Running out of excuses? This handy tool should help. From Pinterest (of course.)
MAY
Running out of excuses? This handy tool should help. From Pinterest (of course.)
The cyber-criminal underground has found a real moneymaker in the various forms of encryption based ransomware schemes. These exploits turn all your readable work product, your documents, pictures, music and video files, into a collection of encrypted gibberish, and then kindly offers to sell you the decryption key. I recently saw an infographic from Symantec on the Bromium blog that illustrated the problem perfectly.
One of the very worst breaches that can happen to you is for an attacker to be able to access your email account. If someone else can access your email, and read the messages you send and receive, and access your contact list and calendar, then they can learn many personal details about you that would make it easier to steal your identity, access other web accounts using the password reset ...
Its been a while since we have written about AI and robotics, but an article in Tech Republic got me inspired to discuss some of the more disturbing uses of autonomous machines, from least to most scary
Thanks to my uncle Ron Weiss for this one:
They should put Prince on the $20 bill and call it $19.99… It’s “The bill formerly known as a twenty.”