Machine learning, artificial intelligence, and the singularity from Dilbert.
Continue Reading →JAN
Machine learning, artificial intelligence, and the singularity from Dilbert.
Continue Reading →It can be overwhelming to learn you’ve been a victim of identity theft. As in your case, crimes involving identity theft and credit fraud are often committed online.
There are other options for photo ...
Continue Reading →One of the worst things that can happen to you online is when someone hijacks one of your social network accounts. When unauthorized bad-actors get your Facebook or Twitter password, they can use your account to impersonate you, and to send all sorts of friend requests, share requests, spam, and posts with click-bait links that can lead your friends to web pages that will steal their information or silently download ...
Continue Reading →A new phishing campaign by the Iranian state-sponsored group known as “Charming Kitten” is using new tactics to trick users out of their passwords and both SMS and app generated two-factor codes. Charming Kitten is tied to the Islamic Revolutionary Guard. This campaign has been ongoing since October 2018. Information on this attack was released on December 18, 2018 by Certfa Lab.
Targets of these attacks are high-ranking individuals in the ...
Continue Reading →I have written before about how our smartphones are ratting out our location, using GPS and even just cell tower location information. The New York Times recently published a story that followed a woman throughout her day and discovered that her location was collected over 8000 in a single day. From the location database they purchased from a location data broker, they ...
Continue Reading →From the Smithsonian. Video on CNN
Back in July, eight-year-old Saga Vanecek was playing in a lake near her family’s summer home in Sweden. She reached into the water and pulled out what she thought was a stick—but quickly realized that it was something far more special.
“Daddy, I found a sword!” she cried, according to Catherine Edwards of the Local Sweden.
Saga’s family subsequently alerted the Jönköpings Läns Museum to the discovery, and experts there have ...
Continue Reading →No, none of us can “bypass” Facebook’s newsfeed algorithms by copy-pasting our way past them. I have friends and relatives that are trying to use this by it is fake.
Adobe has patched two critical flaws ...
Continue Reading →WordPress version 5 was released a month ago on December 6. There have already been some minor upgrades to fix some security issues. If your WordPress site is running any version of WordPress 4, you probably need to upgrade.
Before you upgrade your WordPress site to version 5, you need to take a look at the new page editor, code named “Gutenberg.” If ...
Continue Reading →The implementation of EMV (Europay, Master Card, Visa) or “chip” cards have not reduced the instances of credit card theft in the US. The reason: WE ARE DOING IT WRONG!! I have been writing about the late implementation of EVM for years, and complaining about the “chip and sign” method we are using in the United States, vs. the much more secure “chip and PIN” method used in Europe, where ...
Continue Reading →US-Cert recently released the following warning to businesses, governmental units, and other organizations who contract their computer support to computer support companies that are known as Managed Service Providers or MSPs. An MSP provides support principally by using remote monitoring, remote access, and remote control software products. They install a monitoring tool called an “agent,” and a command and control device on ...
Continue Reading →