My mother asks the following question, so I'm writing up a blogpost in response.I am watching a George Boole bio…
In today's post, I answer the following question:Our customer's employees are now using our corporate application while working from home.…
There are few college programs for "cybersecurity". Instead, people rely upon industry "certifications", programs that attempt to certify a person…
Today a couple vulnerabilities were announced in Zoom, the popular work-from-home conferencing app. Hackers can possibly exploit these to do…
Today Huawei published a video explaining the concept of "backdoors" in telco equipment. Many are criticizing the video for being…
In software development, we start with a "requirements specification" defining what the software is supposed to do. Voting machine security…
There's no evidence the Saudis hacked Jeff Bezos's iPhone.This is the conclusion of the all the independent experts who have…
At the center of the "Saudis hacked Bezos" story is a mysterious video file investigators couldn't decrypt, sent by Saudi…
I'm currently experiencing the toxic hell that is a misunderstood tweet going viral. It's a property of the social media.…
"RISC" was an important architecture from the 1980s when CPUs had fewer than 100,000 transistors. By simplifying the instruction set,…