One can easily see in the emerging information and cyber war that a nation having its own IT infrastructure, its own hardware, and its own versions of social media platforms is quickly becoming a matter of national security. Without control over these assets, a nation must depend on foreign suppliers for their computers, peripheries and software. Already, this dependence has opened nations up to now evident threats including malw
All Posts (6122)
Don’t assume you’ll never be targeted by phone scammers just because you don’t have a cell phone; they continue to feast on landline users, especially those over 50.
“This is the IRS…”
- Drill this into your head: The IRS never calls to collect back taxes. NEVER.
- A common ploy is to threaten that the listener will go to prison if they don’t pay up immediately.
- If you really do owe taxes, the IRS will contact you alright—but via snail mail, not a phone call, text or e-mail.
- Scam calls may also sound pro
We Can’t Rein In the Banks If We Can’t Pull Our Money Out of Them
Martin Armstrong summarizes the headway being made to ban cash, and argues that the goal of those pushing a cashless society is to prevent bank runs … and increase their control. What do you think?
The central banks are … planning drastic restrictions on cash itself. They see moving to electronic money will first eliminate the underground economy, but secondly
Enterprise Risk Management (ERM) Software, unfortunately, is a poorly defined (and often poorly executed) concept, but by structuring your vendor selection around the core concepts of Enterprise Risk Management, Risk Managers can mitigate the inherent risks that accompany a software implementation.
Common Pitfalls of ERM Programs
The common maturity process of an ERM programs looks something like this: define our purpose with an ERM charter, define our process, and then seek automation to support
So just how are hackers able to penetrate all these huge businesses? Look no further than employee behavior—not an inside job, but innocent employees being tricked by the hacker.
A recent survey commissioned by Intel Security reveals that five of the top seven reasons that a company gets hacked are due to employee actions.
One of the things that make it easy to trick employees into giving up critical information is the information employees share on social media about their company.
People just fre
10 years ago, many of us were hearing about social media for the first time. Now, social media plays a giant role in our lives, allowing us to share pictures, connect with family and friends, and get updated news. Through social media, we can express ourselves to our inner circle and the world.
So how devastating would it be if someone got a hold of your social media accounts?
They could really wreak some havoc, like sending dirty links to all of your followers on Twitter. Or worse, take personal
Enrique Suarez Introducing to:
Matthias Chang
The original article appeared on Global Research on July 08, 2013
Excess Reserves at the Federal Reserve. One of The Biggest Financial Scams In History: A Whopping US$1.794 Trillion
Banks’ excess reserves at FED is one of the biggest scam by the FED and there is a conspiracy of silence as to its actual implications. Economists and financial analysts spewing nonsense to mislead and divert attention to non-issues so that the public is kept in the dark.
The
Everyone’s heard of spam as it pertains to emails. Spam isn’t necessarily a malicious message designed to trick you into revealing your credit card number or PayPal login information.
But spam is an unsolicited message, sometimes referred to as junk mail. Spam can be very annoying and relentless in nature, often attempting to convince you to buy something. Sometimes these messages are untruthful, such as those advertising human growth hormone pills (when they actually contain nothing of the sort)
Burglars don’t usually depend upon the light of the moon to break into homes; they depend on the daylight—because that’s when they know most homes are empty! The kids are in school, the adults are at jobs or shopping…duhhh, even a halfwit burglar knows this is an opportune time!
Therefore, you should get a home security system that’s designed to repel robbers in both the dead of day, not just night. This includes while you’re home. And when you are home, a burglary turns into a “home Invasion” wh
Presented
By:
Enrique Suarez
Why Public Banks Outperform Private Banks: Unfair Competition or a Better Mousetrap?
Public banks in North Dakota, Germany and Switzerland have been shown to outperform their private counterparts. International private competitors have responded by pushing for regulations limiting the advantages of the public banking model, but public banking advocates are pushing back.
