cybersecurity
Cracking the cyber world: NSA, hackers, and the complicated ways that digital information can threaten our personal lives, politics and national security.
Twitter is Allowing A General To Threaten a Sovereign Nation In The Name of Free Speech
This first series of unprovoked tweet came on 3 October 2022. It was followed up by a series of odd tweets from the account of General Kainerugaba. Muhoozi Kainerugaba is the son of Uganda's President Yoweri Museveni who's retained power over the country for 36 year.
By IwriteMywrongs3 years ago in The Swamp
Ghana & Ghanians Aren't Very Accepting of Anyone Who is Different
Un-welcome to Ghana a country that uses the term 'culture' to treat others badly. Colorism is at an extreme high and lighter skinned Black Americans have issues being called 'White' at every turn, as you walk through the streets they'll shout Obroni.
By IwriteMywrongs3 years ago in The Swamp
Trump is the ‘Hope For Peace’ in Ukraine , as Emphasized by a NATO Member
He claimed that Biden had gone “too far” in his criticism of Putin’s continued presidency in Russia. The right-wing populist leader, a close ally of the Former U.S. president, recently declared,
By Estalontech3 years ago in The Swamp
How Cyber Security Has Changed in the Last 10 Years
The world has changed drastically over the past ten years. Even the last two years have shown us so much change, not all of it for the better. When it comes to technology, ten years may as well be a hundred, for it changes so rapidly.
By Andrew Obuchowski4 years ago in The Swamp
Hacker
A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term hacker has become associated in popular culture with a security hacker – someone who utilizes their technical know-how of bugs or exploits to break into computer systems and access data which would otherwise be unavailable to them – hacking can also be utilized by legitimate figures in legal situations. For example, law enforcement agencies sometimes use hacking techniques in order to collect evidence on criminals and other malicious actors. This could include using anonymity tools (such as a VPN, or the dark web) to mask their identities online, posing as criminals themselves.[1][2] Likewise, covert world agencies can employ hacking techniques in the legal conduct of their work. Oppositely, hacking and cyber-attacks are used extra- and illegally by law enforcement and security agencies (conducting warrantless activities), and employed by State actors as a weapon of both legal and illegal warfare.Definitions
By Rebecca Maria4 years ago in The Swamp
How To Tell If Your Company Needs To Boost Its Security Measures
We all collectively know that the most valuable asset to any company is the information that we possess. Not only that, but how data flows through the company has to have the most up-to-date security possible. Security is an absolute necessity in the world of technology information. Here are a couple of signs that your company needs to boost its security measures.
By Louis Barani4 years ago in The Swamp








