JC (Jessica) Torpey, IT specialist (10+ yrs.) turned writer (5+ yrs.), lives in Philadelphia, PA. A Goth at heart who lives Geek Chic, JC specializes in tech topics including Internet safety, security, and troubleshooting; malware identification and annihilation, mobile devices and technology, and others, although she slings dating and relationship advice and her strong political opinions with the best of them.
A freelance contributor to such websites as Yahoo! News, TV, Movies, Shopping and Voices, JC was also a part the Featured Technology Contributor program at Yahoo! Voices from November 2009 until December 2012.
She’s won awards for her technology based content, and certificates for her customer service, design, Information Technology, management, and writing skills.
JC combines her enthusiasm and knowledge of tech with her passion for writing hoping to captivate, educate, and guide anyone willing to learn.
|EDUCATION: In process of earning BA in Journalism and Mass Communications from Ashford University||BLOG: My Blog|
|CERTIFICATIONS: Internet Security, IT Terminology, Computer Fundamentals (Win XP), Computer Fundamentals (Win 7), U.S. English Vocabulary, U.S. English Spelling, U.S. English Written English, U.S. English Word Usage, U.S. English Punctuation Mechanics, U.S. English Online Article Writing & Blogging, U.S. English Sentence Structure, Basic U.S. English Skills, Spanish to English Translation, and Professional U.S. English Vocabulary. Others in progress.||CURRICULUM VITAE: Must be logged in to view|
The following is published on Yahoo! News:
What started as a small security breach of Global Payments, according to the Wall Street Journal, now affects more than 10 million cardholder accounts, according to Kerbs on Security. MasterCard and Visa maintain their systems are not affected. A Gartner report states those affected used their business debit and credit cards to pay for garage and taxi services in New York from Jan. 1 to Feb. 25. The good news is consumers with affected accounts will not be held liable for fraudulent activity, according to a ThreatPost report.
This Global Payments attack is one of many prominent payment-processor breaches in recent years.
A 2007 TJX, T.J. Maxx, and Marshall's security breach affected more than 94 million cardholders, according to USA Today. Using the stolen data, the perpetrators created counterfeit credit cards, used the fake cards to buy real $400 Wal-Mart and Sam's Club gift cards, then used the gift cards to make purchases totaling more than $1 million. Of the 10 people wanted for the crime, police arrested seven who all plead guilty, including ringleader Irving Escobar, while three others were still sought at the time of the report.
Heartland Payment Systems Breach -- 2008
The 2008 Heartland Payment Systems data breach affected more than 130 million cardholder accounts, according The Last Watch Dog, and the same group responsible for this breach was responsible for the TJX breach, including Albert Gonzalez, who used the same SQL Injection hack in both attacks. Breaching company firewalls, Gonzalez and others stole data -- before and after being arrested -- for a year. The single largest data breach in U.S. history, at the time of the original report, the others were still free and their identities unknown, although they are suspected of being Russian.
Second Heartland Breach -- 2010
A 2010 data breach of an Austin, Texas, restaurant affected only a few local people's credit and debit cards, according to a Statesman report. While police Cpl. Scott Perry said the breach was in the Heartland Payment Systems network -- the same Heartland Payment Systems that had 130 million credit card accounts stolen in 2009 -- Heartland disagreed in a news release. The company said its network was not compromised, it was not a target in the Austin data breach investigation, and the breach was merchant specific. Ultimately, four merchants were involved and the case is still ongoing.
The following sample is published on Digital Journal:
In an effort to become more social, Facebook announced in a press release on Wednesday that users now have access to “Embedded Posts.” The plug-in allows Facebook users to embed posts into their website or blog, albeit in a limited fashion.
Extremely limited availability initially Facebook released the Embedded Posts feature in the hopes that users will “inject Facebook into more public conversations,” reported Mashable. Mashable just happens to be one of a very limited number of publishers that were given early access to embed privileges, says the report.
Users who wish to use the plug-in are extremely limited as to the posts they can publish to their blogs and websites. According to the Facebook announcement on its Developer Blog, users can pull posts from five Facebook Pages and profiles only, and the Embedded Posts page notes that:
Embedded Posts is currently available to a handful of news publishers, with a broader rollout coming soon.
The publishers from which users can embed posts include: – CNN – People – Mashable – Bleacher Report – Huffington Post The Embedded Posts plug-in only pulls posts that publishers made public, says the Facebook report. That means posts that publishers have marked "private," "friends," or "friends of friends," cannot be embedded, even though users may be able to read those posts on their own timelines, or on the publishers’ Facebook Pages.
Using the Embedded Posts plug-in
Facebook explains that users can embed all content types including photos, videos, text, and link posts. After users embed that content into their websites or blogs, their visitors can then share and like the published posts from within their personal website or blog – without forcing readers to go to Facebook to do so, as so many other Facebook social plug-ins do.
To embed a post, users must first find a public post from one of the five publishers noted above. Determine if the post is public by clicking the globe at the bottom left of a post (see above image for example), above the "like," "comment," and "reply" icons. If it says, “Public,” the post is embeddable.
After finding a public post, click the drop down menu on the top right of the post and choose the option for, “embed post.” After clicking "Embed Post," the dialogue box will pop up with a code snippit (see photo for code example).
Copy the code and then paste it into website code, keeping in mind that where the code is pasted will depend on the platform with which the website or blog was built.
As an example, WordPress users might paste the code snippit into a widget box that appears in the sidebar. Websites using drag and drop building options might paste the code into a text box and drop the box into the footer or sidebar.
Facebook's Twitteresque move
Facebook states that Embedded Posts allows users to:
“Make it possible for people to bring the most compelling, timely public posts from Facebook to the rest of the web.”
Facebook's move to offer the Embedded Posts plug-in comes only a month after the social media site released the option for users to add hashtags to posts just as Twitter users add hashtags to their Tweets, Digital Journal reported.
NDTV reports that the option to embed posts is "Twitteresque," as Twitter users already have the option to embed others' posts and content into their tweets.
Since Facebook is offering more and more options that Twitter offered its users first would seem to confirm that Facebook is moving to compete on a more direct level with Twitter.