Time to Switch From Debit to Credit When Paying for Things?
I tend to prefer debit when purchasing things. It hasn’t really been a security thing for me; it’s been more...
Read more →I tend to prefer debit when purchasing things. It hasn’t really been a security thing for me; it’s been more...
Read more →Let me just say that I am highly resistant to conspiracy theories in general. I think most of them are...
Read more →I’ve been obsessed with an idea for a while now of a networking and security tool that captures network data...
Read more →Does anyone else think it’s (shameful | criminal | wrong | outrageous) for Exxon to be making record profits (10.7...
Read more →The information security community is a relatively small one, and it remains so even on the Internet. It feels good...
Read more →I’ve been thinking a lot recently about the usefulness of risk assessment. A while back I had an interesting conversation...
Read more →Most in the information security community have heard of the “cold-boot” attack against encryption products that was recently released by...
Read more →The fundamental problem when managing feeds is input management. Most of us simply have too many feeds to read in...
Read more →One of the most common arguments I hear from the religious is that their beliefs and mine are the same....
Read more →This explains a lot. The Dunning-Kruger effect describes the phenomenon whereby people who don’t know anything about something think they...
Read more →Subdomain takeovers are a well-documented security misconfiguration. Despite widespread awareness, developers still frequently forget to remove DNS records pointing to...
Read more →A new BBC piece is highlighting an alternate approach to depression. Rather than assume that it’s something that should immediately...
Read more →