"It is likely only a matter of time before remote exploitation tools are widely available for this vulnerability." So wrote the normally circumspect NSA in their advisory on the so-called BlueKeep vulnerability. Really? Only a matter of time? Hmm, it seems like the NSA knows something they're not telling us about. Other cybersecurity professionals tend … Continue reading Is the NSA Warning to Microsoft Users Really as Bad as it Sounds?
The recent hack of NordVPN was big news in the tech world, but regular web users, if they heard about it at all, just shrugged it off as, yet, another hack. However, any attack on a major VPN provider needs to be taken seriously. Without a dependable VPN, privacy and security on the web vanishes. … Continue reading Security of VPNs in Question after NordVPN Hack
Computers don't care what pop songs humans like. However, they can, given enough data, learn why humans like them. They, or, more precisely, their algorithms, can analyze these popular tunes and find commonalities among them that seem to appeal to members of the human species. This is exactly what one researcher, Dr Mick Grierson, was … Continue reading Computers Poised to Write Chart-Topping Pop Songs
According to a report from Verizon, one-third of major cybersecurity breaches were traced to mobile devices. This number is probably lower than it really is because many companies don't release details on how they were hacked. One reason they don't want to give this information is because they are embarrassed to admit how lax their … Continue reading Cybersecurity as a Lip Service: Self-deception in the Corporate Cyber World
5G stands for 'Fifth Generation', meaning the 5th generation of mobile technology. No matter what you may hear to the contrary, it will become the new standard. The problem will be getting to that level, because there are, as with all new technologies, problems that must be overcome. For the moment, the positives outbalance the … Continue reading 5G Networks: Inevitable but Problematic
Google has now integrated its Password Checkup Tool into its Chrome browser. The tool has been available for a while, but it will now become a common part of the Chrome browsing experience. So is this good or bad? As with most tech changes, it has both its positive and negative aspects. Some users may … Continue reading Google Chrome’s Password Checkup Tool: Valuable for Some, a Nuisance for Others
In a recent post, I suggested that the U.S. had declared cyberwar against Iran. This was made clear when President Trump gloated over the misfiring of one of Iran's rockets. In fact, Iran has had trouble testing numerous missiles and rockets ever since George W. Bush gave a thumbs-up to the infamous Stuxnet attack which … Continue reading U.S. Veterans Targeted by Iranian State Hackers
Emmanuel Nwude sold an imaginary airport to a Brazilian bank for $242 million. Another scammer, Rubbin Sarpong, sweet-talked a woman out of $93,000. The woman believed Sarpong was a soldier in Syria who was in love with her. She believed she was helping the military and helping her romantic partner to bring gold bars back … Continue reading 167 Nigerian Scammers Arrested in Global Law Enforcement Operation