PinnedDo we need to move to the darknet to protect out privacy? Here’s how it can be done.The darknet isn’t just for crime. Here are lawful ways you can use the Dark Web to greatly improve your privacy…Aug 121Aug 121
How to configure a firewallFirewalls are one of the most important network security devices you can possibly have. Everyone who uses the internet or internal networks…Nov 7Nov 7
A fun introduction to fileless malwareLet’s talk about fileless malware! This is a fun topic! The topic is so much fun because it forces antivirus vendors to develop and improve…Nov 5Nov 5
Identifying anonymous programmers by their codeIt would be tremendously beneficial for people who work in malware forensics to have better methodolgies for determining human authors!Nov 1Nov 1
8 ways you’re doing PKI wrongYour certificates and encryption are only as good as your public key infrastructure (PKI). Here are my essential tips for enterprises!Oct 29Oct 29
All about insider cyber threats!Perhaps it’s insider threats that enterprises aren’t threat modelling properly. Here are my tips so you aren’t attacked from the inside!Oct 22Oct 22
Bluetooth exploits: BlueSmacking, BlueJacking, BlueSnarfing… oh my!There are lots of fascinating ways that cyber attackers can ruin your day through the Bluetooth interfaces on your devices!Oct 16Oct 16
What we know about the Internet Archive cyber attackThe Internet Archive is one of the most important technological projects ever. True hackers wouldn’t want to destroy it.Oct 101Oct 101
Malware threat means bad news for ATMsYes, malware can be used to make an ATM spit out loads of cash.Oct 9Oct 9
Hacker Heroes: Aaron SwartzAaron Swartz risked himself to protect the free exchange of knowledge. RSS, Reddit, Creative Commons, we owe so much to him. RIP Aaron.Oct 1Oct 1