Monthly Archives: March 2015

Spoofing: Pretending to be someone, something, or somewhere else at some other time: Evil twins, missing planes

For the most part, the internet depends on trust. When you click on a link, you expect to go to where it says it will take you. When you enter your password, you expect to be let into a private, … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

Beautiful People Get Ugly Virus and Other Dating Site Tragedies

For the most part, hacks are destructive and loathsome. But there are times that hackers do things that just have to make you smile. Take, for instance, the time they took over the then Russian President, Dmitri Medvedev’s, Twitter account … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

Anyone Have Any Explanations for These 5 Puzzling Security Statistics?

I was reading through a number of security breach reports and came across some puzzling statistics that maybe someone can help explain. Some are more serious than others but any explanation could give some insights that could prove useful. Here … Continue reading

Posted in Uncategorized | Tagged , , , , , , , | Leave a comment

ISIS Sympathizers Hack Hundreds of Websites across the US and Canada: Dogs Traumatized

“Hacked by Islamic State (ISIS) We Are Everywhere :)”. So read the black-bannered web page of hundreds of hacked sites across the US and Canada, disconcerting many small businesses and organizations that had no idea why ISIS was taking an … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

Putin’s Troll Cyber Army is on the March to a Website Near You

Why does a guy like Putin, with an 86% approval rating in his own country, care what the rest of the world thinks of him? Does Obama lose sleep over whether Russians like him or not? I doubt it. Yet, … Continue reading

Posted in Uncategorized | Tagged , , , , , , , | Leave a comment

‘Apocalypse-Proof’ Storage Now Available

One of the world’s oldest storage devices was found in a cave. The information encoded on it was still in relatively good shape, considering its age. Unfortunately, this information was not easily retrievable. I am referring here to the Lescaux … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment