Attack Flow: Learn how cyber adversaries combine and sequence offensive techniques
16
Apr
2025

Attack Flow: Learn how cyber adversaries combine and sequence offensive techniques

MITRE’s Attack Flow project aims to translate complex cyber operations into a structured language. By describing how adversaries sequence and…

Percentages of Hitting a Given Number Using x Number of d6’s
16
Apr
2025

Percentages of Hitting a Given Number Using x Number of d6’s

My buddies and I are doing a Harn campaign right now and one of the mechanics involves accruing stat “checks”…

Funding Expires for Key Cyber Vulnerability Database – Krebs on Security
16
Apr
2025

Funding Expires for Key Cyber Vulnerability Database – Krebs on Security

A critical resource that cybersecurity professionals worldwide rely on to identify, mitigate and fix security vulnerabilities in software and hardware…

The future of authentication: Why passwordless is the way forward
16
Apr
2025

The future of authentication: Why passwordless is the way forward

By now, most CISOs agree: passwords are the weakest link in the authentication chain. They’re easy to guess, hard to…

Modern Science on Self-Control, and 4 Things You Can Do Immediately to Improve It
16
Apr
2025

Modern Science on Self-Control, and 4 Things You Can Do Immediately to Improve It

Image from scientificamerican.com Scientists are now discovering that self-control is a precious, finite resource that can be raised and lowered…

PayPal and Two-Factor Authentication: A “Weakest Link” Case in Point
16
Apr
2025

PayPal and Two-Factor Authentication: A “Weakest Link” Case in Point

I am an enthusiastic user of the Verisign PIP two-factor authentication service. It’s a system that allows you to add additional…

Why We Shouldn’t Call Ourselves Atheists
16
Apr
2025

Why We Shouldn’t Call Ourselves Atheists

First, watch the talk. Believe me–it’s worth it. Now, I think the talk is brilliant, and I think he makes…

Critical Chrome Vulnerability Let Attackers Steal Data & Gain Unauthorized Access
16
Apr
2025

Critical Chrome Vulnerability Let Attackers Steal Data & Gain Unauthorized Access

Google has issued an urgent security update for its Chrome browser after two critical vulnerabilities were discovered. These vulnerabilities could…

The Mexican Immigration Solution: Make U.S. Immigration Policy Match Mexico’s
16
Apr
2025

The Mexican Immigration Solution: Make U.S. Immigration Policy Match Mexico’s

So perhaps you’ve heard the story of evil America trying to enact a draconian immigration policy towards Mexico. It’s the…

5X WordPress Speed Improvement with W3 Total Cache
16
Apr
2025

5X WordPress Speed Improvement with W3 Total Cache

[ NOTE: This is an older configuration, and my latest can be found here. ] If you are into blogging…

The Worst Mistake People Make in Political Arguments
16
Apr
2025

The Worst Mistake People Make in Political Arguments

The only way to have a real discussion is to realize that both parties think they are doing good, and…

Best Crypto Tax Software in 2025: A Comprehensive Guide
16
Apr
2025

Best Crypto Tax Software in 2025: A Comprehensive Guide

Keeping up with crypto tax laws in Europe feels like a constant hurdle. Regulations evolve, tax authorities demand precise reporting,…