Mix Tape USB Stick


Mix Tape USB

Do you remember in the days before digital music and MP3 players? The days of mix tape collections of music? If you miss making mix tapes the Mix Tape USB will give you back that nostalgic feeling with a modern twist.

The Mix Tape USB Stick is a 1GB USB memory stick that can store up to 900 minutes of digital music. Create your own mixes, write the playlist on the cover, and give to a friend or keep for yourself.

Grab one at SuckUK.

USB Mix Tape

Advertisements

The iPad Conference Table


DuPont, which is known for its designer furniture made of Corian fiber, has created a conference table with a futuristic design, integrated with technology for using iPads. With 16 docking stations which help in securing the iPad and preventing the theft of the same, this conference table comes in a variety of shapes and colors depending upon the requirement of the customer. 

Whether it is a video conference or a congregation where one may need to display a presentation to a large audience, the Multi Table is the perfect option to choose from among hi-end conference tables. With its accompanying chairs, it fits very well in office environments which have a modern décor to create a situation where the world could be bought under one roof and the flexibility to multi-task without using too many gadgets.

5 Tips to Avoid Getting Phished


As criminal spear phishing becomes more targeted, users need to be even more aware to avoid being duped

By Joan Goodchild, Senior Editor, CSO Online

The criminal art of spear phishing, email spoofing that aims to get the recipient to click on a bad link or attachment, has been around for years. But that doesn’t mean it’s become any less effective. According to figures from the U.S. Computer Emergency Readiness Team (US-CERT), which compiles information from federal, state and local governments, commercial enterprises, U.S. citizens and foreign CERT teams, phishing attacks accounted for 53 percent of all security incidents in 2010.

What has changed recently is that more phishing attempts are direct, targeted efforts aimed at specific individuals within an organization. In fact, after the recent breach of an email database maintained by marketing firm Epsilon, security experts warned that banking customers should worry about a wave of spear phishing attacks utilizing the information gained from the break in.

The days when phishers would blast out hundreds of generic messages and hope for a few hits are ending. Criminals now realize a message with specialized social engineering content that is directed to one person, or a small group of people, can be much more successful. After all, it typically only takes one machine to compromise an entire network.

“We now see more of the scenarios involving just two or three emails targeting the executive team, which spoofs the legal team and contains a malware attachment that talks about pending litigation,” said Jim Hansen of the security awareness consultancy PhishMe.

PhishMe has designed spear-phishing-awareness training that focuses on changing user behavior. Hansen gave us five tips his team offers clients to help them avoid getting hooked by a phony message.

Be skeptical of all emails

Ask yourself: Who is this email from? If the sender is someone you do not recognize, chances are this email is either some form of unsolicited spam or it is a phishing email, said Hansen. Search for the domain through Google or some search engine to see where the domain comes from, he advised.

“Slow down, take a breath and think about what you’re doing,” said Hansen. “We are all busy people, but if you take a few minutes, it’s not going to disrupt your day.”

Be wary of attachments

If you do open the email and you are prompted to download images or attachments, don’t, said Hansen. These “images” and attachments could contain malicious content that you don’t want on your computer. At best, said Hansen, you are slammed with a ton of spam and advertisements. At worst your computer could be an open book to an attacker trying to get your information.

If the message comes from a sender you don’t recognize, or even if it is a sender that you do recognize, get confirmation before downloading any attachment.

Ignore commands and requests for action

If the email is urging you to do something, stop and think before you fall into their trap, said Hansen. If it is too good to be true or seems too farfetched, it probably is.

“There are two motivations a criminal will try to appeal to: reward or authority,” said Hansen.

In an authority-based scam, the email may say you need to act upon something and the message comes from someone in a position of authority, such as an IT team member telling you your computer is infected, or an HR person asking you to fill out a company survey. These kinds of messages may also try to fool you into thinking you have a package that was “undeliverable” or that your bank account has been breached.

