Saturday, December 12, 2015

Netiquette Bascis For Email Introductions And Viva Le Paris Climate Summit!

Bravo For The Paris Climate Summit!
 =============================
In my book about Netiquette ( listed below ) I have a great section on email Introductions. The article below also does a nice job with some of the basics.
==========================================================
GABE LOZANO

APRIL 01, 2015 Entrepeneur.com

8 Tips for Turning Email Introductions Into Actual Relationships

If you're a budding entrepreneur, it's a lucky thing if an established, successful entrepreneur shows interest in being your mentor. One of the most important things a seasoned businessperson can do for you is to make introductions to fellow entrepreneurs who might be able to help you, the business hopeful, on your way. 
A first-time introduction can be a delicate dance that allows the introducer to size you up and see how you handle the interaction. If you make him or her look good, you'll most likely receive a stream of follow-on introductions -- a great start to building your professional network. But if you blow it, you’re unlikely to get a second chance.
Here, some tips for acting like a pro from the get-go and, consequently, receiving further introductions:
1. Respond to an introduction within minutes
World-class entrepreneurs always seem to be dialed in. If you can't respond quickly when selling yourself, one can only imagine how your communication habits are lacking during other, equally critical situations. Don't try to play it cool by waiting hours or days to respond. 
2. When the introducer requests information from you, respond promptly
I keep a running top 10 list encompassing my entire professional and personal life, and my priorities change daily. I’m not unique in that respect -- everyone’s priorities evolve, which means you have a limited window before falling out of someone's top 10.
If you’ve been offered an introduction, but they require more information from you before making it, it’s in your best interest to act quickly.
3. In your first reply, put your introducer in the bcc line
Nothing's worse than being cc’d in a back-and-forth thread, particularly as other parties firm up a meeting time. Clogging up someone’s inbox with irrelevant emails not only makes you look like an amateur but also wastes people’s time.
4. Proof your response before sending
Sloppy emails create a negative first impression. Demonstrating superior writing skills, however, is a great way to make yourself look professional and capable.
5. Be concise and specific
Introduce yourself, include a specific ask and provide any pertinent details -- all in a few sentences. Getting straight to the point demonstrates that you know how to be efficient.
6. If you’re offered a time to meet, take it
Remember that you’re the one selling -- not the other way around. Punting on meeting times demonstrates it's not a top priority for you and shouldn't be for them either. I skipped a party the night before my own wedding which resulted in my first investor check.
7. Don’t drop the damn ball
Remember that your reputation -- but also that of the person who stuck out his or her neck getting you the meeting in the first place -- is at stake. Be willing to go to extremes to follow through.
8. Follow up
Once there's something substantive to report, send an update email to the person who made the introduction. Maybe even say thanks. The update doesn’t have to be long, just a few sentences describing the outcome. A positive report will likely land you another introduction.
===========================================
 Good Netiquette And A Green Internet To All!
  ==============================================
===============================================================
https://www.youtube.com/watch?v=HTgYHHKs0Zw&__scoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618



==============================================
**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

Tabula Rosa Systems Security Bulletin - Apple Release Security Update for Apple iTunes


Original release date: December 11, 2015
Apple has released a security update for Apple iTunes to address multiple vulnerabilities. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system.
Users and administrators are encouraged to review information on iTunes 12.3.2 and apply the necessary update.
=====================================================
 For a great email parody, view the following link:
=======================================================
https://www.youtube.com/watch?v=HTgYHHKs0Zw
scoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618



==============================================

Special Bulletin - My just released book

"You're Hired. Super Charge our Email Skills in 60 Minutes! (And Get That Job...) 

is now on sales at Amazon.com 

Great Reasons for Purchasing Netiquette IQ
·         Get more email opens.  Improve 100% or more.
·         Receive more responses, interviews, appointments, prospects and sales.
·         Be better understood.
·         Eliminate indecision.
·         Avoid being spammed 100% or more.
·         Have recipient finish reading your email content. 
·         Save time by reducing questions.
·         Increase your level of clarity.
·         Improve you time management with your email.
·        Have quick access to a wealth of relevant email information.
Enjoy most of what you need for email in a single book.

 =================================

**Important note** - contact our company for very powerful solutions for IP
 management (IPv4 and IPv6, security, firewall and APT solutions:
www.tabularosa.net
==================================================

Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================


Friday, December 11, 2015

Tabula Rosa Systems Blog Of 12/11/15 - The Enigma Between Jihadists And Technology

The issue of privacy and confidentiality are very import for all netizens. However, with the proliferation of terrorism and its means of communication, moral and lawful prevention of extremist activity is now being hampered with the development of encryption. Where does a happy middle ground exist? Does it exist at all? Will the majority of law abiding netizens be forced to give up their rights and privacy?

Below is a good article discussing a topic which will only continue to grow!

