If you've done enough browsing, you've undoubtedly tried to navigate to a website only to be redirected to another page. Then, in order to get to the page you want, you have to cancel that page. Sometimes you have to do this several times. For the most part, this is nothing more than an annoyance. … Continue reading Those Annoying Pop-Ups may be More Dangerous than You Think
Incognito: having one's identity concealed, as under an assumed name, especially to avoid notice or formal attentions. With this definition in mind, I assume, therefore, that when I choose to browse in Incognito Mode on Google's Chrome Browser, I will have my identity concealed. I don't think that's expecting too much. Google, itself, promises that … Continue reading Google Sued for Incognito Mode Abuse
I am sure that at some point in your cyber life, you have failed to prove you were a human. You have failed the CAPTCHA or reCAPTCHA test. Can't you identify a bicycle when you see one? Can't you read the letters in a twisted word? Humans can do that so you must be a … Continue reading Attackers Use Fake reCAPTCHAs to Trick Corporate Executives
There's nothing new about hiding malware in an image. Once hackers learned that image files could mask malware, they began using them. The name given for hiding a file in a file is steganography. It's always been a sneaky way to avoid detection because the average user believes pictures are innocent; that pictures are pictures … Continue reading Beware of RATs in Images
Back in 2019, MIT released a story that got little media attention. It was entitled, Artificial intelligence shines light on the dark web. The few people who visited the site probably just thought, "that's nice" and continued on their way. However, hidden beneath the somewhat ambiguous title was some surprising information. Apparently, MIT's Lincoln Laboratory's … Continue reading Using Artificial Intelligence to Unmask Users of the Deep Web
It's beginning to look that way. Many big name tech companies are planning to launch more than 50,000 satellites in the coming years to create constellations of satellites that will allow anyone anywhere on Earth to receive a high speed internet connection. But why do they need so many satellites, and isn't satellite internet already … Continue reading Will Satellite Internet Become the Norm?
Surveillance software is legal. Spyware is illegal. Both monitor a specific smartphone owner's use of their device and both can gather copious amounts of information from it. Both can turn on cameras, recorders, read emails and SMS messages, and monitor all internet use. They will also follow the user's physical movements through GPS tracking. The … Continue reading The Short Dangerous Step from Surveillance Software to Spyware
So I get a letter from the IRS in the mail. "This can't be good." I muttered to myself. And, sure enough, it wasn't. The first lines of the letter read as follows. Dear Taxpayer, We received an income tax return, Form 1040, for the tax year above (2019) using your name and Social Security … Continue reading I Was the Target of a Tax Refund Scam
The average person is becoming too smart for most hackers. They know a spoofed website when they see it. Long ago they've learned to check the URL before they begin blithely filling in a form with personal information. They have learned how to hover over a link to see where it really goes. Even though … Continue reading Punycode, Homographs, and Other URL Spoofing Techniques You should be Aware of
The MeetMindful dating site was hacked and the details of its 2.8 million customers were leaked online. The whole database is now free to download. So what? You might say. I'm not a member of the site, what do I have to worry about? Well, possibly nothing, but it's naïve to think that any hack … Continue reading I’m Not a Member: Why Should I Care If Another Dating Site Was Hacked?