The reward scenarios usually involve some kind of prize for entering a raffle or filling out a survey. Ignore them all, said Hansen.

Check out the link

Where does that link actually go? Almost all phishing emails have a link in them that they want you to click, said Hansen. The link says it is going to your Facebook page or to your bank website, but where is it really going?

The easiest way to find out is to hover your mouse over the link and look at the bottom left corner of your browser window. There you should be able to see the exact URL that you will be directed to if you click on the link. If this link shows as an IP address (example :192.168.1.1) then most likely this is not a place that you want to go.

Use the phone

Remember the phone? It’s how most of us once communicated back in the dark ages. It can still come in handy today, said Hansen. If you’re unsure, and the email message seems urgent, try to contact the sender by telephone.

“If you know the person, call them,” said Hansen (or you could text them!).

Hansen also advises that if you don’t know the sender, don’t download the attachment. Look up the sender’s phone number in your company directory or call the organization they are claiming to be from directly using a well-publicized phone number to confirm that the email was legitimately sent from that person or company.

LaCie CurrenKey USB Flash Drives


LaCie has a new line of USB flash drives shaped in the form of currency, aptly named CurrenKey.

Designed by 5.5 Designers, these flash drives come in 4GB or 8GB capacities and either a a bronze (4GB) or silver (8GB) finish.  These flash drives are priced at $19.99 (4GB) and $29.99 (8GB).

Available online at LaCie.

Free ZoneAlarm Pro firewall + anti-spyware + ID protection on Tues, Nov. 18th


CheckPoint Software: http://download.zonealarm.com/bin/free/sum/index.html

Text from PCMag: http://www.pcmag.com/article2/0,2817,2334774,00.asp

On Tuesday, Nov. 18, Check Point Software will offer the ZoneAlarm Pro software package for free for 24 hours, in celebration of Check Point’s 15th anniversary, a company spokeswoman said Friday.

ZoneAlarm Pro, which contains a firewall, antispyware, and ID protection service (including credit monitoring) normally costs $39.95. The download location for the free ZoneAlarm Pro package will go live just after midnight on Tuesday morning.

The free offer includes a one year’s subscription. Check Point charges the price of the software ($39.95) for a year’s subscription.

“This is in celebration of Check Point celebrating its 15th anniversary when it created Firewall-1 for the enterprise,” the Check Point representative said.

In honor of the birthday celebration, customers will be able to access additional details at Check Point’s Innovation Store, including a 50-percent deal on the Aerovation Checkpoint Friendly laptop bag.

Note: ZoneAlarm only runs on 32-bit WinXP or Vista, so those with 64-bit operating systems are out of luck on this offer.

Web 2.0 … The Machine is Us/ing Us


A look at the changing world and the way that information is created, shared and consumed, this video was created by Michael Wesch, an assistant Cultural Anthropology Prof at Kansas State University. He has brought together a bunch of animations, text, and screenshots in order to tell the story of “Web 2.0” — why it matters, and how it’s changing the world.  This video really makes one think.

(Via Boing Boing)

Microsoft – Joint Launch of Windows Vista and 2007 Microsoft Office System


vistaboxes.png

Today, Tuesday, January 30, 2007 marks the joint launch of Windows Vista and the 2007 Microsoft Office System. According to Steve Ballmer, Microsoft Corporation Chief Executive Officer, this is the most significant product launch in company history and the first simultaneous release of Microsoft’s flagship products since the joint launch of the Windows® 95 operating system and Office 95 more than a decade ago.

The word “Wow” plays a big role in Microsoft’s marketing campaign for its new operating system. “This ‘Wow’ thing is a great way of describing what we’ve got here,” Microsoft’s chairman told The Associated Press on the day before Windows Vista’s launch. More than five years in the making, Windows Vista was released for business customers November 30, but the new Windows operating system’s unveiling for consumer buyers is being released for consumers, today, Tuesday, January 30, 2007 around the world.

For more information, check out http://www.windowsvista.com and http://www.microsoft.com/office/preview