Have an Identity theft issue? Just ask. Contact me at: 415-889-8721 or email

Easily train developers on secure coding best practices

New threats and cybersecurity risks are being developed and conceived of every day. With cybersecurity threats on the rise, companies look to their developers as a first line of defense when it comes to application security. Without proper security, hackers can easily access applications and steal private data—putting your customers and business at risk.

Large corporations invest millions of dollars to keep their organization secure and safe from potential threats. Unfortunately, investing time and money has little impact if developers don’t understand their role in the security plan and don’t have the knowledge to act out the plan in place.

Gaining skills through training

More often than not, developers aren’t always thinking about security when coding an application. This lack of focus poses risks and creates the potential for vulnerabilities within the code. By offering training opportunities to your developers, you can help them learn to think securely during the development process. Thinking securely is key to avoid making mistakes later on. By investing in training, developers also gain a valuable skill that will help them increase job productivity. In this sense, training helps reduce vulnerabilities before they happen and saves time and money if something does happen in the future.

Getting developers engaged in training

The most challenging part of implementing a security training program for developers is getting them engaged with the training. Common issues that developers site, include: training interferes with work and deadlines, the courses are not relevant, and why do I really need training?

Human error accounts for 52 percent of the root cause of security breaches, according to a new study from CompTIA, which surveyed individuals from hundreds of companies in the U.S.

To overcome these issues, employee commitments need to be taken into consideration during the training process.To engage developers, it’s important to work with them. Training is an ongoing program, and learning to balance training and deadlines is mandatory for success. With role-based online training, you can specify which modules suit certain employees to make sure the proper courses are being offered to the right people. By informing employees about their role in regards to software security, they will be more likely to understand what’s expected of them.The 2015 Stack Overflow Developer Survey tells us 45 percent of developers have six or more years of experience. These results lead you to believe that there are a large number of inexperienced developers who likely don’t have much application security knowledge. About 42 percent of developers are also self-taught, which means they may not know even the basic best practices of application security.

Implementing application security training for developers starts with understanding the needs of your engineers. Reduce vulnerabilities and risks within your organization by rolling out a computer-based training program to your developers.

Get started today with HP Software Education’s Application Security curriculum for developer security awareness.Security awareness turns your biggest liability (your staff!) into your biggest asset. You can read more on how to make your non-IT users more security aware here.

Source: Easily train developers on secure coding best prac… – HP Enterprise Business Community

Posted in Cyber Crime, Uncategorized | Tagged , | Leave a comment

No Justice for victims enduring cyber bullies

Julie Garner, Liar and Bully

Julie Garner, Liar and Bully

Today the victim was in court in trial as the plaintiff vs. Julie Marie Garner (Fife) with the presiding Judge Eugene Wolfe. It was to seek a peace/protection order against Julie Garner for her 8 months of bullying that has ensued on her, since December 26th. 2014. She had a mountain of evidence/proof of this person, Julie Garner threatening her and stalking her both in person, at her place of work and residency and in the cyber world on social media. This has included her YouTube, Instagram, Facebook, Google+, WordPress, and LinkedIn accounts. Julie Garner has been insulting her, threatened both her and her family and telling enormous lies. She even lied under oath to the Judge, stating she has only met the victim once when in fact she has met her three times. After those first encounters, the victim retreated for months to avoid Julie’s aggressive berating, hoping it would stop. The victim says, “I won’t hide anymore… she’s only doing it because she is jealous and hateful.”

The unfairness is the victim’s story wasn’t heard. She didn’t have a lawyer and Julie did. Julie’s lawyer, Debra Ackerman, interrupted the victim continuously, lied under oath and Judge Eugene Wolfe allowed this behavior. In the end, he sided with the lairs. He made his decision although he reviewed virtually none of the victim’s documentation that clearly showed Julie Garner has been bullying her. His only concern seemed to be, was she on the lease of her work and residency. What difference does that make? Are you on the lease at a grocery store or on the street? What about the office building you work at? So someone can harass you anywhere unless you’re on the lease?  Isn’t bullying and harassment anywhere considered illegal. He dismissed all of the cyber harassing that has been happening relentlessly since Dec. 2014. The judge denied all the unannounced trespassing Julie has done at the victim’s residency. Isn’t trespassing illegal. Julie Garner has stolen stuff off her porch. She has destroyed stuff off of her porch. Stealing and destruction of others property is illegal. She enters the victim’s gated porch and berates her. She has stated in text and voice messages she is making a career out of bullying her. Julie Garner is a 5 foot tall 160 pound woman with streaked brown/blond hair and cankles. She was born on July 13th, 1968, a Friday the 13th, how ironic. She lives in Rockville, Maryland.

