C'Mon Dad...You Should Know Better

by Jen McNeill on September 2, 2016 at 12:26 PM

Hey Dad: sorry for what I am about to share! …but please keep your plane tickets to visit next month and babysit!-Jen

Happy 25th birthday to the world wide web! It's difficult to imagine the first public website was launched just 25 years ago in 1991. For most people, it's hard to think about our lives without the internet.

Internet use...

As the name implies, QuadRooter is a collection of four exploits in Qualcomm's popular graphics and media chipset, which is in more than 900 million mobile devices globally. When used in combination with malware, the...

A CISO's Guide to Application Security

by Danny Harris on August 11, 2016 at 8:53 AM

CISO Executive Summary

Application security differs in a number of ways from IT security, Network Security, and Information Security, so standard solutions from those domains don’t necessarily address the challenges of...

With Apple's recent announcement about starting its first Bug Bounty Program this September, it raises the issue of why they waited so long and why they did finally did decide to create one. 

Bug Bounty Hunter (BBH)...

All organizations that process credit card data are required to be PCI compliant and abide by PCI DSS security standards. However, many organizations treat PCI compliance as an expensive, stressful, and time-consuming...

In the wake of Pangu releasing the latest iPhone jailbreak, the industry will continue to debate on whether jailbreaking your iPhone is worth the security risk.

With a jailbroken iPhone, you can get past many of the...

Automotive Cybersecurity Best Practices

by Gene Carter on July 27, 2016 at 8:59 AM

Recently the Automotive Information Sharing and Analysis Center (Auto-ISAC) released "Automotive Cybersecurity Best Practices" for carmakers and their suppliers. This document expands on their "Framework for Automotive...

Chrome Takes on Quantum Computers

by Gene Carter on July 25, 2016 at 11:36 AM

Recently, Google announced they are testing a quantum resistant cryptographic algorithm for the Chrome browser, specifically the new Canary version used for experimentation. If you are unfamiliar with quantum resistant...

I want to run into traffic, fall into a pond, catch Pokémon while my wife is in labor, and find a dead body; let's check out this Pokémon Go thing!

Pop quiz: Is this a valid login screen for Google Account services?