Security

This just in from the DEF CON security conference in Las Vegas on August 7: security researchers Paul Stone and Alex Chapman revealed that a default setting in Windows and one that is present in many web browsers across operating systems allows a compromised network...

Most hacks require some kind of user feedback.  Whether it’s visiting a certain website, opening a certain .exe file, or clicking “yes” on an OK button, exploits are usually something we have to allow. Apple identified a new bug last week, however, which uses a far more...

Resilience is a fashionable term in homeland security circles these days.  The idea is simple.  It’s impossible to predict or plan for every kind of emergency situation.  What you can do, however, is to plan for the time after an emergency comes. If there are structures and procedures in place to...

Talk about a shot heard ‘round the world.  The so-called “Panama Papers” – a trove of data on money laundering and other financial shenanigans by the world’s wealthiest people – has already claimed several careers.  The Prime Minister of Iceland had to resign.  Russian oligarchs are scrambling for...

Whenever a cybersecurity incident happens, people start pointing fingers. The I.T. staff is usually where most blame is assigned, at least to start.  If only the right patch was in place, if only the anti-virus software had been updated, if only the network was monitored correctly –...