#Beckham #H&M #Superbowl sets Twitter on fire and some get burnt

In Social networks, Twitter on February 15, 2012 by tecnologyantivirus Tagged: , , , , , ,

Published by Leyre Velasco

Journalists, politicians, singers, writers, actors and actresses, more and more people from all sections of society join Twitter to share their life with the rest of the world. Some write directly what comes into their head, without help or supervision of an expert in social media.

Are they really aware that, due to the nature of the Twitter network, they are taking major risks? The most notorious one: being wrong … publicly. Being famous, your reputation is at stake. It’s like when a politician is betrayed by a microphone taping “off-the-record” conversations. On Twitter, what you say, how you say it and when you say it, matters. The image of these personalities can get easily damaged to a greater or lesser extent.

The reasons are varied. From blatant typos, lack of general knowledge, unfortunate expressions to, in the worst case scenario, incendiary and offensive tweets to the community.

Let’s take a look at a few curious examples:

  • Lautaro, the younger brother of Gonzalo Higuain, Real Madrid player, recently wrote a strong message against Jose Mourinho in the social network. Soon afterwards, the message was deleted, but by then, it was too late. This is what happened: A day before the second leg match between Barcelona and Real Madrid, when his girlfriend asked him on Twitter about the possible departure of Mourinho from Real Madrid, he replied: “It’s the best thing he could do because he is a son of a .. and a chicken who does not know how to outplay Barca (or words to that effect). Oh, don’t bother looking for Lautaro’s Twitter account because it no longer exists.
  • Alejandro Sanz certainly writes (or used to write) his tweets himself. His blatant spelling mistakes prove this point. As a result of the harsh criticism he received after a particularly infamous typo, the artist quit the social network. Later on, he reflected on it and justified the mistake on the grounds that his finger had played a trick on the computer keyboard. Whatever. Thanks Alejandro for returning to the network. These lapses generate TT which are pricelessly hilarious!
  • But the issue could  get embarrassingly serious. How about what happened to the actor who first got 1 million followers on Twitter? We are speaking about Ashton Kutcher. Months ago, he posted a tweet endorsing the late Jo Paterno, Pennsylvania State University’s American football  coach condemning his firing. Almost immediately, he was inundated with a flood of angry replies. Why? Because the reason behind the sacking had to do with Paterno’s involvement with child abuse. He later deleted the tweet and apologized, but by then the comment had been retweeted so many times, the damage had been done.
  • But, of today’s and probably most recent Twitter faux-pas, on a scale of 1 to 10, the case reported by the prestigious paper The New York Times gets a 10.
    Just imagine the scene: The Superbowl. Advertising on a giant digital, mega-cool screen with stars like Madonna performing or David Beckham’s ad for H&M underwear on full display. A rate of 10,000 tweets per second during the last three minutes of the game.
    Roland Martin, journalist of the CNN, issues the following tweet during the event: “If a dude at your Super Bowl party is hyped about David Beckham’s H&M underwear ad, smack the ish out of him! #superbowl.”
    The reactions of gay rights groups were immediate. So much so that in the end, even after Mr. Martin and CNN issued the pertinent apologies, we can say that the tweet has cost him the job.

Perhaps this is the downside of free expression in the social networks, where everything is under the watchful gaze of thousands of Twitter users who forgive but don’t forget.

In my opinion, spelling errors are revealing yet excusable, especially because the perpetrator, surely out of ignorance, is not even aware that he is making a mistake. Just a consequence of his sheer lack of attention during spelling and language classes at school.

Something of a different nature is when people from a certain position of influence, say journalists or politicians, express hurtful and offensive thoughts. Therefore, this is my recommendation: Think before you tweet.

Now, to which point should you constrain your natural thoughts? Where is the limit of freedom of speech?

What do you think? We invite you to send us your comments, but remember, if we deem them offensive, they will not see the light 🙂 That is the advantage of having a moderated blog. Without acrimony.



How web 2.0 are you?

