"It is likely only a matter of time before remote exploitation tools are widely available for this vulnerability." So wrote the normally circumspect NSA in their advisory on the so-called BlueKeep vulnerability. Really? Only a matter of time? Hmm, it seems like the NSA knows something they're not telling us about. Other cybersecurity professionals tend … Continue reading Is the NSA Warning to Microsoft Users Really as Bad as it Sounds?
Google has now integrated its Password Checkup Tool into its Chrome browser. The tool has been available for a while, but it will now become a common part of the Chrome browsing experience. So is this good or bad? As with most tech changes, it has both its positive and negative aspects. Some users may … Continue reading Google Chrome’s Password Checkup Tool: Valuable for Some, a Nuisance for Others
In a recent post, I suggested that the U.S. had declared cyberwar against Iran. This was made clear when President Trump gloated over the misfiring of one of Iran's rockets. In fact, Iran has had trouble testing numerous missiles and rockets ever since George W. Bush gave a thumbs-up to the infamous Stuxnet attack which … Continue reading U.S. Veterans Targeted by Iranian State Hackers
Emmanuel Nwude sold an imaginary airport to a Brazilian bank for $242 million. Another scammer, Rubbin Sarpong, sweet-talked a woman out of $93,000. The woman believed Sarpong was a soldier in Syria who was in love with her. She believed she was helping the military and helping her romantic partner to bring gold bars back … Continue reading 167 Nigerian Scammers Arrested in Global Law Enforcement Operation
For a couple of years, I worked as an editor for scientific research papers. Most of the papers I worked on were from China, Japan, and South Korea. There were a preponderance of papers on cancer and other medical research. However, the Chinese research papers were largely focused on improvements in solar panels. Most of … Continue reading The Future of Brain Hacking
Clickjacking is based on a simple principle: Make a victim click on something that is not what it appears to be. A simple example would be a Facebook like button that does something other than show your Facebook friends that you found something you liked. Why would someone want to make people do this? We'll … Continue reading Clickjacking Ramps Up Tactics
This summer I needed to have some questions answered at the local Social Security office. I was greeted by a guard who told me I should use the automated check in station to make an appointment. This was an ATM looking device that asked for my personal information and the reason for my visit. I … Continue reading How I could have Stolen and Used Social Security Numbers
There are some surprising aspects to the recent U.S. cyberattack on an Iranian database, but the fact that it occurred is not one of them. The attack, at least on the surface, was straightforward. U.S. intelligence somehow got a foothold on a network that is associated with Iran's Revolutionary Guard. The group associated with this … Continue reading Did the U.S. Just Declare Cyberwar Against Iran?