Internet of Thing (IoT): Privacy and Security Challenges

The world is heading towards home automation.  Here are some of the hurdles that we might…

Repurposing Logs – Internet Storm Center

A pretty interesting article about logs and the data that might be hiding in them that…

TrueCrypt security audit is good news, so why all the glum faces? | Ars Technica

http://arstechnica.com/security/2015/04/truecrypt-security-audit-is-good-news-so-why-all-the-glum-faces/?

AT&T’s plan to watch your Web browsing—and what you can do about it | Ars Technica

Everybody was griping about Verizon and their tracking of their customers. It turns out that AT&T…

Cutting-edge hack gives super user status by exploiting DRAM weakness | Ars Technica

This is quite the hack.  Memory hacking can be quite powerful.  http://arstechnica.com/security/2015/03/cutting-edge-hack-gives-super-user-status-by-exploiting-dram-weakness/

4 Common Tactics Used in Recent Healthcare Breaches – Venafi

Some techniques to think about. https://www.venafi.com/blog/post/4-common-tactics-used-in-recent-healthcare-breaches/

How GitHub Conquered Google, Microsoft, and Everyone Else | WIRED

Another win for open source. http://www.wired.com/2015/03/github-conquered-google-microsoft-everyone-else/

WordPress Appliance - Powered by TurnKey Linux