William Tsing

Breaking things and wrecking up the place since 2005.

July 25, 2017 - There's been a lot of talk recently about encryption and how law enforcement can't convict criminals without encryption keys. We beg to differ.

CONTINUE READINGNo Comments

June 9, 2017 - Many people post unredacted medical images to Twitter and Instagram. They shouldn't because the details included on the image often can compromise personal identity online and in rare instances, lead to a possible attack on an exposed piece of medical IT infrastructure.

CONTINUE READING4 Comments

June 7, 2017 - We’ve talked a lot about tech support scams over the past few years, typically focused on what we see ourselves, and the scammers who like to pose as Malwarebytes. But tech support scams are much bigger than that, targeting every tech company under the sun. So what are other people doing about it? Let's take a look at some of the other players working to keep you safe.

CONTINUE READINGNo Comments

May 24, 2017 - Cyberthreats are typically boring, repetitive, and require a reasonably predictable remediation process. Here are 5 cyberthreats that if you’re not frightened by, you should be.

CONTINUE READINGNo Comments

May 4, 2017 - OWASP recently published a draft list of the top 10 security vulnerabilities of 2017. While intended for developers seeking to code more secure applications, the top 10 list is based on actual survey data of threats seen in the wild and serves as a great starting point for organizations struggling with security priorities. Let's take a look and see how long they’ve been around prior to publication.

CONTINUE READINGNo Comments

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language