It all began in China, but my guess is that it's not going to end there. When the Chinese government decided it was time to eliminate the Uighur minority in northwest China, they came up with a novel idea. Why not 'suggest' that their Uighur citizens install 'special' apps on their phones? The apps the … Continue reading Genocide Apps: Coming to an App Store Near You
"It is a tale told by an idiot, full of sound and fury, signifying nothing." Shakespeare, Macbeth This quote just about sums up President Elect, Joe Biden's and much of the intelligence community's response to the recent SolarWinds attack on numerous government agencies and private corporations. I realize that they don't want to show their … Continue reading How Will the U.S. Retaliate against the Russian SolarWinds Hackers?
Imagine that you get an email from one of your friends? Imagine that you were both at the same party and that he had some pictures he wanted to share with you. He's done this sort of thing before. His email address checks out so, no problem, right? You open the photos and they are … Continue reading So What Exactly is a Supply Chain Attack?
On New Year's Eve, when everyone's attention was somewhere else, Microsoft casually announced that its source code had been breached. This was followed by a 'nothing-to-see-here' discussion of the incident. So, I suppose we should just continue living as if the SolarWinds attackers' penetration to the core of the Microsoft Corporation is a minor cyber … Continue reading Microsoft Downplays Source Code Breach… Why?
This might be the only question left in which the answer does not fall along party lines. Probably equal numbers of Democrats and Republicans would agree or disagree on the pardons for these two individuals. Democrats loved Assange when he was leaking documents that exposed the wrongdoings of American firms or Republicans. They especially liked … Continue reading Should Trump Pardon Assange and Snowden?
If malware can gain control of your device's firmware, then say goodbye to your device. Manufacturers put firmware on their computers and other devices so that they work properly upon startup. This is why many manufacturers won't let you access the firmware. Messing with the firmware could destroy their product. Yes, firmware upgrades do occasionally … Continue reading This is Dangerous: New Russian Trickbot Variant Can Now Access Firmware
As Business Insider notes; "It's not just you — Google is having a massive outage". Many of Google services are not operating. These include Gmail, Google Maps, YouTube and more. This seems to have started in India and Europe, but outages are now showing up on the East Coast of the U.S. Google has yet … Continue reading Google Outage Spreads Worldwide
People pay good money to search engine optimizing firms to make it onto the first page of Google search results. The bigger the company, the more you pay, and some pay tens of thousands of dollars every month. However, the average user or small business owner just has to do the best they can to … Continue reading How Scammers Use Google Search Results to Lure Victims
Routers distribute the internet connection you receive from your modem. They allow you to form your own network of interconnected devices. Some internet service providers offer a modem/router combination so that you don't need two separate devices. However, some people may prefer having a router to increase their WIFI signal strength and to have more … Continue reading Cheap Routers, Complete with Chinese Backdoors, Available Now!
Combine lockdowns with the holiday season, and you have a fertile breeding ground for hackers who would love to steal your personal information and, ultimately, your money. It's a good idea to be a paranoid web surfer during the holiday season, but which sites are the most dangerous? According to Kaspersky, these are the sites … Continue reading Facebook Users Beware: Criminals Position Themselves for Holiday Attacks