Trojan horse scanner pitch is a sneaky worm
Trojan horse scanner pitch is a sneaky worm
You know, even when it’s a pitch for a trojan scanner, why would anyone install something that was sent to them unsolicited?
Follow these topics: Tech
Trojan horse scanner pitch is a sneaky worm
You know, even when it’s a pitch for a trojan scanner, why would anyone install something that was sent to them unsolicited?
Follow these topics: Tech
Rick does a good job of describing how he can look at this email and determine that it’s a scam, but maybe this is the easiest one: “Finally, if AmEx is going to give me a credit, they will just credit the account, and explain the credit on the account page. There are other clues;…
Those of you who follow me on Twitter could probably guess that yesterday was the first Podcamp Ohio “Unconference”. I haven’t actually been to a podcamp before, but I’ve certainly heard plenty about them from following tech folks online, so I was looking forward to the chance to attend one locally. At first, I think…
It’s easy to point at the Facebook or Google’s of the world, and blame them for violating our privacy when they’ve been tracking our personal information all over the web, but it’s not just them. It’s also all the organizations that promised us the data they were tracking was “safe” because it’s all aggregated and…
I just got done listening to a round table discussion of UCITA. Now I’ll grant you, I don’t know alot about UCITA, but just using common sense I would have to question the ideas presented by the pro-UCITA people. (Who work for AOL by the way, but that did not make me anti-UCITA immediately *L*)…
This is an interesting story, because it demonstrates just how much information smart home devices may have, and how various government interests are going to try and access, and interpret, that data. It also raises some interesting questions about how that data could be hacked by non-official parties. Are we really going to believe that…