GoldAxe was wrong, here’s why…

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

Throughout the years, keep in mind, that we didn’t start the fire.
Photo by Brett Jordan, please support by following @pexel.com

Throughout the many years of us being on this planet, this rock, this existence, or whatever you would like to call it. The complexity of life hasn’t lessened with the release of the Matrix. If you haven’t seen the movie, check it out. It’s a really good movie, it just ugh, will have you question your whole existence. Like “What even am I?” Questioning life aside, you’re probably wondering what new and exciting way technology is being exploited and the possible way your information is being collected. With the recent brainwashing rise of getting everyone comfortable with using AI (artificial intelligence), facial recognition has been employed in scams. We don’t feel the threat in the great US because, well… too much violence (guns, bad, people, worse) but in a nutshell, be glad you don’t live in Thailand. They have a whole different banking system set up over there.

AI is learning what you like, it’s always watching.
Photo by Pixabay, please support by following @pexel.com

The Attack

Facial recognition, what is it? In simple terms, the device uses the images from your face that it captures so when it comes time for a function to be completed, the device knows that it is you and will complete that function or task. In complex terms; the device captures your images with the camera with an overlay of dots which are a kind of reference point for certain sectors of your face, stores them, finds key features from your face that pair up with the stored image data, this could be anything like a mole, birthmark, or beauty mark, (not sure if women still use that term nowadays), once the process is complete and everything checks out. Congrats, you got in. You are now the one. This whole process is done in ones and zeros and is done in nano-to-milliseconds, you don’t care but it’s still nice to know. We’re all nerds here, of course. Armed with the knowledge of what biometrics or an item of what it is, here’s the attack. Threat actors can use your likeness to get into many areas of your life. Areas such as your phone, financial institution, and pretty much anywhere that requires the use of your facial recognition. Alarming, we know, however, people tend to think “They won’t get anything from me, they’re just practicing.” That’s true if you’re getting robbed at an ATM, however, getting robbed online is a whole new and hard-to-catch ball game.

We see all your secret…purchases.
Photo by Almada Studio, please support by following @pexel.com

Who Can It Be Now

So, who would do something like this we can hear you ask. Clearly, they’re a monster although they might live in a poor country, and this might be a way for them to feed their family. Ha, guilt trip engaged, just because they’re the villain in your story doesn’t mean they’re a villain in others. A group by the name GoldFactory was factored in for the use of the trojan called “GoldPickaxe”, they were spotted some time ago in Thailand and maybe Vietnam. GoldPickaxe was created with the intent to collect face profiles, identification documents, and text messages from the victim’s phone. All of this gave them access to having great names like GoldDigger, GoldDiggerPlus, and GoldKefu given to them by researchers.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

I’m not into computers, but I want in on your wallet.
Photo by Basian Riccardi, please support by following @pexel.com

That Sinking Feeling

How does the GoldPickaxe work? As mentioned earlier, GoldPickaxe will infect the victim’s device and begin to collect any information pertaining to facial recognition, and this includes their ID card. Once this information is collected, the threat actor can then gain access to anything tied to the victim. This is a massive problem because, in Thailand, their banking system requires them to use facial recognition to access their accounts. So, pretty much, there’s no way around it, you have to use your face to withdraw or make a deposit.

Hackers are gonna hack.
Photo by Matthew DeVires, please support by following @pexel.com

The Prevention

You don’t want someone to use your face and make a withdrawal from your account? You may be wondering how you protect yourself from something like this happening to you. Since these play on 2MFA (2 multi-factor authentication), you would have to add another level of protection from threat actors having access to your accounts. The best way to think of this is having vault door upon vault doors to protect your valuables. A setup of this would be a password, SMS message verification, email verification, and facial recognition. It may seem like a lot of work to protect what’s important but it’s better than not having anything important to protect.

If you have gold, we’ll be coming for you. That’s GoldFactory’s stand.
Photo by Dakota Edwards, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you feel like there is something I may have missed on GoldPickaxe? Script a comment below.

