<?xml version="1.0" encoding="UTF-8" standalone="yes"?><oembed><version><![CDATA[1.0]]></version><provider_name><![CDATA[Bill Mullins&#039; Weblog - Tech Thoughts]]></provider_name><provider_url><![CDATA[https://billmullins.wordpress.com]]></provider_url><author_name><![CDATA[Bill Mullins]]></author_name><author_url><![CDATA[https://billmullins.wordpress.com/author/billmullins/]]></author_url><title><![CDATA[Paul Lubic&rsquo;s Six Part Series On Cyber&nbsp;Security]]></title><type><![CDATA[link]]></type><html><![CDATA[<p><a href="https://billmullins.files.wordpress.com/2011/06/image33.png"><img style="background-image:none;padding-left:0;padding-right:0;display:inline;float:left;padding-top:0;border-width:0;margin:0 20px 2px 0;" title="image" src="https://billmullins.files.wordpress.com/2011/06/image_thumb33.png?w=84&#038;h=84" alt="image" width="84" height="84" align="left" border="0" /></a>My good buddy Paul Lubic, over at <a href="http://paulshomecomputingblog.wordpress.com/" target="_blank">Paul&#8217;s Home Computing Blog</a>, recently posed this challenging question to his readers &#8211; <em>Do you wonder what future cyber security threats the cyber crooks are working on to steal our money? </em></p>
<p>Paul, a cyber-security expert whose professional background includes cyber-terror prevention and preparedness, doesn’t leave his readers hanging however. He’s in the process of writing a six article series (Upcoming Security Threats), in which he puts together the pieces of this puzzle in his mission to cultivate a new level of cyber security awareness in his readers.</p>
<p><strong><em>Currently available articles:</em></strong></p>
<blockquote><p><a href="http://paulshomecomputingblog.wordpress.com/2011/05/23/upcoming-cyber-security-threats-part-1-text-message-malware/">Upcoming Cyber Security Threats Part 1: Text-Message Malware</a></p>
<p><a href="http://paulshomecomputingblog.wordpress.com/2011/05/25/upcoming-cyber-security-threats-part-2-hacking-into-smart-grids/">Upcoming Cyber Security Threats Part 2: Hacking Into Smart Grids</a></p>
<p><a href="http://paulshomecomputingblog.wordpress.com/2011/05/27/upcoming-cyber-security-threats-part-3-social-network-account-spoofing/">Upcoming Cyber Security Threats Part 3: Social Network Account Spoofing</a></p>
<p><a href="http://paulshomecomputingblog.wordpress.com/2011/05/31/upcoming-cyber-security-threats-part-4-cyber-stalking/" target="_blank">Upcoming Cyber Security Threats Part 4: Cyber Stalking</a></p></blockquote>
<p><strong><em>Yet to be posted – but, on the way: </em></strong></p>
<blockquote><p>Hackers controlling your car</p>
<p>GPS jamming and spoofing.</p></blockquote>
<p><em>So that you don’t miss out on these last two, you might consider subscribing to Paul’s <a href="http://paulshomecomputingblog.wordpress.com/" target="_blank">site</a>.</em></p>
<p><strong><em>Boring, repetitive, but nonetheless &#8211; undeniably true.</em></strong></p>
<blockquote><p>Ensure you have adequate knowledge to protect yourself and stay ahead of the cybercrime curve. Make a commitment to acquire the knowledge necessary to ensure your personal safety on the Internet. In a word, become  “educated”.</p>
<p>If you lack this knowledge the answer is simple – you can get it. The Internet is loaded with sites (including this one), dedicated to educating computer users on computer security – including providing application reviews, and links to appropriate security software solutions.</p></blockquote>
<p>Paul’s excellent series, is a strong example of the available resources aimed at helping undereducated Internet users become aware of significant changes in the Internet security landscape. A definite recommended read.</p>
<p>If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on <a href="http://feeds.feedburner.com/wordpress/TVcE">this link</a> and you’ll never miss another Tech Thoughts article.</p>
]]></html><thumbnail_url><![CDATA[https://billmullins.files.wordpress.com/2011/06/image_thumb33.png?fit=440%2C330]]></thumbnail_url><thumbnail_width><![CDATA[]]></thumbnail_width><thumbnail_height><![CDATA[]]></thumbnail_height></oembed>