Alleged CIA Hacking Techniques Lay Out Online Vulnerability
If this week’s WikiLeaks document dump is genuine, it includes a CIA list of the many and varied ways the electronic device in your hand, in your car, and in your home can be used to hack your life. It’s simply more proof that, “it’s not a matter of if you’ll get hacked, but when you’ll get hacked.” That may be every security expert’s favorite quote,...
I regard the brain as a computer which will stop working when its component fail. There is no heaven or afterlife for broken-down computers. That is a fairy story for people afraid of the dark