Boston Bombing Investigation – Example of Effective Technology Use
As this is written police in Boston appear to be closing in on the 2nd suspected terrorist 4 days after the horrific bombing that ended the 2013 Boston Marathon. Throughout this ordeal, I’ve been...
View ArticleIdentity Theft – Tools and Resources
Identity theft is a serious problem in the U.S. If you’ve been a victim, you know the amazing amount of damage it can do and how much work is required to repair that damage. A few quick stats from...
View ArticleIs this the end of landlines?
Some telephone companies are asking the government to end traditional landline service As more telephone customers cut the cord and shift service to wireless or Internet-based options, some major...
View ArticleBanks of the Future
There’s a quiet revolution occurring in the banking industry. As bank customers embrace technology, the ways they interact with the bank are changing rapidly. According to this article...
View ArticleOnline Crime Report
Service Sells Criminals Access to Fortune 500 Firms — Krebs on Security – http://ow.ly/jRZDT “For just a few dollars, these services offer the ability to buy your way inside of Fortune 500 company...
View ArticleTech News of the Weird Variety
4/23/13 – A Star Wars R2-D2 Talking Pizza Cutter – http://ow.ly/koDQb Seriously? Some people have too much time on their hands. 4/23/13 – At long last: A Pizza Hut app for your Xbox 360 –...
View ArticleIdentity Theft – Scam artist pleads guilty to using stolen identities to...
A creep by the name of Murmylyuk created a fake employment-related website. The site offered fictitious job placement services program and claimed was, “sponsored by the government and intended for...
View ArticleNewsbytes – Technology & Science
There have been are too many (way too many!) cool Sci/Tech stories recently to write about in depth. The mad scientists and others have been working overtime. 4/25/13 – Tax-Free Web Shopping Nears End...
View ArticleZeus / SpyEye Banking Trojan Botmaster Arrested
I’ve been following this story with growing fascination for many years. I’ve been writing about it since 2011. I expect that one day this story will turn into a bestseller and one heck of a movie. Let...
View ArticleWashington Hospital Hit By $1.03 Million Cyberheist
Here’s another excellent story by Brian Krebs. I enjoy his reporting because he goes beyond the basic facts. In this story he doesn’t just tell the story from the hospital’s perspective. He interviews...
View Article$45 Million Dollar Heist, using no guns, only laptops and the Internet
It isn’t often that a cyber crime warrants prime time coverage on the national news. This one did. The storyline would seem to have been manufactured in Hollywood. Who else but Hollywood screenwriters...
View ArticleWhat is a 3-D Printer and Why Does it Make Authorities Very Nervous? Think...
A 3-D printer is a machine that takes a digital design, a CAD (Computer Aided Design) file, and creates 3 dimensional objects by building up layers of material, one after another until the object meets...
View ArticleA Potpourri of Innovative Technology Stories
This Sound Camera Could Help You Fix Your Car – Popular Science – http://ow.ly/kT6RJ – A new camera creates a heatmap-like view of what’s making noise. Survivalist’s E-Ink Android Tablet – Popular...
View ArticleFTC Halts Payday Loan Scams Connected to Identity Theft
The FTC recently put a stop to a payday loan scam (http://ow.ly/kJZiR) that is alleged to have made “…more than 2.7 million calls to at least 600,000 different phone numbers nationwide, according to...
View ArticleA Deeper Look into Identity Theft
I’ve been thinking a lot about identity theft. Probably because of the overwhelming number of stories I see on the Internet. I was completely unaware of any connection between identity theft and drugs...
View ArticleLonglining – Another Step in the Evolution of the E-mail Phishing Threat
Back in 2011 I wrote about an article about spear phishing, “What is Spear Phishing? Dangerous” (http://ow.ly/kWsPV). Spear phishing is a sophisticated variant of the tried-and-true e-mail phishing...
View ArticleInternet Scams are Substantial Part of FTC Complaints
The Federal Trade Commission, the leading consumer protection agency in the U.S., recently released its 2012 Consumer Sentinel Network report. (http://ow.ly/lbtQh) In that report they note that...
View ArticleVery Phunny Phishing Article
It’s not often that an article on phishing can make me laugh, But this one did. (http://ow.ly/kI8DR) This is a good read and Susan Erasmus, the author, is one feisty lady. Here are the first 2...
View ArticleThe Long, Weird History of the Nigerian E-mail Scam
I know the Nigerian e-mail scam, also known as the ‘419’ scam has been running for many years. Before the Internet it was sent by fax. Before that it was sent as a letter – sometimes with counterfeit...
View ArticleHow a 3D Printer Saved This Baby’s Life
I read a lot of stories that involve the negative side of technology. Malware, scammers, cybercrimes, and so on. But technology has its positive side as well. I like to pass them on as well. Based on...
View Article
More Pages to Explore .....