 =========================================================
Why is Silicon Valley helping the tech-savvy jihadists?
Developing apps and emails that are heavily encrypted is playing into the hands of Isil. Whose side are they on?

By Clare Foges from the dailytelegraph.co.uk
7:00AM GMT 21 Nov 2015
 What will it take? 129 dead on American soil? 129 killed in California? What level of atrocity, what location will it take for the Gods of Silicon Valley to wake up to the dangerous game they are playing by plunging their apps and emails ever deeper into encryption, so allowing jihadists to plot behind an impenetrable wall?

Fiendishly-complex online encryption is providing the safe space for terrorists to plan bloodshed on an industrial scale. Products like Whatsapp have become, in the words of GCHQ Chief Robert Hannigan, “the command-and-control networks of choice for terrorists and criminals” – precisely because they are highly encrypted.

Isil claimed credit for both the Paris attacks and the bombing of the Russian airliner on Telegram, the messaging app du jour for terrorist nutcases. Because it’s very private, you see. On this end-to-end encrypted product you can communicate beyond the reach of intelligence agencies.
 
Isil now even have a 24-hour tech helpdesk to assist would-be jihadis with secure communication, advising them on the best under-the-radar apps.

If this is a war we are engaged in, the frontline is online – and the enemy is being aided by Western tech companies. Terrorists want ever-safer spaces to operate in, and the tech giants say “Sure! Here’s an end-to-end encrypted product that is impossible to crack. It’s a lock without a key. Even we don’t have a key.”
Why? It goes back to Edward Snowden, the weaselly inadequate whosegrasp for posterity has proved a boon for Isil. They should be gratefully chanting his name in Raqqa, for it was Snowden’s revelations about government surveillance methods that triggered this extraordinary race towards deeper encryption.

It was Snowden?s revelations about government surveillance methods that triggered the race towards deeper encryption

In the wake of those tip-offs, tech companies faced a massive PR headache on privacy. And so Google, Apple, Facebook and the rest have been falling over themselves to offer products that no government can break into. Apple declare that they “refuse to add a backdoor into any of our products”. Facebook have introduced a standard of encryption for emails called PGP (Pretty Good Privacy), a “Snowden-approved” system.
Telegram offers a “secret chat” service with a self-destruct function for messages, “for people who want more secrecy than the average fella.” (What, like Abdelhamid Abaaoud?)

"There are legitimate concerns that if you open up a “back door” for governments to access data, then the bad guys can come in through the same route."
All this is making the job of the security services infinitely harder. FBI Director James Comey calls the challenge “going dark”. Leads are followed until they hit the brick wall of indecipherable data. A few years ago law enforcement agencies could approach Hotmail or Google with a warrant and get vital information to stop horrors unfolding. Now the data they salvage is often gobbledegook – a load of encrypted numbers that are impossible to read. They are trying to save lives but are being frustrated by encrypted technology.

And what is the response of the tech companies? Extraordinary arrogance. Google CEO Eric Schmidt declared earlier this year that they “will win” the battle for encryption, making the likes of the NSA and GCHQ out as the enemy rather than the murderous butchers of Isil.

When asked if he slept well at night knowing terrorists use his platform, Telegram founder Pavel Durov replied: “That’s a very good question but I think that privacy, ultimately, and the right for privacy is more important than our fear of bad things happening, like terrorism.” Tell that to the grieving of Paris.

This isn’t about privacy, it’s about profit. The tech firms have calculated that they build user numbers by inflaming fears of violations of privacy and offering more secrecy than anyone else. It suits them to paint Government agencies as snoopers who hate all encryption. But this is too simplistic. GCHQ invented encryption. Half of its job is defending the UK against cyber attacks, and the right kind of encryption is a vital part of their armoury. They simply want reasonable access, with a warrant, when lives are in danger.

There are legitimate concerns that if you open up a “back door” for governments to access data, then the bad guys can come in through the same route. As Apple CEO Tim Cook argued: “If you put a key under the mat for the cops, a burglar can find it, too.”
But this is not a reason to refuse co-operation outright. The global tech industry made around $3.7 trillion last year. They employ some of the brightest people on the planet. Apple et al could, if they wanted, employ a fraction of these resources to work out how we can simultaneously keep the good guys’ data secure and keep the bad guys in plain sight. The geniuses of Silicon Valley would be more than a match for the dunderheads in the desert.

