Can you imagine this worst case scenario? Your password manager just got hacked. That is the trouble with a strategy, let me put all of my eggs in one basket. On the other side, what other real options do we have? They say, do not use the same password for all of your various devices.
OK, we got it, but who is going to remember dozen of different passwords. Now, you see what is the big problem here. When it comes to the password managers, we expect from them to be bulletproof in terms of flawless cyber security. When they fail, what are we supposed to do?
Passwords are going to be our most annoying problem for quite some time. We are literally helpless. Every now and then, you hear about the more or less successful innovations in this field. There are some experts, who are suggesting us to use Emoji symbols as a password alternative.
Can you believe it? How about body implants? Can this work for you? Do we really need to trade our privacy for an adequate password? The more we talk about passwords, the more frustrated we eventually become. Should we use the word password for our only password?
OK, we got it. We are not rocket scientists, but we know for sure that a password based on Emoji symbols is actually a picture-based security measure. It makes a perfect sense, doesn’t it? This new type of password is supposed to be a tougher challenge for hackers.
For what is worth, thanks to Emoji, we have more combinations at our disposal to play with. On the other side, we could not help ourselves noticing one obvious practical problem. How we are supposed to remember our new Emoji password? This is going to be a little bit harder, than it seems.
If you want a strong password, then you will have to use quite a few Emoji symbols. Very different ones. Right? Which eventually brings us back to the very beginning of our story about the bullet-proof passwords. Do we have to use a special program to memorize our Emoji passwords for us?
We are pretty much convinced that some reckless users are the perfect match for the category called the helpless-cyber-security-cases. Someone will just put six or eight smileys in a row. And, that will be it. The Emoji version of a password for the password.
Here is the thing with the cyber security experts. They talk too much. When you ask them to give you a couple of life saving tips, this is what you get as a result. The very first thing you are going to hear is that you should always walk on the safe side of the cyber cliff. What is that supposed to mean?
Use only legitimate software. Avoid suspicious websites. Do not do anything foolish while being online. Seriously? It is just like they are referring to the regular users of the notorious Silk Road. What else do these brainiacs have to share with us that can improve our security?
We are supposed to forget about all those ridiculous passwords, which include among other hard to believe “crown jewels” of pure ingenuity, such as password, 123456, 123456789, iloveyou, and similar. Do you feel safer already? What is the moral of this story about the top cyber security secrets?
Well, either these experts were in the bad mood mode, or we, the users, are helplessly naive and reckless. Maybe, we can really strengthen our cyber security position, with a few simple steps, we fail to apply over and over again. Maybe, the image in our cyber security mirror is too scary to look at.
Is there at least one place in our brave new cyber world, which is safe from hacker’s harm? We have seen quite a few troubling things, and heard so many horrific stories, but this is simply too much to handle. Now, our precious web browsers are not going to be left aside, “thanks” to the so-called browser hijackers.
The use of the term hijacking, says a lot about this extremely annoying cyber menace, doesn’t it? Someone hijacks your browser in order to change its settings without your knowledge nor permission. So, what do you get as a result? Well, you do not have to guess twice, do you?
Your browser is very likely to pump up some website’s search results or even worse to steal your privacy and logging data. Unfortunately, this is almost a fully legitimate way to do some illegal things. There is more. This is not the worst thing about the web browser hijackers. Can you guess what it is?
It turns out that you yourself are to be blamed for your hijacking situation. You have installed some completely unnecessary piece of software or you have followed some naughty link. Either way, no one hacked your browser in a traditional sense. Remember that. Prevention is still the best cyber defense.
What is the use of the new OS, if there are no security improvements? This is a golden, and yet unwritten rule, in the mobile world. With this shiny thought in mind, what can we expect from the new iOS 9? Well, for what is worth we are going to make a few wild guesses, based on some serious rumors.
For the time being, we have a fingerprint scanner and a four-characters-code at our disposal. These 10,000 possible combinations are obviously not enough for the busy little bees in Apple. How about a million of potential combinations of a new six-character-code? This sounds like a plan.
Sometimes is good to have your reputation at stake. Why? Because, you will work really hard to create one hell of a tough system for hackers to crack. Yes, you care about your users, but at the end of the day, it all comes down to your shiny logo, which you need to protect at all costs.
OK Apple, you have certainly caught our attention. You want us to feel safe and invulnerable. Then, we have no other choice than to put your name to the rigorous tests. We will see what was this, an intriguing ad or a serious decision to set new standards in the cyber security field.
