According to the National Oceanic and Atmospheric Administration (NOAA), a tornado (also called a twister, whirlwind, or cyclone) is a violently rotating column of air that extends from a thunderstorm and comes into contact with the ground. Tornado intensity is measured by the enhanced Fujita (EF) scale from 0 through 5, based on the amount […]
Scalability improvements in version 5.0 of the WiKID Strong Authentication server
Our recent 5.0 release focused on speed and scalabilty, as well as adding a RESTful version of our API and other enhancements. The speed improvements are truly impressive.
Here’s a 2-CPU VirtualBox VM with 6 gigs of RAM running our previous 4.2 relea…
Kali Linux 2019.4 Release (Xfce, Gnome, GTK3, Kali-Undercover, Kali-Docs, KeX, PowerShell & Public Packaging)
Time to grab yourself a drink, this will take a while!
We are incredibly excited to announce our fourth and final release of 2019, Kali Linux 2019.4, which is available immediately for download.
2019.4 includes some exciting new updates:
A new d…
Best Practices For Protecting Against Phishing, Ransomware and Email Fraud
“Best Practices for Protecting Against Phishing, Ransomware and Email Fraud”
Osterman Research conducted a survey among corporate decisions makers in early 2018 and found that nearly 28% of those organizations had experienced a phishing attack…
Defensive Security Podcast Episode 241
https://www.bleepingcomputer.com/news/security/allied-universal-breached-by-maze-ransomware-stolen-data-leaked/
https://www.csoonline.com/article/3454443/how-a-bank-got-hacked-a-study-in-how-not-to-secure-your-networks.html
Akamai Foundation and Social Responsibility
Recently, at Akamai, we launched the Akamai Foundation, to continue to reach a broader, more diverse range of young people with quality Science, Technology, Engineering and Math (STEM) education. We believe that this work is a vital part of securing…
5.0 Released!
We’ve officially released version 5.0 of the WiKID Strong Authentication Server. There are numerous improvements in this release, most under the hood. Speed is dramatically increased. We have setup a separate logging system so that logs no longer go…
Defensive Security Podcast Episode 240
https://arstechnica.com/information-technology/2019/11/breach-affecting-1-million-was-caught-only-after-hacker-maxed-out-targets-storage/
https://www.csoonline.com/article/3452747/what-you-need-to-know-about-the-new-owasp-api-security-top-10-list.html
…
How to Prevent Security Camera Hacking of Your Cameras
While homeowners consider wireless cameras as a way to protect their homes and loved ones, one of the many ironies is that these cameras can be less secure and used to commit crimes such as invasion of privacy and even assist in burglaries! Most survei…
In Conversation: Successful Women
Success is a tricky word to define. It means something different to everyone and can only be measured by an individual themselves. Often, success is seen as being about what an individual achieves, rather than about who they grow to…