Again from Pinterest – 24 examples of job failures. Don’t be like these guys!
You will have to click through the link to see the full image, it’s just too long for the blog.
Continue Reading →APR
Again from Pinterest – 24 examples of job failures. Don’t be like these guys!
You will have to click through the link to see the full image, it’s just too long for the blog.
Continue Reading →
So how would it be if you found out that the key to your house also worked at your neighbor’s house. What if it turned out the builder in your subdivision used the exact same lock on every house they built, and your key could get you into every house in your neighborhood?
This is essentially the situation that security researchers at SEC Consult discovered with a host of Internet ...
Continue Reading →
If the title seems confusing, it is not your fault. It is really tough to get my head around the epic failure of purported security companies who bring products like these to market. This practically qualifies as fraud!
The first story is about a manufacturer of security camera and DVR systems. This company is a white box manufacturer, in that they build products that are privately labelled by ...
Continue Reading →
I have been collecting article links about cybersecurity issues affecting the increasing number of non-computer Internet connected devices, commonly known as the Internet of Things or IoT. In our enthusiasm to connect every device we own (thermostats, lighting controls, baby monitors, nanny cams and home security systems, etc.) to a smartphone app, the brilliant creators of these products ...
There is a fun little site that is tracking cyber-war attacks on infrastructure targets from all sources – human and non-human. Turns out the deadliest and most effective agents are squirrels. Check out this link, CyberSquirrel 1 and order some of their swag if you like.
I read about this first on Naked Security.
Be sure to check out the cool ...
Continue Reading →
I know it’s April Fool’s Day, but this is a straight up serious post. If you own, operate, host, support, or develop WordPress sites, this article is for you.
We have written a few articles covering the subject of WordPress security. I recently received an email from John Stevens over at HostingFacts.com, inviting me to review their excellent tutorial, 28 ...
Continue Reading →
March 31st is World Backup Day. On my way to the office today I saw someone driving down the highway in reverse. Not completely clear on the concept.
It has been three months since you made your New Year’s Resolution to really backup you data this year for sure!! Still kicking this one down the road? Well today is your day. Sign up for something easy like Carbonite and ...
Continue Reading →
We recently reviewed the bad state of affairs in the world of edge devices, routers, cable and DSL modems, and wireless access points. I just read an article on CSO the talked about the dangers that exist with the routers that router traffic and basically run the Internet. The problem is that these routers are running a Linux kernel in their core that ...
We have heard plenty of stories about people who blindly followed their GPS over a cliff or missing bridge to their doom. Now this bit of research from Slate Magazine.
“Researchers at Georgia Tech had 42 volunteers follow a seemingly autonomous robot into a conference room. However, the robot was actually guided by a hidden researcher, whose goal was to intentionally lead the test subjects astray in order to establish the bot’s unreliability.
Continue Reading →
Are your tired of telemarketers? How about political campaigns? How about the robocalls that listen for your responses and try to engage you in a pseudo conversation? Here is your revenge. Use the call transfer feature of your phone to send the call to 1-214-666-4321. This number is run by the Jolly Roger Telephone Company, and uses the same canned ...
27Share
MAR