Google’s Ormandy once again the bearer of bad news
Experts Hit Back at Rudd’s ‘Cheap’ WhatsApp Shot
Home secretary wants firms to break end-to-end encryption
What You Need to Know About Caching Video Series
In this “unofficial” video series, Akamai Solutions Engineers Tedd Smith and CJ Arnesen explain the basics of caching: what it is, why it’s important, and how to get the most out of it. A great introduction to Akamai, caching, and content delivery netw…
FBI Warns on FTP Attacks to Access Medical, Dental Info
Criminals are accessing protected health and personally identifiable info to intimidate, harass and blackmail business owners.
Kaspersky: Criminals Make 95% Profit on DDoS
Ordering a DDoS attack has become as easy as ordering the latest bestseller from Amazon—and can offer incredible ROI.
Employees Willing to Leak and Sell Corporate Access
Almost a third of European employees have sent unauthorized information to a third party
US Preps Social Media Checks for Visa Applicants
Leaked memos suggest extra scrutiny for those who travelled to ISIS-controlled countries
Toolsmith #124: Dripcap – Caffeinated Packet Analyzer
Dripcap is a modern, graphical packet analyzer based on Electron.
Electron, you say? “Electron is a framework for creating native applications with web technologies like JavaScript, HTML, and CSS. It takes care of the hard parts so you can focus on th…
OUTSMARTING THIEVES: Some are not as sophisticated as you might think!
Taking a close look at ways to keep your family safe and protect what is important to you. Part 5 of a 5-part series. Protecting the things that are important to you can seem daunting. But keep in mind, some thieves trying to steal from you aren’t really all that sophisticated. In fact, sometimes, they […]
The post OUTSMARTING THIEVES: Some are not as sophisticated as you might think! first appeared on ProSec Integration, LLC.
SambaCry, the Seven Year Old Samba Vulnerability, is the Next Big Threat (for now)
As Samba is used as part of many organizations storage systems, we will discuss the impact of the vulnerability on organizations and home users.