Breaching the Great Lakes

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

I don’t know what this website is but they’re talking about something on data. Did we have a issue with data?
Photo by RDNE Stock project, please support by following @pexel.com

We as humans, take many things for granted. Family, friends, pets, and quite often, our personal information. We often share our personal data to make purchases or access services, and we expect it will be protected and used responsibly. But how often is this true?

Many organizations sometimes fail to safeguard or even bravely misuse our information for their own purposes. Then go on record saying that it’s a “you problem” and not a “them problem”, which is kinda correct because you didn’t bother to read the twenty-two-page privacy agreement policy.

Word to the wise, start reading those policies. You’ll start to see how jacked-up companies really are. But outside of the evil corporate overlords being okay with you skimming over the fine print, there is a bigger threat to your information, and it happens more than you would think.

Don’t worry, we have you covered on this one. We’re going to be going over what kind of attack this is, who uses it, the functionality and effects upon release, and what are some of the ways you can keep your information safeguarded better than most companies you’ve done business with.

Yea, I’m about to read another one. Forget work, they’re keep me in the know on threat actors.
Photo by Andrea Piacquadio, please support by following @pexel.com

The Attack

So, what is this attack that most companies just can’t seem to stop? Well, let’s get you acquainted with what’s called a data breach. For those who might not know, a data breach is a serious incident that can compromise the security and privacy of individuals or organizations.

It occurs when sensitive, protected, or confidential data is accessed, copied, transmitted, viewed, stolen, altered, or used by someone unauthorized. Data breaches can have various causes, such as hacking, phishing, malware, insider threats, human errors, or physical theft.

What’s that? They just take your information, that’s not a big deal we can hear you say. While true however stay tuned because data breaches can result in, but are not limited to, financial losses, reputational damage, legal consequences, or identity theft for the affected parties.

Dude 1: Bro, catfishing chicks isn’t illegal.
Dude 2: It’s not but phishing is. You might want to change your username, that’s all I’m saying.
Dude 1: Nah, you worry too much. It’ll be fine.
Photo by Wendy Wei, please support by following @pexel.com

Who Can It Be Now

In this crazy world, who would use such a dirty tactic to harm people? The real answer is it could be anyone. There are times when individuals or groups are named but for the most part, a data breach could be on anyone’s part.

One possible suspect, which is a popular case and highly likely in this day and age, is an unhappy employee who may be in the running to leave the company. They might have access to sensitive data and could leak it to competitors or seek to harm the organization.

A few things that could lead up to this would be but are not limited to; sharing passwords with others, the downloading of unauthorized software or applications on company device systems, and networks that can be compromised by negligence, ignorance, or malicious intent. In simpler terms, business owners, if you want to keep your business healthy, try keeping your workers happy.

Always follow the notion that it’s cheaper to keep them. Ah, that good old married life.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

I was reading a few scripts on Scriptingthewhy and I think it’s about time we came up with a better place to house the voters’ information.
Photo by Mikhail Nilov, please support by following @pexel.com

That Sinking Feeling

Sometimes, these breaches involve voter information, such as names, addresses, party affiliations, or voting histories. This can pose a serious threat to the privacy and security of voters, as well as the integrity of the electoral process. How does this happen you may wonder.

As mentioned before, data breaches can occur due to various reasons, such as hacking, phishing, insider threats, human error, or natural disasters. Pretty much anything that may be considered critical information that is not authorized access to the individual is a data breach.

So, what could be done with this information? Well, a number of things, none of them good. Your information could be sold, or collected, threat actors could pose as you to others you know in order to trick them into giving sensitive information about you or themselves. The mess of a data breach is limitless, and one should act quickly when compromised.

That’s right voter, if germs can’t have your vote than neither should criminals.
Photo by Edmond Dantes, please support by following @pexel.com

The Prevention

Not sure if your information was a part of a data breach? Well, we’re here to tell you more than likely it was. As mentioned, all companies are susceptible to their data being leaked.