The victim has pages and pages of documentation and messages from Julie Garner that she is out to get her. And the victim was granted no protection. How is that for Justice?

For information on combating bullying go here.
On a related story go here:

The content in this blog is the opinion of the blogger drawn from direct observations and experience from the event witnessed by the blogger on August 14, 2015, as well as the preceding events that began since December 26th, 2014. The blogger is not responsible for the mistranslation or misinterpretation of the content. It is not the intention of the blogger to offend anyone. All images were approved and used with permission.

The blogger is not responsible for any comments made or laws the commenters may break made from this blog.

Posted in Awareness, Bullying, Cyber Crime, Trespassing | Tagged , , , , | Leave a comment

Beware of the criminal hiding behind God

A woman is harassing, stalking, and stealing from her ex-husband.These offenses are coming from a woman who claims she is a woman of God. He had to flee the home for his own safety and escape the years of living in hell.

Men are victimized just like women but hardly does it get the attention it deserves. Let’s get this stated, under federal and state laws harassment, stalking, and stealing are criminal offenses!

She has stolen this man’s identity on several occasions and has managed to steal tens of thousands of dollars from him. She is not only stalking and harassing him, but she regularly stalks and harasses his family (siblings, parents) and anyone who has come into this man’s life (friends, co-workers). She has gone as far as hiring a PI to spy on him along with his family and friends.

He has received thousands upon thousands of threats from her through emails, phone calls, text messages, and when there has to be physical contact. She has hit him in the past. She managed to get him fired from his job. He had to go because of all the harassment his boss and fellow co-workers were enduring. She has stolen stuff from his new residence. She has said on many occasions she is out to get this man and ruin his life. Stating she will get all his money, he will have nothing when she is through. “Let’s Play!” she cackles.

She has destroyed most of his belongings that were in the home, since he had to leave with nothing but the shirt on his back. His stuff now laying in waste in the basement while she lies to their kids, “Your father did it, I’m not cleaning it up!” Unfortunately the kids are being brainwashed constantly buying into her hate, anger, and lies. Their dad has to reinforce the truth every time they are with him, but once they go back to this woman the brainwashes ensues and somehow she manages to persuade them into complete confusion An endless cycle for him. This from a woman who claims to be a Christian!  She takes the kids to church Sundays with her new religious boyfriend. As a façade, perhaps for the “demons” that lurk inside.

This woman tells everyone God is working with her (not her husband) in a divine plan for her and her children. But then she quietly plots and tortures her ex-husband warning, “Bad people get what is coming to them!” He gave her a nice home. She got to be the stay home mother she always wanted, when most mothers have to work. And yet she never took care of the home or the children. He still had to hire a nanny and a maid. This mother found watching reality TV more useful of her time.

She has stated she thinks she is God. She says that since she has the ability to give birth, she is closer to God. After all, she has a healthy uterus. She must be special in God’s eyes. She says, “God gave me babies. anyone who doesn’t have children did something bad and God is punishing them by giving them a rotten uterus.”

The sadistic part of all this, she uses her children for her own deceit instead of loving them. She interrogates them to give up information about their father and then she uses the information to harass him and any friend he brings around his children. They are little spies for her. She is slowly turning them into the monster she is. She has great power over these little beings and she thrives on it.

It is clear to me she cares less about her children than she does about the power they give her over her ex. She boost her children are everything to her, but they really are not. She is everything to herself. She can’t even provide them with the basic necessities in life, like food. She doesn’t cook for them and she has sent them off to school without a lunch on many occasions. Can you imagine as a young person how vulnerable this would make you feel? She has absolutely no empathy. She just wants bragging rights like she is the best mommy. You may be a mother, but you are no mommy. Your children cry to their father, “She never does anything, dad! We don’t even know if we are going to have lunch for school.” Is this a woman who is coming from a place of God and Jesus? She thinks so.

