go to sections menu

The Technology blog and podcast

This is for the technology blog and podcast Commentary, articles, and podcasts

header picture for Ingegno theme

You are here: March 2019

Go to Homepage [0], contents or to navigation menu



These scammers claim to have videos of your most private moments

I believe I’ve covered this from time to time, but in an article These scammers claim to have videos of your most private moments and I think I’ve covered this in other articles.

The article talks about how they’ll tell you that they have pictures and videos of you doing certain things, and want you to pay up or get exposed. As I’ve stated before, this particular deal has some tell tail signs.

  • Do you have a camera?
  • If you do, at the time of the email, were you doing something with that camera?
  • Do you know if your camera is patched with the most up to date software that you were aware of?
  • Do you know if there is a way for the camera to auto shut off, and do you know if it can be viewed from the outside?

I’d be asking questions, and as I said, the emails I’ve gotten were latenight, when I was in bed. Growl!

Please check the article for ideas on what else you can do. I bet there are some ideas that I haven’t covered.

Comments Off on These scammers claim to have videos of your most private moments

What has been read as of late

Hello all,

Its been a long time since I’ve posted articles, and I really thought it would be good to post on some of what I’ve read that might be of interest to you.

This isn’t an exhaustive list, and of course I’m well behind, so some may be old. For that, I’m truly sorry about that, but I really need to get reading by the looks of it.

There has been lots of talk about the DNS infrustructure in an article entitled A Deep Dive on the Recent Widespread DNS Hijacking Attacks which was penned by Brian Krebs on the 18th of February. This article, while late, is probably still timely to read, because I have a hunch that this will not be going away any time soon. This may be the future of attacks coming soon, after all other methods have been exhausted.

I don’t see a lot of Mac news, but I did see this one from Trend Micro. They have lead the way in making sure people are protected, but I’m honestly not sure about the accessibility of their Mac product. I haven’t used the windows product as of late, but MSE is all the blind are recommended to use. Trend Micro Antivirus for Mac 2019 is Certified by AV-TEST with Top Scores for Protection, Performance, and Usability is the article in question. A mac user? Blind or disabled? Tried it? How have you faired with it?

Blind Eagle, a new APT group, poses as Colombia’s Cyber Police to steal business secrets posted on cyberscoop, really did something for me, and I still want to talk about this one on the podcast. What really set this apart for me was the following short paragraph.

The most recent attack outlined in the research occurred on Feb. 14. The phishing email appeared to come from the Colombian National Civil Registry, and
was aimed at the National Institute for the Blind.

Why in the world would anyone want to go after a blindness institution? What did the institute do to the group to cause them to go after them? Blindness related agencies do not have the money to be able to defend from you, because they don’t make a whole lot. No wonder it is called blind eagle. Wow!

Next, the health industry has continued to take a hit with an article I saw and intend to talk about as well. U. of Washington Medicine learned it exposed info on 974k people after a patient found their data on Google was penned on CyberScoop and this can’t be good. Seems like this is an ongoing trend, and now the info is out on a search engine.

In the good news department: Russian hacker accused of creating NeverQuest malware pleads guilty and Third suspect in Methbot, 3ve case to plead not guilty after extradition from Malaysia have been published on Cyberscoop and a step forward. We also have Former Russian Cybersecurity Chief Sentenced to 22 Years in Prison posted to Krebs. Great news and again, a step forward. I love to see such stories.

Finally, we continue to see breaches, and I think if nothing else in the bad news department: Payroll Provider Gives Extortionists a Payday was posted to Krebs. Guess the payroll provider really wants to pay, don’t they?

I don’t want to post every single item, this post could get lengthy, but this is just some what I’ve read as of late. Anything from here catch your eye? Let me know!

Comments Off on What has been read as of late

The technology podcast, podcast 306

Hi all, I’ve neglected to let you know on the blog about podcast 306’s publication. Its up on the RSS feed and livewire/ground zero for those on there.


On this podcast, we’ve got braille transcription, talk on articles of varying degrees, and does anyone have any common sense?


It was posted on the 23rd of February.

I’m usually pretty good at making sure that the blog gets updated, don’t know why I didn’t do this then. Oopse!

Comments Off on The technology podcast, podcast 306

Whose Line Is It? When Voice Phishing Attacks Get Sneaky

The topic of phishing and more specifically voice phishing is not new, but this is clever. I know I’ve not posted to the blog as of late, and I’m back to change that.

Going through twitter, I found this article, and I think it worth the read. Always something new to learn.

Researchers investigate malicious apps designed to intercept calls to legitimate numbers, making voice phishing attacks harder to detect.

Source: Whose Line Is It? When Voice Phishing Attacks Get Sneaky

Comments Off on Whose Line Is It? When Voice Phishing Attacks Get Sneaky

« Newer Posts

go to sections menu


navigation menu

go to sections menu