Paris must be a wake-up call. If they had any conscience at all, these great Western powerhouses of the 21st century would be joining the fight to preserve our way of life – not helping to facilitate Islamic State’s way of death.
===============================================================
https://www.youtube.com/watch?v=HTgYHHKs0Zw&__scoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618



==============================================
**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

Tabula Rosa Systems Technical Term Of The Day Man in the Middle (MitM) Attack


Man-in-the-Middle attack (MitM) definition
Posted by: Margaret Rouse
Contributor(s): Mike Cobb
is one in which the attacker secretly intercepts and relays messages between two parties who believe they are communicating directly with each other.
MiTM attacks pose a serious threat to online security because they give the attacker the ability to capture and manipulate sensitive information in real-time. The attack is a type of eavesdropping in which the entire conversation is controlled by the attacker. Sometimes referred to as a session hijacking attack, MiTM has a strong chance of success when the attacker can impersonate each party to the satisfaction of the other.
A common method of executing a MiTM attack involves distributing malware that provides the attacker with access to a user’s Web browser and the data it sends and receives during transactions and conversations. Once the attacker has control, he can redirect users to a fake site that looks like the site the user is expecting to reach. The attacker can then create a connection to the real site and act as a proxy in order to read, insert and modify the traffic between the user and the legitimate site. Online banking and e-commerce sites are frequently the target of MITM attacks so that the attacker can capture login credentials and other sensitive data.
Most cryptographic protocols include some form of endpoint authentication specifically to prevent MITM attacks. For example, the Transport Layer Security (TLS) protocol can be required to authenticate one or both parties using a mutually trusted certification authority. Unless users take heed of warnings when a suspect certificate is presented, however, an MITM attack can still be carried out with fake or forged certificates.
An attacker can also exploit vulnerabilities in a wireless router’s security configuration caused by weak or default passwords. For example, a malicious router, also called an evil twin, can be setup in a public place like a café or hotel to intercept information traveling through the router. Other ways that attackers often carry out man-in-the-middle attacks include Address Resolution Protocol (ARP) spoofing, domain name system (DNS) spoofing, Spanning Tree Protocol (STP) mangling, port stealing, Dynamic Host Configuration Protocol (DHCP) spoofing, Internet Control Message Protocol (ICMP) redirection, traffic tunneling and route mangling.






==============================================
For a great email parody, view the following link:

https://www.youtube.com/watch?v=HTgYHHKs0Zw&__scoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618



==============================================
**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

Thursday, December 10, 2015

Tabula Rosa Systems Security Bulletin - Apple Releases Multiple Security Updates


National Cyber Awareness System:
12/08/2015 07:18 PM EST

Original release date: December 08, 2015
Apple has released security updates for iOS 9.2, tvOS 9.1, OS X, watchOS 2.1, Safari 9.0.2, and Xcode 7.2 to address multiple vulnerabilities, one of which could allow a remote attacker to take control of an affected system.
Updates available include:
  • iOS 9.2 for iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
  • tvOS 9.1 for Apple TV (4th generation)
  • OS X El Capitan 10.11.2 and Security Update 2015-008 for OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 and v10.11.1
  • watchOS 2.1 for Apple Watch Sport, Apple Watch, Apple Watch Edition, and Apple Watch Hermes
  • Safari 9.0.2 for OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 and v10.11.1
  • Xcode 7.2 for OS X Yosemite v10.10.5 or later
US-CERT encourages users and administrators to review Apple security updates for iOS 9.2, tvOS 9.1, OS X El Capitan 10.11.2 and Security Update 2015-008, watchOS 2.1, Safari 9.0.2, Xcode 7.2 and apply the necessary updates.
=====================================================
 For a great email parody, view the following link:
=======================================================
https://www.youtube.com/watch?v=HTgYHHKs0Zw
scoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618



==============================================

Special Bulletin - My just released book

"You're Hired. Super Charge our Email Skills in 60 Minutes! (And Get That Job...) 

is now on sales at Amazon.com 

Great Reasons for Purchasing Netiquette IQ
·         Get more email opens.  Improve 100% or more.
·         Receive more responses, interviews, appointments, prospects and sales.
·         Be better understood.
·         Eliminate indecision.
·         Avoid being spammed 100% or more.
·         Have recipient finish reading your email content. 
·         Save time by reducing questions.
·         Increase your level of clarity.
·         Improve you time management with your email.
·        Have quick access to a wealth of relevant email information.
Enjoy most of what you need for email in a single book.

 =================================

**Important note** - contact our company for very powerful solutions for IP
 management (IPv4 and IPv6, security, firewall and APT solutions:
www.tabularosa.net
==================================================

Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================


Wednesday, December 9, 2015

Netiquette Basics For Kids' Security - Via Tabula Rosa Systems


VTech hack exposes ID theft risk in connecting kids to Internet
Reuters – Mon, Dec 7, 2015 05:23 GMT
By Jim Finkle and Jeremy Wagstaff
BOSTON/SINGAPORE (Reuters) - Parents who gave their child a Kidizoom smartwatch or a VTech InnoTab tablet may have exposed them to identity theft after Hong Kong-based VTech said hackers stole the personal information of more than 6 million children.
The breach underscores how digital products aimed at kids often have far weaker security than other computer products, and may pose a threat to a booming industry. Shipments of toys that connect to the Internet will rise 200 percent over the next five years, according to estimates by UK-based Juniper Research.
It's not clear what the motive was for the VTech breach nor whether it has resulted in any identity theft so far. Still, it's a warning for people who don't understand how much data and sensitive information is in a child's toy.
"The last thing you would ever imagine is that a toy manufacturer would lose your child's identity," said Liam O'Murchu, a Symantec Corp researcher known for his work dissecting complex malware produced by nation states. "This shows that it's harder and harder to do things safely online," he said.
In VTech's case, buyers of the company's cameras, watches and tablets are encouraged to provide names, addresses and birth dates when signing up for accounts where they can download updates, games, books and other content.
VTech said the hackers compromised its Learning Lodge app store, which provides content for children's tablets, and its Kid Connect mobile app service that lets parents communicate with those tablets.
Toys that gather data on the user, like VTech's line of cameras, watches and tablets and their associated websites, will grow by 58 percent annually, according to Juniper.
That category includes dolls like Mattel Inc's recently introduced Hello Barbie, which connects to home wireless networks and communicates with servers to enable conversations by uploading audio and getting responses from the cloud.
Mobile security firm Bluebox and independent security researcher Andrew Hay on Friday disclosed that they had jointly uncovered multiple vulnerabilities in iOS and Android apps that work with the device, as well as its cloud servers operated by technology partner ToyTalk.
Among their findings, they claimed that the app could be hacked to reveal passwords, could be tricked into connecting to hostile networks controlled by hackers and that the servers were vulnerable to some types of attacks.
Mattel spokesman Michelle Chidoni said that the toymaker and Hello Barbie technology partner ToyTalk have taken steps to ensure the products meets security and safety standards.
ToyTalk said in a statement that it had already fixed many of this issues raised.
It's too soon to say if the breach will hurt VTech's sales. Still, its stock fell 2.6 percent this week as it hired forensic experts, responded to government investigations on three continents and temporarily shut down more than a dozen websites, including a messaging service and kids' app store.
Mark Stanislav, a researcher at the security firm Rapid 7 Inc, whose wife is expecting their first child in a few weeks, began looking into problems with children's products after hearing about security flaws in baby monitors, and he subsequently found such problems in products from eight baby monitor vendors.
After disclosing the flaws to the companies earlier this year, he said most have been fixed. He told Reuters he has since found problems in websites that connect other types of devices to kids, including one from a major manufacturer. He will go public with those findings next month after giving manufacturers time to fix the problems.
Identity thieves use compromised data to pose as their victims, get loans or credit cards or apply for services such as utilities. Other types of criminals assume stolen identities to evade capture by police.
CLEAN SLATES
Children offer credit slates to fraudsters that can be exploited for years without the victim's knowledge, said Tom Kellermann, chief cybersecurity officer with Trend Micro Inc.
"Kids have a longer life in front of them and they have completely clean credit, which makes them more valuable," Kellermann said.
A child's name, birth date, email address and Social Security number are worth $30 to $40 on some underground markets, more than the $20 value of most adult profiles, he said.
Research by Carnegie Mellon University in 2011 found that more than 10 percent of a sample of stolen children's social security numbers had some sort of fraudulent activity associated with them, a proportion 51 times higher than adults'.
A child might not find out that their identity had been stolen until they are in their late teens, said Michelle Dennedy, Cisco Systems Inc's chief privacy officer who founded an identity-theft site for parents, theidentityproject.com.
"It's a pain when you are an adult, but for a child it can have so much more harm," said Dennedy. "Somebody might fail a background check for first job, or get arrested because a child molester stole their identity." Still, Vtech has some frustrated customers, even though cyber experts said the stolen VTech data has yet to turn up on forums where such information is sold.
"My concern is: Myself and other unlucky parents out there buying these products during the holidays and have no warning that they may not be able to use these products now or in the future," said Sarah Brace, a Canadian who commented on VTech's Facebook pages.
And it may attract U.S regulatory scrutiny. U,S. rules enforced by the Federal Trade Commission limit how personal information collected online from children under age 13 is treated. That information can include photos, videos and chat logs, just the sort of data that appears to have been collected by VTech, said Phyllis Marcus, a former FTC official now at the law firm Hunton & Williams LLP.
The FTC declined to confirm or deny any probe of VTech. Authorities in Hong Kong, the United Kingdom and the U.S. states of Connecticut and Illinois have said they are looking into the breach.
(Reporting by Jim Finkle and Jeremy Wagstaff. Additional reporting by Diane Bartz in Washington and Subrat Patnaik in Bangalore. Editing by Jonathan Weber and John Pickering)






==============================================
For a great email parody, view the following link:

https://www.youtube.com/watch?v=HTgYHHKs0Zw&__scoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618



==============================================
**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================