What if We are Losing Cybersecurity War?

What is Cybersecurity?  Is it the way one uses and defends their data and systems? CISA the government agency (not my certifications Certified Information Systems Auditor by ISACA) … I know confusing right? https://www.cisa.gov/news-events/news/what-cybersecurity  I like to show you the full link so you know where you are going(not like phishing scams). Cybersecurity is explained … Read more

Clickjacking to Farm Facebook “Likes” Porn Pics are Bad

What is Clickjacking? “Porn sites are stuffing SVGs with clickjacking code to farm Facebook likes” refers to a specific type of cyberattack involving both SVG files and clickjacking techniques.   Above image is from Malwarebytes post…  if you notice (I did not make it a large image but it claims the images are porn images … Read more

Google Claims AI Agent Found Zero Day Vulnerability

Out of a Record.media story where Google “Big Sleep” AI tool found a vulnerability that was not yet uncovered. The white paper referenced by Google discusses how to use AI agents in a hybrid defense in depth approach: Building on well-established principles of secure software and systems design, and in alignment with Google’s Secure AI … Read more

Do you have a Wifi alarm clock?

iank.org says they have serious flaws specifically the Loftie alarm clock This is apparently in the alarm clock file structure: $ strings config.arm64_v8a.apk … assets/icons/clock.svg _setClient@91206165 _TapStatusTrackerMixin@113288344 https://fwbek2lb0a213kbewqoit.byloftie.com/Loftie_EVT.bin # <——- get:digitMatcher ListTileThemeData get:endOfFrame _drawPicture@15065589 … If you notice the weird address in the file: fwbek2lb0a213kbewqoit.byloftie.com This kind of programming is not a good idea.  her … Read more