The DARPA stands for the Defense Advanced Research Projects Agency (DARPA), or in plain English, one of Fox Mulder’s most favorite non-secret government agencies. You dream about it, they make it. The most unimaginable and crazy weapons among other things.
However, this time the DARPA’s men in black have decided to borrow some of Defcon’s strategies. If you want to earn two million dollars in two days, here is what you have to do. You or your team have to come up with a software, which has mastered the skill of superior self defense.
The intention is more than clear with this one. No price is too big to pay for the state-of-the-art software, which can withstand the most sophisticated cyber attacks. In addition, the DARPA is aiming high with this one. How high you may ask? Let us put it in this more understandable way.
The perfect software according to DARPA’s rigorous criteria is supposed not only to successfully defend itself, but also to strike back with all the power of a cyber vengeance. This is a true win-win the busy little bees in the DARPA are trying to achieve with this challenging contest.
If you are a huge Bill & Ted fan, then you definitely appreciate each and any rare opportunity to see Keanu Reeves and Alex Winter together. Yet, how about a documentary? Can this work for you? At the same time, we have not quite used to see these hilarious team in some more serious roles.
Here is an unprecedented surprise for these two. Alex Winter took care of organizing a mind blowing documentary about the so-called Deep Web. On the other side, Keanu Reeves narrated the whole thing. The final results were really impressive. They went deep into the Deep Web, that is for sure.
As soon as you hear Keanu’s voice-over, you will get this unpleasant and cold Matrix feeling. When it comes to the Deep Web aka Dark Net, you cannot make a movie with a happy end. Nevertheless, it is unreasonable to treat this invaluable part of the World Wide Web with superstition and fear.
Our hats off to these two most unlikely cyber heroes. We loved them when they used to entertain us. We should appreciate when they are trying to warn us. Our ignorance is the worst enemy of both worlds the real and the virtual one. What is the Matrix? What is the Deep Web?
There is one more than one serious rumor that the NSA messed up with the Iranian nuclear program, for real and with a success. All of that, thanks to the special stuxnet-style virus. Can you really hack someone’s nuclear facilities? Apparently you can. Do not forget the North Korea.
Do you really believe that the men-in-black in the NSA have not tried to take control over the North Korean nuclear reactors? Then, how come they have failed to “play” with the centrifuges of their reactors, just like they did in Iran? Well, being isolated has some interesting positive consequences.
How can you possibly launch a virus in the country, where there is no Internet, almost literally? The answer is, forget about it, because it is not going to work. On the other side, we have to say that this is a dangerous and reckless game played by the NSA busy little cyber bees. Why is that?
Do you also believe that the notorious North Korean Bureau 121 is not going to try to strike back? When you look at the things in this way, then the USA can look as a true candyshoop for the North Korean hackers. We do not even dare imagine the worst case scenario. How about you?
Every now and then, you stumble across something, which can be best described as the cyber-security-for-dummies. In some cases, the advice you can hear is unreliable and even a ridiculous one. However, the video we had a chance to see on YouTube was a little bit disturbing for our taste.
If you want to check it out yourself, all you have to do is type: “How to reveal a hidden password in the logging page”, or something similar. It really looks convincing, and this is something that worries us the most. So, how does it work? Here it is, if you are too lazy to look for a video.
You should use the right click on your mouse and choose inspect element option in the empty password field. Then, in the developer’s menu, you should replace “password” with “text”. According to what we have seen, this is supposed to work. We will try it ourselves, that is for sure.
What are the possible solutions for this surprising bug, if we could describe it as such? The very first thought that crosses our minds is to make sure your computer does not end up in the wrong hands. On the other side, should we cancel the inspect element option from our browsers?
Oh dear, you have been so naive. For some childish reason, you thought that the modern day viruses are not going to develop and evolve. You really need to be one hell of a brainiac to come up with a successful malicious software solution. The call of the dark-cyber-side can be a huge temptation.
Meet the latest, brightest and deadliest member of the growing malicious family called – Rombertik. This fellow has a remarkable AI potential. Some even dare to classify it as a self-aware malware. So, what does it do? What is so special and dangerous about it? Are you ready for some bad news?
Well, while at “work” this malware is in a “regular” mode for any malicious software. It steals away your financial data, while doing its best to keep a low profile. On the other side, as soon as you run an antivirus software, Rombertik strikes back in an unprecedented way.
This malware would rather destroy itself including your precious device. Now, you get it. This is a genuine and a deadly Kamikaze virus. Unfortunately, there is no much you can do about it. If lucky enough, you can reinstall your computer. Otherwise, Rombertik will make you buy a new one.