November 16, 2017 - A trusted root certificate is the cornerstone of authentication and security in software and on the Internet. But even this can be abused by criminals. Learn when you shouldn't trust these trusted sources.
November 14, 2017 - The cloud. What is it? What are the pros and cons, and how can we make it as safe as possible? This post covers the basics.
November 6, 2017 - Continuing education about cryptocurrency, we provide some insight into the technology behind blockchain and explain what makes it secure.
October 31, 2017 - As an alternative to reverse engineering malware that is protectively packed, we look at the option of analyzing malware by API calls to determine what a file might be up to.
October 24, 2017 - What happens exactly when you delete a file, and how easy or hard is it to recover deleted files? Learn the differences between delete, erase, and overwrite according to digital forensics.