We are inundated with information nowadays, from the tweets,
texts, TV, streaming, email, mentions, etc, etc. This hectic
lifestyle puts us into a mode of needing to respond as soon as
possible to any interruption or notice that happens in...
I'm writing to let you know of a change happening on June 27th,
2018 to our Central Authentication Service (CAS) front page. CAS is
used for a single place to sign in for many of our websites that we
use here at the IAS. We are...
Subject: Fwd: Wire Transfer Initiated
Wire Transfer is about to
be initiated,
Please Confirm Attached Invoice.
Open Invoice |
Download Invoice
Open Invoice (https://invoibnvdswa(...
What is having a Meltdown and
what does a Spectre have to do with it?
A vulnerability has been found in modern computer processors
(after 2009) that allows one program to steal data from another
program on the same computer. Computer programs...
Krack stands for Key
Reinstallation
Attacks. It is an exploit against the
WPA2 protocol that preys on an issue in the protocol itself.
These are usually the worst kind of issues, because they affect
every...
On September 7, 2017, Equifax
CEO Rick Smith announced that on July 29, 2017 Equifax suffered
a data breach between May and July 2017. The breach may have
included the personal credit information of 143 million Americans,
including...
As a security professional, I spend a lot of my time making sure
that the bad guys aren't able to break in. I set up all the fancy
firewalls and anti-virus to keep us safe. But what happens when a
user unknowingly gives up...
Deep packet inspection is a methodology that network security
professionals have been doing for many years. It involves looking
at the data going over the network and determining if anything
malicious is going on based on what's in those packets.