I've been a fan of Liongate's Saw franchise for years, not because of the gore, but because of the stories behind the traps which influence victims' decisions. I know, many people have a hard time getting past the red room-esque murder scenes. Each Saw movie, including Chris Rock's "Spiral," has at least one sociopolitical theme that was prominent around the time of its release, though. Saw X, whether intentional or not, had some tropes that bother me. Spoilers ahead.
In 2023, the Biden-Harris administration quietly released an Artificial Intelligence (AI) Bill of Rights and executive order on securing AI. Both are quite long reads. Although I share my thoughts on them below, I recommend reading both if you're interested in the topic.
Pacemakers are one of the most commonly used medical embedded systems in homes today. With the strides in wireless networking, pacemakers have evolved into mobile electrocardiogram (ECG/EKG) machines, tracking patients' cardio activity remotely to assist doctors with heart health treatments . These now networked embedded systems are unfortunately developed without serious effort given to cybersecurity. There have been many incidents within the past decade highlighting such vulnerabilities and their potentially fatal effects.
In September 2022, Norfolk State University (NSU) released a news post announcing the IBM NSU cybersecurity partnership. This is part of Biden-Harris' White House initiative to allot more resources and professional development opportunities to students within Historically Black Colleges and Universities (HBCUs), specifically related to information technology (IT). Four months later, I was entrusted with the role as IBM NSU student ambassador. I've since completed many free IBM courses and released content in an effort to bring more HBCU students' attention to these resources. Course topics include cybersecurity, artificial intelligence (AI), cloud computing, IBM products, and more.
Starting with the basics, what is an HBCU? "HBCU" stands for "Historically Black College and University" (in the USA). How many HBCUs are there? At least 100, mostly in the south-eastern US. You likely know of the IBM technology corporation. But what is an IBM HBCU ambassador, and why is it important for native Black Americans?
Army veterans understand the importance of making sure your authorized awards match your Army promotion points, promotion point worksheet (PPW) and other paperwork. Those awards and badges provide a snapshot of your experiences. Once you leave the service, that concept is still applicable to some business ventures and career goals.
Electronic mail isn't going away anytime soon, no matter how many social media platforms and other businesses integrate private messaging systems. Below are a few tips to lessen the dread you might feel when looking at your inbox. No matter how long you wait to check, "you've got mail."
Most of what I learn about cybersecurity comes from personal research to solve issues and the ten cybersecurity specialists listed below on Twitter.
Military veterans are prime targets for personally identifiable information (PII). Businesses seek our Post 9/11 GI Bill because it's sure money. Employers see us as tax breaks. For as many benefits as we get between Veterans Affairs (VA) and the GI Bill, plenty others get an interesting bit of benefits from our presence. This is one of many reasons as to why military service members must be careful of how we share our military info.
Don't worry, non-technical folks, as I've done my best to simplify the best security practices, these days sometimes called the "Zero Trust" mindset, that I'll recommend in the key takeaways and video below. The overall solution: verify contacts supposedly from VA medical centers and community-based outpatient clinics (CBOCs).
The world has reached a point where the frequency of cyber attacks is gradually influencing people to choose security over convenience and bleeding edge technology. Many are switching from Android smartphones to iPhones or basic flip phones, sometimes referred to as "feature phones." Some are replacing Windows personal computers (PCs) with Apple MacBooks. Individuals more serious about cybersecurity are migrating to Unix-based operating systems (OSes). The reason why is simple. Windows is attacked at a significantly higher rate than macOS, Linux, and other Unix-based OSes combined because it is most prominent in homes and corporate offices. According to DistroWatch.com, there are over three hundred BSD and Linux OSes, but few are built specifically with the goal of increased high security and privacy . Two of the most interesting security-focused OSes in active development today: OpenBSD and Qubes OS.
Protecting the company's data and physical assets is everyone's job, much like customer service. Laws and regulations are reactive deterrents that require user activity to take effect. Physical and information security measures also depend on users, but no one is perfect all the time. That is where information technology (IT) solutions come in. There is a plethora of IT solutions, specifically "technical controls," which "can enable and/or amplify policy enforcement where human behavior is difficult to regulate" .
Amazon Alexa devices, smart doorbells, and Wi-Fi enabled pace-makers have a few notable similarities. First, they simplify and automate redundant, necessary tasks for many Americans' lifestyle, security, and health. Second, they're all available at an affordable price, even after the COVID-19 pandemic. Most importantly, they're extremely portable wireless technologies capable of communicating with common consumer electronics including personal computers (PCs) and smartphones via wireless and cabled connections. That is the glory of “smart devices,” formally known as Internet of Things (IoT) devices.
Congratulations, you've graduated from your university and are looking to capitalize on your new credential. Hopefully, you've done all of the things. Before you ditch your school login credentials, there are few things you should do first.
Drupal is quite secure from the start. Admittedly, I don't have deep experience with the Drupal content management system (CMS). I've only used it for testing features and comparing workflows to other website builders and applications. I like the Burndown kanban Drupal module. I know enough to help a new Drupal site owner who understands the importance of being proactive with website security. Below are some basic security recommendations.
