Author Archives: firstname.lastname@example.org
While watching Rogue One – especially during the scenes where they infiltrate the data center and transmission tower – there were several plot devices that were head-scratchers from an IT perspective. Apparently I am not the only person who felt … Continue reading
Last week, Wired ran a story on how Trump is still using an unsecured phone. The risks involved with this are almost endless. And, with all the talk during the campaign season about hacking, mail servers, etc., one would think … Continue reading
The end of the year was spent in Shanghai and Thailand. I was able to knock two things off my bucket list: Visited Shanghai Disneyland – which means I have now visited every Disney park in the world. Got certified … Continue reading
Found this on reddit recently.
Beautiful! But will holding lawyers responsible for the legal fees incurred by the defense start an unforeseen trend in non-patent troll related cases?
Even if YOU are consistently vigilant about your private information, other people’s sloppiness can be catastrophic for you.
Because holding your data for ransom wasn’t enough, now hackers want you to infect your friends’ computers for them. It’s a twisted, evolutionary step in both ransomware and social engineering.
Cory Doctorow recently wrote an article on the trend of Hollywood portraying hackers in a more realistic fashion. He cites Mr. Robot as an example of how hacker’s really work – through social engineering, white paper analysis, etc. Gone are … Continue reading
The US National Institute for Standards and Technology has formulated new guidelines for password administration, including doing away with both password hints and password expiration. It’s an interesting read.