Monthly Archives: August 2015

Did Your New High Tech Device Come with Pre-Installed Malware? The Rise of Firmware Attacks

Firmware can be thought of as software installed in hardware. It often comes pre-installed on your computer or smartphone and is responsible for getting your device up and running when it comes out of the box. Components like your monitor, … Continue reading

Posted in Uncategorized | Leave a comment

How to Hack Air-gapped Computers

Once upon a time, all computers were air-gapped. Even malware did not exist. Then, one day, the first computer virus was invented. However, since there was no internet, at least no internet as we know it today, the only way … Continue reading

Posted in Uncategorized | 1 Comment

The IRS Breach Worsens as More Taxpayers Learn Their Tax Information Has Been Stolen

Next year, when you go to file your tax return, you may be surprised to learn that it has already been filed for you. That’s because the number of taxpayers who may have been compromised by the May IRS breach … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

Days of Past Future: Ads that Determine Your Emotional State to Design Themselves

When I visited the Museum of Future Technology in Japan, I expected to be amazed. Instead, I found that many of the exhibits were past their sell-by dates. What may have seemed futuristic when the museum was built had become … Continue reading

Posted in Uncategorized | Tagged , , , , , , | Leave a comment

Surviving the Windows 10 Upgrade: Some Tips and Observations Based on My Personal Trials

I hate upgrades. They never seem to work for me. More often than not, I finish an upgrade only to find that the programs I like most don’t work like they did in the old system. I, then, spend a … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

Has the Defense Department Network been Breached… Again?

On Sunday, the leak site, Cryptome, released a document purportedly from the hacker group known as the “Remember Emad crew”. The letter, addressed to the Pentagon, claimed, “we are responsible for the attack to your computers. the results of the … Continue reading

Posted in Uncategorized | Tagged , , , | 1 Comment