Google Project Zero reports more Kaspersky software vulnerabilities

Glad to hear the bugs are fixed, but means that no software is immune to attack.…

The Hierarchy of IoT “Thing” Needs | TechCrunch

I received a lot of feedback on an article I wrote a few months ago about…

Shellshock’s Cumulative Risk One Year Later

I sure hope that Shellshock has been patched by now thoughout the world.  I know I…

Data-Centric Security Protection Enhancements

The ability to render data useless if lost or stolen, through data-centric encryption, is an essential…

Report Criticizing the State Agencies’ Security

This compliance-focused security thinking is state of the art for most, even while the bad guys…

Rise in Contactless Payments Limit

Contactless cards use the same technology as Chip and PIN – secure generation and loading of…

Stolen Data on the Dark Web

Terbium Labs developed the highly scalable, cloud-based Matchlight system to continuously crawl the Internet, including the…

WordPress Appliance - Powered by TurnKey Linux