Michelle Mangen

38 Flips | 6 Magazines | 26 Likes | 2 Following | 26 Followers | @MichelleMangen | Fighting #Cyberstalking. I've been cyberstalked since 2012 by a woman whose legal name is Leslie Rogers (Spokane WA). My goal is to help others who may be in a similar situations. Other tidbits about me: 6-figure Virtual Assistant offering bookkeeping services. Love Latin Dancing. iTunes addict.

7 Crime Docs To Watch On Netflix After You Finish 'Making A Murderer'

Clear your calendar.<p>Since its premiere last month, Netflix's "Making a Murderer" has become the most talked-about true crime investigation on the Internet, with people comparing it favorably to both the "Serial" podcast series and HBO's "The Jinx."<p>The documentary series has struck a nerve by …

Cyberstalking: Fastest Growing Crime

Over the past few decades, our lives have become increasingly digitized. We do more things online than ever before: date, bank, shop, work, socialize, entertain ourselves. We are living in the Age of Convenience, which is both a cause of celebration, and a recipe for increased vulnerability. The …

6 Lies Your Depression Wants You to Believe (& How to Not Fall Into the Trap)

“The world we have created is a product of our thinking; it cannot be changed without <i>changing</i> our thinking.” – Albert Camus<p>When depression hits, it …

How to send and receive encrypted email for free - ExtremeTech

By on September 28, 2015 at 10:38 am<p>This site may earn affiliate commissions from the links on this page. Terms of use.<p>So you want to send an …

bowlingtoendbullying.org - bowlingtoendbullying Resources and Information.

Weight-Based Bullying Is The Most Common Form of Bullying in Youth

According to a study conducted by a team of researchers from the US, Canada, Australia and Iceland, published in <i>Pediatric Obesity</i>, weight-based …

XcodeGhost Malware: List Of Infected iOS Apps That You Should Delete Right Now

As we reported recently, Apple’s App Store was a victim of a large-scale attack, infecting a bunch of iPhone and iPad apps, mostly from China, with …

4 Rituals That Will Make You Happy, According to Neuroscience

You get all kinds of happiness advice on the Internet from people who don’t know what they’re talking about. Don’t trust them.<p>Actually, don’t trust …

What the Ashley Madison hack could mean for national security

Advertisement<p>0 Comments<p>Credit: iStock/maxkabakov<p>The release of information stolen from Ashley Madison, a site devoted to helping married individuals …

Former U.S. Government Employee Charged in Computer Hacking and Cyber Stalking Scheme

Why outlawing anonymity will not halt online abuse

Over the past few years a growing number of social networks and online communities -- the likes of Facebook and YouTube among them -- have …

Intro to basic forensic investigation of a hard drive

Basic forensic investigation<p>For a recent project I had to do a basic forensic investigation of a hard drive. The assignment included two questions …

This is how the FBI hunts down the world's most notorious cyber-criminals

There is now a growing underground economy for cyber-crime. It is no longer the preserve of just the hacker elite. The market is thriving, said Symantec in one of its most recent threat reports. More cyber-criminals, whether sophisticated or glorified script kiddies, means more work for authorities …

The Psychological Difference Between Male and Female Serial Killers - In The Loop

Researchers such as psychologist Marvin Zuckerman, have long noted the morbid curiosity of humans; there’s just something about horror and terror …

The Art of Crime - In The Loop

<i>Lois Gibson, forensic artist for HPD, has helped catch thousands of criminals—and now puts her skills to use in unexpected ways.</i><p>It’s crazy the things …

Spyware demo shows how spooks hack mobile phones

http://vod-pro-ww-live.akamaized.net/mps_h264_hi/public/news/technology/1184000/1184376_h264_1500k.mp4?__gda__=1524717929_152966618282922f611330acc7d3c401<p><b>Intelligence agencies' secretive techniques for spying on mobile phones are seldom made public.</b><p>But a UK security firm has shown the BBC how one …

Why Criminal Justice Isn't Just

Imagine if your doctor approached your complaint of chest pains with a conception of the human body from two or three hundred years ago. That’s …

How to send encrypted emails

Long has the war for email privacy been fought – and it looks we’ll keep fighting far into the future. People have always wanted to make sure than …

Information Systems

In Defense Of Hopeless Romantics: Why I Will Always Believe In Love

When it comes to love, this generation is <i>filled</i> with cynics -- people who despise relationships, who are petrified of being vulnerable, who have a …

What is Anonymous? Inside the group plotting to attack Islamic State/ISIS

Everything you need to know about hacking collective Anonymous – their targets, their motivations and their history<p>If you ask anyone to name a …

How big is Anonymous? Researcher attempts to quantify hacktivist network

In her definitive account of the Anonymous movement, Gabriella Coleman describes the hacktivist movement thus:<p><i>An aggregate sack of flesh – meshed</i> …

New Research Suggests Anonymous Is Much More Powerful Than You Think

Though maligned by some as simply the world's largest <i>V for Vendetta</i> fan club, the headlines-snatching hacktivist collective known (or, perhaps, …

Gone (Cat)Fishing: How Language Detectives Tackle Online Anonymity

In the recent case of online harassment of currency campaigner Caroline Criado-Perez, it was reported that those found guilty of sending abusive …

Forensics

Tightening your security, safeguarding your right to privacy.

We all know by now that surveillance is ubiquitous. The <b>Snowden</b> revelations unveiled wide and far ranging capabilities on the part of the ‘<b>five eyes</b>’ …

InstantWatcher: Better Way to Find Amazon Prime Netflix Videos - Consumer Reports

Easier filtering<p>InstantWatcher gives you the power to search in many different ways. For Amazon Prime, you can filter your options by specific title, …

It's Time to Encrypt Your Email

After the Snowden revelations in 2013, I began looking into improving the privacy of my email communications. Initially, I explored installing my own …

How to improve your privacy on Android with a few simple steps

We keep an awful lot of personal information on our mobiles these days and, as a direct result, these devices know quite a lot about us. From our location and contacts to our favourite hangouts and hobbies, we happily exchange some of this information for “free” services from the likes of Google …