"According to the statement issued by Jim Holthouser, Executive Vice President of Global Brands, "unauthorized malware" was used to gain access to Hilton's point-of-sale systems resulting in the theft of payment card information of some of its guests. The attacks are said to have occurred between November 18 to December 5, 2014; and April 21 to July 27, 2015. Customers who used their cards at any of the Hilton Worldwide hotels - including its subsidiary brands, such as Waldorf Astoria, Conrad Hotels & Resorts, Double Tree, Embassy Suites, and others - during these periods have been recommended to monitor unusual activity."
Not that I don't already keep a close eye on my credit card transactions. As much as I travel, and use my card, I know better.
"Those of us here at Exterro are already preparing for a new year of E-Discovery and have put together a feast of new tools and resources that will help you get ready for what lies ahead."
Definitely worth a bookmark for future reference!
An online quiz that illustrates the words you use the most on Facebook as a "word cloud" has gone viral -- and it's a great reminder of why you should be wary of connecting ostensibly fun games with your account. UK-based VPN comparison website Comparitech has delved into how it collects not just your name, but also your birthdate, hometown, education details, all your Likes, photos, browser, language, your IP address and even your friends list if you link it with Facebook. Too many details for a simple game, right? If you agree, you may want to think hard before linking any other FB quiz in the future, because most of them require you to give up a similar list of information.
"One panelist, U.S. Magistrate Judge Kristen Mix, who sits in Colorado, said the first thing lawyers need to remember is that most judges don’t have Facebook pages, and may know about how the site works only through their grandchildren’s explanations.
“Our understanding is nowhere near as thorough as complete as if we were users,” said Mix."
And yet, when it comes to making legal decisions about social media evidence, those decisions are left in the hands of lawyers and judges who admit to not using them or understanding how they work?
I wouldn't be proud of that. Would you?
Look, the article is absolutely correct. Data is being created in millions of different places that didn't exist even a couple of years ago. That data could be evidence. That data could be the most important piece of information about a case.
That's why bar associations are laying down rules that say lawyers need to be competent or hire someone who is, when it comes to dealing with this data. More and more, cases hinge on data created is not being created on a local computer, but online, in various networks, websites, cloud storage locations and so on. Not understanding how these things work is not an excuse to not do your job.
"3. Generic Presentations
Not taking the time to tailor your presentation to your audience is a sure-fire way to lose your audience. You run the risk of sounding like you are on auto-pilot, and it's disrespectful to people who have come to hear you speak. Making your presentation unique to your audience will help you deliver your information in a new way, and will keep your audience engaged."
For training, I think this is the tricky one. Obviously, when teaching a class, especially as part of a certification, you have to cover the material. Doing so, while still being able to make it relevant to the audience, and their interests, requires something more than just knowing the material, it takes interpersonal skills and the ability to think on your feet. You have to know how to react to what the audience is giving you, without losing sight of the content of your course.
That's a tricky line to walk, but doing it well results in a training engagement that leaves everyone better off.
The other 12 habits are things to look out for too!
This isn't a good thing, at all. I don't think it's just teens either. Advertising has become so prevalent on the web, and so embedded, that the difference between actual "news" and an ad is pretty blurred. That means that savvy marketers could influence public opinion with stories that seem to be news, but truly aren't.
I mean really, people already like and share things on social media that aren't remotely true, how much of a stretch is it to think they would see an ad and assume it's journalism?
"I don’t think Twitter can convince bloggers to pay for sharing data directly. But what if Twitter announces – and I’m telling you right now to expect this – that sharing counts are only available on the Twitter Analytics dashboard? In truth, the data available there is already pretty sweet, and if Twitter put sharing data exclusively in that dashboard, what will happen? A LOT MORE people will log on to that dashboard, slavishly scanning the numbers for their daily dose of social proof."
This wouldn't surprise me either. I'm not thrilled that Twitter eliminated share counts on my own, and other, sites, but I also understand that Twitter will do what's best for Twitter, not necessarily me.
Getting more people to their site, and viewing their ads, is in their interest, but they will have to weight that against ticking of their own user base. I don't think this will impact that much though. Most of the Twitter users I know don't really care that much, it's website owners who care, and it's not like we're going to stop using Twitter over it.
Yes, you should probably do this. If you've stored a credit card with Amazon, now that they are supporting two factor authentication, you need to enable it.
I will be!
"The 19,000 hashes have been "given to five global internet companies [Facebook, Google, Microsoft, Twitter and Yahoo], who had volunteered to conduct a robust test on the list through their systems during the implementation period."
The hashes, created during the implementation stage, were sourced from images forensically captured on the Home Office Child Abuse Image Database, which in turn was sourced from police investigations.