This is not an inside scoop. It is a hypothetical case.
If you actively work on information security (InfoSec) at any point, you'll end up working on a disaster recovery (DR) and business continuity (BC) plan to maintain operations when the unexpected happens. You'll likely improve your system backup process or add security features. Hopefully, you at some point realize address the need for a backup plan in case your primary IT solution shuts down permanently.
Whether you're starting college or working on a new business, you'll benefit from applying basic best security practices. I'm going to simplify everything you should have on your personal computer (PC), why, and with recommendations so you're not left to figure it out on your own. Follow this cybersecurity guide and become less likely to be a victim.
I've learned a lot about how black entrepreneurs approach digital marketing since starting to support black-owned businesses, starting with D'iyanu, a few years ago. After purchasing products from over a dozen black-owned small businesses, I've realized some common mistakes that I'd like to share with everyone. I hope this helps small and medium-sized business (SMB) owners rethink how they approach digital marketing.
You're likely thinking one of the following:
- There's not much to securing a static site generator (SSG)
- The writer is spilling all their secrets
- What is Bashblog?
Yes, Bashblog is a static site generator. No, there isn't much to securing the Bashblog SSG by default. But embedded code and man-in-the-middle (MITM) attacks can cause vulnerabilities. You still have to harden the web server, especially if you run other services on your system. And to be fair, everything I mention below is public knowledge, if you know where to look. I'm going to show you where to look.
I know quite many people who love WordPress. I'm talking the self-hosted WordPress.org website builder you have to install on a web hosting server, not WordPress.com. But I don't hear them talk much about WordPress security.
I've mentioned some of the stuff below in other blogs about my favorite WordPress plugins and unnecessary plugins. And I don't want this to be verbose. So I'll try to keep everything straight-forward for newbies.
Falkon, formerly known as Qupzilla, is a Chromium-based web browser for the KDE desktop environment (DE). Qupzilla was buggy and crashed at random when I tried it as a Linux newbie years ago. Falkon is a stable browser that makes compliments my needs for privacy and user experience (UX). I recommend it for anyone looking to try something new. Below are my four favorite Falkon browser features and extensions.
RIPEMD (RIPE Message Digest) isn't as popular as SHA and MD5 for creating cryptographic hashes, or checksums. But I got curious after reading about it during some cybersecurity training. The
sha (256, 512, etc.) command-line hash (CLI) tools are pre-installed on many Linux distros. But I didn't see one for RIPEMD.
After reading "It's Time to Stop the Victim Blame Game" on DarkReading.com, I had to rethink some of my personal shopping rules. This part stuck out to me:
I watched this move twice before starting this blog. I’d watched it four times by the time I finished it.
Okay, Upgrade movie.
I’ve played with a lot of WordPress plugins. Some were good for convenience. Some were made obsolete with Gutenberg. Some became favorites as I learned how to integrate WordPress with so many different projects – podcasting, forums, school projects, web development, etc.
Below are 5 WordPress plugins I love and why.
First published on March 17, 2015
If you ever get bored, check out “Nonprofit.net/hoax – Don’t Spread That Hoax” for some random trivia, entertainment, myths, IT fun facts, and plenty of useless knowledge.
First published on May 15, 2015
Whenever you sell a computer, don’t simply leave the hard drive with all your data easily recoverable. Ensure you keep the hard drive (HD) as a backup or external drive, wipe it properly so the data can’t be recovered, or destroy it completely with hammers, drills, and other manly stuff. I was on Craigslist earlier searching for a cheap laptop to buy so I can play with Linux. I found a guy looking to sell two laptops for ~$70 simply because his ex-girlfriend changed the log-in passwords. Hard Drives – Keep, wipe, and/or destroy it. But don’t simply give it, and all your information, away for free. Your credit score and mindset will thank you later.
First published on September 10, 2015
If last weeks post spiked your interest in web security, privacy, and tracking, you should check out http://browserspy.dk/. Simply visit the site and the tabs (tests) on the left will educate you on what information your web browser is sharing.
I’m sure you’ll be surprised.
First published on September 21, 2015
Have you ever been on Facebook or Twitter and seen a short website address provided by a source that’s not completely professionally verified? For example, https://bit.ly/2AvtgLn. Called shortened or tiny URLs, it can save space anywhere, but it also hides the origin of the source.
First published on November 30, 2015
When you’re experiencing computer issues due to a failing hard drive, you have options:
First published on September 19, 2016
Adsense / Google Ads
First published on April 20, 2020
I’ve said this a few times in the past, but my goals to improve my WordPress blog taught me HTML and web design. I’ve downloaded a lot of WordPress plugins for extra features without knowing I could’ve achieved the same goal with a few lines of HTML or editing a file that already exists.
Last updated on March 28, 2017
It’s always good to know what you need to back up before wiping a hard drive, whether you’re upgrading to a newer version of a distro (generally safer) or distro hopping (which I have 5 good reasons for doing a lot of).
Here’s a cheat sheet to help ensure you don’t forget anything.