Not funny, but an interesting account of the scuttled remains of the USS Lexington.
Article on Smithsonian.com
Continue Reading →
MAR
Not funny, but an interesting account of the scuttled remains of the USS Lexington.
Article on Smithsonian.com
Continue Reading →
A tiny US company called Grayshift is reportedly quietly touting software it claims can unlock Apple’s flagship handsets, the iPhone X and 8.
Did you know that most traffic across the Internet travels in an unencrypted state. And when you make an open wireless connection in a coffee bar or other public location, the radio connection is unsecured and unencrypted, too. This traffic travels as plain text, and can be read by anyone with the skills to intercept the traffic and open the data packets.
We ...
Continue Reading →Often when I am writing about cybersecurity, the situation seems worse than ever. But its not more dangerous than its ever been, it dangerous in ways that its never been.
A team of Israeli researchers have cataloged 29 different USB exploits and attacks. These attacks can come disguised as a smartphone charger connection, or may come hidden on a USB thumb drive. Plugging an ...
Continue Reading →In January we learned about a pair of cybersecurity vulnerabilities called Spectre and Meltdown. Discovered last summer by different security researchers, these vulnerabilities are proving difficult to mitigate because the problem exists in the way central processing units (CPUs) have been designed and manufactured. These processor cores are at the heart of all computer hardware, from PCs and servers, to ...
Saint Patrick’s Day, or the Feast of Saint Patrick is a cultural and religious celebration held on 17 March, the traditional death date of Saint Patrick (c. AD 385–461), the foremost patron saint of Ireland.
Can ...
Continue Reading →If you are “monetizing” your website using any of certain Google-banned advertising types, you will need to rethink your strategy and use approved advertising types only. Otherwise you run the risk of the Wrath of Google, and will see your advertising revenue drop along with your page rank.
Starting in mid-February, the most recent version of Google’s Chrome web browser proactively blocks certain ...
Continue Reading →Bots are alive, well, and busy on the Internet, making up nearly half of Internet traffic. Bad bots are used by cyber-criminals and cyber attackers to automate harmful exploits and attacks, such as denial of service attacks, crypto-coin mining, data mining, information exfilitration, account hijacking, vulnerability scanning, spamming, and other illegal or illicit activities.
Not all bots are bad. Some of these site visitors are helpful, such as the automated bots ...
Continue Reading →Yesterday marked the 28th anniversary of the World Wide Web protocol. In 1989, Sir Tim Berners-Lee, who was a software consultant at CERN, the European Organization for Nuclear Research, proposed the concepts which became the World Wide Web. Prior to his proposal, the Internet existed almost solely as a research network for government and university science and engineering professionals. Sir Tim was concerned that saved research documents ...