cybersecurity
Cracking the cyber world: NSA, hackers, and the complicated ways that digital information can threaten our personal lives, politics and national security.
Super Frog's Missing Loot
While Miss Georgina wined and dined on gator meat, a few miles down the road in another state a concerned Super Frog assessed the worst-case bucket issue scenario.
Marc OBrienPublished about a year ago in The SwampIs Putin's evil scheme the new Satellite Destroyer Missile?
Russia's S-550 air defense system is designed to shoot down adversary ballistic missiles and aircraft, including the United States' fifth generation fighters, the F-22 and F-35, as well as the future B-21 Raider bomber. Is the S-550, however, as effective as Russia claims? Here's what military strategists have to say about it. 😈🗺⚠
Twitter is Allowing A General To Threaten a Sovereign Nation In The Name of Free Speech
This first series of unprovoked tweet came on 3 October 2022. It was followed up by a series of odd tweets from the account of General Kainerugaba. Muhoozi Kainerugaba is the son of Uganda's President Yoweri Museveni who's retained power over the country for 36 year.
IwriteMywrongsPublished about a year ago in The SwampGhana & Ghanians Aren't Very Accepting of Anyone Who is Different
Un-welcome to Ghana a country that uses the term 'culture' to treat others badly. Colorism is at an extreme high and lighter skinned Black Americans have issues being called 'White' at every turn, as you walk through the streets they'll shout Obroni.
IwriteMywrongsPublished about a year ago in The SwampRussian has been sanctioned in every way, so what else can they lose?
Putin reportedly sent President Xi of China a message of congratulations on his re-inauguration to a third term as president.
EstalontechPublished 2 years ago in The SwampTrump is the ‘Hope For Peace’ in Ukraine , as Emphasized by a NATO Member
He claimed that Biden had gone “too far” in his criticism of Putin’s continued presidency in Russia. The right-wing populist leader, a close ally of the Former U.S. president, recently declared,
EstalontechPublished 2 years ago in The SwampJapanese woman scammed by 'Russian astronaut' who needed money to return to Earth
Internet scams have been on the rise in the years since the pandemic began, but this might be the craziest yet. With the rise in internet usage, the number of online scams has also increased considerably. At Interesting Engineering, we report the latest crypto-scams so that people do not fall for them in their attempts to connect with the new-age technology.
China's success as an ill omen for Europe.
A still-thriving authoritarian society that follows a capitalist economic model, and it is currently considered to be the second-largest economy in the world.That could easily be a definition in a lexicon of modern geopolitics .Even though China is still facing many ethical and existential issues, like environmental catastrophes and emissions that are causing pollution, as well as issues that many other authoritarian or even liberal states are facing, like the oppression of speech, minority marginalization and terrible working conditions.
Sergios SaropoulosPublished 2 years ago in The SwampHow Cyber Security Has Changed in the Last 10 Years
The world has changed drastically over the past ten years. Even the last two years have shown us so much change, not all of it for the better. When it comes to technology, ten years may as well be a hundred, for it changes so rapidly.
Andrew ObuchowskiPublished 2 years ago in The SwampHacker
A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term hacker has become associated in popular culture with a security hacker – someone who utilizes their technical know-how of bugs or exploits to break into computer systems and access data which would otherwise be unavailable to them – hacking can also be utilized by legitimate figures in legal situations. For example, law enforcement agencies sometimes use hacking techniques in order to collect evidence on criminals and other malicious actors. This could include using anonymity tools (such as a VPN, or the dark web) to mask their identities online, posing as criminals themselves.[1][2] Likewise, covert world agencies can employ hacking techniques in the legal conduct of their work. Oppositely, hacking and cyber-attacks are used extra- and illegally by law enforcement and security agencies (conducting warrantless activities), and employed by State actors as a weapon of both legal and illegal warfare.Definitions
Rebecca MariaPublished 2 years ago in The SwampHow To Tell If Your Company Needs To Boost Its Security Measures
We all collectively know that the most valuable asset to any company is the information that we possess. Not only that, but how data flows through the company has to have the most up-to-date security possible. Security is an absolute necessity in the world of technology information. Here are a couple of signs that your company needs to boost its security measures.
Louis BaraniPublished 2 years ago in The SwampInformation Warfare is a Cybersecurity Thing. Duh!
Duh! That’s what we say when something should be obvious. It turns out, information warfare is at the heart of cybersecurity. But the cybersecurity community and I missed it. This Computer Weekly article from Dec. 23, 2020 brought it into focus. And the US Capitol fiasco on Jan. 6, 2021 vaulted information warfare to the top of the priority list. We need a solution and root cause analysis. Fast.
Greg ScottPublished 3 years ago in The Swamp