Discover how mastering email communication can boost business efficiency, avoid common pitfalls, and ensure secure, respectful online interactions.
Turkey Revenge
The turkeys are pissed this Thanksgiving they are seeking revenge.
Germs Infest 60% of Americas Phones
60% of Americans sleep with their phones, harboring germs. Cleaning regularly with UV sanitizer or alcohol wipes can help keep your phone and bed germ-free.
Smartphone Sanitizing: A Practical Guide
Securely erase personal data from your old smartphone before recycling. Protect your identity from hackers—easy steps to follow.
Why Soft Skills Matter in Today’s Job Market
Boost your career with essential soft skills like communication, teamwork, and emotional intelligence. Learn why they’re crucial for workplace success.
Risky Celebrities
Computer security firm McAfee says talk show host Jimmy Kimmel is the most dangerous celebrity to search for online. The company says that a search for ABC’s Kimmel carries nearly a 1 in 5 chance of landing on a website that has tested positive for spyware, viruses, or malware. Cybercriminals can use celebrities as bait to install malicious software and steal passwords or other personal data.
Risky celebrities
| Rank | Celebrity | Risk % |
|---|---|---|
| 1 | Jimmy Kimmel | 19.38% |
| 2 | Armin van Buuren | 19.33% |
| 3 | Ciara | 19.31% |
| 4 | Flo Rida | 18.89% |
| 5 | Bruce Springsteen | 18.82% |
| 6 | Blake Shelton | 18.47% |
| 7 | Britney Spears | 18.19% |
| 8 | Jon Bon Jovi | 17.64% |
| 9 | Chelsea Handler | 17.22% |
| 10 | Christina Aguilera | 16.67% |
In addition to Jimmy Kimmel (No. 1) and Chelsea Handler (No. 9), a number of funny people made McAfee’s top fifty risky celebrities list. Other notable comedians in the riskiest top 50 include Jimmy Fallon (No. 12), Adam Sandler (No. 14), Jason Segel (No. 19), Wee Man (No. 35), and Cameron Diaz (No. 41).
Risky musicians
The music industry is also well represented in the McAfee top 10 riskiest with Armin van Buuren (No.2), Ciara (No. 3), Flo Rida (No. 4), Bruce Springsteen (5), Blake Shelton (No.6), Jon Bon Jovi (No.8).
Other musicians in McAfee’s riskiest 50 are 50 Cent (No. 13), Cheryl Cole (No. 16) Calvin Harris (No. 17) and Iggy Azalea (No. 20). Additional superstars heating up the McAfee top 50 are Jason Derulo (No. 24), Jay Z (No. 26), Chris Brown (No. 28), Paul McCartney (No.29), Jennifer Lopez (No. 31), Pitbull (No. 34), Jessie J (No.44), Rihanna (No.45), Justin Timberlake (No.46), Carrie Underwood (No.47), and Pharrell Williams (No. 49).
rb-
I have covered these tidbits for a while and one sign of hope for humanity is that last year, searching for downloads of Kanye West, Kourtney Kardashian, Kim Kardashian, Khloe Kardashian, and Kris Jenner were popular among Americans. This year, the Kardashian clan is nowhere to be found.
Related articles
- Bruce Springsteen and Jon Bon Jovi named ‘most dangerous’ artists to search for, say McAfee (nme.com)
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.
Avoid A Data Breach
Security firm SRC Cyber cites a report from the United States Government Accountability Office, The U.S. Computer Emergency Readiness Team (PDF) reported a 782% increase in cyber incidents from 2006-2012. As this number increases, SRC Cyber and other cybersecurity companies are pressured to respond. They are creating products that not only defend against threats but also aid in recovery if a data breach occurs.
SRC Cyber points out that security breaches can happen to anyone at any time. The article claims that system problems and human error account for the majority of the data breaches. The most common single cause of data breaches at 42% is malicious intent.
This SRC Cyber infographic shows the impact of three high-profile data breach attacks. The attacks have had an effect on security spending, attack awareness, and in the case of the Target breach how it’s hit the company’s profits.
Related articles
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.
Are Your Earbuds Twisted?
Does this sound familiar? You are about to walk the dog, grab your iPod and have to spend the next 5 minutes untangling the $%*&@ earbuds. It seems to happen to everyone who owns an Apple iPod or iPhone your “EarPods.” (even though Apple has shipped its white in-ear headphones with every iDevice since the iPod in 2001, they updated its earbuds to “EarPods” in 2012)
Your earbuds have conspired against you. Whatever you call them, the earbuds have mysteriously tangled themselves into a knot so vicious that you risk snapping the wire to get them undone. Especially the little thin wires that go to each earpiece.
