Phishing has been around since the dawn of the internet. The term was first
used in an AOL Usenet group back in 1996 but it wasn’t until 2003 when many
baited hooks and lures started dropping. Popular transaction destinations
like PayPal and eBay were some of the early victims of these spoofed sites
asking customers to update their personal and credit card information. By
2004, it was a full-fledged ‘get rich quick scheme’ with many financial
institutions – and their customers – as targets.
Oxford Dictionary defines Phishing as, ‘The fraudulent practice of sending
emails purporting to be from reputable companies in order to induce
individuals to reveal personal information, such as passwords and credit card
You’ve seen it, the almost perfect looking email with actual logos, images
and links to a reputable company only to have it go to a slick looking
A few years ago, those little iHome alarm clocks started to appear in hotel
rooms. Cool gadgets that you could mount your mobile phone to battery charge
or play the music on the device. We also had a few in our home. They worked
perfectly for the iPhone 4 since the connector was that 1 inch protruding
plug. When I got the iPhone6, those clocks instantly became useless.
Obsolete. At least the phone connector part lost its value.
I’ve been thinking about this for a while.
The rate of obsolescence. The state when an object, technology, service or
practice is no longer needed or wan... (more)
2020 seems to be an important milestone for the Internet of Things. That’s
the year that Cisco says there will be 50 billion connected devices and also
the year Gartner notes that over 50% of major new business processes and
systems will incorporate some element of the Internet of Things.
That’s the good news.
A recent Symantec Internet Security Threat Report says there are 25 connected
devices per 100 inhabitants in the US. Minimum 25 entry points to your
personal information, not counting your front door, personal computers,
compromised ATMs and other data sources. As your con... (more)
Whether intentional or accidental, data leaks are a huge concern for
organizations. And it has been for years. Going back to a 2004 survey from an
IT security forum hosted by Qualys, found that 67% of security executives do
not have controls in place to prevent data leakage, A December 2006 survey,
Boston-based researchers Simon Management Group noted that some 78% of
respondents said they were "very concerned" about data exposure. A 2010
article published by Trustwave on CSOonline.com said that 65% of leakage
occurs due to the following combined methods: Microsoft SMB sharing, R... (more)
An old article gets new life. #TBT
Back in 2012 I wrote an article titled Bait Phone. It was about cops dropping
mobile phones with a tracking device and following the stealing culprit for
an arrest. Like Bait Car but with a smartphone.
Over the weekend, I noticed that the article was blowing up but couldn’t
figure out why:
I even tweeted out on Monday:
At the time, I didn’t realize something else was at play.
Then I decided to do a twitter search:
And found that a video with the same name as my blog post was trending: Bait
Phone 2 – basically a stun gun with a remote. Over 2.... (more)