In Tech Support Tutorials, Uncategorized on February 9, 2012 by tecnologyantivirus Tagged: , , ,

Published by Leyre Velasco

A couple of years ago we explained how Technical Support had evolved and adapted to the web 2.0 trends. The term Web 2.0 is associated with web applications which facilitate interactive exchange of information, data sharing, and collaboration on the world wide web. It is thought to have been coined after a conference held by O´Reilly Media in 2004. The web 2.0 philosophy promotes web-based communities, hosted services, web applications, social-networking sites, video-sharing sites, wikis, blogs, not to mention social networks aimed at various sociological profiles.

Companies are more and more implementing community knowledge bases enabling users to solve product and customer service issues on their own. In Panda Security, we are particularly sensitive to this issue and have deviced additional means of Support such as forums, multimedia tutorials, blogs, etc. Check out the Homeusers Support website for proof! The Panda Security International Technical Support Forum for example, enables not only moderators, but users to directly help one another.

These new sources improve the quality of support as massive feedback is obtained directly from the users themselves. Community knowledge bases create smarter, more informed customers and users. Content can be authored by both internal and external resources providing a rich source of information relating to the company’s products and services. What´s more, collaboration is a key issue: It improves decision-making, and enables knowledge workers to meet mission objectives with the best information available. However, for an average user, technology in this regard may have already gone too far, and the user finds himself not really prepared to face the trend in technology, some users even questioning the validity of all these tools.

So, before web 3.0, the natural evolution of web 2.0, spreads, let´s test how web 2.0 you are!!  Simply fill in this quiz on social media and web 2.0 by Quizible and check how many of the 32 icons you recognize!!

Which form of interactive 2.0 means do you prefer? Blogs? Forums?Social networks?


How to update (and not die in the process)

In Uncategorized on February 1, 2012 by tecnologyantivirus Tagged: , , , , ,

Published by Ana Etxebarria

6.45 AM The alarm clock of my BB goes off. As every day, I turn it off, I stretch and as soon as I am able to open my eyes I look to check what’s new. Mhhhh! The App World icon tells me that there are 4 new updates. A new version of Foursquare, WhatsApp, Twitter and of BBM. What is special about these versions? Well, as far as I know, nothing much, but experience tells me that either I update them, or I will be bombarded by those annoying messages informing of the availability of a new version. So much to my regret, I start the update process. Of course, as usual, during the first update the BB freezes and there is no other way to revive it but by removing the battery. Once rebooted, I choose to live with the new version messages and before I starve to death, I decide to go get breakfast.

9.00 AM I arrive at the office. As I start my computer, I fetch some water, turn on the heater, check my agenda …, but just as I prepare to open my Outlook, an update message informing me that Acrobat Reader update is available appears on my screen. The truth is I do not know how many updates Acrobat releases, but my perception is that there is at least, one a week … So after the BB experience a while ago, I choose to upgrade later. I do not feel like it now. I am rebellious. But what is this new shield like icon at the bottom right of my screen? Should I click it?, it won’t be yet another update, will it? … Well, quite right, ladies and gentlemen, on this occasion it is Microsoft kindly letting me know of the availability of new automatic updates. This is wearing me out, really..

17.00 PM It has been days since I last synchronized my iPad. I will do it now that I seem to be a little calmer. I open iTunes, connect the USB, and what is the first thing I see on the screen? Bingo! A new version of iTunes available. Well, I do NOT want it, thank you very much!, Very kind of you! Enough is enough, what a day … And now whaaaat?, another screenshot?, This is not happening, arggggghhhhh !!!!! Now, this time, very politely, and totally free, I am offered a new version of the iPad software … I am not exaggerating one iota.

I give up, I throw in the towel. I cannot put up with it anymore … Let them do whatever they want. Go ahead, update the software! Do so daily if you wish! But please, I do not want to know about it. Do it silently. Do not ask for my permission. At the end of the day, if only at their persistence, they always win…

The moral of my post is the following: If today I had accepted all the kind offers of available updates for my gadgets, I would have upgraded 3 different machines, 7 software programs and an Operating System. There! Not to mention the 52 updates that according to the App Store are available …

Don’t you think that something that is very positive in theory, is becoming a torture and a nightmare for users? What do you think?


