TUEMedia
[blockquote]
“Working with Appletree MediaWorks is one of the best decisions we have made here at TUEMedia. They do an excellent job at keeping our websites up to date, and always have us covered with the latest updates and features. The team at Appletree MediaWorks does a fantastic job with their layout and custom design, and are always a phone call away when there’s a problem. I couldn’t imagine anyone else handling our media!”
Brittany Sheets
Co-Host and Communications Director
TUEMedia
[/blockquote]
[blockquote]
“With Appletree MediaWorks taking care of our web presence, I can spend my time producing radio instead of worrying about our websites. I work most with Raina, who is friendly and quick to carry out requests. She answers all of my questions, even when that means she has to do extra research for me. I can’t imagine running The Union Edge without Katie and Raina our corner!
Angela Baughman
Co-Host & Executive Producer
TUEMedia
[/blockquote]
TUEMedia is a new site designed for the WordPress framework, pinwheel slider, and Search Engine Optimization. Utilizing a dark background, the design implies elegance and simplicity, showcasing the client’s services and contact information.
[alertbox]Complete Web Site Design, Custom WordPress Integration, Search Engine Optimization.
Tue Media [/alertbox]
EMV Chip and PIN Credit Cards
EMV Chip and PIN Credit Cards
You may be receiving new credit cards this summer: the chip and PIN credit cards.
Credit card terminals must be upgraded to the new technology, common in Europe, by October 1st
or will be held liable for Credit Card fraud that happens in their establishment.
The EMV chip and pin cards reduce credit card data theft by containing a chip that encodes data transferred to the merchant. They are also tougher to clone than
magnetic strips.
Reducing, But Not Eliminating, Data Theft
This technology will not do away entirely with data theft. Online fraud and insecure websites that might store your data are not protected by the chip. For that, you need complicated, hard to guess passwords. And since credit card fraud still happens overseas, the system is not fail-safe.
For businesses and companies, this means it is their responsibility to upgrade credit card terminals for the new technology or they will be held liable for credit card fraud.
Instagram at a Glance
Instagram at a Glance
What is Instagram?
Instagram is an app-based social media system for sharing photos, videos, and status updates. Word has it that teens, less interested in Facebook these days, are very active on Instagram. But why? Should you be on Instagram? What’s the appeal?
The Good
- It’s Fun – Instagram is supposed to be a lighthearted, personal look at your life.
- An Easy Way To Share – Instagram is an app for your phone. It’s there at hand just like your phone. You snap photos of your life and you share them with your friends.
- Casual – Less fast-paced than Twitter. You don’t want to overwhelm your friends but it’s easier to keep up with them, too.
- Big Pictures – Instagram has big ‘real estate’, photo filters, and videos. We have big phones with big screens. Instagram grabs this and runs with it.
The Bad
- Image Rights Are Questionable – You own your pictures on Instagram, but Instagram’s tech lets it display those images and their terms of service reflect this. Effectively you own the car but your buddy who owns the garage can drive it around whenever he wants.
- Your Trouble’s Your Own – You are on your own if you get caught publishing copyrighted materials or breaking rules. Instagram takes no responsibility and is no buffer if you get in trouble for pretending you took those copyrighted stock photos.
- Not Made for Business – If you want Instagram for business you might have an uphill battle. It is a native app for phones so it’s not Hootsuite friendly, links are not easy like Pinterest, and it doesn’t play nice with Twitter.
The Ugly
This is where the infamous selfies and food pictures come from. Don’t like selfies? Annoyed by artistic, filtered food photos? Cringe when your friend posts 27 pictures of her baby? Instagram may not be for you.
Who’s It Good For?
Instagram is great for anyone that likes photos, images, and videos. The Instagram community is strong and personable. With 300 Million accounts, it is great for casual social media. And while it can be used for businesses and organizations (there is no special business area), don’t sell yourself – share your personality and culture. The personal, behind the scenes look is what people want to see.
Update 2/25/2015
WebProNews posted an article, Instagram for Business: Where to Start, which goes into more detail about using Instagram appropriately for business while keeping with the Instagram community and the right kind of user engagement.
2015 the Year of Artificial Intelligence Technology
We talked last time about self-learning personal assistants and just how far artificial intelligence technology is going to go.
There’s been a lot of fear about the future of artificial intelligence. Technology subject matters experts such as Elon Musk, Stephen Hawking and Bill Gates are all concerned for the inevitable robot overlords taking over the world.
The Terminator Won’t End the World, but He Might Take Your Job
But Baidu chief scientist Andrew Ng —one of the world’s best-known Artificial Intelligence (AI) researchers and a guy who’s building what is likely one of the world’s largest applied AI projects, the Google Brain project — says we really ought to worry more about robot truck drivers than the Terminator.
