Saturday, May 27, 2017

Tabula Rosa Systems Blog Of 5/27/17 Identity thieves used stolen data 9 minutes after it was posted online


Buy the books at

 www.amazon.com/author/paulbabicki
====================================================








Identity thieves used stolen data 9 minutes after it was posted online
money.cnn.com 

by Selena Larson   @selenalarson May 26, 2017: 12:43 PM ET
When personal data is dumped online, it can take just nine minutes for bad guys to start using it, according to a report from the Federal Trade Commission.

Over the course of three weeks in April and May, the FTC analyzed what happens when hacked personal data is shared online.

Researchers created 100 fake consumers and gave them fictitious personal information like names, emails and passwords, and either a credit card, Bitcoin wallet, or online payment account. Then they posted the collection of data on a site popular with leaking stolen credentials, once on April 27 and a second time on May 4.
According to Dan Salsburg, acting chief at the FTC's Office of Technology Research and Investigation, the the FTC observed two types of identity thieves -- those who want to test credit cards' authenticity to resell them, and those who tried making big purchases on things like clothing or hotels.

"There are people laying there in wait, ready to pounce on stolen credentials," Salsburg told CNNTech.

Nine minutes after the publication on May 4, thieves began using the data -- a Twitter (TWTR, Tech30) bot picked up the posting, which could have helped speed up hacking attempts. On April 27, it took one and a half hours before the fake credentials were used.
All told, there were over 1,200 attempts to access accounts belonging to the fake consumers. That includes a total of $12,825.53 attempted credit card purchases and 493 attempts to access emails. 

There are ways you can prevent cybercriminals from using your data, even if it's published online. Salsburg said some of the test accounts were protected by two-factor authentication, a security feature that requires a second code in addition to your password (usually texted to your phone) to log in to your account. 

It's not a perfect solution -- if your phone gets stolen, thieves could have access to your backup codes. But it is a simple and effective security tool.
Identity thieves did not access the fake accounts with two-factor authentication enabled +++++++++++++++++++++++++++++++++++++++++++++++++++++


=================================   

Good Netiquette And A Green Internet To All!  =====================================================================
Tabula Rosa Systems - Tabula Rosa Systems (TRS) is dedicated to providing Best of Breed Technology and Best of Class Professional Services to our Clients. We have a portfolio of products which we have selected for their capabilities, viability and value. TRS provides product, design, implementation and support services on all products that we represent. Additionally, TRS provides expertise in Network Analysis, eBusiness Application Profiling, ePolicy and eBusiness Troubleshooting

We can be contacted at:

sales@tabularosa.net  or 609 818 1802.
 ===============================================================
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


Additionally, I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology market.

Monday, May 22, 2017

Tabula Rosa Systems Blog Of 5/22/17 - SB17-142: Vulnerability Summary for the Week of May 15, 2017


Buy the books at

 www.amazon.com/author/paulbabicki
====================================================







 +++++++++++++++++++++++++++++++++++++++++++++++++++++


05/22/2017 12:06 PM EDT

Original release date: May 22, 2017
The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) / United States Computer Emergency Readiness Team (US-CERT). For modified or updated entries, please visit the NVD, which contains historical vulnerability information.
The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:
·         High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0
·         Medium - Vulnerabilities will be labeled Medium severity if they have a CVSS base score of 4.0 - 6.9
·         Low - Vulnerabilities will be labeled Low severity if they have a CVSS base score of 0.0 - 3.9
Entries may include additional information provided by organizations and efforts sponsored by US-CERT. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletins is compiled from external, open source reports and is not a direct result of US-CERT analysis.
=================================   

Good Netiquette And A Green Internet To All!  =====================================================================
Tabula Rosa Systems - Tabula Rosa Systems (TRS) is dedicated to providing Best of Breed Technology and Best of Class Professional Services to our Clients. We have a portfolio of products which we have selected for their capabilities, viability and value. TRS provides product, design, implementation and support services on all products that we represent. Additionally, TRS provides expertise in Network Analysis, eBusiness Application Profiling, ePolicy and eBusiness Troubleshooting

We can be contacted at:

sales@tabularosa.net  or 609 818 1802.
 ===============================================================
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


Additionally, I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology market.

Sunday, May 21, 2017

Netiquette And Linguistic Imperialism Via Tabula Rosa Systems


Buy the books at

 www.amazon.com/author/paulbabicki
====================================================






Part of good Netiquette is the practice of respecting a recipient's customs, language, time zone and even special holidays. In my book, "Netiquette IQ . . . ", I write about all of these aspects.

