The Alphabet: What Are We Going To Get?

image

Oh dear, what is this supposed to mean? Are we witnessing the very birth of the notorious SkyNet, but this time in cheerful colors? For what is worth, Google is transforming into the Alphabet. Or, maybe it is better to say, Google has grown so much that it has become something else.

This Alphabet is going to include everything and anything, from the Internet to investments, and rocket science development programs. The last one was supposed to be a joke, but this does not mean we are not telling the truth. Or, let us put in this more simpler way.

Everything you may need from A to Z, Google will be happy to provide. At the same time, Google wants to prove a point that you can still make money in the brave new cyber world, with no need to use Machiavellist approach or methods. It really sounds like a dreamland at the end of a rainbow.

And, corporations will continue to grow, until one day they swallow the entire world, and we are going to be served as a dessert. And, there is nothing we can do about it. In the latest Terminator movie, the notorious SkyNet has a new name. No, it is not the Alphabet, but there are some striking similarities.

Android Lock Patterns = Passwords

image

It is really hard to believe that the ALPs or the Android Lock Patterns can be unforgivingly ridiculous as the ones, we have had a chance to examine for our good old passwords. When it comes to passwords, you can create an endless list of the easiest ones, you can figure out in a second.

Do we have to remind of some of the golden hits, such as 12345678 or the password as a password itself? Well, the same pattern exists among the numerous Android users. There are very few common patterns, which can allow you to unlock almost any smartphone. What is your excuse?

It seems that we are helplessly lazy and reckless, when it comes to our passwords and lock patterns. Then, if you do not want to learn it the easy way, the hackers will make sure you will remember it the hard way. Is there nothing we can do about it, for real? Have not you learned a thing, so far?

For some users passwords or smartphone lock patterns are obviously not necessary. Having a poor and a weak password or lock pattern is just like you do not have any. And, at the end of the long security day, you have the nerve to complain about the unsatisfactory state of cyber security.

China vs China

image

China has arrested more than 15,000 hackers and cyber criminals. When you have almost 1,5 billion of your own citizens, this really seems like a meaningless drop in the ocean. Or, everything and anything has to be huge and impressive in China, including the number of hackers.

On the other side, there are quite raised eyebrows and suspicious faces that this battalion of arrested hackers is not going to end up in prison. What is that supposed to mean, exactly? Well, China has quite a notorious reputation for its numerous and merciless hacking teams.

It is not an unimaginable thing to witness Nikita scenario for Chinese hackers. It is better to work for the Chinese government or military things you are doing best, than to dream about computers from your cell in some God forsaken province. It is not much of a choice, is it?

So, what is China supposed to do, in order to gain our trust? Even if they arrest 150,000 hackers, we are still going to be suspicious, aren’t we? We sure hope China is doing some serious job in this field. Otherwise, hackers can easily hack the entire China one day. We are not exaggerating.

The Nature vs Google

image

Google is probably the most powerful cyber “thing” known to men. However, nothing and no one can be even compared with the mysterious and overwhelming powers of the good old Mother Nature. Do you still have some doubts about this claim? Then, listen to this story.

Google data center in Belgium experienced it first-hand, what it exactly means when the Mother Nature gets angry. Despite the latest state of the art technology and protective measures, it only took a couple of thunders to compromise Google’s data protection policy and strategy.

There are quite a few invaluable pieces of information, which were irrevocably lost due to this unusual accident. It turns out that the thunder strikes are the most serious types of data attacks, after all. And, what could be the most suitable moral of our story about Google and the Mother Nature?

Well, it depends who or what you favor more. Either way, despite its unparalleled power and size, Google still has to tremble on the stormy weather, just like the most of us, the mortal ones. We have to wait a little bit longer, before being able to challenge the Mother Nature with no consequences.

iOS 8.4.1 vs TaiG Jailbreak 

image

The new IOS 8.4.1 update is already here. So, what is this going to be all about? Well, the most important characteristic of this update is its anti-jailbreak feature. If you are using an iPhone, which made friends with the TaiG team, then you should be aware of this change.

Otherwise, all of your apps and everything else, which work, thanks to a jailbreak will be in trouble. So, what can you do about it? Well, you can just avoid this update, and your jailbreak will be just fine. However, there is a bigger story in the background. Can you dare to guess what it is?

For what is worth, one serious rumor has it that the IOS 8.4.1 update was a rehearsal for the main thing called IOS 9. Apparently, this latest IOS will be jailbreak-proof. This is a little bit too easy to say. Let us wait what TaiG team has to say about this tempting challenge. Can it be done?

We have no other choice, than to wait and see for ourselves. Maybe Apple just had enough of this jailbreak thing. Now, they want to end it with the new IOS. Well, good luck with that. There are quite a few jailbreak experts, who will hardly resist this challenge. Let the jailbreak games begin.

