Advanced persistent cybersecurity
Tuesday, May 19, 2020
Securing work-at-home apps
In today's post, I answer the following question: Our customer's employees are now using our corporate application while working f...
Wednesday, May 13, 2020
CISSP is at most equivalent to a 2-year associates degree
There are few college programs for "cybersecurity". Instead, people rely upon industry "certifications", programs that a...
Thursday, April 02, 2020
About them Zoom vulns...
Today a couple vulnerabilities were announced in Zoom, the popular work-from-home conferencing app. Hackers can possibly exploit these to do...
Friday, March 06, 2020
Huawei backdoors explanation, explained
Today Huawei published a video explaining the concept of "backdoors" in telco equipment. Many are criticizing the video for being ...
Wednesday, March 04, 2020
A requirements spec for voting
In software development, we start with a "requirements specification" defining what the software is supposed to do. Voting machine...
Tuesday, January 28, 2020
There's no evidence the Saudis hacked Jeff Bezos's iPhone
There's no evidence the Saudis hacked Jeff Bezos's iPhone. This is the conclusion of the all the independent experts who have revi...
How to decrypt WhatsApp end-to-end media files
At the center of the "Saudis hacked Bezos" story is a mysterious video file investigators couldn't decrypt, sent by Saudi Crow...
Sunday, December 29, 2019
So that tweet was misunderstood
I'm currently experiencing the toxic hell that is a misunderstood tweet going viral. It's a property of the social media. The more t...
View web version