It’s very common for our personal info to appear in a data breach, including emails and passwords. Sad to say, it’s now a fact of online life. Thankfully, knowing is half the battle. There’s much we can do to protect ourselves.
Here’s what you can do right away:
- Use a STRONG password on your email account. This is your most sensitive, important online account, so it deserves a strong password that you don’t use on any other web sites.
- Subscribe to a free breach notification service. If a web site you use suffers a breach, you’ll receive an alert letting you know. You can then change those passwords. We recommend Have I Been Pwned . This is a free service; there’s no catch or upsell. It’s run by a concerned citizen looking out for other people online.
- Use a password manager app! They make it much easier to create and use long, complex passwords that are unique for each web site you use. Password reuse is a major risk, allowing a breach on one web site to spread to others. Any reputable password manager will do a good job, including iCloud Keychain for iOS, Mac and Google Saved Passwords for Android, Chrome browser.
- Reset your password on web sites where you’ve used the same password as other sites. Use your password manager to generate new passwords. If you need a password manager, and don't know where to get one, check out our top menu, left side, for APPLICATIONS > RESOURCES > APPS & SOFTWARE TOOLS > PASSWORD MANAGEMENT.
- Enable two-factor authentication (2FA) on web sites that support it , especially your email account!
This line is spoken by Reverend Mother Gaius Helen Mohiam in the novel Dune, written by Frank Herbert (1965).
A graphic example from NPR.org
Apple Inc. Chief Executive Officer Tim Cook called on the Federal Trade Commission to track data brokers and monitor how they use people’s digital information, the latest privacy push by the iPhone maker.
In the Incubator.org Community area, you can tag people based on a various different parameters and cases, depending on the friendship status, privacy, replies, group or event membership and many other factors.
- When you compose a new post from post box on profile or home page, you will only be able to tag yourself and your friends.
- When you reply to activity stream item on the home or profile page, you will be able to tag yourself, all your friends and everyone who participated in that particular story.
- In public group or public event, you will be able to tag yourself, all your friends, and all members of that particular group or event.
- In private group or private event, you will only be able to tag yourself and members of that group or event.
- In private messages, when there are more than two (2) people in conversation, you can tag all participants in the conversation.
- Tagging on photo, video and album comments is also available and you can tag the owner of the item, as well as existing commenters.
- You can not tag same person more than once in single item.
- All tagged people will recieve a proper notification that they are being tagged.
Tagging is initiated by @ character continued with peoples name. All available people you can tag will be shown in the dropdown to choose from. Select who you want to tag, and continue writing the message.
In the Incubator.org Community area, you can tag videos that you have uploaded, as well as videos uploaded by your friends.
Simply navigate to the video you want to tag, and if you have permission to tag the video, "Tag this video" option will show up.
In the Incubator.org Community area, you can tag photos that you have uploaded, as well as photos uploaded by your friends.
Simply navigate to the photo you want to tag, and if you have permission to tag the photo, "Tag this photo" option will show up .
There's a Whole List of Popular Apps Sending Your Data Off to Facebook
Popular Android apps send off your data even if you never log in to Facebook with them.
The new study from Privacy International sheds light on a slew of popular Android apps that provide user data to Facebook without the explicit consent of users who don't necessarily have to be logged in to Facebook or even maintain an account to have their data snagged.
Of the 34 apps examined in the study, 20 were found to share data with Facebook, sometimes at the exact point of activating the app. The apps examined, which include the language study guide Duolingo and the travel-booking giant Kayak, were built using the open-source Facebook Software Development Kit (SDK). Sixty-one percent of the apps tested were found to transmit data back to Facebook "from the moment a user opens the app," according to the study.
The Digital Skills Curriculum Group includes: Activities and Interactions of participants in CCLAC's Generations Communication Centers (GCC) and students, teachers & mentor's involved with Incubator.org's Digital Literacy Curriculum will find Announcements, Discussions, and helpful information in...
On Saturday, Dec. 29 Enrique Feldman will be performing on piano/vocals along with: Nick Coventry, Violin Guillermo "Bubba" Fass, Congas and Vocals Style of Music: Original Latin Fusion influenced by Cuban music, Flamenco and Jazz Food: available for purchase at 6pm by Enrique's son's catering...
On Saturday, Dec. 29 Enrique Feldman will be performing on piano/vocals along with: Nick Coventry, Violin Guillermo "Bubba" Fass, Congas and Vocals Style of Music: Original Latin Fusion influenced by Cuban music, Flamenco and Jazz Food: available for purchase at 6pm by Enrique's son's catering co....
- Saturday, 29 December 2018 07:00 PM
- Location: Crooked Tooth Brewing at 228 E. 6th St.
Women are key to solving the workforce shortage, which is expected to reach 3.5 million open jobs by 2022.
As the cybersecurity industry continues to struggle to meet a workforce gap – an estimated 3.5 million jobs are expected to remain unfilled by 2021 – it’s clear that encouraging women and those from diverse backgrounds to pursue careers in the field will be a key factor in staying ahead of the threat landscape. Changes at the RSA conference, scheduled for February in San Francisco, along with a handful of large companies stepping up to the plate with training and recruitment efforts, show that the industry may finally be getting serious about addressing the issue.
While diversity in general is an issue in tech, women are particularly underrepresented. They hold about 26 percent of tech jobs according to a research report by The American Association of University Women (AAUW), and in cybersecurity specifically that drops to just 11 percent of roles globally being held by women according to the (ISC)2 2017 Global Information Security Workforce: Women in Cyber Security study.
This is a story about how to perceive the population of cities.
Matt Daniels has created a way of showing where each dot on the map represents 1,000,000 square meters and the areas with the most people show as deeper shades of red. Then he shows another way to look at population, by growing each dot into a 3D block appearing as Population Mountains.
Check it out: https://pudding.cool/2018/12/3d-cities-story/