Blog Archives

Article: WiFiPhisher — Automated Phishing Attacks Against Wi-Fi Networks

Memorize what your WiFi administration screen looks like Change all passwords if you think that your cybersecurity has been compromised. Make sure your Wifi access password is difficult to guess Phone numbers make for bad WiFi passwords… WiFiPhisher — Automated

Tagged with: , , , , , ,
Posted in Cybersecurity

Home Invasion 2.0

If a device doesn’t need to be connected to the Internet, then it should not be connected to the Internet…

Tagged with: , , , , ,
Posted in Cybersecurity

You may want to reconsider hooking up electrical devices to a “smart” power plug device…

You may want to reconsider hooking up electrical devices to a “smart” power plug device… This article may be a bit too technical for some readers, but it is important to understand the dangers that can be posed by the

Tagged with: , , , , , , ,
Posted in Cybersecurity, Home Defense

TAILS 1.0 is out now!

TAILS 1.0 is out now! For those of you into issues of Internet Privacy and Internet Freedom, this is a big milestone. Read about TAILS at wikipedia. http://en.wikipedia.org/wiki/Tails_(operating_system) Download the .iso file and burn a copy of it today. or download

Tagged with: , , , , , , , ,
Posted in Cybersecurity