The Three IT Roles: The King, the Sage, and the Cog
I observe three basic types of people working in the IT field: kings, sages, and cogs. The King The king is one who has complete…
I observe three basic types of people working in the IT field: kings, sages, and cogs. The King The king is one who has complete…
It is considered good social networking etiquette–especially on Twitter–to warn your followers that you are posting a link to content on your own blog or…
A new class of supply chain attacks named ‘slopsquatting’ has emerged from the increased use of generative AI tools for coding and the model’s tendency…
Symbolic Link trick lets attackers bypass FortiGate patches, Fortinet warns Pierluigi Paganini April 12, 2025 Fortinet warns attackers can keep read-only access to FortiGate devices…
We’ve been debating agnosticism and atheism here for the last couple of weeks. One of the sub-arguments that has pronounced itself has come from my…
Phishing-as-a-service (PhaaS) platform Tycoon2FA, known for bypassing multi-factor authentication on Microsoft 365 and Gmail accounts, has received updates that improve its stealth and evasion capabilities.…
This doesn’t bode well. Here’s an interesting list of predictions from the study: The main drivers of religious affiliation to 2043 are immigration and secularization.…
OpenAI is working on yet another AI model, reportedly called GPT-4.1, a successor to GPT-4o. The Verge recently reported that OpenAI plans to launch GPT-4.1, which…
A friend of mine (CarlM) and I have a long-running debate regarding how logical or illogical the average religious person is in the United States.…
A seven-year-old vulnerability in Cisco networking equipment continues to pose significant security risks, enabling attackers to execute remote code on unpatched systems. Discovered initially in…
In short? Bad. To give an overall flavor, here is a collection of data from a number of polls on American belief in evolution, correlated…
Microsoft has recently uncovered a sharp rise in ransomware attacks exploiting domain controllers (DCs) through Remote Desktop Protocol (RDP), with the average attack costing organizations…