Archive | Trends RSS for this section

The pros and cons of using subdomains

I recently read an article in Website Magazine about the advantages or disadvantages of using subdomains through your host service. I’ve often wanted to set up multiple domains so I could have sites that cover a broad range of topics I’m interested in, ones that don’t necessarily jive with my personal portfolio site, but have always been wary of the cost involved.  I’ve often wondered if subdomains could offer a solution but have, until now, been too preoccupied or perhaps downright lazy to do the research to find out.  Read More…

Things You Shouldn’t Give to Social Media

We must be aware that, everything we post online could risk our identity, security or reputation. How to keep our online presence safe and private? Here’s some information you’d better not give to your social media websites.

Date of birth combined with place of birth can betray your SSN. People love to give their exact date of birth on Facebook to receive B-day blessings from friends and be informed of their birthdays as well. How can that possibly be risky? However, an exact birth date with the place of birth could be used to predict most or even all of the nine digits of one’s Social Security Number. So even if you decide to post your birthday and place, do not present the year, and use privacy settings to restrict the visibility of the information.

Read More…

Going Public on Securing Privacy

It is deliciously ironic that a fellow born with the “stolen” look of Donald Sutherland would be so expert on protecting a person’s identity on social media. But it’s the easygoing, down-to-earth approach of Cisco Senior Security Advisor Christopher Burgess that makes his advice so relatable and believable.

But first, here are eyebrow raising findings from exhaustive surveys of social network users in 21 nations around a world more worried than ever about their online security and privacy:

  • 92%  cite security when opening social network accounts
  • 54%  experience phishing
  • 73%  think employees share too much

“Details thought to be mundane can actually be a gold mine for identity thieves, scammers and other criminals savvy enough to mine social networks for details they can use to target you,” eWEEK’s Brian Prince says.

It goes without saying your web history should remain private as possible, your antispyware/antivirus software should be kept obsessively up to date, and – according to Burgess – your device should never auto-run anything. Read More…

Ops, India did it again!

When we reside in a country like the US, we tend to forget that not every place on Earth enjoys the freedom of press and speech that we get to experience…  According to a recent report by NYT, the Indian government will meet with local executives of Google, Facebook, Yahoo and Microsoft to work on a plan regarding using this platforms as watchdogs before content gets published on social media and online outlets to prevent the appearance of seditious materials. According to, executives will explain Indian Government that their request isn’t doable since the number of user generated content, and the fact that they are not in a position to decide what could be considered “inflammatory” content.

Nevertheless, it isn’t the first time that Indian government tries such a stratagem. Last April, the government demanded internet service providers to delete every piece of information online that either government officials or citizens could found disturbing.  Also, last year, the government threaten to shut Blackberry after the carrier denied access to encrypted data from local law enforcement. And if it wasn’t enough, is trying to set up its own monitor on social media and the internet.

Who do you think will win: India’s government or the internet? I bet a million to the internet… Ops, I may get busted by Indian government!


Mind the App Gap?

Last month, the New York Times ran a story about the “app gap.” The gist of the matter is that over half the kids from families earning over $75,000 per year have experience playing with educational apps, while children from lower income earning households have little to no knowledge, let alone access to emerging digital technologies. The debate as to the significance of this new research is still very much up for debate. The technology is too young to know whether or not it is actually educational or really just another way to avoid being a hands on parent- a distraction to keep the kids out of your hair masked as “educational,” or if apps really are engraining kids with access to them skills that will give them the upper hand in the future.   Read More…

Is your phone being tracked?

After I posted the comment on indoor maps and “tagged” shopping carts to track customers’ shopping behavior, which I find extremely scary and invasive, I found an another article about tracking customers but this is related to iPhones and Andoids.

Have any of you heard about Carrier IQ? Well, this company that provides tracking tools to phone companies had been in lately in the news because it was found to be monitoring Andoid devices. iPhone owners beware because Apple’s smart phone also has this software deep down that is hard to find, unless someone knows what to look for.

But there’s hope! According to a story published on this topic on untitled “Carrier IQ tracking iPhone customers too, hacker says”  IQ’s software on iPhone works in a different way than that on Android, since the feature can be turned off easily as opposed to Android devices where is embedded in such a way that is virtually impossible to disable it.

The hacker known as “Chpwn” also pointed out on CNET’s story that iPhones still using this feature share way less information than Andoids, which provides phone number, location, country, active calls and carrier. According to “Chpwn” iPhone only includes location if that service is enabled by the customer.

So if you are as jealous as I am regarding privacy, you might think twice before getting an Android device.