October 16, 2017

Hotel Chain Hyatt Announces Second Breach in 2 Years

Read morearrow_forward

The Top 25 Most Common Passwords of 2014

The newly released list of the top 25 most common passwords reveals that we are still a far cry away from where we should be.

Read more arrow_forward

Hacking Cars through Insurance Dongles

A security researcher recently proved what everyone suspected: cars can easily be hacked. He pulled this off by discovering vulnerabilities in a dongle provided by an insurance company – the same dongle two million other drivers have installed in their cars.

Read more arrow_forward

What Sets Apple Pay Apart from other Mobile Wallets?

What sets Apple Pay apart from its competitors in terms of security – Jacky Guo investigates.

Read more arrow_forward

Making Users Hack Themselves – Reflected Cross Site Scripting Combines Social and Technical Attack Vectors

Most of you know the dangers of cross-site scripting (XSS), but how many of you know that Reflected XSS combined with a bit of social engineering can be even more dangerous?

Read more arrow_forward

Dangers of Using VPNs

In this day and age, we must question ourselves – just how safe is our data on the internet, outside of the parameters of our firewall and anti-virus? With this…

Read more arrow_forward

The Imitation Game: A Great Film on Espionage and Cryptography

The Imitation Game takes you on a great journey into the earlier days of cryptography and espionage.

Read more arrow_forward

Weird Security Term of the Week: “Wardriving”

Learn a new term every week! This week, we’ll examine the many forms of “wardriving,” and how to protect yourself against them.

Read more arrow_forward

​U.S. Central Command Accounts Hacked

how is it possible that military accounts that allow 2-factor authentication were hacked?

Read more arrow_forward

North Korea’s Red Star OS Reveals Poor Development Skills

North Korea’s operating system, the Red Star OS 3.0, offers a look inside the North Korean software development capabilities, as well as their “internet.”

Read more arrow_forward