Lexicolatry: Celerity - Speed & Grace
http://www.flickr.com/photos/mikebaird/2507352554/ is the source image used here under Creative Commons
eBomb.us
Raw research material for a body of work at http://eBomb.us by "Mike" Michael L. Baird mike [at} mikebaird d o t com
Tuesday, March 18, 2014
Sunday, June 9, 2013
Iran ups cyber attacks on Israeli computers: Netanyahu - Yahoo! News
Iran ups cyber attacks on Israeli computers: Netanyahu - Yahoo! News:
2013 will be known as the year where Cyber security became an "aware issue" for most citizens worldwide. This is disruptive warfare and changes the rules of the game of power.
'via Blog this'
2013 will be known as the year where Cyber security became an "aware issue" for most citizens worldwide. This is disruptive warfare and changes the rules of the game of power.
'via Blog this'
Sunday, June 2, 2013
Researchers Say They Can Hack Your iPhone With A Malicious Charger - Forbes
Researchers Say They Can Hack Your iPhone With A Malicious Charger - Forbes:
Innocent-looking, malicious USB chargers can be constructed that will infect your iPhone - it's just a matter of time -Cybercrime is just getting started.... http://ebomb.us
'via Blog this'
Innocent-looking, malicious USB chargers can be constructed that will infect your iPhone - it's just a matter of time -Cybercrime is just getting started.... http://ebomb.us
'via Blog this'
Wednesday, March 20, 2013
A DIY UAV That Hacks Wi-Fi Networks, Cracks Passwords, and Poses as a Cell Phone Tower | Popular Science
A DIY UAV That Hacks Wi-Fi Networks, Cracks Passwords, and Poses as a Cell Phone Tower | Popular Science:
they’ll be showing off a functioning homemade spy drone that can sniff out Wi-Fi networks, autonomously crack passwords, and even eavesdrop on your cell phone calls by posing as a cell tower... the duo has taught their WASP a new way to surreptitiously gather intel from the ground: pose as a GSM cell phone tower to trick phones into connecting through WASP rather than their carriers... Tassey and Perkins say they built WASP so show just how easy it is, and just how vulnerable you are. “We wanted to bring to light how far the consumer industry has progressed, to the point where public has access to technologies that put companies, and even governments at risk from this new threat vector that they’re not aware of,” Perkins told Forbes.
'via Blog this'
they’ll be showing off a functioning homemade spy drone that can sniff out Wi-Fi networks, autonomously crack passwords, and even eavesdrop on your cell phone calls by posing as a cell tower... the duo has taught their WASP a new way to surreptitiously gather intel from the ground: pose as a GSM cell phone tower to trick phones into connecting through WASP rather than their carriers... Tassey and Perkins say they built WASP so show just how easy it is, and just how vulnerable you are. “We wanted to bring to light how far the consumer industry has progressed, to the point where public has access to technologies that put companies, and even governments at risk from this new threat vector that they’re not aware of,” Perkins told Forbes.
'via Blog this'
Tuesday, March 19, 2013
Hacked PCs falsify billions of ad clicks - FT.com
Hacked PCs falsify billions of ad clicks - FT.com:
Even the wild west analogy barely steps up to the scale and potential financial and economic impact of intrusions on and attacks into the new internet infrastructure where rules and laws are made in real-time by gangsters, warriors, terrorists, entrepreneurs, and state actors, to exploit and capitalize and profit from gaming the system. Attacks in the future will not be conventional bombs, and suicide vests, but rater processes perturbing transactions resulting in chaos in financial systens as confidence evaporates.
Beware eBomb.us
'via Blog this'
Even the wild west analogy barely steps up to the scale and potential financial and economic impact of intrusions on and attacks into the new internet infrastructure where rules and laws are made in real-time by gangsters, warriors, terrorists, entrepreneurs, and state actors, to exploit and capitalize and profit from gaming the system. Attacks in the future will not be conventional bombs, and suicide vests, but rater processes perturbing transactions resulting in chaos in financial systens as confidence evaporates.
Beware eBomb.us
'via Blog this'
Friday, June 15, 2012
Google Voice: a step-by-step primer on ditching your land line while keeping your number | ZDNet
Google Voice: a step-by-step primer on ditching your land line while keeping your number | ZDNet:
'via Blog this'
$45 and you can port your landline number to Google Voice - but you'll have to port it to a cell phone number as part if the process.
http://www.zdnet.com/blog/government/google-voice-a-step-by-step-primer-on-ditching-your-land-line-while-keeping-your-number/10455?tag=content;siu-container
'via Blog this'
Tuesday, May 29, 2012
Beyond Stuxnet: massively complex Flame malware ups ante for cyberwar - CSMonitor.com
Beyond Stuxnet: massively complex Flame malware ups ante for cyberwar - CSMonitor.com:
Very sophisticated - read what we know already here...
'via Blog this'
Very sophisticated - read what we know already here...
'via Blog this'
Subscribe to:
Posts (Atom)