Author Archives: admin

“Brad Meltzer’s Decoded: “Mafia Alive?”

This popular show on The History Channel’s spinoff channel, H2, recently looked at organized crime and its evolution over the years, namely how organized crime has evolved with respect to evolutions in technology. Brad Meltzer had his team of investigators …

Hacking Into A Hotel Room

A thief hacked into a hotel room at the Hyatt House Houston Galleria in Houston, Texas, on September 7th and stole the room occupant Janet Wolf’s laptop. Ms. Wolf, who ironically enough is an IT services consultant for Dell Computers, …

Credit Union Infected by Its Own DVR

It was recently announced that a credit union, whose identity and location were withheld, became a victim of its very own infected DVR. Thinking they had become the victim of an outside attack, the credit union had actually posted a …

Defining Cybercrime

It’s a very commonly used word these days, but what exactly is cybercrime? According to www.technewsdaily.com, cybercrime is defined as, “Any action that uses a computer as a weapon or an accessory in crime, or when a computer serves as …

When Facebook Overstays Its Welcome

The writers at a website called TechNewsDaily.com recently published an article called, “When It’s Time to Leave Facebook”. In this article, they discuss the different kinds of Facebook users: the ones who access their accounts a multitude of times every …

Another College Victimized By Hackers

A Florida college recently became the next publicized victim of computer hackers. Birth dates and social security numbers were stolen from some 300,000 students and employees of Northwest Florida State College in early October. It is known that at least …

Pinterest Makes Drastic Changes to Privacy Policies

In an effort to make the site a more secure place to socially network, Pinterest recently implemented several changes to its privacy and security policies. These changes will seem very familiar to account holders because they are very similar to …

Gathering Computer Data to Solve Crimes

A plethora of information can be gathered from a computer that has been implicated in the commission of a crime, but it takes people who are specifically educated and trained to extract this data and make sense of it, and …