Apps, apps, and more apps

In Uncategorized on January 25, 2012 by tecnologyantivirus Tagged: , , , , , , ,

Published by Ana Etxebarria

It is clear that the number of applications for smartphones and tablets is almost infinite. There is pretty much an application for everything, and it is fair to say that some of the apps are that divine that they even try to simplify the difficult task of being a parent, helping us find and organize fun activities to keep our children entertained. Plus, many of them are also FREE, so what more could you ask for?

If we focus on the upbringing and education of our children, we also find countless options. There are applications that advise you on what you should and should not do from the moment you know you’re pregnant. Others help you find the name of your baby. Others suggest how to organize a birthday party for the youngest lot. Other apps can tell you where to find parks with swings. Other applications can even help you find your kids if you lose them in a mall before you even have the time to get hysterical. Other apps will suggest physical activities to strengthen their still feeble musculature. Other, other, other …. I could spend hours listing applications for parents and there would still be hundreds, thousands, millions to be discovered.

And, of course, among all these fancy stuff, there are also applications which are most questionable. For example, Tymoot. Pronounced like Time Out, it refers to those moments where your children are sent to their room “to reflect” about the latest deed committed. It is therefore an application that will help us manage the punishments to impose on our children. It is advertised as the “ultimate mobile discipline tool”, which actually sounds quite funny …

The way it works is simple. Enter the birthdates of your children and the app will give you the suggested duration of the punishment in accordance with the children’s age. A priori, this task should not be that complicated for us, as parents and as inexperienced Internet users, as to need a specific application. Everyone knows that the ideal is one minute for each year of the child. But the best is yet to come!

The section entitled “Wheel of Discipline” is advertised as “horrible and terrifying” and it does sound like a sort of medieval torture. It actually does not go that far. It is simply a wheel where punishments of the most varied type are drawn. For example, forcing one child to be present when his/her brother is given preferential treatment or make the child wear clothing of the opposite sex if the child has shown sexist behaviour …

It’s okay for parents to need support. Clearly the world has become so complex that we are extremely vulnerable, but this should not lead to anyone taking advantage of our weaknesses, our lack of time and our inexperience to sell nonsense that will distract us from our real obligations.

Do you feel too burdened by useless applications?, Do you dare to make your own ranking of silly applications? To break the ice, I will start:

Birth Buddy: a woman who is going to give birth is supposed to enter the frequency and duration of contractions …


Do we lie more on social networking sites?

In Social networks, Twitter, Uncategorized on January 18, 2012 by tecnologyantivirus Tagged: , , , , , ,

Published by Leyre Velasco

There can be no denying that social networking is booming, to the point that head-hunters are increasingly using social media to find and research candidates, as we explained on a previous post on online reputation. That’s why it is so important to take good care of it.

However, can you build a certain online reputation deliberately? Well, yes you can. Nevertheless, it will most likely be a reputation based on exaggeration and, occasionally, sheer lie. The Straight Talking Report, a survey commissioned by UK insurance company Direct Line, has revealed that people are more likely to lie on social networking sites like Twitter than in a face-to-face conversation. According to the research, only one in five people claim to be more honest on Twitter or via text messages, compared to a third who say that they are more frank when talking to someone in real life.

In addition, men tend to lie more via text messages than women (17 percent of men compared to 21 percent of women). Another nugget: Women are less likely to be truthful in person than men, with 12 percent more men claiming to be honest face-to-face than women.

In my opinion, this is perfectly normal for a number of reasons:

Firstly, lying is an in-built part of human nature.

Secondly, there is no body language on the Web, and we all know that in real life there are sometimes subtle movements –a gesture, a look, a blush – that can help to differentiate between a lie and the truth.

And finally there is the concept of the relationship between mask and online identity as defined by Dorian Wiszniewski and Richard Coyne. Basically, they point out that whenever an individual interacts in a social sphere they portray a mask of their identity. And this is even more so when social interaction takes place on the Internet, due to the conscious decisions made by the individual to manage their online reputation.

Social networks like Facebook let you design your own image through posts, tweets, comments, opinions, etc. It is obvious that slightly molding the ‘real you’ is absolutely normal as when you are online anyone can see you, read your comments and opinions, etc… and you are more exposed to criticism. Everything depends on the level of honesty you have when creating your online reputation.