Crucially, with the use of the hash list project, child sexual abuse images will be prevented from being uploaded in the first place, thus giving internet companies the power to stop people from repeatedly sharing the images on their services, said IWF."
This is a great use of this technology. I know there are hash lists in use by law enforcement, and I also know why their distribution has been limited, but it's great to see technology companies cooperating to test the hash lists and take what is essentially a pretty easy step to eliminate the images from their service. It won't eliminate all child abuse images, but the more people found sharing known images, the more likely we can find the people who are sharing the ones we don't already know about.
"A 2014 survey from About.com found the top three reasons why people do not like their jobs — accounting for 62 percent of responses — were communication related. The biggest issue, a lack of direction from management, was followed by poor communication overall, and constant change that is not well communicated.
Under-communication, lack of communication, miscommunication, whatever you want to call it, is a widespread and detrimental problem."
I know when I feel a significant lack of communication, I usually respond by starting to look around. My experience tells me when that sort of thing happens, it's followed by lots of things that I'd rather not be around to experience. You might think that paranoid, I'd call it experienced.
This is an important lesson for photographers, or anyone traveling with technology of any kind. I know I am paranoid about having my camera bag swiped when I'm traveling around with that, and just as paranoid when I'm hauling all of my tech stuff for work!
"Privacy advocates are warning federal authorities of a new threat that uses inaudible, high-frequency sounds to surreptitiously track a person's online behavior across a range of devices, including phones, TVs, tablets, and computers.
The ultrasonic pitches are embedded into TV commercials or are played when a user encounters an ad displayed in a computer browser. While the sound can't be heard by the human ear, nearby tablets and smartphones can detect it. When they do, browser cookies can now pair a single user to multiple devices and keep track of what TV commercials the person sees, how long the person watches the ads, and whether the person acts on the ads by doing a Web search or buying a product."
This really goes to show how much data about you is valuable to advertising companies, and to what lengths they will go to gather that data.
"Following the installation of the November 10 2015 updates, users may have problems with Outlook crashing when they view HTML messages. Windows 7 64-bit is definitely affected; other versions of Windows may be affected as well. "
Haven't tried the fix yet, but I am definitely seeing Outlook crash since the updates installed last night on my work laptop. If you are too, thought I'd pass this on!
"IT ALWAYS seemed improbable that Marriott was the only one. Last year the hotel chain paid $600,000 to America's Federal Communications Commission (FCC) to settle a complaint that it had blocked customers' personal wireless modems and hotspots at "at least one" of its hotels, forcing customers to sign up for expensive in-house internet access instead. Now Hilton has found itself in hot water over the same charge."
They just can't help themselves, but they really need to.
"The three major distinctions are:
Per Family (email + attachment) vs. Per Document
Deduplication is performed on the family level, while near-duplication is performed on the document level.
Textual Analysis vs. File Analysis
Near-duplicate detection uses only the text AND white space to compare documents, but deduplication uses a set of criteria based on the actual metadata of the files.
Duplicates vs. Similarities
Deduplication removes identical document families, while near-duplicate detection groups documents together by similarity."
Deduplication is not the same as identifying near-duplicates. On the other hand, there are a lot of reasons to do both, so long as you understand the differences, and the different things you are trying to accomplish with each.
Weird that while every other service is moving to add space to existing accounts, Microsoft goes the other way. I don't see how that is going to help encourage Office 365 use if I can use Google apps and get more storage space for the results.
I've said it before. Google is a company that sells advertising. Anything that will help them target advertising to users will be done, including keeping track of what you search for.
I have resisted the urge to use a VPN all of the time, but I may need to revisit that idea.
"The takeaway: Relationships form the bedrock of any successful business- or career-building strategy. But it's tough to build relationships without networking, and it's tough to start networking if you've bought into its less-than-stellar reputation. It's time to fix that, and start amassing the relationship capital that will pay both short- and long-term dividends for you and your organization."
That's a good takeaway. If you think networking is a dirty word, that's fine, but also accept that relationships are an important part of everyone's career, and life. So go and form relationships, which really is what networking is really about, not these seven things.
"The take-home message is this: If you want to build your confidence in public speaking, you have to go out and do some. You will be nervous, because everyone is. It will get better the more you do it though, so accepting this and getting through the initial nerve-wracking talks will send you on the way to speaking more comfortably in time."
It's true. The more public speaking you do, the more comfortable you get with it, and maybe most importantly, you learn that when something does go wrong, nobody dies. It's not really that big of a deal most of the time. Not nearly as much as we imagined it to be while we worried about it going wrong.
Click in to find related links.