$32 For 32 Million Problems

image

The latest DefCon event witnessed one both surprising and disturbing presentation. Just when you dare to think that you are safe from harm, there is a gadget to spoil the fun. In this case, we are talking about the RollJam. So, what is this notorious and affordable gadget all about?

Well, according to his inventor and numerous successful tests conducted at Ford, Toyota, Volkswagen, Chrysler, Nissan, and Lotus models, you can unlock a car or even a garage, with this little “helper”. In other words, with something worth only $32, you can steal the other thing worth $32,000 or more.

There is only one thing we can do. We should offer a job to RollJam’s inventor as soon as possible, otherwise we are going to end up in a serious trouble. It is simply amazing that someone can make this kind of a cheap device, which can steal so efficiently our car and garage lock codes.

Luckily for us, this brilliant mind has decided to present its dangerous gadget at DefCon rather than some real Grand Theft Auto players. Such a shame, when you can collapse an entire safety and protection system with a couple of bucks worth gadget. How inconvenient, indeed.

Private, More Private, Mozilla Firefox

image

Mozilla is eager to reshape the challenging landscape of private browsing with the new Firefox Aurora private surfing feature. What is the big deal with it, you may ask? Every single browser has it. So, what is so special about the Aurora? Well, when Mozilla says private, it really means it.

You open a new private browser, and you think that you are invisible. Little did you know that all kinds of trackers and scripts are still following you. So, what kind of private browsing is that? This is what we used to have before Mozilla decided to do something about it. And, now we are safe?

To tell you the truth, there is no privacy online. It has never been. At least not the one you are expecting to get. However, we have every right to get the privacy, when a browser claims we have it. Right? Otherwise, we have been fooled badly. And, the unwanted consequences can be devastating.

OK Firefox, we have heard enough. You can rest assured that we are going to put your private browsing stuff to a real test. We sure hope you were telling the truth. Otherwise, we cannot handle one more disappointment. That would be just more than enough. Happy private browsing Firefox cyber guys.

The False Kaspersky Decade

image

Here is a serious trouble for Kaspersky busy little bees. Two of its former employees had some troubling and compromising accusations to share with the rest of the world. According to them, Kaspersky has manufactured intentional malware for more than a decade. What for?

Well, this just could not be more obvious, could it? This is a nice way to hit two targets with a single bullet. On the one side, you can discredit your competitors, while at the same time, you can present your solutions as the most reliable and efficient ones. Sounds like a perfect plan?

We are not quite sure, if these former employees are telling the truth, but the damage has already been done. Now, Kaspersky has a lot explaining and convincing to do. The biggest trouble of them all, is that we keep asking ourselves the same question, all over again.

Can Kaspersky really do such an unfair thing? It is just like you are selling the cure for a disease you have previously created, as well. We just cannot wait to see what is going to be the most probable outcome of this security scandal. Have you really done it Kaspersky? Is it really true?

175 Million Reasons To Be Worried

image

We all know that Windows Server 2003 retired. This not a good nor a bad news. This is how it had to be, eventually. This platform did a remarkable job, and it was about time for it to enjoy the careless retirement days. Unfortunately, the users themselves are still trapped in time. How?

Well, for what is worth, and it is obviously worth a lot, more than 175 million websites worldwide still depend on Windows Server 2003 architecture. In the cyber world, the most serious consequence associated with retirement is an inability to get updates. Any kind of updates.

Especially the ones related to security. In plain English, you are using an outdated platform with the obsolete security measures, the hackers have had plenty of time to study and prepare for thoroughly. So, what can we do about it? We should embrace new systems. This is obvious.

Yet, our laziness, and unwillingness to invest in improved systems, are responsible for this problematic number of almost 200 million websites. That is almost an entire continent of websites, which are left on their own. Grandpa Microsoft is in trouble. Its retirement plan does not work.

Thunderstrike Firmworm: A Mac’s Cyber Thorn

image

You do not have to be an outstanding computer genius or a cyber guru to know that Mac computers are considerably safer platforms compared to Windows. However, some busy little expert bees have decided to put this claim to a test. So, what were the results of this “experiment”?

This is how the so-called Thunderstruck Firmware for Mac computers was born. Its name says it all, does not it? Its ability to hide in the firmware section, combined with the ability to be set remotely makes it to be a formidable security threat. So, what can we do about it?

You can relax, there is also another group of busy little bees at Apple, which is fixing this problem as we speak. On the other side, you should be wiser, and do your best to avoid any suspicious links. How hard could it be to follow this simple advice? Otherwise, you are going to be hit by the Thunderstrike.

There is a sad conclusion. Which one? Well, it seems that there is no safe cyber place for us. Everywhere you look there is a trouble or a threat waiting for you around the next cyber corner. Yet, if you play smart and according to the rules, you are going to decrease the chances against you, at least.