|Monday, February 19, 2018
You are here: Home » Technology

Technology

Nobody is safe on the Internet

Internet crime, cyberwar and cyberespionage are some of the most popular terms in the tech world. The boogeyman of the 20th century was so-called Islamic Terrorism. In the 21st century, what keeps people awake the most are Cyberthreats. Today, online threats are the greatest risk to personal and corporate security, and we must try to understand who has the power to threaten us, to know what we can do to ...Read full article...

Facebook and its Open War on Independent Media

Facebook excuses its censorship on a plea to “end disinformation” and “sensationalism” on the internet. It will not be enough to have a large audience or be registered as a medium, Facebook wants to measure the trust that the media possess to prioritize their content on the social network. As of Friday, more than 2 billion active service profiles will see 4% of content generated by professional pages instead ...Read full article...

Facial Recognition: Convenience vs Privacy

SÃO PAULO – Facial recognition technology comes loaded with comfort, yes, promises of greater security, okay. But it also comes loaded with a major, yet often ignored inconvenience: Violation of Privacy. In parallel, the expansion of an entire security industry revolves around it and slowly but surely society turns into the Orwellian nightmare of a place of controlled citizens. Derived from artificial intelligence, facial recognition took its first steps ...Read full article...

The Social Media Pyramid Scam

Social media personalities generated more than $4 billion in one year for large social media pyramid scam users. A pyramid scheme or as I prefer to call it, pyramid scam, is a business model that recruits members via a promise of payments for enrolling others into the scheme scam, rather than supplying investments or sale of products or services. Social media are a hidden, nonetheless an out-in-the-open version of ...Read full article...

Este es el Precio de la Comodidad y Conectividad

La conectividad y los avances tecnológicos no tienen que ser arriesgados. Está en las manos de los consumidores el exigir que su privacidad y seguridad sean protegidas. Imagine un mundo en el que se está conectado con cualquier cosa cuando lo desee. Imagine un mundo en el que ni siquiera tiene que pensar en lo que quiere, porque la Internet de los Cosas (IdC) está siempre dispuesta a pensar ...Read full article...

Google in a War on Media Freedom

A previous article explained Google’s transformation from search engine to online censor. Changes in its search algorithm makes it harder to access what it calls fake news, low-quality information and conspiracy theories – code language for real news, information and analysis it wants suppressed. In cahoots with US dark forces, it declared war on RT and Sputnik News. RT is the most widely viewed news on Google-owned YouTube, now ...Read full article...

Why People Will Happily Line Up to be Microchipped Like Dogs

So…some people actually want to be microchipped like a dog. They’re lining up for it. They’re having parties to get it done. It if isn’t available to them, they’re totally bummed out. I’m not even going to venture into the religious aspect of having a microchip inserted into a human being. Let’s just talk about the secular ramifications. Certain folks won’t be happy until everyone has a computer chip implanted ...Read full article...

Bluetooth Flaw Makes ALL Your Connected Devices Hackable

In case you don’t have enough to worry about with hackers getting into our power grids, cyber attacks taking down entire countries, and epic natural disasters, a newly discovered Bluetooth flaw makes nearly all devices that are connected subject to hackers. BlueBorne is an attack vector that could affect billions of devices. If you’re running IoS, Android, Windows, and even Linux, your devices could be at risk. Using BlueBorne, ...Read full article...

Geoengineered Environmental Disasters?

Were Hurricanes Harvey and Irma natural or engineered? It’s unclear. Geoengineering makes the latter possible. So-called High Frequency Active Auroral Research Program (HAARP technology) manipulates the atmosphere, climate, and weather for military purposes. Based in Gokona, Alaska (officially closed down), what’s likely still ongoing secretly there or elsewhere is a jointly managed US Air Force/Navy weather warfare program. A no longer operating HAARP web site earlier called the technology ...Read full article...

Behold, the Magic Lab pills that will pass as Food

We’ve all seen it before. Magic vaccines that prevent disease, magic pharmaceuticals that promise to treat and cure those who are ill, magic diet pills that will make you lose pounds in a matter of days or weeks. We have also learned about soylent green. If you haven’t make sure you check it out. It is all about swindling desperate people so they make desperate decisions. It is about ...Read full article...

Google Plans to Release 20 Million Infected Mosquitoes in California

Sometimes you have to think that scientists don’t ever read science fiction, and thus have not even contemplated all the things that could go wrong when they do something like creating 20 million mosquitos in a laboratory, infecting them with a bacteria, and then releasing those mosquitos in Fresno, California. First of all, did you even know that Google had a bio-lab?  They do and it’s called Verily. Which, ...Read full article...

American Tech Giants don’t want an Open Web

Facebook, Google and Twitter use the name Net Neutrality to push for a tighter, more monopolised Internet while claiming they seek  to protect an open environment. Dozens of technology companies allied Wednesday to protest against the proposal by the government of Donald Trump aimed at limiting net neutrality. The term that seems to promote a more open web actually does exactly the opposite. It facilitates monopolies and limits information ...Read full article...

How a Massive Cyberattack Could Happen To Us

The Petya Ransomware attack hit globally, but one country, in particular, was devastated by it. The Ukrainian infrastructure was brought own by the attack, where the epicenter occurred, and now, experts are suggesting that it may have been deliberate and state-sponsored. The ostensible purpose of all that damage was to make money — and yet there’s very little money to be found. Most ransomware flies under the radar, quietly collecting ...Read full article...

Petya Ransomware Cyberattack: “There is no Kill Switch”

Remember that Eternal Blue loophole created by the NSA? Well, it has been employed again in the launch of the Petya Ransomware Cyberattack. Thanks, NSA. The attack began earlier today and has crippled some major companies across the globe. No one has taken responsibility for the virus, and according to Matthieu Suiche, the security researcher who helped fight the WannaCry attack earlier this summer, “There is no kill switch.” Suiche ...Read full article...

Are you addicted to Sharenting?

It is becoming more common for parents to share pictures of their children – sharenting – since they are babies. Many do it innocently but experts warn of future dangers. The trend is now labeled as “Sharenting” or the out of control desire that parents have to expose their children on social media. According to the British Collins dictionary, the English term sharenting is “the practice of parents to ...Read full article...
Page 1 of 9123456789