|Wednesday, July 8, 2020
You are here: Home » Technology


Technology

The Social Media Pyramid Scam

Social media personalities generated more than $4 billion in one year for large social media pyramid scam users. A pyramid scheme or as I prefer to call it, pyramid scam, is a business model that recruits members via a promise of payments for enrolling others into the scheme scam, rather than supplying investments or sale of products or services. Social media are a hidden, nonetheless an out-in-the-open version of ...Read full article...

Este es el Precio de la Comodidad y Conectividad

La conectividad y los avances tecnológicos no tienen que ser arriesgados. Está en las manos de los consumidores el exigir que su privacidad y seguridad sean protegidas. Imagine un mundo en el que se está conectado con cualquier cosa cuando lo desee. Imagine un mundo en el que ni siquiera tiene que pensar en lo que quiere, porque la Internet de los Cosas (IdC) está siempre dispuesta a pensar ...Read full article...

Google in a War on Media Freedom

A previous article explained Google’s transformation from search engine to online censor. Changes in its search algorithm makes it harder to access what it calls fake news, low-quality information and conspiracy theories – code language for real news, information and analysis it wants suppressed. In cahoots with US dark forces, it declared war on RT and Sputnik News. RT is the most widely viewed news on Google-owned YouTube, now ...Read full article...

Why People Will Happily Line Up to be Microchipped Like Dogs

So…some people actually want to be microchipped like a dog. They’re lining up for it. They’re having parties to get it done. It if isn’t available to them, they’re totally bummed out. I’m not even going to venture into the religious aspect of having a microchip inserted into a human being. Let’s just talk about the secular ramifications. Certain folks won’t be happy until everyone has a computer chip implanted ...Read full article...

Bluetooth Flaw Makes ALL Your Connected Devices Hackable

In case you don’t have enough to worry about with hackers getting into our power grids, cyber attacks taking down entire countries, and epic natural disasters, a newly discovered Bluetooth flaw makes nearly all devices that are connected subject to hackers. BlueBorne is an attack vector that could affect billions of devices. If you’re running IoS, Android, Windows, and even Linux, your devices could be at risk. Using BlueBorne, ...Read full article...

Geoengineered Environmental Disasters?

Were Hurricanes Harvey and Irma natural or engineered? It’s unclear. Geoengineering makes the latter possible. So-called High Frequency Active Auroral Research Program (HAARP technology) manipulates the atmosphere, climate, and weather for military purposes. Based in Gokona, Alaska (officially closed down), what’s likely still ongoing secretly there or elsewhere is a jointly managed US Air Force/Navy weather warfare program. A no longer operating HAARP web site earlier called the technology ...Read full article...

Behold, the Magic Lab pills that will pass as Food

We’ve all seen it before. Magic vaccines that prevent disease, magic pharmaceuticals that promise to treat and cure those who are ill, magic diet pills that will make you lose pounds in a matter of days or weeks. We have also learned about soylent green. If you haven’t make sure you check it out. It is all about swindling desperate people so they make desperate decisions. It is about ...Read full article...

Google Plans to Release 20 Million Infected Mosquitoes in California

Sometimes you have to think that scientists don’t ever read science fiction, and thus have not even contemplated all the things that could go wrong when they do something like creating 20 million mosquitos in a laboratory, infecting them with a bacteria, and then releasing those mosquitos in Fresno, California. First of all, did you even know that Google had a bio-lab?  They do and it’s called Verily. Which, ...Read full article...

American Tech Giants don’t want an Open Web

Facebook, Google and Twitter use the name Net Neutrality to push for a tighter, more monopolised Internet while claiming they seek  to protect an open environment. Dozens of technology companies allied Wednesday to protest against the proposal by the government of Donald Trump aimed at limiting net neutrality. The term that seems to promote a more open web actually does exactly the opposite. It facilitates monopolies and limits information ...Read full article...

How a Massive Cyberattack Could Happen To Us

The Petya Ransomware attack hit globally, but one country, in particular, was devastated by it. The Ukrainian infrastructure was brought own by the attack, where the epicenter occurred, and now, experts are suggesting that it may have been deliberate and state-sponsored. The ostensible purpose of all that damage was to make money — and yet there’s very little money to be found. Most ransomware flies under the radar, quietly collecting ...Read full article...

Petya Ransomware Cyberattack: “There is no Kill Switch”

Remember that Eternal Blue loophole created by the NSA? Well, it has been employed again in the launch of the Petya Ransomware Cyberattack. Thanks, NSA. The attack began earlier today and has crippled some major companies across the globe. No one has taken responsibility for the virus, and according to Matthieu Suiche, the security researcher who helped fight the WannaCry attack earlier this summer, “There is no kill switch.” Suiche ...Read full article...

Are you addicted to Sharenting?

It is becoming more common for parents to share pictures of their children – sharenting – since they are babies. Many do it innocently but experts warn of future dangers. The trend is now labeled as “Sharenting” or the out of control desire that parents have to expose their children on social media. According to the British Collins dictionary, the English term sharenting is “the practice of parents to ...Read full article...

This is what a Quantum Computer Could do for You

The use of quantum computers could spell the end of privacy and security. Everything a computer does today is based on a series of zeros and ones. These two digits are capable of being combined to store or process information. It has been like this for decades, though scientists have been trying to make the next leap, quantum computing. In a quantum processor things are different due to the ...Read full article...

The Exponential Growth of Insecurity

There is no such thing as cyber security. The only choice is more security or less security, as the recent hack of the National Security Agency demonstrates. Hackers stole from NSA a cyber weapon, which has been used in attacks (at time of writing) on 150 countries, shutting down elements of the British National Health Service, the Spanish telecommunications company Telefonica, automakers Renault and Nissan, Russia’s Interior Ministry, Federal ...Read full article...

Technological Innovation will make you Retire Earlier

The losers will be those who work to live, those who simply go to work every day to carry out tasks that do not satisfy them at all. Three American entrepreneurs founded Marble two years ago. In the heat of cars driving alone, they saw an opportunity in short-distance logistics. Based on robotics, artificial intelligence, GPS and endless new technologies they created a robot that, seen from the outside, ...Read full article...