Looking for Command & Control agents on my Mac
This post shows how it is easy to spot these Command & Control agents waking up and calling their C&C servers. In these cases, the C&C agents are (mostly) benign.
The propaganda machines
Fox News and Sinclair-owned local stations are propaganda machines.
US COVID-19 deaths surpass all war & conflict deaths since Vietnam
US COVID-19 deaths exceed all US deaths in wars and conflict since the end of the Vietnam war.
Big Early Signs of COVID-19
By January 23 the White House should have put this country on a war footing - setting up manufacturing of PPEs, checking the functionality of its existing respirators and ramping up production of new ones, and deploying serious resources to develop high throughput testing to support broad surveillance of the disease.
Process X-Ray Details Window
Using Apple’s approved system extensions API, we can see when a process was created, how it was created, which sequence of programs it executed, and when the program exited. We also know when the program was created, when it ended up on this Mac, where it lives on this Mac, and which developer signed this code.
The Great Economic Experiment: Shutting Down and Rebooting the Economy
The United States, and much of the world, is embarking on a large-scale, unplanned experiment: shutting down and then rebooting the economy.
Living with COVID-19
COVID-19 is 75% more infectious and 2000% deadlier than the flu. As Dr. Messonnier, director of the National Center for Immunization and Respiratory Diseases, said, “It’s not so much of a question of if this will happen anymore but rather more of a question of exactly when this will happen.”
Series Zero AR Glasses from Apple?
VentureBeat makes a good case for a “Series 0” release of Apple’s augmented reality glasses. From my experience writing and using AR software, I think VB is right.
Challenges Security Analysts Face
The 1990s was the Golden Age of of intrusion detection. A quarter century later, network analysis, by both automated tools and human analysts, still dominates the detection of compromised systems within many enterprises. But technology and business changes over the years have made this much harder.
What is happening to independent cybersecurity companies?
Some of most well-known cybersecurity companies have recently lost or may be losing their independence, and it is getting hard to point to cybersecurity companies with sustained growing profits.