The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies Fourth Generation Warfare going on right under America’s nose. As one cyber-terrorist said: “You do not need a gun to wage war in the 21st Century. All you need is a laptop and a good internet connection.” Stay Alert, Stay Armed and…
Category: Cyber-Security
26 Secrets an Identity Thief Definitely Doesn’t Want You to Know
26 Secrets an Identity Thief Definitely Doesn’t Want You to Know Good information on a problem that effects thousands of people every month in this country. Security begins with forming GOOD habits. If you are not doing the things suggested, start now! Stay Alert, Stay Armed and Stay Dangerous!
Dose of Truth: The “Future” of War is Now
If any of you have ever read the book Ghost Fleet by P.W. Singer you would realize with a chill down your spine that more and more things listed in that fictional work regarding Military Technology is beginning to unfold right before our eyes. The recent unveiling of China’s new Dark Sword Drone makes the…
How Search Algorithims Manipulate You
A recent article about how Google and YouTube Search Algorithims are manipulated got me to thinking. So I emailed a good friend of mine, Mr. A, with my concerns. Mr. A works on the security side of the IT industry. Here is what he had to say: Technology and information warfare have reached a…
The Surveillance State: Big Brother Will Soon Be Able To Legally Hack You
The Feds Will Soon Be Able to Legally Hack Almost Anyone (click on the above link to be re-directed to source page) Well if you have been keeping up, this is no friggin’ surprise. But like all things, there is a work around to Big Brother’s antics. Remember, A Civilian Operator’s Cyber skill-set in the…
The Surveillance State: Artificial Intelligence Facial Recognition
AI Can Recognize Your Face Even If You’re Pixelated (click on above link to be re-directed to source page) With the Surveillance State growing by leaps and bounds and a camera on every street corner and passing vehicle, understanding how much Artificial Intelligence can push this invasive technology into overdrive is very important for the…
Cyber-Warfare Update: iPhone Weaknesses Made Apparent by Israeli “Digital Arms” Company
Apple boosts iPhone security after Israeli spyware reveals startling weaknesses (click on above link to be re-directed to source page) Leave it to a bunch of retired Mossad Cyber-Spies to start up a “Digital Arms” Company and wreak havok on the most “secure phone on the planet”. The Silicon “Wadi” not Valley, Strikes Again!…
Surveillance State: Ways Your Wi-Fi Router Can Spy on You
All the Ways Your Wi-Fi Router Can Spy on You (click on above link to be re-directed) Overall, not surprising news by a long shot but you may be shocked at the WAYS in which it can spy on you, specifically, programs like Wi-Key. Like all Technology in the tight hands tools like this could…
Cyber-Warfare for Sale
Hackers claim to auction NSA source code (click above title link to be re-directed to Source page) More shenanigans from State Sponsored hacking groups most likely. Just another reminder that we have not yet begun to see the true capabilities of what warfare in the fifth domain entails. Stay Alert, Stay Armed and Stay Dangerous!
Cyber Threats – 3 Easy Steps To Getting Your Door Kicked In
By Mr. A The Internet is easy to use, but the consequences of using it are hard for people to understand. Just stop and think about that. This technology can be used by almost anyone with a computer, and yet only a very small fraction of people using computers, smart phones, and tablets really understand…