The excitement is mounting to record highs! We can’t wait to get our keyboard-tapping fingers on the new Windows 10 to be released in a couple of months (end of July based on a leak from AMD). The new OS is promising to be what Windows 8 never managed to … |More
Encryption, Encryption, Encryption. That is what some believe to be the solution to our information protection and assurance problems. Last week, we discussed the now-defunct True Crypt, which could be used to scramble data stored on a range of devices from USB keys, to hard drives and SDDs in … |More
Let’s be honest here: Fingerprint sensors are so 2014. As is the ability to to bypass them. But what if you’re a researcher with vast amounts of knowledge and a willingness to prove the insecurity of everything? What are you going to go after next?
Security researcher Jan Krissler, of … |More
It’s episode 2 of ‘How to build the Internet’s Fort Knox’. We are convinced you spent this past week squashing bugs, patching holes, and preparing for an invasion from the Internet. You are now awaiting instructions on how to get all this waiting, monitoring, listening to someone who can handle … |More
It’s fairly obvious that selling guns to foreign powers carries heavy ethical concerns, and can land the seller in a lot of trouble if not conducted in accordance with the law. But what about cyber security products? Could the sale of web filters and monitoring software lead to a breach … |More
Every once in a while, we need to stop for a moment and look at where we are, to analyse and understand our current situation in order to better face the uncertainties ahead. The more angles we consider during our analysis, the better the overall picture we will have when … |More