Tag Archives: Invading and Stealing Personal Data

Exploiting Computer Chip Flaws

In my Jon Masters thriller series, my protagonist Jon has a friend named Ed Ochoa. Ed is a computer genius and often does some cyber-magic to produce secure, and usually unavailable, information that helps Jon out of a variety of … Continue reading

Posted in A Jon Masters Novel, A Murder Mystery Novel, A New Science Thriller Novel, A Thriller Novel, About James J. Murray, Accuracy in Writing, Achieving Writing Perfection, All About Writing, Better Fiction Writing, Blog Writers, Blogging, Bloodless Death Scene Writing, Character Driven Writing, Committing The Perfect Murder, Computer Hacking, Computer Processor Vulnerabilities, Creating Interesting Fiction Characters, Creating Unique and Interesting Character Flaws, Cyber Attacks in 2018, Cyber Security Issues, Cybercriminals, Cyberterrorism, Cyberwar, Data Security, Designing Murder Plots, Developing Better Writing Skills, Developing Story Plots, Developing Storyline Ideas, Developing Writing Skills, Elements of Murder, Error-Free Computer Processing, Evidence Free Murder, Fiction Based on Facts, Fiction Based on Real Life, Fiction Writing - A Believable Lie, Growing As A Writer, Imperfect Murder The Novel, Imperfect Murder Thriller Novel, Internet Security, James J. Murray Blog, James J. Murray's IMPERFECT MURDER Novel, James J. Murray's LETHAL MEDICINE Novel, Jon Masters Thriller Series, Lethal Medicine Thriller Novel, Lethal Medicine-The Novel, Mastering Your Craft, Meltdown Computer Chip Flaws, Murder Mayhem and Medicine, New Blog, New Thriller To Download, Plot Development, Plot Ideas and Where They Come From, Plotting The Perfect Murder, Prescription For Murder Blog, Publishing A Novel, Spectre Computer Chip Flaws, Story Development, The Art of Storytelling, The Art of Writing, The Writings of James J. Murray, Tools of Fiction Writing, Unique Murder Plots, Using Cyber Security To Murder | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

CYBER ATTACKS and MURDER

When I develop a new murder mystery idea, one of the primary issues that must be solved is determining how the murderer gains access to his victim, preferably without leaving evidence that can lead back to the villain. In this … Continue reading

Posted in A How To Blog on Murder Plot Ideas, All About Murder, Blog Trends, Blog Writers, Blogging, Culture Shock, Cyber Security Issues, Cybercriminals, Cyberterrorism, Cyberwar, Developing Storyline Ideas, Fiction Based on Facts, Future Shock, Guest Blogging, Internet Security, James J. Murray Blog, Lapinsky, Using Cyber Security To Murder, Using Malware For Murder, Walt Lapinsky Blog, Websense, wrLapinsky | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | 2 Comments