Excerpt: Did you know that cyberthieves also have Black Friday and Cyber Monday sales – of stolen credentials, including IDs, passwords, e-mails, credit card info, addresses, etc.? Your information IS their product so be wary of making it easy for them to engage in identity theft.
Archives for November 2014
With online shopping on the rise during the holiday season, here are some tips to keep your information safe:
In this edition of The Digital Edge, Sharon Nelson and Jim Calloway present their favorite tech toys for the holidays. Nelson and Calloway have each picked out their choice of new electronics for themselves or loved ones. These new gadgets range in practicality from the Microsoft Surface Pro 3 to a bacon scented alarm clock and they range in price from a $20 Bluetooth Shower Speakerphone/Radio to a glass yacht that you can’t afford if you care how much it costs. Other products include a tablet, an Apple integrated flash drive, a cheap drone, noise-cancelling headphones, a flux capacitor USB port for your car, rhumbas for your grill and driveway, and even a Yeti cup. Tune in for inspiration and awe on the direction technology is heading. Who knows, you might hear about a new tech toy you have to have!
#SenseiSherlock was delighted to be invited to the “almost retired” lunch for Sharon and John’s dear friend Bill Reichhardt and his wife Sharon.
On this episode of Digital Detectives, Sharon Nelson and John Simek interview cybersecurity expert David Bodenheimer about the effects of cyber attacks, whether they are likely to proliferate, the connection between the private sector and government defense, and the legal risks to contractors and bystanders. Bodenheimer first explains how economic cyber crimes are different than cyber war, and gives some examples like the US cyber security threat in 2009, the 2007 cyberattacks on Estonia, and Stuxnet, a computer worm that destroyed many control systems in Iranian nuclear plants. He explains that there is a global cyber race and, in a few years, no self-respecting military will be without cyber attack capabilities. Unfortunately, there are no international treaties or laws that directly govern cyber weapons and war. Bodenheimer also discusses US laws that federal agencies and contractors could face to account for damages. These could include the DHS SAFETY Act, Public Law 85-804, and various legislative proposals, but there is no clean fit.
Excerpt: In the simplest terms, cryptography is the science of secret communication. It involves transmitting and storing data in a form that only the intended recipient can read. Encryption is one form of cryptography.
Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form (plaintext), so it can be understood.
#SenseiSherlock was happy to meet Elizabeth Ewing who was kind enough to invite John and Sharon to speak on cybersecurity to the Virginia School Board Association in Williamsburg.
Sensei recently became a proud sponsor of The City of Fairfax Band.
By their active participation, ensembles and members of the City of Fairfax Band Association (CFBA) support performing arts in the Fairfax community and in the greater Northern Virginia and Washington DC metropolitan area. Led by talented and experienced musical staff, CFBA ensembles have entertained the citizens of Fairfax, the Commonwealth of Virginia (including Richmond, Yorktown, Orkney Springs, and Fredericksburg), and the Washington, DC metropolitan area for 40 years.
#SenseiSherlock was in awe of Gaudi’s design of the basilica Sagrada Famila in Barcelona. He promises to come back when it’s finished in 12 years!
#SenseiSherlock enjoyed a nice siesta with his friend Ferdinand outside Pura Brasa in Barcelona.