by Greg Scott | Oct 15, 2024 | Cybersecurity
In a DDOS (Distributed Denial of Service) attack, somebody orchestrates lots of systems to flood a victim with traffic, denying internet service to the victim. One popular attack is called a SYN flood. I had heard about different DDOS attacks, including SYN floods,...
by Greg Scott | Aug 10, 2024 | Cybersecurity
DCIM\100MEDIA\DJI_0141.JPG – from Jan Wildeboer’s camera I liked what Jan Wildeboer had to say about the xz-utils and Crowdstrike incidents so much, I asked Jan’s permission to paste it as a guest blog post right here. I made one minor formatting...
by Greg Scott | Jul 1, 2024 | Cybersecurity, Slice of Life
I started using Facebook back in 2009. A few friends greeted me. It was fun. I connected with my sister, T, and her family in Idaho and we’ve traded hundreds, or maybe thousands of messages since then. T was 11 when I was born. She spent much of her teenage...
by Greg Scott | Jun 28, 2024 | Cybersecurity
Like nearly all sensational data breaches, the public will probably never know the root cause of the Great United Health Group data breach of 2024 that exposed medical information for millions and millions of Americans. But after following data breaches for a long...
by Greg Scott | Jul 9, 2023 | Cybersecurity
Back in 2019, I followed somebody on Twitter and they tried to entice me with a private message sex reference. Happens all the time – surely it’s not somebody probing to groom me – must be my masculine physique. Yeah, in my dreams. 🙂 But I answered...
by Greg Scott | May 1, 2023 | Cybersecurity
The very first thing I learned about cybersecurity was, learn to think like an attacker. And since online grooming is a cybersecurity problem, if I want to to understand how today’s traffickers find online grooming victims, then I need to think like a...
Recent Comments