For years, I slept fitfully after a “friend” told me that it wasn’t the noisy mosquitos buzzing in my ears at night that were a problem. Instead, it was the female mosquitos that made no noise at all but laid eggs in your ears at night. That image wrecked my sleep until the Internet helped…
Category: Computer Related
3-D Printing Will Disrupt the World in Ways We Can Barely Imagine
In the last few years, additive manufacturing, also known as 3-D printing, has transformed from an interesting hobby to an industry producing a wide range of products. It is on the path to causing major disruptions in global trade — and changing the international security environment. The explosion of additive manufacturing means it is virtually…
This article Will NOT Boost Your Confidence in American Cyber-Defense Capabilities
Iranian hackers infiltrated the control system of a small dam less than 20 miles from New York City two years ago, sparking concerns that reached to the White House, according to former and current U.S. officials and experts familiar with the previously undisclosed incident. The breach came amid attacks by hackers linked to Iran’s government…
Merry Christmas America! Congress secretly Slips CISA into Budget Bill
Update 12/18/2015 12pm: The House and Senate have now passed the omnibus bill, including the new version of CISA. Privacy advocates were aghast in October when the Senate passed the Cybersecurity Information Sharing Act by a vote of 74 to 21, leaving intact portions of the law they say make it more amenable…
Iran: A Rising Cyber-Power?
“A Brown Water Navy” Through a series of attacks over the last three years, Iran has revealed a limited offensive cyber capability but a willingness to use it to meet its geopolitical goals. In testimony calling out Iran for attacks on Sands Casinos, Director of National Intelligence James Clapper put Iranian cyber capability in the…
How NexDoor and NestCams Help Cops Solve Crimes
I will be doing some articles on the many civilian applications of both of these apps soon for both home and business security. -SF (NOTE: I think the name of the below video should have been “Night of the Living Trans-Vestites” or something along them lines; regardless I think it proves the absolute necessity of…
Computer Security: Email Hygiene Tips
Anti-phishing and Email Hygiene Journalists and newsrooms are increasingly the victims of hacking and malware, and often hackers target them through their email. Virtually every “sophisticated” hack of an individual reporter or entire newsroom starts with a relatively simple attack: phishing and spear phishing. Phishing is a social-engineering attack where an adversary crafts an email…
How to Find out if your Netflix Account was Hacked-And Fix It
Netflix lets multiple people use an account at the same time, and this feature is great when it allows you to mooch off a friend’s account without inconveniencing them. But one problem with this policy is that it has inadvertently created a black market for “access” to stolen Netflix accounts. A recent report by McAfee Labs revealed you…
Intel Tradecraft: Geo-Tagging and Identifying a Picture by it’s Background (Similar Image Search)
In the most recent episode of Homeland, Carrie while trying to figure out what direction to go in searching a stolen laptop for intel, is distracted by the computer’s screen saver which is a picture that shows the suspect in a beachfront bar in what appears to be a tropical location. Thinking back, Carrie remembers…
The Truth about Terrorist and Encryption Technology
Terrorists were using encryption technology to evade detection long before Snowden and the Paris attacks By Natasha Bertrand A wave of coordinated terror attacks that killed at least 130 people in Paris last week have had experts grappling with how French intelligence could have missed an operation that was most likely months in the making….