Another fun article from the Smithsonian Magazine
Patented in 1957, the lightweight ball saved players’ arms and more than a few windows
Continue Reading →
Original release date: October 17, 2019
Personal note: Windows 7 has been, and may always be, my favorite operating system of all time. I have come to respect Windows 10, and of course I use it every day, but I have ...Continue Reading →
Artificial intelligence and machine learning are topics that I have been following for a few years now. AI supports the growth of enhanced technology that has the potential to have abilities like a human has.
AI has can have impacts on local, national, and international politics. AI enable systems will replace humans at many jobs, but will create more new obs that the old jobs it ...Continue Reading →
What is a “zero-day,” exactly? In information security, occasionally there is a brand new cybersecurity vulnerability or exploit in the news, and the reporter calls it a “zero-day” exploit. What are they talking about. This is a concept similar to “patient zero” in medical epidemiology. This is where the bad thing started to happen.
A zero-day vulnerability is a flaw ...Continue Reading →
Your Personally Identifiable Information (PII) is one of the top targets of cyber-criminals. This information is valuable because it can be used for identity, fraud, tax refund fraud, loans and credit card applications, money transfers, phishing and spam campaigns, blackmail and extortion, fraudulent medical insurance claims, online shopping, and so much more. This information is packaged and sold on the Dark Web, and ...Continue Reading →
Few people claimed to fully understand it, but the esoteric theory still managed to spark the public’s imagination.
Phishing continues to be the number one method that over 90% of cybersecurity incidents and breaches happen. Cybersecurity Awareness Training and Phishing Simulation company KnowBe4 recently posted an article on their blog about the Top-Clicked Phishing Email Subjects. Sharing this information with your staff is one way to limit the impact of these email exploits.
Here are the top subject lines used in emails by actual cyber-attackers.
Most Common ...Continue Reading →
Never in human history has there been a platform for tracking, eavesdropping, reconnaissance, and surveillance like the smartphone. With the right malware or phone store app, a marketing company, suspicious spouse, parent, nation-state cyber-spy, or your own government or law enforcement agency can easily spy on anyone carrying a smartphone. Mobile devices often provide a bridge between a target’s personal life and professional ...Continue Reading →
Editor’s comment: I spend a lot of time writing about cyber-crime. This article reminds us that there are other very physical and personal crimes that we need to guard against as well.
They say that crime doesn’t pay, but in the end, does it? You are at risk from crime when you’re running a business. This could include an ...Continue Reading →