-

Geek Squad Email Scam: How to Spot It and What to Do
In 2025, the Geek Squad scam is still around and it’s more convincing than ever. The official-looking messages, familiar branding, and just enough personal detail can even fool the careful. To be clear: Geek Squad is Best Buy’s legitimate tech support service, but scammers exploit its good reputation to deceive their victims. In this guide, Read more
-
Secure Public WiFi: Wireless Security Tips
San Jose will be launching a free WiFi service to its residents starting in the summer of 2012. The free, unsecured municipal WiFi in San Jose will be free to the public and secured for the government. As the public facing free WiFi service is unsecured, it is up to the user to enable wireless Read more
-
Pullin’ a Rabbit out of a Black Hat
Step 1 – Hack a computer. Step 2 – ? Step 3 – Profit. In the past, step 2 generally consisted of several intricate steps that required a significant amount of effort and skill. Even if a system was filled with valuable data, it was highly unlikely that any of said data was actually valuable Read more
-
Interview with nanotube, founder of the Bitcoin-OTC, IRC’s Marketplace on Bitcoin, Multisigs and Security
The peer to peer (P2P), anonymous crypto currency with cash-like properties known as Bitcoin has quickly become a formidable payments medium in contemporary society. New products and services are born almost daily as these cash-like payments have created new ways to conduct business online. I had the opportunity to speak with Daniel Folkinshteyn, founder of Read more
-
Windows, Mac OS X, and Linux Applications can access your Photos, Contacts and Data too!
The recent privacy debacle surrounding third-party iOS applications and Android applications has garnered serious attention. Researchers have discovered that minimal to no permissions are required for applications on these devices to access one’s contacts, photos, and other considerably confidential data. However, the fact is, this lack of a permission-based implementation has existed in almost all consumer-based operating Read more
-
Cloak and Swagger: A Brief History of Anonymous Identity Protection on the Internet
Anonymity has proven itself a vital property of society. Dating back to the beginnings of time, anonymous writings have been found in many great literary works, including but not limited to Cave Paintings, Hieroglyphs, The Bible, Tom Sawyer, as well as the same Federalist Papers that helped in the ratification of the US Constitution. The Read more





