Welcome!
If you have an account, please:
Log in
Yes, it's THAT book!

Drop your email here to stay informed of the status of my "tell most" book about the National Security Agency:

--OR--

Check out the Kickstarter here (click)

--OR--

I want info first...

Fair enough. Click the thumbnail below:

Employees are allies, not the adversary
How can I help you?
Contact Jeremy
Recommendations

Here's something that


I, Jeremy Duffy, actually recommend and think is worth checking out.
No web-bugs, no bs, just a legit recommmendation that I have personally evaluated before allowing it to be listed here:

Think something's here that shouldn't be? contact me!

NIST Recommends that E-voting Machines be De-certified

(Image is in the Public Domain)

The National Institute of Standards and Technology (NIST) is recommending that the 2007 version of the Voluntary Voting Systems Guidelines (VVSG) decertify direct record electronic (DRE) machines.

In the article, they explain how NIST has found that the machines have no paper trail, and that a single programmer could rig an entire election. Uh…hello? This is not news, this .... [Click here to read the rest of this post]

Tags: ,

Senate Banking Committee Member Denounces”No-Swipe” Credit Cards

Wireless credit cards aren't ready. Avoid them.
(Image used under: Creative Commons 3.0 [SRC])

From the CASPAIN newsletter:

A member of the Senate Banking Committee denounced RFID "no-swipe" credit cards at a press conference Sunday. Senator Charles Schumer (D-NY) said contracts for the cards should have warning boxes disclosing "the known weaknesses of the technology." He cautioned cardholders about their vulnerability to identity thieves, commenting .... [Click here to read the rest of this post]

Tags: , , ,

DRM in Game Systems

Oh no! People are stealing our games!
(Image used under: Creative Commons 2.0 [SRC])

I had to laugh when I read this today at Penny-Arcade:

All of this confusion for paying customers, so that pirates will be detained an additional fifteen minutes before they descend, their scythes awhirl.

For those who don't know, Penny-Arcade is a site that has been doing comics centered .... [Click here to read the rest of this post]

Tags: , , ,

Some US Schools Fingerprint Students Like Criminals

Schools have our kids confused with criminals
(Image is in the Public Domain)

In a recent newsletter, the Electronic Frontier Foundation writes:

Despite complaints from privacy advocates and parents, schools in states across the country are considering using fingerprint scans to track students. Kids at Sandlapper Elementary in Columbia, South Carolina, have their fingerprints scanned to pay for their breakfast and check out library books, .... [Click here to read the rest of this post]

Tags: , , , ,

Universal to Rip off MP3 Player customers

(Image used under: Creative Commons 2.0 [SRC])

Reuters reports that the recent Microsoft Zune player (the competition portable MP3 player to the iPod) has a built in royalty fee that goes straight to Universal (one of the worlds largest music companies).

Slashdot's coverage quotes Universal Music's Doug Morris as saying the following:

These devices are just repositories for stolen music, and they .... [Click here to read the rest of this post]

Tags: , , , ,

IHOP Takes Driver’s Licenses

(Image used under: Creative Commons 2.0 [SRC])

There was a recent case in Boston where a man was asked for his driver's license before being seated at IHOP. Apparently some gizmo thought it would be a great idea to prevent "dine and dashing". According to the article, the security person already had about 40 IDs on the desk by the time the subject of this .... [Click here to read the rest of this post]

Tags: ,

Tommy Thompson – May Run For President

(Image used under: Creative Commons 2.0 [SRC])

Katherine Albrecht, the world's leading RFID privacy expert and co-author of the book Spychips - How Major Corporations and Government Plan to Track Your Every Move with RFID writes:

Former U.S. Secretary of Health and Human Services Tommy Thompson is considering a run for president in 2008…

As head of Health of Health and Human .... [Click here to read the rest of this post]

Tags: , , , ,

The British RFID passports have had their encryption broken already

If you spend millions to deploy an encryption system, maybe you should make sure it's robust first?
(Image used under: Creative Commons 2.0 [SRC])

New RFID passports are supposed to make identity theft more difficult and to make it easier to spot fake passports like the ones used by the perpetrators of the 9/11 attacks.

