image_pdfimage_print

CIA hack job(s) EXPOSED

Finally, we have a ‘snowden’ event for the CIA and the inner workings of how the agency operates in the digital ‘cyber’ sphere.  Wikileaks released “Vault7” – a treasure trove of documents pertaining to their ‘cyberwarfare’ or in layman’s terms, hacking operations.  Since we’ve released Splitting Pennies, in the hope of explaining how the world […]

Why HTTPS and SSL are not as secure as you think

GIH: We are led to believe that by installing a certificate, or by other common security practices, we are safe.  The following shows that this may not be the case, especially considering the vulnerabilities of HTTPS protocol, the commonly accepted ‘safe’ way to browse: In this day and age of well-known NSA spying, everyone keeps […]

How the NSA Plans to Infect ‘Millions’ of Computers with Malware

GIH:  As more information comes out about various spy agencies and their cyber divisions, it seems that those such as the NSA pose a larger threat to internet security than the hackers they are supposedly protecting us from.  The following information should make any user of the internet, be it a business or individual or […]

ALERT: Point of Sale RAM scraper malware

Advances in technology have led to more sophisticated crimes by exploiting security vulnerabilities of new technologies.  This is exacerbated by the fact that understanding of these technologies and their use is only by a few, while the majority of end-users are unaware.  Generally speaking, following standard security practices will thwart 95% of electronic crimes such […]

The sky is not falling – it’s already fallen

It’s no fun being a cynic, thinking that everything is bad and getting worse. It’s easy–especially in the security community–but it’s not fun. But, in light of the latest in the interminable string of revelations about the NSA’s efforts to eat away at the foundation of the security industry, the only alternative available is the […]