Whether you’re an animal person or not, you have to admit that puppies are pretty darn cute. So cute that there are YouTube Channels, Facebook accounts, and Buzzfeed newsletters devoted to the subject. Unfortunately, there’s a not so cute PUP out in the world, and it wants access to your device. What I’m talking about is a potentially unwanted program (PUP). What is an unwanted program? It’s software or an app that you don’t explicitly want on your device. PUPs usually are bundled with freeware
All Posts (6240)
It’s easy to scam someone who did something wrong by telling them they need to fix their mistake. This is why thousands of people get scammed into paying back taxes to the IRS—the IRS has nothing to do with these scams, of course, but the predators prey on peoples’ fear of Uncle Sam. It all begins with the fraudster making a phone call, pretending to be an IRS employee.

They have other tricks up their sleeve too, such as making the caller ID show a number that appears to be coming from the IRS an
I remember my teachers always telling me there are no stupid questions. When it comes to identity theft, this is especially true. The more you know about identity theft, the better prepared you will be to prevent it from happening to you. Here are some commonly asked questions about identity theft.

What is identity theft?
Identity theft is when a person pretends to be you to access money, credit, medical care, and other benefits. They acquire your identity by stealing and using your personal infor
Developing a schedule needs to be approached with success in mind. Dividing the project or portfolio into smaller manageable pieces called sub-projects is a good principle, a strategy acceptable and recommended in various industries. However, as the number of activity grows in the schedule, completeness, integration, and alignment challenges becomes the next hurdle. Key dates ends up not supporting each other. Probability of one activity finishing on time cancels out by the lower probability of
Give me a break! In the next month, students will get the week off for spring break—a much needed reward after months of hard work and, for some, gnarly winter weather. Spring break means free time, family vacations, trips with friends, and timeless memories.

But, spring break can pose some risks to your online reputation and your identity. So whether you are going to party it up in the Caribbean or you are taking the kids to Disney World, here are some tips to keep you digitally safe this spring
Here’s good advice from a sheriff’s office about how to protect your house.

Burglars and home invaders don’t give a flying hoot if you keep thinking, “It can’t happen to me and this is a safe neighborhood.” In fact, the issue isn’t how safe your neighborhood is or how watchful your neighbors are. The issue is how easy it is to simply break into your home.
Think of the other safety precautions you take daily even though the odds of an unfortunate outcome are very small, such as making sure you take
In the event of an attack, new smartphone applications can be used to send an alarm to a pre-chosen person. And the potential victims location can then be tracked.

But is this faster and more secure than a woman whipping out pepper spray and blasting a drunken buffoon who has her cornered in a parking garage at night?
No.
Apps meant for personal security are simply one layer of protection but in no way should be relied upon for personal protection. I mean, come on!!!! IT’S AN APP!!!!!!!
For the iPho
Ever see those public bulletin boards with all the business cards on them? Don’t be surprised if you spot one that says “Hacker•for•Hire.” These are hackers who will, for a nice juicy fee, hack into your wife’s Facebook account to see if she’s cheating on you.

However, there’s at least one hackmaking site that matches hackers to clients who want to infiltrate a network for personal gain or even revenge. The site, Hacker’s List, is a good idea, certainly not the first of its kind; the site’s found
There’s the war on drugs, the war on terrorism, the war on cancer and the war on cyber threats. In fact, more people are vulnerable to cyber attacks than they are to the first three threats combined.

So pervasive is this threat that President Obama fully recognizes that everyone is at risk. He even signed an executive order recently in the hopes of promoting the sharing of more cybersecurity related data between the government and the private sector.
Recently President Obama presented a speech at
The Unexamined Life is not Worth Living/Noam Chomsky's Quotes
Presented by:
Enrique Suarez
http://www.wix.com/suarezenrique/delta
The Unexamined Life is Not Worth Living"
Socrates
“We shouldn't be looking for heroes, we should be looking for good ideas.”
“If we don't believe in freedom of expression for people we despise, we don't believe in it at all.”
“The whole educational and professional training system is a very elaborate filter, which just weeds out people who are too independent, and who think
Making Singapore one of the most Advanced Economies in the world
Singapore Fundamentals and the Role of the Economic Development Board (EDB) in Making Singapore one of the most Advanced Economies in the world
Enrique Suarez
http://www.wix.com/suarezenrique/delta
The emergence of Singapore as the heart of Asia’s economy has come with many challenges. From its days as a small and underdeveloped nation, Singapore has emerged from the tumultuous financial, social and political changes over the years to
There’s only one entrance to the house: a steel door two feet thick. If someone from the outside touched the door—even with a battering ram—they’ll get an electric shock. No bad guys could get through, right?

