and is actively being abused to launch phishing and malware attacks which leverage dormant Web site names currently owned and controlled by some of the world’s most trusted corporate names and brands.
Bruce is right that you are needlessly terrorized when you evacuate a school, a public building, or a WalMart because of a simple phone-in threat. Perhaps if there were more credible threats (perhaps the phone in to a university is traced to a phone of a known expelled student), you c...
If she had a cell phone (way, way more complex technologically) no one would have said anything. That’s the real problem. There is NO SECURITY people, not when we waste resources stupidly looking for things that are obviously fake, while ignoring cell phones and other pervasive technology. ...
(who turned out to be very talented computer geeks and coders) came to corporate and rewrote the systemthemselvesinsix weekfor a couple hundred thousand dollars (spent on pizza, coke, and hotel rooms.) All to the astonishment of the company’s IT consultant who said the project should cost...
[NRO] had scheduled an exercise that morning in which a small corporate jet would crash into one of the four towers at the agency's headquarters building after experiencing a mechanical failure.The agency is about four miles from the runways of Washington Dulles International Airport." [So it...