Possible credit card breach at Home Depot

Possible credit card breach at Home Depot

 It is believed that this breach could be many times larger than Target, which had 40 million credit and debit cards stolen over a three-week...

Read More »

Can you trust your USB devices?

Can you trust your USB devices?

An article claims that we could be headed to a reality where you can’t trust your USB devices.  Not just storage devices, but any...

Read More »

Blackphone, a secure smartphone

Blackphone, a secure smartphone

Based on the Android mobile OS, Blackphone offers a secure operating system paired with key applications to provide a secure environment for phone calls,...

Read More »

They don't want to take compromising or sexual photos of you, they want something…

They don't want to take compromising or sexual photos of you, they want something…

They don't want to take compromising or sexual photos of you, they want something scarier. Researchers have developed an algorithm to detect the PIN...

Read More »

IPMI and BMC vulnerabilities put thousands of servers at risk

IPMI and BMC vulnerabilities put thousands of servers at risk

Multiple vulnerabilities in the IPMI protocol and the baseboard management controllers designed to allow remote, hardware level access to servers, could allow an attacker...

Read More »

Share if you bike

Share if you bike

Share if you bike Reshared post from +Mike Searle Share if you leak? View this post on Google+

Read More »

Privacy improvements in iOS8

Privacy improvements in iOS8

Apple is introducing a number of privacy-protection enhancements in it's upcoming mobile device operating system.  The most notably is perhaps the use of random...

Read More »

Comcast wants to share your WiFi

Comcast wants to share your WiFi

Comcast has been slowly enabling public WiFi access in their home routers across the country, allowing other users to connect to the internet via...

Read More »

Ransomware on the rise

Ransomware on the rise

These "Ransomware" attacks will render all the files on your hard drive(s) and accessible network storage useless.  The typical infection will state, that for...

Read More »

Switch to our mobile site