Blackphone, a secure smartphone

Blackphone, a secure smartphone

Based on the Android mobile OS, Blackphone offers a secure operating system paired with key applications to provide a secure environment for phone calls,...

Read More »

They don't want to take compromising or sexual photos of you, they want something…

They don't want to take compromising or sexual photos of you, they want something…

They don't want to take compromising or sexual photos of you, they want something scarier. Researchers have developed an algorithm to detect the PIN...

Read More »

IPMI and BMC vulnerabilities put thousands of servers at risk

IPMI and BMC vulnerabilities put thousands of servers at risk

Multiple vulnerabilities in the IPMI protocol and the baseboard management controllers designed to allow remote, hardware level access to servers, could allow an attacker...

Read More »

Share if you bike

Share if you bike

Share if you bike Reshared post from +Mike Searle Share if you leak? View this post on Google+

Read More »

Privacy improvements in iOS8

Privacy improvements in iOS8

Apple is introducing a number of privacy-protection enhancements in it's upcoming mobile device operating system.  The most notably is perhaps the use of random...

Read More »

Comcast wants to share your WiFi

Comcast wants to share your WiFi

Comcast has been slowly enabling public WiFi access in their home routers across the country, allowing other users to connect to the internet via...

Read More »

Ransomware on the rise

Ransomware on the rise

These "Ransomware" attacks will render all the files on your hard drive(s) and accessible network storage useless.  The typical infection will state, that for...

Read More »

OpenSSL releases security advisory

OpenSSL has released updates patching 6 vulnerabilities, which may allow an attacker to decrypt or modify traffic between a vulnerable client and server. The...

Read More »

UEFI Secure Boot mechanism bypassed

UEFI Secure Boot mechanism bypassed

From the article: The Secure Boot security mechanism of the Unified Extensible Firmware Interface (UEFI) can end up bypassed on around half of computers that...

Read More »

Switch to our mobile site