When we started WiKID, we knew we had to be as secure as or more secure than the leading players at the time (RSA, Vasco, mostly, way back then). We decided that using asymmetric keys generated on users’ devices was the best way to overcome objections …
Your Residential Security Checklist: Essential Features To Keep Your Home Safe
Being a homeowner can come with a lot of worries, especially surrounding the safety and security of your family. There are many options for residential security systems, especially as technology advances, making smart home monitoring and home automation more attainable for all. There are many reasons people choose to install residential security systems. They protect … Continue reading Your Residential Security Checklist: Essential Features To Keep Your Home Safe
The post Your Residential Security Checklist: Essential Features To Keep Your Home Safe appeared first on Calgary Alarm Inc..
Kali Linux 2017.1 Release
Finally, it’s here! We’re happy to announce the availability of the Kali Linux 2017.1 rolling release, which brings with it a bunch of exciting updates and features. As with all new releases, you have the common denominator of updated packa…
Kali Linux Repository HTTPS Support
A couple of weeks back we added more HTTPS support to our Kali infrastructure, and wanted to give our users some guidance and point out what’s new. While our Kali Linux download page (and shasums) has always been served via HTTPS, our mirror redi…
Why You Should Avoid DIY Home Alarm Systems
There are many reasons you may consider a DIY home alarm system. They are widely available at stores, and are an inexpensive option for those who want to ramp up their home security while saving money. While there are many effective DIY home alarm systems available, they are also difficult to install, and if installed … Continue reading Why You Should Avoid DIY Home Alarm Systems
The post Why You Should Avoid DIY Home Alarm Systems appeared first on Calgary Alarm Inc..
Penetration testing Sharepoint
Like any normal web application, Sharepoint may fall prey to OWASP Top 10 vulnerabilities with a special focus on XSS, mostly due to inadequate patching and misconfiguration. On this post, we focus on recon / what sharepoint is exposing. Google Dorks F…
Keep Your Home Safe While on Vacation
Do you have summer vacation on the brain? We don’t blame you! With warmer weather fast approaching, it’s hard not to start thinking about where and what you want to do for summer vacation. Even with all the excitement of planning your vacation, it’s important to think about your home while you are away. Nothing is worse than coming back … Read More
The post Keep Your Home Safe While on Vacation appeared first on Security Source.
How can we use the cloud and comply with global privacy laws?
The cloud clearly provides a number of benefits for businesses and associations, but as many are aware, remaining compliant with regional, federal and industry law and regulations is a major challenge.
Layered Database Security in the age of Data Breaches
We live in a time of daily breach notifications. One recently affected organization in Germany put out a statement which said: “The incident is not attributable to security deficiencies.” and “Human error can also be ruled out.” They went on say that …
Data Breaches: The Encryption Challenges
This article is the third in a series that discusses data breach threats and possible solutions. The first two articles, “What You Need to Know,” and “Threats and Consequences,” make it clear that businesses need to take action to reduce data …