Thought Is Recycled Data
We show off our data …
… and it shows.
And then, there is Data Smog: an overwhelming excess of information.
We might think that the more information we have the more we will know – but more likely there is so much to sift through that we lose sight of wisdom, and become walking, talking smog. Both material life and spiritual life can become like that. Data controls computers and robots, and it’s what controls us too.
Below is computer terminology, but this can just as well apply to the human mind via all media, because we are the final recipients of data/ideas.
Ever heard of Ping Flood Attack?
Ping flood is an attack in which an attacker takes down a victim’s computer by overwhelming it with ICMP echo requests, also known as pings. The attack involves flooding the victim’s network with request packets, knowing that the network will respond with an equal number of reply packets … (TB – reactions!)
Social engineering attack techniques
Social engineering attacks come in many different manifestations, and can be performed anywhere where human interaction is involved. The following are the five most common forms of digital social engineering assaults:
As its name implies, baiting attacks use a false promise to pique a victim’s greed or curiosity. They lure users into a trap that steals their personal information or inflicts their systems/mind with malware.
Scareware involves victims being bombarded with false alarms and fictitious threats. Users are deceived to think their system is infected with malware, prompting them to install software that has no real benefit (other than for the perpetrator) or is malware itself. Scareware is also referred to as deception software, rogue scanner software and fraudware.
Here an attacker obtains information through a series of cleverly crafted lies. The scam is often initiated by a perpetrator pretending to need sensitive information from a victim so as to perform a critical task.
As one of the most popular social engineering attack types, phishing scams are email and text message campaigns aimed at creating a sense of urgency, curiosity or fear in victims. It then prods them into revealing sensitive information, clicking on links to malicious websites, or opening attachments that contain malware.
This is a more targeted version of the phishing scam whereby an attacker chooses specific individuals or enterprises. They then tailor their messages based on characteristics, job positions, and contacts belonging to their victims to make their attack less conspicuous. Spear phishing requires much more effort on behalf of the perpetrator and may take weeks and months to pull off. They’re much harder to detect and have better success rates if done skilfully.
(Taken from https://www.imperva.com)
Unless we are aware, we will not know what is going on in our mind.
Empty cache at least once a day through meditation.
Cache: late 18th century: from French, from cacher ‘to hide’.