media (30)

Contrast media enhance and boost image quality (or pictures), so that the radiologist (a medical doctor qualified to analyze the pictures and give a written report to the patient's physician or medical) may report more reliably on how the body functions and whether there is any illness or abnormality present.

8028312866?profile=original

Contrast media, also called contrast agents, are used for blood enhancement and tissue perfusion. This includes computed tomography (CT) based contrast based on iodine, MRI based agents base

Read more…

We all get scam phone calls, but the newest one is meant to scare. When you pick up the phone, you get a message that your Social Security number is suspended due to suspicious activity, and then prompts the victim to speak with an agent to get help.

The FTC makes something very clear: your Social Security number cannot be suspended for any reason, so any call that states your SSN is under suspension is a scam. What they are really trying to do is to trick you into giving them your actual Social

Read more…

Social media is an excellent tool for small businesses, yet, the use of social media by small business staff can definitely put the company in danger. Many small business owners and managers don’t realize this.

Recently, I was talking to employees of a credit union about what to do in a robbery. Before this presentation, police officers had staged a robbery in the same credit union. The fake robbery was so real, some of the tellers were brought to tears, thinking they were really getting robbed.

A

Read more…

There are many ways that you or a small business could get caught up in a social media disaster. Can you think of any off the top of your head? If you are like most of us, probably not. Here are 14 ways that you could be in danger:

  1. A Terrible Online Reputation – Do you keep a watchful eye on you or your business’ Facebook page? Are people posting to it? Are your staff? Even things that seem good-natured at first can be taken the wrong way by friends or potential customers.
  2. Racy Images or Text – If
Read more…

Have you been thinking that it’s time to make the drastic choice to remove yourself from social media? Most of us were quick to join the social media bandwagon, but these days, you might have worries about privacy. Though it’s possible to delete yourself from social media, the process isn’t easy, and it might not be totally foolproof.

Why Do You Want to Leave?

Before getting into how to delete yourself from social media, it’s important to ask yourself why you want to leave. Experts say totally del

Read more…

Getting Owned or Pwned SUCKS!

A well done New York Times article recently re-introduced this topic to the masses. Being “owned” isn’t new, but the term is not becoming part of popular culture. If you use the internet or are often on social media, odds are good that you have been OWNED. Whether you are called out for a misspelling on your latest Facebook post, or you were proven wrong after sharing a “fact” or post from another site…you have probably been owned.

The word “owned” comes from the hacker world, and real “ownage” i

Read more…

Parents Beware of Finstagram

You have surely heard of Instagram, the photo sharing social network, but what about “Finstagram?” If you are like most parents, you have rules about the social media practices of your kids. However, once you learn about Finstagram, those might all go out the window.

When you combine the words “fake” and “Instagram,” you get Finstagram. Essentially, these are fake, or alternative, Instagram accounts that are created by teens, for the most part. These accounts can be used for harmless laughs, such

Read more…

Gone are the days when social media is only used to share what you had for dinner or announcing to the world that you are headed to the gym. But social media has become a platform for any and everyone to say what’s on their mind, and sometimes that’s great, but all too often it isn’t. Social is significantly lacking in decorum. But at least some are using social for good.

These days, law enforcement is using social media to find missing children.

Washington, DC police are leading the way on this.

Read more…

8028254897?profile=original

“Peeping Pigs” and Propaganda by Omission

By Edward Curtin

Global Research, March 05, 2017

Theme: Media Disinformation, Science and Medicine

The creatures outside looked from pig to man, and from man to pig, and from pig to man again; but already it was impossible to say which was which. - George Orwell   Animal Farm

While there is much talk these days about “fake news,” omitting important news is perhaps as widespread and egregiously harmful to an informed public.  The following report tries to reme

Read more…

8028259887?profile=original

“Fake News”: The Latest Weapon in Information Space

By Tony Cartalucci

Global Research, January 16, 2017

 

The ability for technology and innovations to transform global economics and geopolitics is often underestimated, even sidelined in retrospect.

However, from the technological achievements that gave the British Empire mastery over the seas, to the industrial revolution that eventually disrupted and unraveled the empire’s carefully constructed global system of mercantilism, the march of technolog

Read more…

Set Privacy on these Social Media Apps

Just like older generations never thought that the dial phone in the kitchen could be dangerous (think phone scams), today’s kids don’t have a clue how hazardous smartphone apps can really be. They are a godsend to pedophiles, scammers and hackers. And let’s not forget other kids who just want to be cruel bullies.