She won’t allow the children to visit their own grandparents. While she talks a good talk about her own absent mother, she trashes his parents. His parents who have supported them regularly from the beginning. Now she lies and says they are bad people. She is wrong! Grandparents are God’s gift to children for their unconditional love they can give to grand-kids. Something children need for healthy development. The children are stunted in their emotional growth according to experts.

It’s so sad the court is not recognizing how sick this woman is towards her children. They have stated only that she is a compromised parent. This woman who isn’t nurturing or protecting of her children like a mom. She isn’t providing them with the emotional or mental support. a mom would do. Actually quite the opposite, she is poisoning them with a hateful and angry outlook on life. Every time they are with their father they are all confused and angry until he manages to turn them around. My hope is he will always have this positive loving influence on them. His biggest fear is that they will turn out to be just like their mother!

For information on bullying and stalking click here.

Posted in Awareness, Bullying, Identity Theft | Tagged , , , , , , | Leave a comment

What is Cyber-Stalking and how to combat it

Cyber-bullying and Cyber-stalking are the same thing. They are serious dysfunctional behavior flaws in a person who causes tremendous danger to their victims. It is a criminal offense even if it rarely gets prosecuted.  Stalking almost always escalates from the initial contact into anything from constant bombardment of hateful and angry slander to physical abuse and even death. Sometimes the death occurs from the stalker themselves and sometimes from the victim who commits suicide to escape the unrelenting torment.

Stalkers are very sick people. They are usually very lonely, insecure, and feel a sense of entitlement for their actions. They also think everyone behaves this way, so in a way they see it as normal. They are not doing anything anyone else wouldn’t do. And they believe the victim deserved it for not placating their wishes.

“According to the Supplemental Victimization Survey (SVS), individuals are classified as victims of stalkers if they experienced at least one of these behaviors on at least two separate occasions. In addition, the individuals must have feared for their safety or that of a family member as a result of the course of conduct, or have experienced additional threatening behaviors that would cause a reasonable person to feel fear.” –Bureau of Justice Statistics

The SVS measured stalking behaviors as:

  1. Making unwanted phone calls.
  2. Sending unsolicited or unwanted letters or e-mails.
  3. Following or spying on the victim.
  4. Showing up at places without a legitimate reason.
  5. Waiting at places for the victim.
  6. Leaving unwanted items, presents, or flowers.
  7. Posting information or spreading rumors about the victim on the internet, in a public place, or by word of mouth.


According to the Bureau of Justice Statistics:

  1. During a 12-month period an estimated 14 in every 1,000 persons age 18 or older were victims of stalking.
  2. About half (46%) of stalking victims experienced at least one unwanted contact per week, and 11% of victims said they had been stalked for 5 years or more.
  3. The risk of stalking victimization was highest for individuals who were divorced or separated—34 per 1,000 individuals.
  4. Women were at greater risk than men for stalking victimization; however, women and men were equally likely to experience harassment.
  5. Male (37%) and female (41%) stalking victimizations were equally likely to be reported to the police.
  6. Approximately 1 in 4 stalking victims reported some form of cyberstalking such as e-mail (83%) or instant messaging (35%).
  7. 46% of stalking victims felt fear of not knowing what would happen next.
  8. Nearly 3 in 4 stalking victims knew their offender in some capacity.
  9. More than half of stalking victims lost 5 or more days from work.


So what can we do as victims of stalkers?

  1. Avoid these people at all cost, don’t play into their hate and anger.
  2. Keep a record and journal of everything that happens.
  3. Keep all emails, text messages and phone calls for proof of the stalking.
  4. Notify the police, even though they most likely will do nothing, at least it’s on court record.
  5. Block the cyber-stalker from all access to your social networking accounts.
  6. Report stalkers to those same social-media companies, so they have a record of the assaults.
  7. Get new email accounts.
  8. Change your phone number and/or block the stalker from calling.
  9. Let close family and friends know of your dilemma in case of foul play. If you know the stalker give these confidants your stalkers name and information just in case it is needed by the authorities.
  10. Talk to a professional or a support group to help you cope with the torture.
  11. Talk to the media about the stalking to make it public knowledge.
  12. And finally, live a happy fulfilled life, it removes the stalkers power over you.
Posted in Bullying, Cyber Crime, Helpful Resources, Identity Theft | Tagged , , | Leave a comment