Author: Cybernoz
A study has been released that says that talking on a mobile phone while driving is still very dangerous even…
A newly disclosed vulnerability affecting Jenkins Docker images has raised serious concerns about network security. The vulnerability, stemming from the…
Ransomware attacks increased by nearly 20% in 2024, and the severity rose by 13%, according to At-Bay. The blast radius…
Switch to Pure Key-based AuthenticationI say pure because it doesn’t help to just enable key-based authentication; you have to disable…
2024 brought about countless new cybersecurity challenges including significant growth of the mobile threat landscape, according to Lookout. Threat actors,…
Many people wonder why some businesses require them to sign a receipt when they pay with a credit card, while…
Here’s a look at the most interesting products from the past week, featuring releases from Forescout, Index Engines, Jit, RunSafe…
In continuing with ongoing efforts to improve the site, I’ve modified the look of the lists in my sidebars. Among…
It can be frustrating to not have a system for your iPhone app organization–especially if you’re an optimization freak like…
This is me in 87′ executing a handplant. For anyone interested, that’s a John Lucero board with a super short…
A while back during a pentest my buddy Steve came up with a cool idea for doing Nmap scans while…
Aussie Broadband has outlined a six-pillar technology strategy aimed at making IT more trusted and able to underpin an ambitious…











