Tags » Weeping Angel

Moffat Era Marathon #5 – “It’s a long story, Doctor. It can’t be told. It has to be lived.”

Okay where do we pick up from last time. The Angels are now living ideas, they are ideas that think for themselves.

In The Time of Angels… 1,228 more words

A short break in Tuscany - Part One

Last week, my husband, younger son and I took a short break in a small town called Gallicano, in Tuscany. Our main reason for going was because my current WIP is set in that area, and I wanted to get the ‘feel’ of the place. 251 more words

Senza Categoria

Moffat Era Marathon #4 – “What if we had ideas that could think for themselves?”

Okay, I’ll start with saying that this one is genius.

This is our first distinct break from the Russell T Davies era, I think. Moffat concepts are coming together, in a way they haven’t done so far – the Weeping Angels, of course, and River Song. 1,262 more words

Complete List Of Wifi Routers From WikiLeaks' Cherry Blossom Release Detailing CIA Hacking Tools

For the past four months, WikiLeaks has been slowly publishing a series of documents that describe a plethora of hacking tools, which the anti-secrecy organization says belong to the US Central Intelligence Agency. 92 more words

WikiLeaks Docs: CIA Has Been Hacking WiFi Routers For Years

The CIA has been targeting WiFi routers to conduct surveillance for several years, according to documents published Thursday by the anti-secrecy organization WikiLeaks.

Using advanced firmware called Cherry Blossom (CB), the intelligence agency could allegedly monitor unsuspecting users’ internet activity. 75 more words

New Item: Angel of Judgement

Recently I went on another photography expedition through the cemetery near my house, and I came out with this image. It’s one of many, many angel statues and memorials in the graveyard, but this one jumped out at me — not in a terrifying Weeping Angel way, though. 20 more words

Redbubble

Vault 7: CIA Hacking Tools

It had been reported by Wikileaks that the U.S. Central Intelligence Agency (CIA) has several hacking tools to infiltrate IoT devices. The Internet of things (IoT) is the inter-networking of physical devices, connected device, or smart devices, allowing network connectivity and enabling devices to collect and exchange data. 159 more words

Cybersecurity