... TO ... This article may be ... in ... and on web sites provided ... is provided to the author, and it appears with the included ... resource box and l
PERMISSION TO REPUBLISH: This article may be republished in newsletters and on web sites provided attribution is provided to the author, and it appears with the included copyright, resource box and live web site link. Email notice of intent to publish is appreciated but not required. Mail to: eagibbs@ureach.com
You may have heard of Roger von Oech's book, A Whack on the Side of the Head: How to Unlock Your Mind for Innovation. It's as much fun to read as its title suggests. It covers the ten common obstacles to creative thinking. It's about ways in which you can unlock your mind for innovation, for change, for more interest, or even for a career change.
Mr. Von Oech writes about the time when his English teacher in high school put a small chalk dot on the blackboard and asked the class to tell him what it was. A few seconds passed, and then someone said, "It's a chalk dot on the board." The rest of the class seemed relieved that the obvious had been stated, and no one else had anything more to say.
"I'm surprised at you," replied the teacher, "Yesterday I did the same exercise with a group of kindergartners, and they thought of fifty different things the chalk mark could be:
Living in the Age of the Internet Gangster, Part Three of Three: Sleeping with the Phishes . . .
One of the newest phishing trends to emerge has almost everybody in the security industry concerned: Trojan phishing. So-called Trojan programs, named after the horse of mythology that put the Greeks inside Troy's city walls, disguise themselves as beneficial files, but actually enable hackers to gain access to computers from remote locations to steal account information directly from a computer.Living in the Age of the Internet Gangster, Part Two of Three: An Evolution of Professional-class ..
Members of the hacker community throughout that region now are adapting to take advantage of the latest phishing scams. As a natural transition is taking place, "phishing" is the term applied to online schemes that attempt to lure people into giving up sensitive information, such as passwords or credit card numbers, by masquerading as trustworthy sources.Your Child's First Year at College: Prime Target for Identity Theft?
If your son or daughter is a recent high school graduate and college freshman, he or she is the ideal target cybercriminals are looking. "Why?" you might ask. For cybercriminals the answer is easy and highly profitable.