The past few months I’ve racked up quite a few “I’d like to join your LinkedIn network” invites and I can assure you that I am extremely hesitant when these invitations arrive. Many newly created LinkedIn affiliate interlopers have zero to two first degree connections (in contrast to my connections.) Though I am suspicious by nature when connecting to strangers on social media, I am also curious as to what the new (potential) contact hopes to achieve...Read More
Using public wifi without a VPN (virtual private network)? If you are not using one—you should be.
Perhaps Kashmir Hill says it best:
. . .a VPN is like a condom for Internet use. When you use a VPN, it creates a private encrypted tunnel that your Internet requests are sent through, re-routing your activity through a server controlled by your VPN provider rather than over a shared wifi network...
I’ve been spending a great deal of time thinking about our government, Snowden revelations, mass surveillance, data breaches and the like. During the interim—I also burned through two startups. It has not been an easy road on a financial basis—if anything, it has taught me to question what is happening in the world around me.
Due to a recent (real life) nightmare that I had, I felt compelled to blog (after an almost three month hiatus from writing...Read More
Recently, I became aware of a prodigious stealth-mode Twitter botnet that contain upwards of 3 million user accounts, alongside two other botnets that total 100,000 bots. Kudos goes to SadBotTrue security researchers who first disclosed botnet findings at their blog earlier this week.
Stealth Twitter botnet
According to SadBotTrue, this particular botnet is the most active and most undetectable botnet in existence on Twitter today.
SadBotTrue states at their blog:
All the accounts are protected...