Category identity management

The ‘Invisible’ Malware That Allows Hackers To Remotely Control ATMs: Experts Warn Software Has Already Infected At Least 140 Banks In 40 Countries Around The World

The ‘Invisible’ Malware That Allows Hackers To Remotely Control ATMs:  Experts Warn Software Has Already Infected At Least 140 Banks In 40 Countries Around The World www.fortunaascorner.com      Stacy Liberatore writes in the February 9, 2017 edition of the Daily Mail Online about a new technique/tool that cyber criminals are using to steal cash […]

‘Cloaking’ Film For Windows Blacks Out The Screens Within — A Step Forward For Digital Privacy

‘Cloaking’ Film For Windows Blacks Out The Screens Within — A Step Forward For Digital Privacy   http://www.fortunascorner.com        You had to figure it was only a matter of time.  With the FBI Director, among others warning everyday Americans to cover up their laptop cameras — otherwise, you can be clandestinely seen and […]

The Spy Who Believes Hitler May Have Successfully Faked His Own Death: Classified Documents Reveal That The Fuhrer May Have Used A Secret Runway To Escape His Berlin Bunker To South America On A Luftwaffe Plane

The Spy Who Believes Hitler May Have Successfully Faked His Own Death:  Classified Documents Reveal That The Fuhrer May Have Used A Secret Runway To Escape His Berlin Bunker To South America On A Luftwaffe Plane   http://www.fortunascorner.com        The, claims, theories, and folklore surrounding Adolph Hitler and rumors that he somehow fooled […]

Anti-Surveillance Camo Hides You From Facial Recognition Technology; Hides Wearer’s From Drones & Cellphone Trackers

Anti-Surveillance Camo Hides You From Facial Recognition Technology; Hides Wearer’s From Drones & Cellphone Trackers   www.fortunascorner.com        Renee Morad had an interesting article, with the title above, in the January 10, 2017 edition of Seeker.com.  Mr. Morad’s bottom line up front:  “A complex pattern that can be printed on fabric intentionally exploits […]

DARPA Challenges Hackers To Create Automated Hacking System — Win $2M

DARPA Challenges Hackers To Create Automated Hacking System — Win $2M   www.fortunascorner.com        Mohit Kumar had an article on the HackerNews website, July 13, 2016, with the title above.  He began by asking a question:  “Why can’t we detect all security loopholes and patch them before hackers exploit them?  Because……we know that […]

Intelligence Community Building Software To Spot Suspicious Behavior, Shooters, & Potential Terrorists In Live Videos — Before They Have A Chance To Attack

Intelligence Community Building Software To Spot Suspicious Behavior, Shooters, & Potential Terrorists In Live Videos — Before They Have A Chance To Attack   http://www.fortunascorner.com        Aliya Sternstein writes on the June 6, 2016 DefenseOne.com website that the Intelligence Community “is working on amping up people-recognition power to spot, in live videos, shooters […]

Facial Recognition Will Soon End Your Anonymity; A New Age In Espionage/Spying; Advances In Biometrics And Identity Management Could Force Single-Use HUMINT Operatiions

Facial Recognition Will Soon End Your Anonymity;  A New Age In Espionage/Spying; Advances In Biometrics And Identity Management Could Force Single-Use HUMINT Operations www.fortunascorner.com      “Facial Recognition Will Soon End Your Anonymity,” is the title of a June 3, 2016 article on the Marketwatch website, by Mr. Tarun Wadhwa,.  Mr. Wadhwa begins with an astonishing […]

The World’s Best Bounty Hunter Is 4’11”: Here’s How She Hunts

The World’s Best Bounty Hunter Is 4’11”:  Here’s How She Hunts    www.fortunascorner.com        Randall Sullivan writes on the May 17, 2016 website – WIRED.com, that “Michelle Gomez, at just 4’11”, and just over 100 pounds, doesn’t look like the sort of person to retrieve earth-moving equipment stolen by a Peruvian crime family. […]

U.S. Developing Technology To Identify And Track Hackers Worldwide

U.S. Developing Technology To Identify And Track Hackers Worldwide  www.fortunascorner.com      Mohit Kumar  writes on the May 5, 2016 web edition of The Hacker News, that “the Pentagon wants a better way to not only identify malicious hackers; but, also practical algorithms that can predict where that hacker [or hackers] might attack next.”  He […]