Security

The convenience of single sign-on services is undeniable.  Pretty much every useful website or app requires a password these days, and keeping all of those credentials straight can be both frustrating and insecure.  We all have our system.  Post-It notes on a computer monitor, excel...

Apple has patched three high-severity iOS vulnerabilities that are being actively exploited to infect iPhones so attackers can steal confidential messages from a large number of apps, including Gmail, Facebook, and WhatsApp The spyware has been dubbed Pegasus. To protect yourself you must update to the latest...

This just in from the DEF CON security conference in Las Vegas on August 7: security researchers Paul Stone and Alex Chapman revealed that a default setting in Windows and one that is present in many web browsers across operating systems allows a compromised network...

Most hacks require some kind of user feedback.  Whether it’s visiting a certain website, opening a certain .exe file, or clicking “yes” on an OK button, exploits are usually something we have to allow. Apple identified a new bug last week, however, which uses a far more...

Resilience is a fashionable term in homeland security circles these days.  The idea is simple.  It’s impossible to predict or plan for every kind of emergency situation.  What you can do, however, is to plan for the time after an emergency comes. If there are structures and procedures in place to...