To be fair, Jim Edwards at the Business Insider says it happens to all earbuds, not just Apple’s (AAPL). But iPhone tangles seem more visibly conspicuous because their wires are white as part of Apple’s branding. BI observes that the knots even occur when you coil them carefully before putting them away. Typically the headphone wires will knot themselves on a daily basis.
Earbuds tangle for a reason
Mr. Edwards explains that tangling happens for a reason, and it has been the subject of scientific research. Dorian M. Raymer and Douglas E. Smith of the University of California at San Diego Department of Physics proved that iPhone earbud tangles are predictable. The tangle is a function of the length of the wire and the amount of “agitation” the wire is subjected to. The author explains that when — length versus agitation — are plotted against each other, the rate of knots and tangles obeys a statistical pattern that describes a curve.
The physicists published a paper titled “Spontaneous knotting of an agitated string” (PDF). Their research revealed that the length of a cord influences how much it will tangle when sealed inside a rotating box. The length of Apple’s iPhone earbuds is 55 inches long and right at the 50% tangle-rate-sweet-spot of the curve.
BI provided a schematic showing how a cord that starts off neatly coiled and quickly becomes tangled. The tangle test shows that one end of a wire only has to cross another part of the wire twice to start spontaneously knotting itself. The research shows that your earphones are indeed spontaneously knotting themselves. The knots really do form as a matter of physics, so it is an unstoppable force of nature that can’t be prevented.
That is until Professor Robert Matthews of Aston University in England saved the day. Rebecca Borison at BI says the physicist has developed a surefire way to end all earbud tangling: clip them together.
Professor Matthews suggests that you clip the two earbuds together and attach them near the audio jack to create a loop. He claims that this will reduce tangling tenfold. He told ABC News,
First, by forming the loop you’ve effectively reduced the length of string able to explore the 3-D space by 50%, which makes a big difference. Second, you’ve also eliminated the two ends, which are the prime movers of knot formation.
rb-
CNET says the tangled earbuds research has attracted interest from biochemists concerned with the tendency of thread-like DNA to get itself tangled. The new study suggests nature may form loops in DNA to prevent this from happening.
Related articles
- FREE Earhoox for Earbuds for Referring Friends (hunt4freebies.com)
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.
How to Spot Phishing
Phishing scams are spam emails sent by cyber-criminals that can lead to identity theft at home and data breaches at work. Phishing attacks pretend to be from a legitimate person or organization to trick you into revealing personal information. A phishing attack begins when a cyber-criminal sends an email that looks like it originates from your bank.
The email might hint at a problem with your account asking you to “confirm” account information by clicking on a link that takes you to a fake website. The fake website asks you to type in your bank account user name and password. The goal is to convince the target that the web page is legitimate so that they will enter their credentials. Once entered, attackers can access an individual’s finances.
Phishing attacks
RSA reports 2013 was a record year for phishing attacks. They report that nearly 450,000 phishing attacks were launched in 2013 with losses estimated to be nearly $6 Billion. The security firm believes that these attacks will continue for the foreseeable future. They point out that it only costs an attacker $65.00 to spam 500,000 email addresses.
Symantec reports (PDF) that 1 in every 392 emails a user receives is a phishing attempt. 71% of the phishing attacks were related to spoofed financial organizations and login credentials for accounts seem to be the main information phishers are looking for. Dell SecureWorks delved into the depths of the online underground economy and found the value of personally identifiable information (PII).
value of personally identifiable information
- Visa and Master Card account numbers are worth up to $15
- American Express account numbers are worth up to $18
- Date of Birth (DOB) is worth up to $25
On his excellent website, Brian Krebs revealed the black market value of hacked credentials.
- Active accounts at Facebook and Twitter retail for just $2.50 apiece,
- $4 buys hacked credentials at wireless providers ATT.com, Sprint.com, Verizonwireless.com, and Tmobile.com,
- Groupon.com accounts fetch $5,
- Fedex.com, Continental.com, and United.com accounts for go for $6.
- iTunes accounts go for $8 on the cyber underground economy.
medical records
In a new phishing twist, attackers are going after medical records to exploit the broken healthcare industry. Stolen health credentials can go for $10 each, about 10 or 20 times the value of a U.S. credit card number, according to Don Jackson, director of threat intelligence at PhishLabs, a cybercrime protection company.
With these threats in mind, PhishMe developed an infographic, click on the image below to see the complete image.

PhishMe infographic
rb-
Since many cyberattacks originate with phishing emails, the best way for organizations and individuals to protect themselves online is to recognize and avoid phishing emails.
Related articles
- Phishing attacks target Google accounts, warns Bitdefender (computerweekly.com)
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.

The firewall has turned 25 years old this year. In commemoration,
1995: 
