Mastering the Internet

By Big Cajun Man | Useful blogging, social media, and networking articles

When it comes to political ads, it's time for Facebook and Google to be held to the same standards as ABC and CBS

You probably saw it dozens, if not hundreds of times in the months leading up to the US presidential election last year.<p>A political ad would air. And at the end, you'd see a clear message about who paid for or endorsed the spot, whether it was Donald Trump, Hillary Clinton or any of the numerous …

Facebook

What I learned about concussions — by having one

It’s hard to understand a brain injury until you have one<p>I opened my eyes to see a clear blue sky and two men leaning over me to put a brace around my neck. I don’t know if I was already on the stretcher or if I was still on the pavement, but there are plenty of things I don’t remember. As I would …

The Brain

Distrustful U.S. allies force spy agency to back down in encryption fight

SAN FRANCISCO (Reuters) - An international group of cryptography experts has forced the U.S. National Security Agency to back down over two data encryption techniques it wanted set as global industry standards, reflecting deep mistrust among close U.S. allies.<p>In interviews and emails seen by …

National Security Agency (NSA)

Yes, Bill Gates regrets Ctrl+Alt+Delete

<i>This post has been corrected.</i><p>At the Bloomberg Global Business Forum today, Carlyle Group co-founder and CEO David Rubenstein asked Microsoft founder Bill Gates to account for one of the most baffling questions of the digital era: Why does it take three fingers to lock or log in to a PC, and why did …

Bill Gates

Prof Shows How Your Internet Activity Is Being Watched

While news of data leaks and malware attacks seem to be on the upswing, there are forms of web surveillance that reveal just as much data, only they …

Privacy

Equifax Suffered a Hack Almost Five Months Earlier Than the Date It Disclosed

Equifax Inc. learned about a major breach of its computer systems in March -- almost five months before the date it has publicly disclosed, according …

Security

Software Has a Serious Supply-Chain Security Problem

The warnings consumers hear from information security pros tend to focus on trust: Don't click web links or attachments from an untrusted sender. …

Information Security

The 'South Park' Season Premiere Set Off Everyone's Amazon Echo, And Here Are The Internet's Greatest Reactions

It's hard to believe that Trey Parker and Matt Stone didn't know exactly what they were doing with Wednesday night's season premiere of <i>South Park</i>. …

TV

Take These Steps to Secure Your Raspberry Pi Against Attackers

Raspberry Pi boards are fantastic for any project — they’re cheap, easy to use, can run a wide range of possible operating systems, and provide programmable GPIO pins as well as multi-core CPU availability and multiple USB ports.<p>You can use Raspberry Pi boards for all kinds of automation and …

Data swamped US spy agencies put hopes on artificial intelligence

AI has widespread functions, from battlefield weapons to the potential to help quickly rebuild computer systems and programs brought down by hacking …

Artificial Intelligence

The Music Industry Bands Together to Finally Get Paid Online

Last fall, a group of music industry heavyweights gathered in New York City to do something they’d mostly failed to do up to that point: work …

Boston

Equifax Breach Response Turns Dumpster Fire — Krebs on Security

I cannot recall a previous data breach in which the breached company’s public outreach and response has been so haphazard and ill-conceived as the …

Identity Theft

Jaguar has restored this old E-type with an electric upgrade | Ars Technica

The batteries and motor are the same size and shape as the old XK powertrain.<p>Ask any enthusiast and they'll tell you the same thing—if you want to …

Jaguar Land Rover

Mobile Payments Rise in Popularity, Reaching Tipping Point in Some Countries, Global Report by ACI Worldwide Finds

<i>Tuesday, September 05, 2017</i><p>NAPLES, FLA—September 5, 2017—On the eve of the third anniversary of the launch of Apple Pay, mobile wallet adoption is on …

A Simple Design Flaw Makes It Astoundingly Easy To Hack Siri And Alexa

Hackers can take control of the world’s most popular voice assistants by whispering to them in frequencies humans can’t hear.<p>Chinese researchers have discovered a terrifying vulnerability in voice assistants from Apple, Google, Amazon, Microsoft, Samsung, and Huawei. It affects every iPhone and …

Amazon Echo

Only 13% of Americans are scared that robots will take their jobs, a recent poll shows

Responding to Russian president Vladimir Putin's warning this week that "whoever leads in artificial intelligence will rule the world," Tesla CEO …

Robots

Cyber Insurance: Should You Get It?

This entry was posted in General Security on September 5, 2017 by Mark Maunder 0 Replies<p>You have probably noticed the gradual increase in the number …

U.S. Military to Create Separate Unified Cyber Warfare Command

<b>President Donald Trump ordered the US military on Friday to elevate its cyber warfare operations to a separate command, signaling a new strategic</b> …

U.S. Military vows to tweak and fling malware back at creators

U.S. military hackers are by throwing the proverbial malware grenade back at the enemy

U.S. Military

Ransomware Targeting WordPress - An Emerging Threat

Ransomware Targeting WordPress – An Emerging Threat<p>This entry was posted in Wordfence, WordPress Security on August 15, 2017 by Mark Maunder 46 …

Google is paying Apple billions per year to remain on the iPhone, Bernstein says

Google is paying Apple billions of dollars to remain the default search engine on iPhones and iPads, Bernstein said in a note to investors on …

Google

More on Ransomware

TweetHow does this Work?As the name implies, <i>ransomware</i> works like a kidnapper, unfortunately it is your data being held captive.Once your computer(s) …

Security

August 3, 1977: The TRS-80 Personal Computer Goes on Sale

It was with minimal expectations that, on August 3, 1977, Tandy Corporation teamed up with Radio Shack to release the TRS-80, one of the first …

For 20 Years, This Man Has Survived Entirely by Hacking Online Games

A hacker says he turned finding and exploiting flaws in popular MMO video games into a lucrative, full-time, job.<p>Manfred's character is standing still in the virtual world of the 2014 sci-fi online multiplayer game <i>WildStar Online</i>. Manfred, the real life person behind the character, is typing …

Security

Putin bans VPNs to stop Russians accessing prohibited websites

MOSCOW (Reuters) - President Vladimir Putin has signed a law that prohibits technology that provides access to websites banned in Russia, the government's website showed on Sunday.<p>The law, already approved by the Duma, the lower house of parliament, will ban the use of virtual private networks …

Russia

How Twitter Fuels Anxiety

The anxious can often find a supportive community through tweeting, but the nature of the social media site can exacerbate symptoms.

Social Media

U.S. government crackdown threatens Kaspersky’s American dream

(Reuters) - Eugene Kaspersky, the CEO of the Russian cybersecurity software firm that bears his name, had a big American dream.<p>He wanted his company to go beyond selling anti-virus software to consumers and small businesses and become a major vendor to the U.S. government - one of the world's …

Cybersecurity

The WPSetup Attack: New Campaign Targets Fresh WordPress Installs

This entry was posted in WordPress Security on July 11, 2017 by Mark Maunder 52 Replies<p>At Wordfence, we track millions of attacks from a wide variety …

Linux is not as safe as you think

There is a notion by many people that Linux-based operating systems are impervious to malware and are 100 percent safe. While operating systems that …

Linux