swordfish

Concerns With Ancestry.com

Ancestry.com has been in the business of personal genetic-tracking for a while – allowing many consumers to discover their ancestry for an approximated cost of $100. And while some consumers may be eager to find out about their ancestry background, most of them are scared of discovering certain genomes that are disturbing. However, most sceptical […]Read More

How Hash & Salted Passwords Keep Your User Account Protected

One of the most important tasks a web developer may have is creating a secure user account system. Your users need to know that their passwords will be protected and not hacked. However, as hackers never sleep and are constantly finding new ways to exploit weaknesses in your system, you need to find a good […]Read More

Chinese Social Credit System Explained – Why it Should Concern

Imagine this situation. You are getting ready to board your plane when the flight attendant stops you at the entrance and says, “I’m sorry sir, but we can’t allow you to board this flight, your social credit score is not high enough”. Wait, say that again. If this sounds dystopian to you, that’s because it […]Read More

WikiLeaks Exposes CIA Malware Targeting Your Favorite OS

If you’re using a computer (and if you are reading this article, there’s a high chance that you do), you probably have a favorite operating system that you are willing to defend (hopefully just verbally) against users of other operating systems that say theirs is the best. It’s an old age debate as to which […]Read More

Cyber war Programs and Why the CIA is Actually Playing

When Donald Trump announced that he will run for president of the United States a lot of people didn’t give him much chance. Sure, he was well known, but mostly as a somewhat controversial business magnate, not as a politician. Then, when he won the election on November 8, 2016 and was formally elected by […]Read More

CIA Agents Based in Frankfurt are Given Diplomatic (“Black”) Passports

Last year, WikiLeaks released 8,761 CIA documents containing interesting details about the technology, malware, viruses and other exploits and zero day vulnerabilities that the Central Intelligence Agency (CIA) is using. One interesting section of this document, titled Vault 7, details how the CIA is using the United States consulate in Frankfurt, Germany as a covert […]Read More

CIA can Spy on You via Your Smart TV, iPhone

Are you being careful about what you say when you talk with someone on your iPhone or Android device? Or even when you watch something on your Smart TV with your family in the living room? Well, it turns out you should be. According to leaked CIA documents, which we now have insight into thanks […]Read More

Intel’s x86 Hidden Control Mechanism

Have you ever thought, “My computer has a mind of his own!” or said these words while working on it, “I didn’t tell him to do that!” If that’s the case (and I know from personal experience it’s true for me), then you probably won’t like to hear about what is hiding in your Intel’s […]Read More