Learning Linux

linux-logoAlthough my very first PC user experience was on an Apple IIe back in 1984, I have really been a Windows guy for the most part.  Got on my first Windows PC back around 1991, and bought my first Windows PC (Windows 3.11) in 1994.  I do have an iMac in my current computer collection.  But lately I have been playing around more and more in the Linux platform, both Ubuntu and, ...

Continue Reading →
0

Typographical Errors Can Have Surprising Results

typosquattingThis is not a gripe about Spell-Check, although I am driven mad when my phone tries to “correct” the spelling of something I spelled correctly.  Sometimes I get really funny and/or embarrassing results.

Speaking of embarrassing, have you ever mis-typed a domain name and ended up at a porn site?  And caught a virus?  (The computer equivalent of an STD?) This is the result of something called “typo-squatting.”  Individuals will intentionally ...

Continue Reading →
0

The Growing Threat of Ransomware

The cyber-criminal underground has found a real moneymaker in the various forms of encryption based ransomware schemes.  These exploits turn all your readable work product, your documents, pictures, music and video files, into a collection of encrypted gibberish, and then kindly offers to sell you the decryption key.  I recently saw an infographic from Symantec on the Bromium blog that illustrated the problem perfectly.

ransomeware-infographic

What ...

Continue Reading →
0

Was Your Email Password Stolen?

Email_thumb2One of the very worst breaches that can happen to you is for an attacker to be able to access your email account.  If someone else can access your email, and read the messages you send and receive, and access your contact list and calendar, then they can learn many personal details about you that would make it easier to steal your identity, access other web accounts using the password reset process, ...

Continue Reading →
0

Disturbing Uses of Artificial Intellegence

Its been a while since we have written about AI and robotics, but an article in Tech Republic got me inspired to discuss some of the more disturbing uses of autonomous machines, from least to most scary

  • AI Based Medical Treatment  – There are increasing advances in the use of artificial intelligence systems in the diagnosis and treatment of disease.
  • Using AI to Predict Future Events – The Nautilus computer system has been able ...
Continue Reading →
0

Now The FBI Can Legally Hack Your Computer

image_thumbA recent rule by the Supreme Court has given the FBI authority to hack your computer if it is inadvertently part of a criminal botnet.  Recent changes to a procedural rule known as Rule 41 allows the FBI to obtain a search warrant to use “network investigative techniques” or NIT (or more commonly called hacking) to search computers engaged in criminal activity anywhere in the world.  This includes innocent computer users ...

Continue Reading →
0

Insecure Windows XP Still Third Most Popular OS

Windows-XPWindows XP was released on August 24, 2001.  It was officially retired by Microsoft two years ago on April 8, 2014.  This makes WinXP almost 15 years old, which in operating system years is about 500 years old.  Sophos reported:

“Windows XP was still running on 10.9% of all desktops as of March 2016, according to stats compiled by Net Applications.

To put that in perspective, according to Net Applications’ figures, Windows XP is still ...

Continue Reading →
0

WhatsApp? What Else?

encryptionHappy Friday the 13th.  In honor of all the governmental and law enforcement agencies that want to deny the privacy and security of encrypted communications to the general public, today we will be looking at encrypted messaging apps for your smart phone.

When the bad guys can break into your digital assets and steal your information with impunity, encryption is a necessity.  Encryption is the lock on your data. I am a proponent ...

Continue Reading →
0

The Aftermath of Apple vs. The FBI

applelogoAs we all know, Apple refused to assist the FBI in cracking the iPhone 5c of the San Bernardino “terrorist” killers. The FBI took Apple to court.  Then the FBI dropped the case after successfully hacking the phone.  Then they successfully hacked another phone in a different case in New York.  Information appeared linking Israeli mobile security firm Cellebrite to the successful breach of ...

Continue Reading →
0
Page 37 of 49 «...1020303536373839...»