Well, suppose the bad guy tricks the homeowner into opening the door…and once open, the bad guy strangles the homeowner. Do you see what happened? All that security is worthless if the homeowner can be tricked. And the same goes for passwords. You can have the longest, strongest, most gibber
Intel Security has compiled a list of the top ways cybercriminals play with the minds of their targeted victims. And the chief way that the cybercriminals do this is via phishing scams—that are designed to take your money.

The fact that two-thirds of all the emails out there on this planet are phishy tells me that there’s a heck of a lot of people out there who are easily duped into giving over their money. I’m riled because many of these emails (we all get them) scream “SCAM!” because their subj
The Global Competitiveness Report 2014-2015 assesses the competitiveness landscape of 144 economies, providing insight into the drivers of their productivity and prosperity. The report remains the most comprehensive assessment of national competitiveness worldwide, providing a platform for dialogue between government, business and civil society about the actions required to improve economic prosperity. Competitiveness is defined as the set of institutions, policies and factors that determine the
Key Questions/Themes Dedicated to the Candidates to the Presidency of the United States of 2016: Peace, Self-Knowledge, Human Nature, Personal and World Philosophy, Governability, Competitiveness, Global Power Dynamics, International Trade/Global Business, International Relations, Education, Industrial and Economic Policy
Peace, Dignity and Prosperity: For a Better Future for the United States and for All the Nations of the World
By:
Enrique R. Suarez
Master of Education & International Development
H
Global Inequality: The World’s 400 Richest Billionaires Get Richer, Adding $92bn in 2014
Presented
by:
Enrique Suarez
http://www.wix.com/suarezenrique/delta
The 400 richest billionaires in the world added another $92 billion to their names in 2014 and now sit on assets worth $4.1 trillion, but Russia’s super-wealthy have been hit by economic problems resulting from the Ukraine crisis.
The biggest winner in 2014 was China’s Jack Ma, who co-founded the Alibaba Group Holding ltd, (BABA), China’s largest
The 6 Grand Illusions That Keep Us Enslaved to the Matrix
“In prison, illusions can offer comfort.” – Nelson Mandela
For a magician to fool his audience his deceit must go unseen, and to this end he crafts an illusion to avert attention from reality. While the audience is entranced, the deceptive act is committed, and for the fool, reality then becomes inexplicably built upon on a lie. That is, until the fool wakes up and recognizes the truth in the fact that he has been duped.
Maintaining the susp
Enrique Suarez
http://www.wix.com/suarezenrique/delta
suarezenrique@post.harvard.edu
I have not yet dealt specifically with the not-for-profit organizations (NFPOs), an important institutional segment, whose objective is not the creation of economic wealth but the pursuit of activities that will positively affect society at-large. The immediate problem we face when attempting to develop a cohesive strategy for NFPOs is their enormous diversity.
The term not-for-profit seems to encompass a wide array
This blog from Pete Cook about aiming to fail 50% of your projects each quarter is so right in the context of risk and decision making. All my research, whether it is McKinsey Global Surveys or academic research such as the work of Professor Paul Nutt of Ohio State University and his analysis of more than 400 major business decisions across scores of countries, the evidence is the same. For more complex, strategic decisions our success rate, globally, is about 50%. That is, no better than chance
Does your Lenovo computer have Superfish VisualDiscovery adware (a.k.a. spyware) installed? It’s possible if you purchased a Lenovo PC any time in September of 2014 and thereafter.
This Superfish software intercepts the Lenovo user’s traffic so that the user sees ads displayed that reflect their browsing habits. The problem with this targeted advertising scheme is that it comes with a vulnerability that makes it easy for hackers to attack.
Superfish enables targeted advertising by installing what’