This is the question a passenger flying on JetBlue had when she was asked to look at a camera for an identity check rather than use her photo ID. You can imagine how creepy and unnerving that may have felt. Especially since it was done without any prior notification at the airport.
Ever wonder where all the spam that floods email inboxes every day comes from? Turns out to be different than expected, at least as far as your author is concerned. According to the fine folks at Statista, China tops the list. During 2018, China produced nearly 12% of all worldwide spam. 11.69% for those wanting a more precise measurement.
There are ways of becoming less visible on the internet. Using the Tor browser is one, but that comes with its own risks, as our post discusses. VPN connections disguise your location, disrupting accurate tracking of your browsing habits. However, we leave tracks and histories in a growing number of places. If we want to protect our privacy and information, what other options are available?
Email phishing attacks remain a go-to tool for bad actors everywhere. Many reasons for this include responding to an email in a rush, not being suspicious enough, clicking through an email link rather than going directly to a known site, and more.
A recent ZD Net article reports the 12 most common email subject line openers sent to businesses in phishing attacks. Barracuda Networks analyzed over 360,000 known phishing emails to identify common themes and subject lines. The result
You knew this had to happen eventually. After all, even a lowly fish tank thermometer can be hacked to allow network access. There are numerous advantages to smart medical devices. They can send data to the physician on a patient’s health. The patients can monitor their stats on an app. Theoretically, firmware and software updates could be downloaded. Although in this last situation, I’d want “firm” control over how and when that took place!
Recently, Germany’s Bundesrat legislative body passed a bill on to the Parliament for action designed to make it easier for authorities to prosecute individuals and groups operating on the dark web for illegal purposes. On the surface that sounds like a great idea. Who doesn’t want the people who hack systems and steal personal data held accountable for their crimes?
Isn’t technology amazing? Look how many things have been developed since the first personal computers hit the scene. It is a wondrous time to be alive if you are a technology and gadget geek. Naturally, there are those out there who want to spoil it for everyone. Hackers and bad actors, you know who you are.
The latest example of this crowd corrupting our tech toys involves the hard disk drives (HDD) on our computers. This technology is so last century. But, even as solid-state drives (SSD) take over if you want a multi-terabyte drive that doesn’t cost as much as a Tesla, the venerable HDD can’t be beaten, at least not in terms of price and capacity.