Ransomware

Standard

With one careless,

Errant click,

The line I cast,

With which to phish,

Had gotten a bite.

I seemed to be his boss “Theresa”

But with an “e,”

At the end.

He completed his normal routine,

Without another thought,

Input his username,

Password,

Then hit “send,”

And when I felt the time right,

I reeled him in.

His company put all their eggs in this one basket,

So I took liberty,

To scramble them.

For a small fee,

I will unencrypt,

What they so graciously

Gave me,

At my own discretion.

Phishing is not a contact sport,

It is not fraught with danger,

You can lounge in your robe,

And not move from where you sit,

Still,

I wouldn’t recommend it for the faint of heart.

What webs we weave,

When we practice to deceive,

But at least there’s some money in it.

Planned Obsolescence

Standard

You can put lipstick on a pig,

but at the end of the day,

the shade may just go out of style,

because of controversey

over animal-testing.

I’m telling you this,

on perhaps the most important invention

of our time,

using architecture and infrastructure,

built by brilliant minds

and billions of tax dollars-

that is being sold back to you monthly,

bundled with cable TV and a landline,

that serve as expensive

background noise,

A smartphone accomplishes all of this,

Just don’t let it shatter, bend or explode.

Cars these days,

are safer than ever before,

because fender-benders,

smash their plastic bumpers,

spiderweb-crack their Plexiglas,

and collapse their every crumple zone,

like an empty tissue box,

to be thrown in the trash,

and left out on the curb every Tuesday.

It’s very hard

To practice what you preach,

When screaming,

“Waste not want not,”

While standing at the summit,

Of your own personal

massive garbage heap.

Heartbleed

Standard

A bait-and-switch,

Give and take,

Fake Out.

I gave the server,

A blank note,

She did a double-take,

And blurted all her client’s

Names out.

That was taboo,

But she never got the memo–

Maybe it was wrong of me,

To do.

It felt a touch exploitative,

Though I assure you,

A hacker never uses

Their sleight-of-hand,

Technical prowess,

And strong communication skills,

for evil,

Unless they feel like it.