October 16, 2018 - Attention makers! Are you looking for a challenging project that not only gets your gears grinding but helps to keep you secure while traveling? Welcome to the build-your-own security camera tutorial.
October 2, 2018 - We know about BYOD. What about BYOS? Is it a good idea to Bring Your Own Security, or use your own security solution on devices that you use for work? What if they are company owned? We walk companies and employees through the pros and cons of each.
September 25, 2018 - Safari has begun blocking legacy extensions installed from outside the Extensions Gallery. Unfortunately, implementation of this policy has been abrupt, with little explanation for users on why their extensions are being yanked. Let's look at how Apple's new policy and how its application impacts security.
September 10, 2018 - In this post, we acquire the necessary equipment to analyze the security of an inexpensive portable router, which we access through its diagnostic interface, and poke around inside.
August 31, 2018 - What is regular expression (regex) and what makes it vulnerable to attack? Learn how to use regex safely and avoid ReDoS attacks in the process.
August 16, 2018 - Popular content management systems are easy to install and use. But how easy is it to keep them secure?
August 3, 2018 - In our explained series, we talk about the impact of big data on our society. What is it, who uses it, and for what purposes?
July 18, 2018 - Smart assistants are programmed to eavesdrop on you in order to await commands. Sometimes they're dangerous, and other times downright hilarious. What's the real value in these devices?
July 12, 2018 - Unfortunately, most ICOs (Initial Coin Offerings) turn out to be scams. So we feel compelled to ask our customers: would you like us to protect you from all of them?