Posts

The Flaws in the Binary Computer

The Universal Model of Computation

The Gales in Cyberspace

The Digital Future

Virtualized Society

Maze Ransomware

Moving towards

Android Police: Researchers finally discover how Android malware that could survive factory resets works

Forbes: U.S. Government Offers $5 Million Reward To Identify North Korean Hackers

Forbes: Hacker Claims Android App Store Breach: Publishes 20 Million User Credentials

EDP faces $11m ransomware demand after 'potentially catastrophic' cyberattack | Recharge

CSO Online: Threat modeling explained: A process for anticipating cyber attacks

Popular Mechanics: The 737 MAX Has Been Grounded for a Year Because of Its Terrible Computers

The 10 biggest data hacks of the decade

Forbes: Windows OneDrive Security Vulnerability Confirmed: All You Need To Know

North Korea hacking threatens U.S., other countries, international financial system: U.S. State Department - Reuters

Answer to From a security perspective, what is more important to focus on: threats or vulnerabilities? by Flavius Hobbs 

Forbes: Windows 10 Warning: Anger At Microsoft Rises With Serious New Failure

Forbes: A Sinister New Botnet Could Prove Nearly Impossible To Stop

Password Writing Quiz to Help Bolster Your Online Passwords