First, making the data remotely secretly readable without every possessing or otherwise .... [Click here to read the rest of this post]

Tags: , , , ,

Low Chance of Bush Pushing Spying Bill Through Lame Duck Congress

(Image used under: Creative Commons 2.0 [SRC])

The Center For Democracy and Technology recently said in their newsletter:

The "lame duck" 109th Congress will return to Washington November 13 to take care of unfinished business before it finally ends. Among the bills President Bush has said he'd like to see passed is the NSA Domestic Spying bill. In addition, there is an effort .... [Click here to read the rest of this post]

Tags: , ,

Voting not allowed in Maryland

Our most fundamental right as American citizens is being denied in Maryland. I went to the polls to vote today and explained that I wanted to vote, but would only use a paper ballot. While the check-in people suggested a "provisional ballot", the supervisor nixed that and showed me this nice large sign.

Barred from voting in Maryland

Why did I insist on a paper .... [Click here to read the rest of this post]

Tags: , , ,

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

email Tutorial
|INDEX|next: E-mail Viruses

E-mail Dangers

Until we find out who the people are who actually buy things from spammers and kick them off the Internet, you're going to have to learn how to deal with and prevent spam.
E-mail Viruses - Learn how viruses are spread through e-mail and how to stop them
Phishing - Spot and avoid lures that pull you into the dark side of the web
Don't be one of those people that loses thousands of dollars to the classic Nigerian Scam.

E-mail Etiquette

Use CC only when necessary and BCC the rest of the time.
Use Reply-All when you mean to and never when you don't.
Practice proper E-mail Forwarding to protect privacy and make e-mails more readable.
Always personalize your e-mails to make it obvious to your recipient that it's valid.

E-mail Tips and Tricks

Using E-Mail Aliases Properly - Be careful about using sensitive data (like your real name) in an e-mail account.
Remember to treat your e-mail account with the security it deserves.
Use a decoy e-mail account to keep your main e-mail account free of spam.
Avoid using any Internet provider's default e-mail.

... or check out any of my other guides and tutorials by clicking here!

Preventing Spam

Spam is annoying and worthless, but you still see it every single day. Here are some tips for preventing and reducing spam.

[Click for full description]

E-mail Viruses

Make sure that viruses don't sneak onto your computer through your e-mails. Read some simple tips to prevent that from happening.

[Click for full description]

Phishing

By far the most dangerous thing you'll find in e-mails is a lie. Sending a bogus e-mail to someone is generally called phishing, but can also be referred to as a Nigerian scam (depending on the goal of the e-mail). Learn to recognize and deal with phishing before it's too late.

[Click for full description]

Nigerian Scam

Many people have lost thousands and even hundreds of thousands of dollars to the classic Nigerian Scam. Don't fall for it!

[Click for full description]

How to Use "CC" Properly

Don't violate people's privacy and invite spam into their accounts by CC'ing all your contacts. Learn the proper way to send mass e-mails first.

[Click for full description]

Reply-All

It's easy to embarass yourself or harm your career when you don't know how to use Reply-All appropriately.

[Click for full description]

How to Forward E-mails Properly

Don't forward e-mails carelessly or you risk looking foolish as best and violating the privacy of all your contacts at worst.

[Click for full description]

Personalize E-mail

Follow this simple rule of e-mail etiquette to help prevent your friends and family from falling for phishing scams.

[Click for full description]

Using E-Mail Aliases Properly

It can be hard to find a good name to use in an e-mail account that hasn't been used and doesn't give away too much information about you.

[Click for full description]

Protecting E-mail Passwords

Your e-mail account is the most important online account you have. Remember to treat it as such!.

[Click for full description]

Using a Decoy E-Mail Account

Why it's very important to use a buffer e-mail account to shield your main account from people and companies that you don't trust.

[Click for full description]

The ISP E-mail Trap

Don't fall for the trap of using the free e-mail account provided to you by your Internet service!

[Click for full description]