This is a nice way of looking at key strength, comparing the amount of computing power it would take to hack a cryptographic encryption with how much energy it takes to boil different quantities of water. Specifically, Dutch mathematician Arjen…
The NSA doesn’t just spy on everyone….it actually publishes a very good comprehensive guide to end user and home network security. NSA_Best_Practices_for_Home_Network_Security_June2013
EFF needs your help! Do you have an old iPhone 4S or newer sitting around? Want to put it to better use than being a paperweight? Donate it to EFF. EFF need your used unlocked iPhone In order to do…
Funniest article lampooning security that I’ve read for a long time by James Mickens at Usenix. Sometimes, when I check my work email, I’ll find a message that says “Talk Announcement: Vertex-based Elliptic Cryptography on N-way Bojangle Spaces.” I’ll look…
Re-posting this as it’s an interesting and thoughtful perspective on security from a human viewpoint. http://swiftonsecurity.tumblr.com/post/98675308034/a-story-about-jessica
Here’s a useful list of common e-mail subjects used to distribute Cryptolocker ransomware. If you use a capable mail filtering tool, such as Mimecast, you can add regex or similar filters to automatically block these as an additional layer of…
Chronology of Data Breaches We’re all aware of the latest high profile cyber attacks reported in the media. The the Privacy Rights Clearinghouse, a California non-profit, publishes a database of cyber attacks, data breaches and privacy disclosures going back to…
If you own an Apple Mac 2014 or older you should be afraid…..very afraid. Oh, and you can stop believing the hype and the fanboy trot out that ‘Apple devices don’t get malware’™ which hasn’t been true for a long…




Recent Comments