Irresistible: Hooks, habits and why you can’t put down your phone

Struggle to part ways with your tech? You’re not alone. Here’s why your devices are your vices. How often do you go somewhere without your phone? And how do you feel when you go somewhere with no signal? Let’s be honest, the majority of us would admit that going without our beloved devices close at … More Irresistible: Hooks, habits and why you can’t put down your phone

How can I keep my child safe from sextortion?

Technology plays an integral role in our daily lives. Because of this, parents are facing the growing challenges of guiding their children through the complexities of online interactions. One particularly concerning aspect is the sharing of intimate photos or videos, or ‘sexting’,  which has become prevalent among younger people. A recent Guardian article sheds light … More How can I keep my child safe from sextortion?

6 open-source tools to assess and enhance corporate defenses

Here’s how the blue team wards off red teamers and a few open-source tools it may leverage to identify chinks in the corporate armor. Do you ever play computer games such as Halo or Gears of War? If so, you’ve definitely noticed a game mode called Capture the Flag that pits two teams against each other – … More 6 open-source tools to assess and enhance corporate defenses

Vulnerabilities in business VPNs under the spotlight

As adversaries increasingly set their sights on vulnerable enterprise VPN software to infiltrate corporate networks, concerns mount about VPNs themselves being a source of cyber risk. Virtual Private Network (VPN) services have emerged as essential tools for modern businesses in recent years, doubly so since helping save the day for many of them amid the pandemic-fueled, pell-mell rush … More Vulnerabilities in business VPNs under the spotlight

Keeping encryption secure from BitLocker sniffing

Recently, the YouTube channel stacksmashing uploaded a video on breaking the built-in encryption in Windows, essentially bypassing Windows Disk Encryption on most devices using Microsoft’s globally dominant operating system with a cheap $10 tool. This all in just 43 seconds – record time. And while encryption has often been the poster child for efficient and secure data protection, now … More Keeping encryption secure from BitLocker sniffing