blog

October 21, 2014

C.R.E.A.M.: The Internet, Telecoms, and Greed

In 1993, hip-hop group the Wu-Tang Clan released the song C.R.E.A.M., an acronym for Cash Rules Everything Around Me. How does the Wu-Tang Clan and their song about greed relate to the Internet? Clearly, you’ve never met the major telecom […]
October 14, 2014

What To Do If You Were Affected By The “Poodle” Bug

What to do if you’ve been affected by Google’s “Poodle” Bug affected SSL Vulnerability: A serious SSLv3 security vulnerability was recently discovered that can allow third parties to decrypt information being sent between a web browser and a web server. […]
October 9, 2014

Data Center Security Breaches Are Human’s Fault, Claims IBM

Never thought I’d be saying this, but the time has probably come. Yes, you know what I’m talking about—the time when it’s indistinguishable to determine whether or not something is human or robot. You’ve seen it in a bunch of […]
October 8, 2014

The US Military Is Outsourcing Data Centers to the United States?

In the most bizarrely American thing you could imagine, the United States Department of Defense (DoD) will start “outsourcing” its data centers to commercial providers here in the states. Okay, admittedly “outsourcing” might be the wrong word, but it’s no […]
October 7, 2014

China’s Cyber War

We talk a lot about cyberattacks, hacking threats and security breaches, and it’s all gathered under the banner of “cyber warfare”. But what is happening in China—Hong Kong, specifically– is literal cyber war. Waging a War Online For those unfamiliar, […]