"It is likely only a matter of time before remote exploitation tools are widely available for this vulnerability." So wrote the normally circumspect NSA in their advisory on the so-called BlueKeep vulnerability. Really? Only a matter of time? Hmm, it seems like the NSA knows something they're not telling us about. Other cybersecurity professionals tend … Continue reading Is the NSA Warning to Microsoft Users Really as Bad as it Sounds?
"PLEASE DO NOT PLACE ANY ORDERS FROM COWPKM.MYSHOPIFY.COM THIS COMPANY IS A STORE OF LIES AND THIS SCAMMERS WILL BURN IN HELL FOR STEALING FROM HARD WORKING PEOPLE ALL THESE SCAMMERS ARE BREAKING GOD'S LAW THE 8 COMMANDMENT. YOU SHALL NOT STEAL. EXODUS 20: 15" There's a good reason for this person being angry. According … Continue reading Fake Stores on Shopify Ruining Christmas for Many
A 65-year-old woman, named Rukmani, was murdered for giving chocolates to some children. Was there something wrong with the chocolates? Not at all. Did someone have a grudge against her? No, nobody even knew who she was. In fact, her murder was traced back to WhatsApp and a news story that was posted there. Was … Continue reading Fake News Kills
“To achieve impartiality, you do not need to include outright deniers of climate change in BBC coverage, in the same way you would not have someone denying that Manchester United won 2-0 last Saturday. The referee has spoken.” And with this statement, the BBC proved that it was a science denier. Why? Because as far … Continue reading How an Online Petition Exposed BBC Bias
At some point in your cyber life, you have probably run across malware that seems to persist no matter what you do to remove it. Your antivirus doesn't do the job so you search online for help. Eventually, you may find somewhat daunting virus removal instructions and try to follow them, yet, the next time … Continue reading Xhelper: The Android Malware That Can’t be Removed
The recent hack of NordVPN was big news in the tech world, but regular web users, if they heard about it at all, just shrugged it off as, yet, another hack. However, any attack on a major VPN provider needs to be taken seriously. Without a dependable VPN, privacy and security on the web vanishes. … Continue reading Security of VPNs in Question after NordVPN Hack
Computers don't care what pop songs humans like. However, they can, given enough data, learn why humans like them. They, or, more precisely, their algorithms, can analyze these popular tunes and find commonalities among them that seem to appeal to members of the human species. This is exactly what one researcher, Dr Mick Grierson, was … Continue reading Computers Poised to Write Chart-Topping Pop Songs
According to a report from Verizon, one-third of major cybersecurity breaches were traced to mobile devices. This number is probably lower than it really is because many companies don't release details on how they were hacked. One reason they don't want to give this information is because they are embarrassed to admit how lax their … Continue reading Cybersecurity as a Lip Service: Self-deception in the Corporate Cyber World