Thursday, May 27, 2010

Anyone have any info about this sticker?

Do you recognize this sticker?
If you do, leave a comment below.

Monday, February 22, 2010

ScreenCap of GMail Phishing Scam

Here's a sample of what the GMail phishing scam looks like.
Do NOT respond!
Jest delete it!
Click on the above image to see a larger format.

Friday, October 16, 2009

Hawaii National Bank E-mail Phishing Scam

Beware of the most recent Hawaii National Bank e-mail phishing scam.
The e-mail subject line reads, "Password Reset" and sender purports to be Hawaii National Bank. However, the hyperlinks will misdirect you to...

This is NOT Hawaii National Bank's website!

Below is a screen capture of the phish.

You can click on the image and see more details going to the website.

Friday, May 29, 2009

Hawaii Teens to be Prosecuted for Sexting?

According to the news report on May 29, 2009 on KHON2 News,  the Hawaii State Attorney General's Office is implying that Hawaii teens may be arrested for "sexting". 

Here are some of the implications:
1) If the teen is convicted, he/she will be classified as a sex offender and required to register as such with the Hawaii Sex Offender Registry.  In addition, if they move to the mainland to attend school, they may have to also register in that state depending on the state's legal requirements.
2) They will also have to state they are registered sex offenders when filling out forms which ask if they have been convicted of a crime.
3) The device that the teen used, cellphone and/or computer can be forfeited to the state.
4) The stigma of being labeled a convicted sex offender will have long ranging effects on the future of that teen on many levels; social,  professional, psychological, and emotional.  The effects will definitely be far reaching and will impact them for the rest of their lives.

I AM a very strong proponent of disciplining the teens for their wrongdoings.
And that the teens need to know that there can be severe consequences to their actions.
But the punishment/discipline should fit the crime.
In the case of "sexting", the discipline/punishment might be more damaging that the crime itself.

I think we should start looking at the "spirit of the law" rather than the "letter of the law".
The statutes were meant to protect our children from being victimized by child pornographers and pedophiles.  

If the State starts enforcement by making arrests, hopefully the Courts will have some latitude in the sentencing.  In the meantime, the Legislature should start working on either drafting new statutes or start making amendments to our current ones.

But most important, parents need to start parenting!
The schools & law enforcement can only do so much.
Parents need to start communicating with their children and explain that their actions can have dire consequences.
Explain to them that if they misuse/abuse their technology, it will be taken away from them.
If they (the parents) does it, then their devices will eventually be returned.
If law enforcement and/or the courts do it, they lose their devices - permanently!

If  you have any questions, please feel free to contact me at

Monday, May 25, 2009

Recommended Guidelines for Confiscating Electronic Devices

Many schools having been thinking about seizing electronic devices (cellphones, ipods, etc.) from students. I've jest finished drafting procedural guidelines which may help the schools draft their own procedures.  But even before they start drafting their procedures for confiscation, they need to look at their written policy to see if it gives them the authority to do so and under what circumstances. 

The purpose of these guidelines I drafted is to reduce the risks of liabilities that the schools and the teachers may be exposed to.

Simply put, "C-Y-O"! --- "Cover Yo Okole!"

Contact me if you want a copy of the guidelines.

Saturday, May 23, 2009

CyberSafety Tips for Twitter

Be cautious when Twitter asks for your e-mail password.  

Twitter accesses the e-mail address that you provided when you signed up with the password you provided and grabs your e-mail contacts in your address book.

So, now it will be easier for you to notify your contacts about your Twitter account and invite them to join.

Twitter claims that they do NOT save the passwords.

“Yeah, sure." <<WINK>>

Why worry?

Well,what else do you have in your e-mail account?

All your mail; Everything in your Inbox, read & unread. Contents of your Sent Mailbox, your draft folder, etc.

If you are using a GMail account and have a Blogger account, that same password will access all your blog sites that are linked to that GMail account.

And if you are using any of the Google Apps, they can be compromised also.

CyberSafety Tip

If you have already provided Twitter with the password, then go to your e-mail account and change your e-mail account’s password (NOT your Twitter account's password).

Also, if your e-mail account has an option to submit a secret question and answer, change those also.

Your e-mail password should be different than your  Twitter password.

You may want to create a free web based e-mail account (i.e. Yahoo!) jest for Twitter.

(But the same rules apply about giving Twitter the password).

Did you know you can get a Twitter account with a fake e-mail address?

When I say “fake”, I mean one that is non-existent.

The problems with making a fake e-mail address are…

If it’s a fake, then you cannot access it and get updates from Twitter.

Most important, you won’t be able to reset your Twitter password if you forgot it.

You can still get direct messages, but you only can read/reply via Twitter.

Also, what happens if the “fake” e-mail address is not really a fake, but belongs to another user?  


Now that person can “hijack” your Twitter account!

All they need to do is go to the login webpage and click on the link, “forget password?”

A new page comes up asking for the username or the e-mail address.

The hijacker types in their e-mail address (which you thought was fake). 

Twitter sends an e-mail to that e-mail address with a link to the reset password webpage.

Now, the hijacker jest needs to check their e-mail since he/she knows the password because they ARE the legit owners of that e-mail account.

You, on the other hand, can NOT access that e-mail because you thought it was fake and don’t know the password.  

The hijacker can now reset your Twitter password and take over your Twitter account.

CyberSafety Tip

Better to create a free web based e-mail account than make a bogus one.

You can still use a fake e-mail address to get a Twitter account.

But once you get the account, go to the a Setting tab and change the e-mail address to one that you have the password to.  

Do NOT keep that fake e-mail address.  

Or you run the risk of your Twitter account being hijacked.

Real Name or Alias?

It really depends on you.  

Remember what you post may comeback and bite you in the okole (“butt”).  


U R only as safe as your friends want U 2 B!

Example, my Twitter profile does not mention my name, address, telephone numbers, etc.  

I go by the name of “The Great One”. 

So, my pal “Kawika” tweets, “Eh Chris, wen we go drink?”  Ooops! 

My brother Arnold tweets, “How’s da kids?”  Ooops!  

Hilary tweets, “Miss you @ work today.”   

Checking Hilary’s profile, she lists who she works for and the address of the workplace. Ooops!

CyberSafety Tip

Respect your friends’ anonymity!  

Read their profile.  If they are vague, then be vague.

Let them make the first gesture if they want to identify themselves.

For example, “Aloha Fred!, It’s me Chris!”

When in doubt, ask.  Send them an direct e-mail or call.

Look at Twitter as a bulletin board – if it’s public, anybody anywhere can read the Tweet.


Don't be anti-social using social networking apps!