Anti-Censorship technologies have been an important topic in the last few years but especially recently with the global uprisings against oppressive regimes such as those in Iran and Syria. Many of these countries, including countries such as China and North … Continue reading

Posted in Security, Technology | Tagged , | Leave a comment

Ethical hacking, the topic of IT security assessments, along with threat and risk assessments have all been written and spoken about, with experts dissecting different kinds of breaches. One thing continues to stand out–the company CEO mindset: “how much” for … Continue reading

Posted in News, Security | Leave a comment

From CNN.com: This year’s Black Hat cybersecurity conference in Las Vegas offered up a shocking, quirky and often downright strange view of the security space. A “brute force” attack on an iPhone can cycle through nine password guesses per second, … Continue reading

Posted in Security | Leave a comment

Over the last few years there’s been a significant increase in large scale cyber attacks against governments and organizations across the globe. One of the more notable and recent was that against the International Monetary Fund where the scope of … Continue reading

Posted in Security | Leave a comment

In by far one of the most publicly visible and aggressive attacks from China, Google Inc. has reported that it has disrupted what it believes was a targeted phishing campaign against government officials, contractors and military personnel in the United … Continue reading

Posted in Security | Leave a comment

To date the largest security breaches in history were Sony’s PlayStation network. After a few weeks of investigation, it turns out that over 77 million users may have had their personal information including names, birth dates, emails and other login … Continue reading

Posted in Security | Tagged | Leave a comment

Client-side vulnerabilities are some of the easiest to exploit and are very prevalent. If you don’t know, client-side means that all of the code runs on your local computer. When you load up a website, anything you see in the … Continue reading

Posted in Security, Technology | Tagged , | Leave a comment