Internet of Thing (IoT): Privacy and Security Challenges

The world is heading towards home automation.  Here are some of the hurdles that we might…

Repurposing Logs – Internet Storm Center

A pretty interesting article about logs and the data that might be hiding in them that…

TrueCrypt security audit is good news, so why all the glum faces? | Ars Technica

AT&T’s plan to watch your Web browsing—and what you can do about it | Ars Technica

Everybody was griping about Verizon and their tracking of their customers. It turns out that AT&T…

Cutting-edge hack gives super user status by exploiting DRAM weakness | Ars Technica

This is quite the hack.  Memory hacking can be quite powerful.

4 Common Tactics Used in Recent Healthcare Breaches – Venafi

Some techniques to think about.

How GitHub Conquered Google, Microsoft, and Everyone Else | WIRED

Another win for open source.

WordPress Appliance - Powered by TurnKey Linux