Farmville Addiction Leads to Baby’s Death

Today a severely depressing story of a baby that was shaken to death for interrupting his mother's Farmville time.

A normal parent knows interruptions happen and can deal, but someone suffering from an addiction is different. They're obsessed and nothing else is as important!

The Mashable article says this:

Needless to say, it is Ms. Tobias — and not the game itself — that is responsible for the death of her 3-month-old son.

While this is completely true, I don't think it's right to say that Farmville was not involved and bears none of the responsibility. The game, is fun, engaging, bright and feeds into people's innate needs to build, organize, nurture, and escape (all signs of addictive games), but worst of all, Farmville punishes you for not playing. When you stop playing, your animals and crops die.

At some point, the people who make Farmville had a meeting to decide how to keep people playing the game and came up with the death idea. To be fair, maybe they didn't realize how this would lead many people into addiction, but it has and that fact is pretty obvious by now.

Even Mashable agrees:

FarmVille, named one of the “worst inventions” in recent decades by Time magazine, has more than 60 million members, most of whom access the game through Facebook (Facebook). Some players have found it so addicting that they’ve lost their jobs and racked up debts north of $1,000.

In the end, what company owns up to this and apologizes or changes their ways even in the face of deaths and misery that they had a hand in causing? Instead, they'll blame the user saying that it's totally their responsibility for becoming addicted. So the only choice you have is to handle it yourself.

You have to manage or completely avoid games that are (allegedly) built addictive. Just do a search for "name of game" addictive and if there are pages and pages of results, you just might want to steer clear.

Tags: , , ,

Mint Data Lets You See Anonymous Purchase Trends

I've never liked Mint.com. Not because they're bad at what they do (they're not), but because you have to give them too much access to take advantage of it. So you get a little money management help, so what? You have to give away your password to do it. Not only that, Mint is (surprise, surprise) using all that juicy data you provide for their own purposes.

For now, it seems that they're not actually telling you who purchased what, but there's no telling when and if they'll start selling your valuable personal data to 3rd parties. Until then, showing truly anonymous purchase information is kind of neat so long as they don't take it further than that.

Tags: , ,

Mint Data Lets You See Anonymous Purchase Trends

I've never liked Mint.com. Not because they're bad at what they do (they're not), but because you have to drop your trousers to take advantage of it. So you get a little money management help, so what? You have to give away your password to do it. Not only that, Mint is (surprise, surprise) using all that juicy data you provide for their own purposes.

For now, it seems that they're not actually telling you who purchased what, but there's no telling when and if they'll start selling your valuable personal data to 3rd parties (maybe they are already). Until then, showing truly anonymous purchase information is kind of neat so long as they don't take it further than that.

Tags:

Australian Schools Force Fingerprint ID – To Students: Beat It With Gummi Bears

(Image is in the Public Domain)

So the first problem is that Australia is in a head-to-head race with the UK to see which country can lose their freedoms first. The newest chapter in this sad saga of Australia's descent into becoming a China clone is a high school that requires fingerprint identification for students to check in.

Though the privacy violating principal foolishly thought that by tracking fingerprints he could defeat students who used other students to "swipe in" for them previously. However, research which is available online shows how to defeat these with only gummi bears.

So if you're an Australian student at Gosford's Henry Kendall High School who thinks this privacy invasion is crap, check out this article that shows the research you can use to defeat the fingerprint scanners.

Tags: , , ,

Hijack A Facebook Account in One Click

(Image used under: Creative Commons 2.0 [SRC])

Ok so maybe not ONE click. But someone has put together a simple tool that you can use to take over the active sessions of anyone within wireless range of you. Hang out at the Starbucks free wi-fi and you'll be able to control the Facebook or other accounts of people nearby. It's an attack that was always simple to do for those who know how, but now any idiot can do it with a simple new interface.

By the way, they mention a few protections from this at the bottom of the article, but here's one more.

