SSA: Ixnay on txt msg reqmnt 4 e-acct, sry

Tuesday, August 16th, 2016 at 11:58 am

The U.S. Social Security Administration says it is reversing a newly enacted policy that required a cell phone number from all Americans who wished to manage their retirement benefits at The move comes after a policy rollout marred by technical difficulties and criticism that the new requirement did little to prevent identity thieves from siphoning benefits from Americans who hadn’t yet created accounts at for themselves.

In an announcement last month, the SSA said all new and existing ‘my Social Security’ account holders would need to provide a cell phone number. The SSA said the numbers would be used to send recipients an 8-digit code via text message that needs to be entered along with a username and password to log in to the site.

But sometime in the past few days, apparently, the SSA decided to rescind the cell phone rule.

Continue reading SSA: Ixnay on txt msg reqmnt 4 e-acct, sry

How-to Insert your PollEverywhere Polls into PowerPoint

PollEverywhere is great for creating a dynamic presentation that keeps your audience engaged.

In this Quick How-to Webinar I will demonstrate to you how-to insert your polls into a simple PowerPoint Presentation and mention a few helpful features you can incorporate into your polls.

How-to Create Your First Poll in PollEverywhere

Poll everywhere is a fantastic platform to engage your audience and assess their knowledge of any given topic. It hosts a wide variety of question formats and your polls are available anywhere at any time. Just insert your poll into your powerpoint presentation or display them from your favorite web browser. Participants only need their mobile device or laptop to respond via the internet or text message.

In this Quick How-to Webinar I’ll demonstrate how to create your first poll in PollEverywhere.

IT & Classroom Technology Overview

Welcome Back! This fall we will see a few things that have changed in the classroom technology arena.

In this Webinar we will review the most important things you need to know about Information Technology and Instructional Technology at the Law School including a brief overview of the classroom podium and Desktop Computer

For any assistance with technology at the law school please email

This webinar is accompanied by Overview Documentation.

IT & Classroom Technology Guide 2016 – Faculty

Identity Theft Hits Home


Image courtesy of

In lieu of several recent incidents of identity theft affecting various members of The School of Law and The University of South Carolina’s community as a whole, we felt it extremely important to remind you to take every precaution to protect your identity and that of your family’s. Continue reading Identity Theft Hits Home

FBI: $2.3 Billion Lost to CEO Email Scams

Thursday, April 7th, 2016

The U.S. Federal Bureau of Investigation (FBI) this week warned about a “dramatic” increase in so-called “CEO fraud,” e-mail scams in which the attacker spoofs a message from the boss and tricks someone at the organization into wiring funds to the fraudsters. The FBI estimates these scams have cost organizations more than $2.3 billion in losses over the past three years.

In an alert posted to its site, the FBI said that since January 2015, the agency has seen a 270 percent increase in identified victims and exposed losses from CEO scams. The alert noted that law enforcement globally has received complaints from victims in every U.S. state, and in at least 79 countries.

A typical CEO fraud attack. Image: Phishme

Continue reading FBI: $2.3 Billion Lost to CEO Email Scams

Microsoft is putting Windows 10, Cortana at the center of smart homes

A display for the newly formed Open Connectivity Foundation at Mobile World Congress 2016 shows a model smart home, in a file image captured on Feb. 25, 2016. Credit: Stephen Lawson

Windows 10 will be able to support more IoT devices with new standards coming in 2017

By Agam Shah

IDG News Service | Apr 1, 2016

Are you too lazy to open the door or switch on a light? Let Windows 10 and its Cortana voice-activated digital assistant do the job for you.

Microsoft’s vision is to make home automation a breeze in Windows 10, and the company featured several related Internet-of-things announcements at its ongoing Build conference.

Windows 10 will work with a wider range of devices and appliances by integrating new Open Connectivity Foundation (OCF) protocols, scheduled to be released in 2017. Additionally, Cortana will allow users to easily automate tasks using a Windows PC, mobile device, Xbox console or Raspberry Pi 3.

Continue reading Microsoft is putting Windows 10, Cortana at the center of smart homes

Amazon goes after patent so you can pay by selfie

Credit: Eugenio Marongiu/Shutterstock

Forget passwords, users would shop on Amazon by clicking a selfie or video

By Sharon Gaudin

Computerworld | Mar 16, 2016 12:43 PM PT

Amazon filed a patent application for a technology that would enable users to pay for purchases using a selfie.

The U.S. patent application is for image analysis technology for user authentication.

“The process identifies the user and verifies that the user requesting the transaction is a living human being,” the application states. “The user is identified using image information, which is processed utilizing facial recognition.”

Amazon explains that the user authentication would work by verifying that the image or video is of a live human using one or more “human-verification” processes. The device would then prompt the user to perform a specific action, such as making a specific hand gesture or blinking the left eye, to confirm the transaction.

Continue reading Amazon goes after patent so you can pay by selfie

11 signs you’ve been hacked — and how to fight back

Photo courtesy of InfoWorld and StaticWorld

By Roger A. Grimes

Redirected Net searches, unexpected installs, rogue mouse pointers: Here’s what to do when you’ve been 0wned

In today’s threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable.

To combat this, many antimalware programs monitor program behaviors, often called heuristics, to catch previously unrecognized malware. Other programs use virtualized environments, system monitoring, network traffic detection, and all of the above at once in order to be more accurate. And still they fail us on a regular basis.

Here are 11 sure signs you’ve been hacked and what to do in the event of compromise. Note that in all cases, the No. 1 recommendation is to completely restore your system to a known good state before proceeding. In the early days, this meant formatting the computer and restoring all programs and data. Today, depending on your operating system, it might simply mean clicking on a Restore button. Either way, a compromised computer can never be fully trusted again. The recovery steps listed in each category below are the recommendations to follow if you don’t want to do a full restore — but again, a full restore is always a better option, risk-wise.

Continue reading 11 signs you’ve been hacked — and how to fight back