Blog Archives

Article: WiFiPhisher — Automated Phishing Attacks Against Wi-Fi Networks

Memorize what your WiFi administration screen looks like Change all passwords if you think that your cybersecurity has been compromised. Make sure your Wifi access password is difficult to guess Phone numbers make for bad WiFi passwords… WiFiPhisher — Automated

Tagged with: , , , , , ,
Posted in Cybersecurity

Ethernet Powered Lighting Transmits Data Via Light

Web connected Lighting Could Transmit Data to Phone via light pulses Much like acoustical networks and microphones, cameras are now going to be an entry point for malware as well. Don’t be surprised if finance departments fight with security departments

Tagged with: , , , , ,
Posted in Cybersecurity

You may want to reconsider hooking up electrical devices to a “smart” power plug device…

You may want to reconsider hooking up electrical devices to a “smart” power plug device… This article may be a bit too technical for some readers, but it is important to understand the dangers that can be posed by the

Tagged with: , , , , , , ,
Posted in Cybersecurity, Home Defense

TAILS 1.0 is out now!

TAILS 1.0 is out now! For those of you into issues of Internet Privacy and Internet Freedom, this is a big milestone. Read about TAILS at wikipedia. http://en.wikipedia.org/wiki/Tails_(operating_system) Download the .iso file and burn a copy of it today. or download

Tagged with: , , , , , , , ,
Posted in Cybersecurity

Puppy Linux has been updated!

Puppy Linux has been updated! Version 5.7 is out now.

Tagged with: , , , ,
Posted in Cybersecurity