What about you? Where do you have your most honest interactions – online or off?


How naive are you?

In Malware, Malware for beginners, Security on January 11, 2012 by tecnologyantivirus Tagged: , , , , ,

Posted by Leyre Velasco

I have always thought that my mother was anything but naive. She has lived enriching experiences, has had a very intense working life with a high degree of responsibility and is practical, astute and witty. Let us say that she is not easy to rip off. At least, that’s what I thought.

Last Christmas, over one of many family get-togethers, she candidly announced:

“I have won an IPhone online”.

Somewhat stunned I asked:  “Win? IPhone? Online?”

Calmly, she replied:  “Yes, I won it over the Internet. I got a message on screen saying I had been selected over thousands of visitors and that the IPhone will be delivered to my address”.

At this point, my 12 year old daughter could not help the giggles.

I (rhetorically) asked: “Did you believe that?”

“Sure, – she replied -, why shouldn’t I?”

Getting seriously frightened, I asked:  “Which data did you provide?”

“Oh,  – my mother said – nothing much, just my email address and my postal address.”

So far, she has been getting emails requesting her participation on further contests but no mention of the IPhone, of course.

My mother was not at all conscious of the implications of her naivity. Because fraud through pop-ups is probably one of the oldest frauds there is on the Internet. Behind the so-called prizes there might be professional fraudsters, well able to spoof your identity or, without any scruples, make use of your personal data, all for economic benefit.

My mother is a regular Internet user. Her naivity is fruit of her lack of knowledge regarding the dangers of the Internet. That is why I believe it is so important to spread good Internet practises in order to raise awareness among different types of users. We teach our daughter security guidelines and therefore, she is cautious. My mother – up until now – has always browsed alone, no Jiminy Cricket around 🙂

How can you protect yourself?

  • It is very important to have an antivirus program that includes a spam filter installed and up-to-date. Any of Panda Security’s solutions will protect you against these kind of threats.
  • Check the source of information received. Ignore any pop-up that asks for your personal or financial information.
  • Scan you computer for free.
  • Inform yourself. We recommend pages on security, for instance, this blog or the Security Info page.

Luckily, my mother never provided her credit card details. Otherwise, she could have been in serious trouble. She has now installed the antivirus, scanned the computer and hopefully, from now onwards, she will be more cautious when browsing the net.

How about you? Have you ever been ripped off online? Tell us your experiences!


Kids and technologies: 6 basic tips to bear in mind

In Security, Teenagers, Uncategorized on January 3, 2012 by tecnologyantivirus Tagged: , , , , , , ,

Published by Ana Etxebarria

Continuing our series of articles on children and new technologies, today we give you some simple tips to make sure your children stay safe on the Internet.

Last week I posted an article describing two different approaches to parenting in the digital age: controlling and permissive; and despite I am clearly in favor of the latter approach, I am also aware that you cannot lower your guard when dealing with Internet risks.

I still believe that interaction on the Internet is not very different from real-world interaction, and people who manage well in real life do at least equally well in the virtual world. In any event, I must admit the online world may pose additional risks due to the Internet’s immunity and anonymity.

How can you help your children deal with that threat?

  1. Just as you know about your children’s friends, you better also know who your child contacts on the Internet.
  2. Keep an eye on how much time your children spend online, including other points of Internet access too, like smartphones and gaming consoles.
  3. Just as you teach your children never to talk to strangers or accept gifts from them, remind them never to physically meet anyone they’ve only become friends with online. If they decide to meet a cyber-friend in person, go with them.
  4. Talk to kids about the types of information they post online and how it can impact their reputation and future. Kids can unknowingly give out personal details about their life that could be maliciously used… And embarrassing and inappropriate photos and comments can stay with you forever.
  5. Teach them to be cautious with giving too much personal information, such as their location, their parents’ working hours, hobbies, etc. The less potential ‘unfriends’, the better.
  6. As Facebook makes frequent changes to its privacty policy, it is a good idea to sit with your kids and check out their online profiles with them. Pay special attention to their privacy settings and which messages, photos and personal details are accesible to whom.

Are you comfortable monitoring your child’s online world? What are your family’s technology ground rules?