07 Dec 2018

Not All TLS is Created Equal

Security Image

Many, many software service sales professionals throw around security phrases to make cyber security sound simple. Today, as technologies advance and threats get ever more sophisticated, encrypting email for privacy compliance is not getting simpler. The devil (hacker) is in the details. Here, we will try to (in a simple manner) decipher a commonly referred to catch all for security, TLS, and explain why the details are important. “Not all TLS is... Read more...

Security Image
30 Nov 2018

Your Spit is Your Real Government ID

DNA Card

The DHS is using Congress’ “Real ID” Act of 2005 to require all US states to issue new, more robust IDs for air travel originating in the United States (source). Has the DHS missed the real opportunity, to consider today’s state of technology? There are already millions upon millions of dollars being spent to upgrade every citizen’s driver’s license to a “Real ID”. Why not, in the same process, associate each one’s retina scan, fingerprint,... Read more...

DNA Card
16 Nov 2018

Email Security Beyond the Soundbite

The ubiquity of smart phones and their apps have reduced the attention span for the masses. People now expect their information in big fonts, nice colors, and pretty pictures. In the tech world, while many services have features that are now described in simple sound bites, it is often the details that make one product work for a customer need; or work better than similar sounding alternatives. And, with heightened awareness of email security needs,... Read more...

12 Nov 2018

Whaling is Flourishing, a $5 Billion Hacker Lottery

Whale Tail

Harpooning whales is (in most of the world) a thing of the past. This is good for the kind-hearted. But in the cyber world, harpooning “whales” is a thriving and fantastically profitable criminal profession. Who is doing the whaling? Sophisticated hackers start by purchasing your information from marketing companies and LinkedIn recruiter tools. They use basic automation tools to lure “whales” into replying to an email that has no links,... Read more...

Whale Tail
28 May 2018

Of Course, Alexa has Control of Your House

Author:

Recent reports of the amazing eavesdropping power and home control Amazon’s Alexa has (similar to other voice-assistances) should not surprise. Its inherent in how these virtual assistants work. Alexa has to always be listening to be able to respond to a voice command that may come from you yelling across the kitchen. She has to be ready to respond to back-and-forth question-response to receive further clarifying instructions if needed, so she... Read more...