Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: “Simple Log Review Checklist Released!” is often at the top of this list – the checklist is still a very useful tool for many people.Show More Summary
Government claims eligibility info missing, but insurance agents say online glitches preventing information from being received by CMS
Twitter just announced that their analytics are now available to all users not just advertisers, but is that too much information? Read more about #TMI – Is Twitter giving users 2 much info?
Samsung and LG stole a jump or two on Apple today by announcing two new smart watches; the Samsung Gear S and the LG G Watch R. Read more about Wanna buy a watch? Watching the smart watch wars
Andrey Rudenko of Minnesota used a custom-built, cement-spraying 3D printer to print a 3D castle in his backyard. Read more about Minnesota man builds 3D castle with 3D printer
Having spent time in several Asian countries over the years, I have learned a lot about why students from these countries excel in mathematics and related technical fields. Read more about Companies Struggle to Find Workers in U.S. With Basic Math Skills
I seriously love these headphones, they are easy to use, are attractive, very easy to set up, have fast charging and long battery life, decent sound, and they both look and feel wonderful. Read more about Plantronics BackBeat Pro: Can You Fall In Love With a Headset?
Six year database developer Alex Kuznetsov has come up with some interesting and seemingly counter-intuitive best practices. Read more about Why one agile developer sees silos as a good thing
New legally mandated student tracking system plagued with problems
Almost exactly a year ago my family and I moved from Northern California to 20 miles west of the capital of the United Kingdom, London. It was the start of an adventure that’s exposed us to a new culture, cut us off from most of our friends and family and made massive changes to how […]
“This is not the Last Hacker Standing: Episode IV – Part II Revenge of the @k8em0 that you’re looking for!” To fill the void in your lives before we release the epic that is Episode IV Part II we got the crew together to chat about hacker summer camp and our personal recovery plans… In […]
Developers have to answer a lot of questions when building apps but one question that doesn’t have a clear answer is how do you build spyware into your apps? Read more about So exactly how do you build spyware into your apps?
There's a dangerous trend happening around the world – courts attacking technology providers rather than people who use those technologies. Read more about Foreign courts may force developers to change the way they code
The researchers who hacked into Gmail on Android were able to show that apps can interfere with each other and that's the really scary part. Read more about Gmail wasn't the only thing hacked by researchers; it's bigger than that
by Vivek Vahie The cloud is one of the most important technologies in the world right now, but can be extremely confusing. This series aims to explain it in a much more brain-friendly way. Read more about 99 problems but the cloud ain't one: What are SaaS, PaaS and IaaS?
by Alysia Judge Like the birth of computing, the virtual devices may only hold five kilobytes of data between them, but the results are, nevertheless, amazing. Read more about Gaming master builds working hard drive inside Minecraft
It’s true, we don’t want little things like experience and a broad knowledge of the landscape of technology getting in the way of our policy makers, now do we? Or at least that seems to be the way US White House cybersecurity coordinator, Michael Daniel thinks. Why get lost in an understanding of the big […]
With protest and outcry in the wake of the shooting of Michael Brown in Ferguson, Mo., citizens and police find themselves looking for answers on how to improve relations and prevent more senseless death; some argue that the answer is wearable cameras. Show More Summary
The compromise of Community Health Systems (CHS) is being reported as the first major breach involving the Heartbleed vulnerability. The details are slim, but apparently the vulnerability was exploited on a Juniper remote management console that hadn’t been properly updated. Heartbleed is an OpenSSL vulnerability that allows an attacker to dump part of the memory […]
Stating various reasons including a hectic schedule, teaching, civic contributions, learning and taking over as the owner of the LA Clippers, Steve Ballmer has left his position on the Microsoft Board of Directors. Read more about Ballmer steps down from Microsoft Board