Tags: , ,

TSA Pilot Refuses Naked Scanner – TSA Response

(Image is in the Public Domain)

Maybe you haven't heard of this yet, but a pilot working for ExpressJet refused to use the new nudie scanners installed at his airport. They offered to pat him down instead, but according to him:

"Pat down is misleading," Roberts explained. "They concentrate on the area between the upper thighs and torso, and they're not just patting people's arms and legs, they're grabbing and groping and prodding pretty aggressively."

I've written about this previously as it's been reported that refusing the scanner will get you a ''super-sized'' pat-down almost like a punishment and this experience seems to confirm that.

Peter Pietra, the head of privacy for the TSA is a reasonable guy who I met at a conference once. I asked him about this issue and he stated that the procedures seemed to work as intended. People have the right to opt out, but must be patted down in the process. I asked him about the "aggressive pat-down" and he said this:

There is no retaliatory pat-down for people who decline AIT. There used to be several types of pat-downs, but there are now only two (standard, and resolution). People who decline AIT or metal detector, for that matter, get the standard pat-down, but our standard pat-down changed about a month ago .... There was a flurry of media attention about a month ago on it, and some complaints following the news articles, but not a lot. My rough recollection is a dozen or fewer complaints specific to the new pat-down.
There is no retalitory pat-down…people who decline get a standard pat-down

Along with my previous talks with him, this is the second time he's assured me that there is no special treatment of people who refuse the scan. While I'm positive there are people who abuse their authority or make things tougher for people who they think make things tough for them (asserting rights which also makes their job harder), here's the thing:

There are two pat-downs and while I don't know what warrants the second, you should only get the first by refusing to be scanned. Therefore, if your pat down is more extensive than what you see old people with heart devices getting, it's time to complain and complain loudly (which is what I believe this pilot has done and good for him). Peter says he thinks there's no problem because he hasn't received many complaints. If you think you've been a victim of retaliation or excessive probing, make sure he hears about it.

Make sure your voice is heard. You can connect with his office here: TSAPrivacy@dhs.gov

Support for the Pilot

There's been a lot of support for him in the airline industry (among workers not officially). Here are some of the industry forums where they're talking about him:

Jetcareers
Expressjetpilots
Flyertalk

UPDATE 2010/11/07

I recently went through the airport and also refused the scanner. I was patted down, but the TSA employee was very clear and professional. At no point did I feel uncomfortable.

It's a big deal if someone overdoes it and they should be called out, but it really wasn't a problem for me.

However, I was once told that signs would be prominently posted showing people they could opt out of the scan, but I found none anywhere.

Tags: ,

Farmville Spys on You

(Image used under: Creative Commons 2.0 [SRC])

This is not surprising.

"Apps" are pieces of software that let Facebook's 500 million users play games or share common interests with one another. The Journal found that all of the 10 most popular apps on Facebook were transmitting users' IDs to outside companies.

The apps, ranked by research company Inside Network Inc. (based on monthly users), include Zynga Game Network Inc.'s FarmVille, with 59 million users, and Texas HoldEm Poker and FrontierVille. Three of the top 10 apps, including FarmVille, also have been transmitting personal information about a user's friends to outside companies.

Once you install a 3rd party application, you no longer have control. Think twice before touching any "app" about how much you care if your information remains private or is sold on the information black market.

Tags: ,

Government Databases are Dangerous to Privacy – Well Duh!

(Image is in the Public Domain)

Why on Earth would anyone be surprised that when someone has access to a lot of sensitive data about people they know, they'd be tempted to look at it? Check out this story outlining several recent cases of government workers peeping on people with government databases.

Creation of government databases should be limited. Any that are legitimately created must be carefully controlled and restricted to only the people that need it. Breaches of trust should be visible and accounted for.

As far as I'm concerned, private databases owned by companies should fall into the same boat. No one should be tracked and tagged like an animal when they're not a convicted criminal.

Tags: ,

Great Money Advice

(Image used under: Creative Commons 2.0 [SRC])

Today I found some great and solid advice from "TheSimpleDollar.com" about managing money the right way. I agree with most of this though I wonder about the advice of investing before paying off bills. If your interest rates of debts are always higher than those of investments, it seems you're spending more than you're gaining.

