Editorials

Editorials (446)

A couple of days ago Google started pushing encryption for e-mail. No, we are not talking about the typical https connection required for Gmail. We are talking about actually encryption of email as it moves from server to server using…
This morning as I was cursing through the internet news sites I noticed a trend. I saw multiple articles about the state of security all of them claiming that the bad guys a winning or lamenting about the increase in…
Whenever a new game hits the streets you can bet there will be a less-than-legal copy either right before, or right after. This was the case with the new game "Watch Dogs. Shortly before the retail release there were multiple…
Irony is described by Miriam Webster as: a situation that is strange or funny because things happen in a way that seems to be the opposite of what you expected. This is exactly what we have in the current (and…
Microsoft is a company with some serious identity issues, at least they have become a company with identity issues. It seems that they do not really know where they want to be or where they belong. Looking back at their…
Unless you have been living under a rock you have probably heard all about ISPs asking the FCC (Federal Communications Commission) for the right to charge premium fees for prime access across their networks. The argument started when Comcast was…
The anonymous social networking app Secret has been finally released for Android users. Now, if you have not heard about this then let me give you a short overview. Imagine Facebook where the images, posts and links were not related…
Playing slots on mobile phones isn’t something new. But being able to play slot machines on your smartgadget outside New Jersey and Nevada – the only states in the US that allow online gambling – is something that can change…
Malware and breaches are inevitable. Anyone that has been in security knows that this is a simple fact. Every day there are hundreds of attempted (and successful) attacks executed against businesses, consumers, and the government. These attacks have been traditionally…
The big news today is that Google is preparing to encrypt their search data. They are planning to automatically encrypt not only the connections, but the information sent back to the user. On the surface this would seem to be…
Wednesday, 12 March 2014 13:39

Is It Time for an Internet Bill of Rights?

Written by
We talk a lot about privacy, net neutrality, digital right and other topics that have become more and more important over the last few years. As the internet becomes the defacto way we communicate these items HAVE to be addressed…
Sunday, 09 March 2014 12:49

What is Modding?

Written by
Modding. Technically, it means modification plain and simple, and is done to improve performance in some way, aesthetics or both. I could talk about modding in general, as it applies to everything from tools to cars to everyday household items,…
During the days leading up to CES 2014 there has been a lot of talk about how much the show has changed. Although tagged with the Consumer Electronics Show label the show is becoming dominated by items that, while loosely…
Steve Ballmer’s resignation was no shock to anyone that has been following Microsoft for the last few years. After far too many slips and mistakes the board and many investors felt it was time for Steve to go. Now the…
Thursday, 17 October 2013 19:53

There’s gold in them thar exploits

Written by
In a career that has spanned over 20 years in IT I have met a lot of people from different industries. Many of these people I have not kept in contact with and some I have. Occasionally when talking to…
“Hope. It is the only thing stronger than fear. A little hope is effective. A lot of hope is dangerous. Spark is fine, as long as it's contained.” – President Snow, “The Hunger Games,” Lionsgate, 2012 If it weren’t for…
Page 5 of 28