In the article below, the author discusses a rather extreme departure from Netiquette, namely Linguistic Imperialism. No one or no entity should ever take this approach;

In a sense, even a lesser rendering of electronic communication with acronyms and abbreviations unknown to the recipient constitute a form of this practice!

 +++++++++++++++++++++++++++++++++++++++++++++++++++++
 From Thoughtco.com 
Updated May 09, 2017 

Linguistic imperialism is the imposition of one language on speakers of other languages. Also known as linguistic nationalism, linguistic dominance, and language imperialism.
In our time, the global expansion of English has often been cited as the primary example of linguistic imperialism.

The term linguistic imperialism originated in the 1930s as part of a critique of Basic English and was reintroduced by linguist Robert Phillipson in his monograph Linguistic Imperialism (OUP, 1992).

In that study, Phillipson offered this "working definition" of English linguistic imperialism: "the dominance asserted and maintained by the establishment and continuous reconstitution of structural and cultural inequalities between English and other languages" (47). Phillipson viewed linguistic imperialism as a "sub-type" of linguicism.

Examples and Observations
  • "The study of linguistic imperialism can help to clarify whether the winning of political independence led to a linguistic liberation of Third World countries, and if not, why not. Are the former colonial languages a useful bond with the international community and necessary for state formation and national unity internally? Or are they a bridgehead for Western interests, permitting the continuation of a global system of marginalization and exploitation? What is the relationship between linguistic dependence (continued use of a European language in a former non-European colony) and economic dependence (the export of raw materials and import of technology and know-how)?"

  • (Robert Phillipson, "Linguistic Imperialism." Concise Encyclopedia of Applied Linguistics, ed. by Margie Berns. Elsevier, 2010)
  • "The rejection of the linguistic legitimacy of a language--any language used by any linguistic community--in short, amounts to little more than an example of the tyranny of the majority. Such a rejection reinforces the long tradition and history of linguistic imperialism in our society. The harm, though, is done not only to those whose languages we reject, but in fact to all of us, as we are made poorer by an unnecessary narrowing of our cultural and linguistic universe."

  • (Timothy Reagan, Language Matters: Reflections on Educational Linguistics. Information Age, 2009)
  • "The fact that . . . no uniform British empire-wide language policy developed tends to disconfirm the hypothesis of linguistic imperialism as responsible for the spread of English. . . .

    "The teaching of English by itself, . . . , even where it did take place, is not sufficient grounds to identify the policy of the British empire with linguistic imperialism."
    (Janina Brutt-Griffler, World English: A Study of Its Development. Multilingual Matters, 2002)
Linguistic Imperialism in Sociolinguistics
  • "There is by now a well-entrenched and very respectable branch of sociolinguistics which is concerned with describing the world of globalization from the perspective of linguistic imperialism and 'linguicide' (Phillipson 1992; Skutnabb-Kangas 2000), often based on particular ecological metaphors. These approaches . . . oddly assume that wherever a 'big' and 'powerful' language such as English 'appears' in a foreign territory, small indigenous languages will 'die.' There is, in this image of sociolinguistic space, place for just one language at a time. In general, there seems to be a serious problem with the ways in which space is imagined in such work. In addition, the actual sociolinguistic details of such processes are rarely spelled out--languages can be used in vernacular or in lingua franca varieties and so create different sociolinguistic conditions for mutual influencing."
    (Jan Blommaert, The Sociolinguistics of Globalization. Cambridge University Press, 2010)
Colonialism and Linguistic Imperialism
  • "Anachronistic views of linguistic imperialism, which see as important only the power asymmetry between the former colonial nations and the nations of the 'third world,' are hopelessly inadequate as an explanation of linguistic realities. They especially ignore the fact that 'first world' countries with strong languages seem to be under just as much pressure to adopt English, and that some of the harshest attacks on English have come from countries which have no such colonial legacy. When dominant languages feel they are being dominated, something much bigger than a simplistic conception of power relations must be involved."
(David Crystal, English as a Global Language, 2nd ed. Cambridge University Press, 2003)
=================================   Good Netiquette And A Green Internet To All!  =====================================================================
Tabula Rosa Systems - Tabula Rosa Systems (TRS) is dedicated to providing Best of Breed Technology and Best of Class Professional Services to our Clients. We have a portfolio of products which we have selected for their capabilities, viability and value. TRS provides product, design, implementation and support services on all products that we represent. Additionally, TRS provides expertise in Network Analysis, eBusiness Application Profiling, ePolicy and eBusiness Troubleshooting

We can be contacted at:

sales@tabularosa.net  or 609 818 1802.
 ===============================================================
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


Additionally, I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology market.