So, realistically, what are the chances that a laptop bomb could be developed that could evade detection by airport scanners? Well, pretty good. The truth is that these bombs have already been developed and used. They could have already brought down some planes. Certainly, one was used on a Daallo Airlines Airbus 321 in Somalia … Continue reading Should the Government Have Lifted the Laptop Ban?
Month: July 2017
Is This the End of the Deep Web?
"You are not safe, You cannot hide. We will find you, dismantle your organization and network. And we will prosecute you.” So stated Attorney General Jeff Sessions last Thursday when announcing the takedown of deep web sites, Alphabay and Hansa. This was the correct statement to make when speaking of the deep web. It feeds … Continue reading Is This the End of the Deep Web?
Hackers Beware: You are in the Crosshairs of the ‘Hunter’
You might be naive enough to think that, if a hacker does something bad to you, you can, in turn, do something bad to them. If a hacker holds your computer for ransom, for example, you might think you have the right to do the same to them or at least go after them and … Continue reading Hackers Beware: You are in the Crosshairs of the ‘Hunter’
Trolls: A Product of the Internet, Society, or a Psychological Disorder?
Let’s get straight to the point. Real trolls have serious psychological problems. That’s not just my opinion. It’s the opinion of experts who have researched the subject. People with psychological disorders have been around long before the internet was ever conceived of. The internet simply gives such people a way to satisfy the compulsions associated … Continue reading Trolls: A Product of the Internet, Society, or a Psychological Disorder?
Attackers Use Your Mobile Number to Take Control of Your Facebook Account
Of the many Facebook hacks, and there are many, there is one that stands out in its ability to fool people and, thus, deserves to be discussed in some detail. This hack is more sinister than most because it only needs a mobile phone number to begin its nefarious actions. True, this attack vector has … Continue reading Attackers Use Your Mobile Number to Take Control of Your Facebook Account