The Biggest Spy on the Internet – Part 1

Spying, intelligence gathering, surveillance, reconnaissance, eavesdropping, tracking – the Internet has made these activities much easier than they used to be.  The NSA, CIA, Russia’s Fancy Bear, China, North Korea – which organization is gathering more information about more people than probably any other.  While your information is unlikely (hopefully) to be in the NSA, CIA, or other governmental databases, a lot of information about you and me are certainly in ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Potential Hurricane Florence Phishing Scams

09/14/2018 02:19 PM EDT

NCCIC warns users to remain vigilant for malicious cyber activity seeking to exploit interest in Hurricane Florence. Fraudulent emails commonly appear after major natural disasters and often contain links or attachments that direct users to malicious websites. Users should exercise caution in handling any email with a subject line, ...

Continue Reading →
0

Your Tax Dollars At Work – Governmental Surveillance

We know that the US government is spying on us.  Just how deep the surveillance goes is a question that is hard to answer.  If you are one of those people who thinks this surveillance is OK because you “have nothing to hide,”  I suppose you could skip this article.  But here’s my question – why do you get upset when your identity is stolen by a cyber-criminal, but yet you are unmoved when your own government does the same ...

Continue Reading →
0

Internet Anonymity – A Case Study

Who is Will McLauglin?  The Campaign for Privacy?  or Dennis Anon and Privacy.net?

I’ve been writing this blog long enough that I receive regular submissions for guest content, infographics and other sort of suggestions for article topics. As long as the submissions are legitimate and on topic, I am generally happy to post them.  My next post is one of those times.  My efforts at verifying the source has been an ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Windows 10 security can be bypassed by Settings page weakness

The file type used by Windows 10’s settings page can be used to trick Windows into running files it’s supposed to block.


Here are the 4 best ways to train employees for better cybersecurity

87% of companies experienced ...

Continue Reading →
0

Why Do I Need a VPN?

Did you know that most traffic across the Internet travels in an unencrypted state.  And when you make an open wireless connection  in a coffee bar or other public location, the radio connection is unsecured and  unencrypted, too.  This traffic travels as plain text, and can be read by anyone with the skills to intercept the traffic and open the data packets.

We ...

Continue Reading →
1

Spy vs. Spy vs. Spy – What Countries Are Using Cyber-Espionage Tactics?

The press has been relentless lately in its coverage of Russian cyber-espionage and disinformation campaigns on Facebook and other social networks prior to the last US Presidential campaign.  But is Russia the first to engage in election rigging on this sort?  Hardly.  We thought that looking at the state of cyber-espionage as a tactic in international relations might be interesting, and we were right.  It turns out that cyber-espionage is ...

Continue Reading →
0
Page 6 of 11 «...45678...»