.
Cool – Smartphones, Gaming Systems, Power Mats, Virtual Keyboards, Smart Pens, Portable Secure Wireless
Smartphones can provide your kids with easy access to educational information and use it as a device where they can call or text you to let you know they are safe. Some of the top choices are iPhone, BlackBerry Storm, Motorola Droid. Your purchase will also include a monthly service charge so make you understand contract options before buying the device.
Gaming Systems can provide your kids with a platform to surf the net, communicate with friends, store pictures, and play educational games. Some of the top choices are PlayStation, Wii Nintendo, and Xbox.
Power Mats are designed to recharge many devices such as phones, computers, music players on one mat saving space and eliminating cords.
Virtual Keyboards project an image of a keyboard onto a desktop so you can do away with a separate keyboard. Using Bluetooth technology, you can project a virtual keyboard to use with your computer or smartphome. If your kids watch CSI, they will have seen this cool capability on that show. You can find more information at ThinkGeek.com
Smart Pens offer different features and functions. Some can record what you say and translate it to text. Others can take short videos. Some can copy printed words that you can upload to your computer. For younger users, Poingo and the LeapFrog tag reading system use smart pens to help your budding reader. For older kids, look at SpyNanny, LiveScribe and Oregon Scientific,
Portable Secure Wireless: You can use a broadband access card as a cheaper option. If more than one device needs to connect, consider the Sprint or Verizon MiFi option. With the purchase of a small device and a monthly fee, you can connect up to 5 devices at a time on a secure wireless network.
Hands On: Cameras that have Still & Video, Robots
Unique: Pets-Eye View Camera from National Geographic allows you to see what your dog or cat sees.
Cameras for Younger Kids: Lego and Vtech Kidizoom Plus
Cameras for Older Kids: Nikon D300, Panasonic Lumix, Sony CyberShot, Canon PowerShot
Robot for Younger Kids: Matchbox has a Rocky the Robot Truck that is an interactive robot and dump truck or you can program a soft and furry friend such as the My Pal Scout by LeapFrog.
Robot for Older Kids: Tin Can Robot kit from Green Science. The Lego and Roborover allow your kids to build robots that can also be programmed to do different tasks and functions.
Games: Fun and educational such as problem and puzzle solving.
This season you have many choices. We have highlighted a few for you. A tip to make sure your game is Family Friendly is to check the rating. When shopping for a game, look for “E” somewhere on the box or the website. The “E” means the Entertainment Software Rating Board has reviewed it and it is suitable for “Everyone”. If it says "E10+", this means that the game is meant for Everyone 10 and older.
Family Friendly & Educational Games:
ItzaZoo: Teaches children how to read or improves their reading skills. Your kid goes on adventures with zoo animals.
Dora Saves the Crystal Kingdom: Learn problem solving and Spanish. Kids join Dora for adventures.
LittleBigPlanet : Great for teaching problem solving. You help a little boy named Sack Boy navigate by solving puzzles.
Scribblenauts: Puzzle solving and spelling. You study a puzzle and spell an object that you need to have to resolve the puzzle.
Mattel’s Mind Flex: Using mind and body, this game uses NeuroSky technology to measure your theta-wave brain activity. As you concentrate, you can power a fan with your mind that pushes a ball.
KidZui.com: This is a web browser designed to keep kids safe online. It also provides access to kid friendly games, social networking, and filters youtube videos for age appropriateness.
Video:
http://www.wbtv.com/Global/story.asp?S=11666296
Subscribe to:
Posts (Atom)