Ethical No Brainer

We are in the security business and making money off of vulnerabilities is what we do.  We search for vulnerabilities, we patch vulnerabilities, we implement workarounds for those that have no patches and we work to protect our clients against known and even suspected...

Do You Trust Your Co-Worker?

He does look a bit shifty, but, more likely, he is clumsy rather than dishonest.  A survey of 3,000+ employees and IT practitioners across the U.S. and Europe by the Ponemon Institute. and sponsored by Varonis Systems, reported three out of every four organizations...

Every Other One

Eeny meeny miny moe, I’ll steal your data then I’ll go!  A recent study by the Ponemon Institute, reports that more than 50% of Small to Medium Businesses (SMBs), that’s every other business folks, were breached in the past year.  The study was sponsored by password...

“Not OK, Google”

A group of researchers from Georgetown University and UC Berkeley have demonstrated how voice commands hidden in YouTube videos can be used by malicious attackers to compromise smartphones.  The attack works against phones that have the Google Now, or Apple Siri voice...