Shouldn't you pay off debts then invest?

Tags: , ,

Facebook Yanks Your Phone Contacts Out of Your iPhone with App

(Image used under: Creative Commons 2.0 [SRC])

Rule number 1: don't trust Facebook or any other marketer with your information. Anything you provide should be carefully researched to see how safe it is then provided only after deciding what risk you face.

Rule number 2: don't use automated processes to share information without even MORE careful research.

Breaking both rules is a new app from Facebook which will allow you (or one of your friends) to violate the privacy of many people at once by uploading your phonebook.

The greatest part is that you don't have to give up your phone number since one of your friends can instead! This is just like how Facebook let friends tell stalkers where to find you or add you to groups so someone who's mad at you can make you look like a pedophile.

Don't you love Facebook?

Tags: ,

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

email Tutorial
|INDEX|next: E-mail Viruses

E-mail Dangers

Until we find out who the people are who actually buy things from spammers and kick them off the Internet, you're going to have to learn how to deal with and prevent spam.
E-mail Viruses - Learn how viruses are spread through e-mail and how to stop them
Phishing - Spot and avoid lures that pull you into the dark side of the web
Don't be one of those people that loses thousands of dollars to the classic Nigerian Scam.

E-mail Etiquette

Use CC only when necessary and BCC the rest of the time.
Use Reply-All when you mean to and never when you don't.
Practice proper E-mail Forwarding to protect privacy and make e-mails more readable.
Always personalize your e-mails to make it obvious to your recipient that it's valid.

E-mail Tips and Tricks

Using E-Mail Aliases Properly - Be careful about using sensitive data (like your real name) in an e-mail account.
Remember to treat your e-mail account with the security it deserves.
Use a decoy e-mail account to keep your main e-mail account free of spam.
Avoid using any Internet provider's default e-mail.

... or check out any of my other guides and tutorials by clicking here!

Password Mugging

A disturbing new practice among websites and services is where they ask you for your user name and password to other sites. I call this "Password Mugging"

[Click for full description]

Preventing Spam

Spam is annoying and worthless, but you still see it every single day. Here are some tips for preventing and reducing spam.

[Click for full description]

E-mail Viruses

Make sure that viruses don't sneak onto your computer through your e-mails. Read some simple tips to prevent that from happening.

[Click for full description]

Phishing

By far the most dangerous thing you'll find in e-mails is a lie. Sending a bogus e-mail to someone is generally called phishing, but can also be referred to as a Nigerian scam (depending on the goal of the e-mail). Learn to recognize and deal with phishing before it's too late.

[Click for full description]

Nigerian Scam

Many people have lost thousands and even hundreds of thousands of dollars to the classic Nigerian Scam. Don't fall for it!

[Click for full description]

How to Use "CC" Properly

Don't violate people's privacy and invite spam into their accounts by CC'ing all your contacts. Learn the proper way to send mass e-mails first.

[Click for full description]

Reply-All

It's easy to embarass yourself or harm your career when you don't know how to use Reply-All appropriately.

[Click for full description]

How to Forward E-mails Properly

Don't forward e-mails carelessly or you risk looking foolish as best and violating the privacy of all your contacts at worst.

[Click for full description]

Personalize E-mail

Follow this simple rule of e-mail etiquette to help prevent your friends and family from falling for phishing scams.

[Click for full description]

Using E-Mail Aliases Properly

It can be hard to find a good name to use in an e-mail account that hasn't been used and doesn't give away too much information about you.

[Click for full description]

Protecting E-mail Passwords

Your e-mail account is the most important online account you have. Remember to treat it as such!.

[Click for full description]

Using a Decoy E-Mail Account

Why it's very important to use a buffer e-mail account to shield your main account from people and companies that you don't trust.

[Click for full description]

The ISP E-mail Trap

Don't fall for the trap of using the free e-mail account provided to you by your Internet service!

[Click for full description]