In November 2014, the Wall Street Journal reported that the Bank of North Dakota (BND), the nation’s o
Enrique Suarez
http://www.wix.com/suarezenrique/delta
School children in Nepal’s Matatirtha village practice an earthquake drill in the event of a natural disaster. A 7.8-magnitude earthquake in Nepal on Apr. 25, 2015, has endangered the lives of close to a million children. Credit: Department of Foreign Affairs and Trade/CC-BY-2.0
UNITED NATIONS – The death toll has now passed 3,300, and there is no telling how much farther it will climb. Search and rescue operations in Nepal entered
Yes, it’s possible: preventing fraudsters from getting you via online trickery and other stealthy actions. Yes, it’s possible to be thinking one step ahead of cyber criminals. Let’s begin with e-mails—the conduit through which so many cyber crimes like ID theft occur.
- Imagine snail-mailing vital information like your SSN, bank account number, a duplicate of your driver’s license and your credit card number. At some point in the delivery process, someone opens the letter and see the contents. Elec
Well, you know that old saying: The viciousness of an online bully’s attack is inversely proportional to the size of his (you fill in the blank), I was thinking ego.
Many online bullies are female, but in the case of former Red Sox pitcher Curt Schilling’s daughter, the trolls are collectively male.
Recently Schilling tweeted how proud he was that his daughter, Gabby, will be playing softball as a pitcher for Salve Regina University. Schilling got a lot of responses. And some were disgusting, incl
Risk Leadership: What is the purpose of a policy or a framework?
I have seen many, many corporate policies and frameworks in my time. The one great tendency of the authors of policies and frameworks is to put way too much information into them.
The other day I decided to sit down and sort out the difference between a policy, a framework and “the rest” of the information that one needs to provide so that the intent of the policy can be fulfilled. I hope this helps clear it up in your head if you
Enrique Suarez Introducing:
Prof. Dr. MUJAHID KAMRAN is Vice Chancellor, University of the Punjab, Lahore, Pakistan
Since I entered politics, I have chiefly had men’s views confided to me privately. Some of the biggest men in the United States, in the field of commerce and manufacture, are afraid of something. They know that there is a power somewhere so organized, so subtle, so watchful, so interlocked, so complete, so pervasive, that they better not speak above their breath when they speak in co
It’s up to the potential victim—the user—YOU—to make your computer or smartphone very difficult for Joe Hackster to infiltrate.
Passwords
- Being that cyber crime has been a fixture of modern living for over a decade, you’d think that everyone and his brother would know to use strong, long passwords, and a different password for each account. But people—including those who’ve been around for a long time—continue using the same password and ridiculously weak passwords, like password1 and princess.
- A v
“On the Internet, you can be ANYBODY!”
Not quite. Remaining anonymous in cyber space isn’t as easy as it used to be. Your browsing habits can be tracked, leading to your true identity. But there are things you can do to remain as anonymous as possible.
- Don’t feel you must use your full, real name when filling out forms or whatever, just because it’s asked or even a “required field.” Of course, you’ll want to use your real name when registering online with a bank, for instance, or making a purchase
You have a master password, from your password manager, for 28 accounts. Life has been so easy since!
But then you lose this master password. First off, you can’t fix this like you would if you forgot your password for PayPal or your credit card’s site. Plus, each password manager service has a different solution.
Yet how do you lose a master password in the first place? If it’s impossible to remember,then it may not be a good master password, regardless it should be written down somewhere in a se
Have you ever had the chicken pox? This common childhood illness has another name—the varicella zoster virus. Like all viruses, varicella replicates itself, spreading though the body, and eventually appearing as itchy red blisters all over the body. But the virus doesn’t stop there; it can spread to other people through physical contact and through the air when an infected person coughs or sneezes. It’s not a very fun illness to have.
Viruses don’t just affect humans; there are viruses that can a
Enrique Suarez
http://www.wix.com/suarezenrique/delta
Why Universal Poverty is the Only Sensible Choice for Humanity
Source: Kevin Karn, 2013
It's easy to show that the best course for the future of mankind is to reduce everyone in the world to poverty. To see this, examine the diagram below:
The diagram shows three possible income/wealth distribution scenarios for the world: the bottom scenario where everyone in the world is living in poverty; the middle scenario, where most of the wo