November brings a new book in the grydscaen series entitled grydscaen: metropolis. We are hard at work trying to get the book ready for release on November 30 and we can’t wait to have it out for readers to enjoy. I wanted to talk a little about the process of writing metropolis today and give you a bit of a teaser of the ware game Silence which is prominent in the story to get your jazzed for the release. Are…..
Cover Reveal for the new cyberpunk novel, grydscaen: dark. Hackers Unite. Hack Till You’re Dead. I can’t tell you how excited I am to release grydscaen: dark to the world. The 266 page book was published on 25 June, 2018 and is a techno thrill ride through hackers infiltrating the stock market and attacking the Elite government. We are currently running a blog tour which I hope will help to get some exposure for the series and highlight Rom the…..
Social Engineering: Getting Information out of a Target Hackers are getting very sophisticated these days and many people fall prey to their schemes. One type of scam which can be very effective is the phone scam. With tax season coming up in the United States and many people not knowing how the IRS or the government works, people can fall prey to scams easily especially if there is a threat of action on the part of the government. Elderly people…..
“grydscaen: dark” chapter draft by Natsuya Uesugi. ARC excerpt. © 2018 Natsuya Uesugi. Wanted to share the first chapter of “grydscaen: dark,” the new dystopian cyberpunk, tech noir thriller I am writing. This is the final version of chapter 1 and I wanted to get any feedback if readers are so inclined. Take a read for free. #hackersunite #hacktillyouredead Chapter 1: Dot Hack Stock “Not here. Hide the data till we are off the street. This way,” Toapfyl hurriedly motioned…..
On Friday, there was a large Denial of Service (DDoS) attack that occurred in the United States that affected Internet traffic and caused online businesses and popular social media sites, as well as cloud computing applications and corporate websites to be unavailable, run slow in opening files or accessing emails, or sites became unresponsive. This attack started on the East Coast and filtered across the country in three targeted waves that initiated in the morning and lasted throughout the afternoon……
Unlock the power of the Packrat Factions. Today we look more closely at The Runners. Leader: Anj Short Description: Quick thinking and quick actions makes a Runner who has a knack for seeing the truth in things. Always thinking ahead and can get out of any situation. Strives to see the monetary benefit in what he does and will get the job done no matter how dangerous. Member of: The Packrats Past Affiliation: None Main Occupation: Smuggling psi inducer drugs,…..
Unlock the power of the Packrat Factions. Today we look more closely at The Acolytes. Leader: Acolyte Short Description: You are an elite hacker who has a knack for computers and is always on the cutting edge of information technology. You have a keen eye for strategy and will get things done by any means necessary. Member of: The Packrats Past Affiliation: The Terror Hack Main Occupation: Hacking, infiltration, intrusion, accessing Top Secret data History: Acolyte and his 15 members were…..
The Internet is a tool unmatched for psychological warfare. Information, disinformation, propaganda and counter propaganda can be lodged like missiles over the Internet in seconds and resonate around the world. With the popularity of the Internet many people are getting their news from those channels including Facebook and Twitter. Posting disinformation can change how people perceive an event. There have even been affects to the stock market based on information on the Internet. These perceived sets of information can cause…..
The difference between a cyber activist and a cyber hacktivist is degrees, and sometimes the lines are very thin. An activist expresses his or her views maybe using social media and stays within the confines of the law. The hacktivist on the other hand has another agenda which might include illegal activity such as infiltrating systems, exposing data, and releasing this data onto the Internet for all to see. Some hacktivist groups have multiple members but others may not even…..
Continuing our series on cyber security, we will feature some new articles on aspects of cyber warfare. Today we start with the Dark Web. What is anonymity? Can I find out who you are? Can I spider a site to get its content? Can I find it in a search engine? What is the cost of being virtually invisible? The US Naval Research Laboratory created Tor in 2002. Tor was originally designed to create totally anonymous communications across the Internet……