To prevent or mitigate data breaches, organizations that handle voter information should adopt best practices for data protection because if threat actors have your voter information, then they have your vote. Best practices such as encryption, authentication, backup, and monitoring help to ensure you have a secure connection. you may not always notice the signs of a cyberattack, especially if it targets your social media habits.

For example, you may see a change in the content you view online, such as going from cute animals to political messages. This could be a way of manipulating your opinions or influencing your decisions.

To prevent this, you should regularly check your accounts and settings, and be aware of what you share online. You can also use a website like “HaveIBeenPwned.com” to see if your email or password has been compromised in a data breach.

You can reduce the subconscious effects of these hidden influence strategies by educating yourself. You can watch documentaries like “The Big Hack”, read about how Russia used social media to interfere in Ukraine, the Brexit scandal, and the recent US elections, and learn how social media and voter data are used to manipulate elections.

One way to resist social influence is to be aware of its presence. When you see different people and posts on your Facebook timeline during an election period, don’t assume they are genuine. They might be bots trying to sway your opinion with customized information based on your profile.

So wait, you’re saying that my information was leaked and since it was my voter information, the “threat actors” were able to sway me via social media and advertisement to vote for someone who I didn’t even like in the first place?
Photo by Edmond Dantes, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you feel like there is something I may have missed on data breaches? Script a comment below.

Explore AI, Quantum Tech, and Cybersecurity Trends

Key Takeaways

  • AI is revolutionizing various industries: From personalized recommendations to self-driving cars, AI is rapidly transforming how we live and work.
  • Deep learning is driving AI advancements: Neural networks are enabling AI to perform complex tasks with increasing accuracy and sophistication.
  • Quantum computing holds immense potential: This emerging technology has the potential to solve problems that are currently intractable for classical computers.
  • Cybersecurity is crucial in today’s digital world: Protecting data and systems from cyber threats is essential for individuals, businesses, and governments.
  • Numerous avenues exist for getting involved: There are various ways to learn about and contribute to these fields, including online courses, coding tutorials, open-source projects, and hands-on experience.
  • The future of computing is bright: Continued advancements in AI, quantum computing, and cybersecurity will shape the future of technology and society.

Hot Topics in Computing: AI, Quantum, and Cybersecurity

Come one, come all! Welcome to another exciting script on how technology is constantly improving while the masses are choosing to be left behind. Which, it’s a real shame since our advancements in technology are designed to help make our lives easier, however, we still operate a five-day workweek. This doesn’t make sense, like, come on. Your phone is a powerful mini-computer and you’re still punching the clock.

Getting off my capital soap box. The world of computing is constantly evolving, with new technologies emerging and reshaping our lives at an astonishing pace. Today, we’ll dive into three of the hottest topics in the computer science field: Artificial Intelligence (AI), Quantum Computing, and Cybersecurity. I feel like I cover this every week, but I get no suggestions in the comment section…so, yeah, you’re stuck running this script.

1. Artificial Intelligence (AI)

AI-generated image. “It seems that part of your programming is from the snake game. Who coded you this way?”

Thanks to the creators of our new metal overlords. AI has exploded onto the scene, moving beyond theoretical concepts to become an integral part of our daily lives. From the personalized recommendations we see on streaming platforms to the AI-powered assistants on our smartphones, AI is revolutionizing how we interact with technology. I say this and somehow Netflix still misses the mark for my recommendations.

Deep learning, a subfield of AI, has been a major driver of recent advancements. Neural networks, inspired by the human brain, are now capable of performing complex tasks like image recognition, natural language processing, and even composing music. The potential of AI is vast, with applications ranging from self-driving cars and medical diagnostics to climate modeling and drug discovery.

