image_pdfimage_print

EXPOSED: Russia is a proxy for the digital underworld

Russia is an easy scapegoat.  As we explain in Splitting Pennies – the world is not as it seems. The US Government spent billions of dollars creating the false narrative of Russia as an ‘enemy’ as the post WW2 “War Department” knew very well based on focus groups and RAND reports that unless they could come up with […]

CIA hack job(s) EXPOSED

Finally, we have a ‘snowden’ event for the CIA and the inner workings of how the agency operates in the digital ‘cyber’ sphere.  Wikileaks released “Vault7” – a treasure trove of documents pertaining to their ‘cyberwarfare’ or in layman’s terms, hacking operations.  Since we’ve released Splitting Pennies, in the hope of explaining how the world […]

ALERT: Point of Sale RAM scraper malware

Advances in technology have led to more sophisticated crimes by exploiting security vulnerabilities of new technologies.  This is exacerbated by the fact that understanding of these technologies and their use is only by a few, while the majority of end-users are unaware.  Generally speaking, following standard security practices will thwart 95% of electronic crimes such […]

Inside TAO: Documents Reveal Top NSA Hacking Unit

More leaked documents reveal a secret NSA hacking operation, with techniques ranging from physical implants of malware (sometimes hardware) to infiltrating Telecom networks, and even exploiting Microsoft updates to infect the target machine.  TAO has existed since 1997, but recently interest in the program is exploding, as seen by the drastic increase in the number […]