Robert Graham

What is Boolean?

My mother asks the following question, so I'm writing up a blogpost in response.I am watching a George Boole bio…

7 months ago

Securing work-at-home apps

In today's post, I answer the following question:Our customer's employees are now using our corporate application while working from home.…

7 months ago

CISSP is at most equivalent to a 2-year associates degree

There are few college programs for "cybersecurity". Instead, people rely upon industry "certifications", programs that attempt to certify a person…

7 months ago

About them Zoom vulns…

Today a couple vulnerabilities were announced in Zoom, the popular work-from-home conferencing app. Hackers can possibly exploit these to do…

9 months ago

Huawei backdoors explanation, explained

Today Huawei published a video explaining the concept of "backdoors" in telco equipment. Many are criticizing the video for being…

10 months ago

A requirements spec for voting

In software development, we start with a "requirements specification" defining what the software is supposed to do. Voting machine security…

10 months ago

There’s no evidence the Saudis hacked Jeff Bezos’s iPhone

There's no evidence the Saudis hacked Jeff Bezos's iPhone.This is the conclusion of the all the independent experts who have…

11 months ago

How to decrypt WhatsApp end-to-end media files

At the center of the "Saudis hacked Bezos" story is a mysterious video file investigators couldn't decrypt, sent by Saudi…

11 months ago

So that tweet was misunderstood

I'm currently experiencing the toxic hell that is a misunderstood tweet going viral. It's a property of the social media.…

12 months ago

This is finally the year of the ARM server

"RISC" was an important architecture from the 1980s when CPUs had fewer than 100,000 transistors. By simplifying the instruction set,…

1 year ago