Ng thinks that AI is going to impact societies, but more regarding jobs and such. With cars being able to self-drive now, more job face robot take over. Ng says that should be the real concern.
Jobs facing artificial intelligence technology take over include:
- driving jobs
- order entry
- data sorting
- bank tellers
- data entry keyers
- telemarketers
In an fast changing, technology filled world careers are challenged every day and humans may need to reconsider their career paths before a robot gets in their way.
For more information visit:
“AI Won’t End the World, But It Might Take Your Job | WIRED.” Wired.com. Conde Nast Digital. Web. 3 Feb. 2015.
Verizon Tracking Cookies Turned Zombie
Remember those permanent Verizon tracking cookies? They’re causing a stir now that they’re being abused. According to Ars Technica, an advertiser named Turn exploited the Verizon tracking cookies to ‘turn back on’ tracking cookies on its own.
ProPublica released an article about the Zombie Cookies, which used Verizon’s tracking number to re-spawn tracking cookies that users had deleted. Verizon worked damage control by updating its site terms regarding the tracking cookies.
Later, Verizon stated it would expand its opt-out.
For more information visit:
Staff, Ars. “Verizon Will Now Let Users Kill Previously Indestructible Tracking Code.” Web. 3 Feb. 2015. <http://arstechnica.com/information-technology/2015/02/verizon-will-now-let-users-kill-previously-indestructible-tracking-code/>.
My Computer Files are Being Held for Ransom!
Ransomware
Ransomware, often going by the specific name CryptoLocker or Cryptowall, is a form of malware that, when installed on your computer, encrypts your files and locks them with a key. It then demands a ransom in digital currency within a set amount of time, or the key will be deleted and the files will be inaccessible.
How do you get it Ransomware?
The most common way to become infected with ransomware is to download it inadvertently. When downloaded, the malware sets to work.
Ransomware is often installed by:
- Opening email attachments
- Clicking on banner ads
Why doesn’t my antivirus protection catch Ransomware?
Generally speaking, Ransomware is sneaky malware that slips in to your computer because you have inadvertently installed it. You’ve gone ahead and told your computer to install things, and the malware takes advantage.
[pullquote cite=”- George W.”]”I got an alarmed call from my grandma. She likes playing online games, and clicked on an ad promising her more coins for her game, and moments later she had a message across her screen telling her that her computer had been infected, and that she had to call a number and pay to get the problem resolved. Fortunately, my grandma didn’t have many files on her computer. We wiped the hard drive and reinstalled Windows. But if she’d had important paperwork or photos without any backups, she would have been in a lot of trouble.”[/pullquote][space10]
Who is the biggest target?
This malware can attack anyone, but it causes the most damage to businesses, as they have more valuable data that is not easily replaced. Ransomware is designed to get money by holding your data for ransom.
How do I avoid Ransomware?
Don’t click on things you shouldn’t, or open unexpected files. Functionally we all know this isn’t always the case, however, and sometimes files slip through because they are deceptive.
If you become infected with Ransomware:
- Have secondary backups of important files that are not updated real time, this way, if you need to roll back, you have something unattached that is not infected.
- Unhook your computer from the internet RIGHT AWAY. All files may not have a chance to be encrypted.
[alertbox color=”red” icon=”delete” hide=”0″]
A few companies claim to be able to undo the damage, or have released the keys to unlock encrypted data, but this has not been guaranteed to work in all cases, especially since criminals update the software all the time.
[/alertbox] [space5]
My files are being held for ransom!
If you do find that you have this software, you have two options:
- Pay up and hope the keys they supply you to unlock your data works as indicated. This is risky as it encourages criminals to continue the scam, and since they ARE untrusted people, nothing is guaranteed.
- Wipe computer clean and restore from backup.
Hacking and computer exploits have become more sophisticated and with more businesses online, the risk is real. Precautions and backups are the most surefire way to avoid the worst of damage from hackers, criminals and emergencies when your files are being held for ransom. For more information on internet security, visit our blog at Appletree Mediaworks, LLC.
For more information visit:
– http://www.businessnewsdaily.com/6657-ransomware-cryptolocker-protection.html
– https://www.foolishit.com/cryptoprevent-malware-prevention/
– http://www.welivesecurity.com/2013/12/12/11-things-you-can-do-to-protect-against-ransomware-including-cryptolocker/
– https://blog.malwarebytes.org/intelligence/2013/10/cryptolocker-ransomware-what-you-need-to-know/