Byline / Apr 19, 2018
Fun Fact #2: the author is looking forward to being a card-carrying Singaporean crime fighter (temporarily) someday.
Byline / Apr 3, 2018
People are mining coins all over the place-all it costs is money for the power bill. So, of course, clever people are figuring out how to use other people’s power to mine cryptocurrency.
Byline / Mar 9, 2018
Reaper is just one more blinking light in the faces of the InfoSec community reminding us that we need to get ahead of IOT madness.
Blog / Feb 8, 2018
Real estate scams are big business for attackers. Be on the lookout for this one, which can leave home buyers destitute if not caught in time.
Blog / Jan 4, 2018 (MODIFIED: Jan 18, 2018)
With Mirai rearing its ugly head again, we’re revealing its C&C hostnames so organizations can update their blacklists and protect themselves.
Blog / Dec 27, 2017 (MODIFIED: Jan 15, 2018)
Bleichenbacher attacks will likely continue to pop up until TLS 1.3 is fully adopted, which could take years.
Byline / Dec 1, 2017
F5 Labs' David Holmes writes for LinkedIn, discussing whether cryptocurrencies are a scam or a revolution.
Blog / Oct 3, 2017 (MODIFIED: Nov 14, 2017)
Legislation is a good first step toward persuading IoT manufacturers (who want to stay in business) to do the right thing when it comes to the security of their devices.
Blog / Sep 13, 2017 (MODIFIED: Oct 24, 2017)
There’s a lot of hype surrounding cryptocurrencies, but what’s good for currency traders may not be great for security-minded professionals.
Report / Jul 13, 2017 (MODIFIED: Nov 2, 2017)
Safeguarding TLS against attack in the quantum computing age will require changes to today’s TLS key exchange algorithms.
Blog / May 16, 2017 (MODIFIED: Jul 24, 2017)
Is the Intel AMT vulnerability as bad as we all first thought? Either way, here are some suggestions for protecting yourself.
Article / Oct 23, 2016 (MODIFIED: Jul 6, 2017)
DARPA claims it takes most organizations an average of 312 days to discover software vulnerabilities. That’s an eternity for hackers to wreak havoc in your network.
Article / Aug 2, 2016 (MODIFIED: Jul 6, 2017)
Malicious actors and eavesdroppers are forcing Internet communication into a single cryptographic protocol: SSL.