720-891-1663

It’s To Protect The Children

Law enforcement has been trying since at least the 1990’s when they jailed and tried to convict Phil Zimmerman for creating an open source encryption program called PGP, to put the encryption genie back in the bottle. The problem is that encryption is math and math doesn’t care about politics. If some governments were to […]

Continue reading → [DISPLAY_ACURAX_ICONS]

The Latest Supply Chain Risk – Your Desk Phone

Senator Chris Van Hollen (Maryland) wrote a letter to Commerce Secretary Raimondo asking what she planned to do about this security vulnerability – the first we are hearing about it. Raimondo could ban the equipment, just like equipment made by Huawai and others. Chinese electronics maker Yealink is not a household word like Huawei, but […]

Continue reading → [DISPLAY_ACURAX_ICONS]

New Attack Exploits Microsoft Software Signing Verification

Software released by Microsoft and other vendors is digitally signed so that users can validate that it really came from the vendor in question and that it has not been modified since the vendor created it. However, hackers have figured out how to bypass the security provided by Microsoft’s digital signature verification process, allowing them […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Why the Internet Does Not Replace Common Sense

Some people say that common sense isn’t so common anymore. Sometimes the Internet doesn’t seem to have much common sense, so those people might be right. Hopefully most adults can distinguish between smart things to do and not so smart things to do, but not always. Right after Apple and Google split over Google maps […]

Continue reading → [DISPLAY_ACURAX_ICONS]