Getting Involved

If you’re intrigued by AI, there are numerous ways to get involved:

  • Online Courses: Platforms like Coursera, edX, and Udacity offer a wealth of AI-related courses, from introductory concepts to advanced deep learning techniques.
  • Coding Tutorials: Platforms like Kaggle and Google Colaboratory provide hands-on experience with AI through coding challenges and projects.
  • Open-Source Projects: Contributing to open-source AI projects is a fantastic way to gain practical experience and collaborate with other enthusiasts.

2. Quantum Computing

AI-generated image. “I don’t think this is what they meant by quantum computing. It’s a small computer, but the computing is suppose to be smaller.”

Quantum computing leverages the principles of quantum mechanics to perform calculations that are beyond the reach of even the most powerful classical computers. This technology has the potential to revolutionize fields like drug discovery, materials science, and cryptography.

While still in its early stages, quantum computing has made significant strides in recent years. Companies like Google and IBM have achieved quantum supremacy, demonstrating that their quantum computers can solve specific problems faster than any classical supercomputer. And to answer the question that none of you are asking, no. We will not have access to this form of computing because the price tag is too high.

Getting Involved

Delving into quantum computing requires a foundation in quantum mechanics and linear algebra:

  • Online Resources: Numerous online resources, including tutorials and interactive simulations, can help you grasp the fundamental concepts of quantum computing.
  • University Courses: Many universities offer introductory and advanced courses on quantum computing.
  • Research Labs: Internships or research positions at universities and research institutions can provide valuable hands-on experience in this cutting-edge field.

3. Cybersecurity

AI-generated image. “This is America, and you choose a bad day to be a hacker.”

This is one a mixed bag of “We need more people in the field” and “We went with other candidates because you lack experience.” Study it, take part in it, “work your network”, but don’t count on getting in and making six-figures right off the back. But sour ranting aside. In today’s hyper-connected world, cybersecurity is more critical than ever. With the constant evolution of cyber threats, from ransomware attacks to data breaches, robust security measures are essential for individuals, businesses, and governments alike.

Getting Involved

Here are some ways to get started in cybersecurity:

  • Online Courses: Platforms like Cybrary and Udemy offer a wide range of cybersecurity courses, covering topics such as ethical hacking, network security, and threat intelligence.
  • Security Certifications: Obtaining industry-recognized certifications like CompTIA Security+ or Certified Ethical Hacker (CEH) can enhance your career prospects in cybersecurity.
  • Hands-on Experience: Setting up a home lab or participating in capture-the-flag (CTF) competitions can provide valuable hands-on experience with cybersecurity tools and techniques.

The Future of Computing

The future of computing is undoubtedly bright. We can expect further advancements in AI, with more sophisticated and intelligent systems transforming various aspects of our lives. Quantum computing holds the promise of unlocking unprecedented computational power, leading to breakthroughs in fields that were previously considered intractable. And as our reliance on digital systems continues to grow, cybersecurity will remain a critical challenge, requiring innovative solutions to protect against evolving threats.

And with all of that being said, I encourage you to explore these topics further and consider contributing to the advancement of this rapidly evolving field. I mean, just because you’re not getting a paycheck every two weeks doesn’t you can’t take part. Find like-minded people, take part in group activities, and keeping yourself up-to-date are good ways to “feel” involved. Not everything is about making money, right?


Love learning tech? Join our community of passionate minds! Share your knowledge, ask questions, and grow together. Like, comment, and subscribe to fuel the movement!

Don’t forget to share.

Every Second Counts. Help our website grow and reach more people in need. Donate today to make a difference!

One-Time
Monthly
Yearly

Make a one-time donation

Make a monthly donation

Make a yearly donation

Choose an amount

$5.00
$15.00
$100.00
$5.00
$15.00
$100.00
$5.00
$15.00
$100.00

Or enter a custom amount

$

Your contribution is appreciated.

Your contribution is appreciated.

Your contribution is appreciated.

DonateDonate monthlyDonate yearly