Parents should have informative discussions with their kids about the various apps out there. And it’s okay to forbid particular apps you aren’t comfortable with. Like Musicly, search “

Read more…

The Dark Web, according to LeakedSource, got ahold of 33 million Twitter account details and put them up for sale. Twitter thus locked the accounts for millions of users.

Twitter, however, doesn’t believe its servers were directly attacked. So what happened? The bad guys may have created a composite of data from other breached sources. Or, they could have used malware to steal passwords off of devices.

Nevertheless, the end result meant that for many Twitter accounts, there was password exposure—l

Read more…

The Panama Papers: Why Iceland?

8028248088?profile=original

The Panama Papers: Why Iceland?

 

Written by:

Gearoid O Colmain

http://www.gearoidocolmain.org

The most unusual aspect of this week’s ‘Panama Papers’ scandal was the appearance of the Icelandic Prime Minister Sigmundur Davíð Gunnlaugsson alongside the West’s favourite ‘bad guys’, Russian President Vladimir Putin and Syrian President Bashar Al-Assad. 

Iceland rarely makes world headlines and for most people this was probably the first time they had ever seen the country’s Prime Minister. There is a goo

Read more…

Stop being a blabber on Social Media

Are you a cyber-blabber? Even a post about your daily afternoon foray to the sub sandwich shop could get you in trouble: A burglar reading this knows when to rob your house. But it doesn’t end there. STOP THE MADNESS!

The Giants: Facebook and Twitter

  • Be careful what you post on Facebook and tweet about. It can be used against you in court, even something as innocuous as: “I’m training for my very first 10K.” Not good if you’re suing someone who hit your car for back pain and suffering.
  • Lawyers will
Read more…

LinkedIn targeted by Scammers

LinkedIn is a free service that allows professional people to network with each other. Often, a LinkedIn member will receive an e-mail from another LinkedIn member “inviting” them to join their network. Sometimes, the inviter is someone the recipient doesn’t know, but the recipient will link up anyways. And that’s the problem.

A report at www.secureworks.com says that Dell SecureWorks Counter Threat Unit™ (CTU) researchers discovered 25 phony LinkedIn profiles.

With this particular phony network (

Read more…

8028237663?profile=original

Google Degenerates into Ministry of Truth; All Knowledge Must Now Be Pre-approved by Search Algorithm

Gone are the days when you could search Google and pull up neutral, relevant content appropriate to your search query. The search engine giant is reportedly pioneering a new search algorithm that will tailor search results not based on popularity or accuracy, but rather on what Google itself deems to be truthful or untruthful.

The

Read more…

8028238276?profile=original

The 2015 Social Media Glossary: 207 Essential Definitions

Source:

Dara Fontein

Hootsuite

Dara is a Blog Writer at Hootsuite. She writes about social media, technology, and Hootsuite happenings.

A lot can change in a year, especially in the world of social media. It can be difficult to keep up with all of the terms and slang used with the introduction of new technologies and platforms, so we decided it was time to update our Social Media Glossary. Like previous editions of the glossary, this is a livi

Read more…

Stay Safe While Traveling this Summer

So, when you think about summer travel safety, what comes to mind? Which beach you’ll be lounging on? Sunburns? Shark attacks? While sunburns and vacation plans are rational concerns most have when traveling during the summer, shark attacks are a new one.

With all of the news of recent shark attacks, people are now anxious about wading into the waters, despite the fact that the chances of getting mauled by a shark are a whopping one in 3.7 million. No guarantees, of course, but your odds are look

Read more…

Social Media Scams on the rise

Social media is a conduit for thieves to get personal data (they can use it, for instance, to open up a credit line in the victim’s name). Though many people are concerned their personal information will get in the wrong hands, the funny thing is that they continue posting personal information—way too personal.

The FBI’s Internet Crime Complaint Center says that social media is a fertile area for criminals to scam people.

Phishing

You are lured to a phony website that masquerades as your bank or so

Read more…

Catphishing is a Heartless Scam

When someone online presents as a different person than their true self, this is called catphishing, and it occurs on online dating sites.

  • Google the name of the object of your interest. Obviously, “Kelly Smith” and “John Miller” won’t get you far, but “Jaycina McArthur” just might. What comes up?
  • See if they have social media accounts, as these suggest they’re a real person. But the absence doesn’t prove they’re a phony, either. Not every legitimate person is into the social media thing.

Here are

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead