4 Tips to Secure Your Online Gaming Accounts

In a perfect world, you would be playing your favorite online action, shooter, and fantasy games without concern—in a magical world with no hackers, malware, or cyber-attacks. Unfortunately, that world doesn’t exist. In the real world, pretty much everything you do online is under constant siege and risk of attack ... Read More
Inner Circle Podcast: Episode 007 – Daniel Miessler Demystifies Machine Learning

Inner Circle Podcast: Episode 007 – Daniel Miessler Demystifies Machine Learning

My guest for this episode of the Inner Circle podcast is Daniel Miessler, Director of Advisory Services for IOActive. Daniel presented a session at IOAsis a few weeks ago while we were in San Francisco attending the RSA Conference. I was not able to attend, but the session title–“Machine Learning ... Read More
Inner Circle Podcast: Episode 006 – Corey Williams Discusses Next-Gen Access and Zero Trust Security

Inner Circle Podcast: Episode 006 – Corey Williams Discusses Next-Gen Access and Zero Trust Security

My guest on this episode of the Inner Circle podcast is Corey Williams, Senior Director of Product Management at Centrify. The focus of our chat is next-gen access, and how the principle of zero trust security is a better approach for identity and access management. I think we can all ... Read More

4 Tips to Secure Your Online Gaming Account and Prevent It from Getting Hacked

In a perfect world, you would be playing your favorite online action, shooter, and casino games without concern—in a fantasy world with no hackers, malware, or cyber-attacks. Unfortunately, that world doesn’t exist. In the real world, pretty much everything you do online is under constant siege and risk of attack ... Read More
Review: iStorage DiskAshur Pro 2 Portable SSD

Review: iStorage DiskAshur Pro 2 Portable SSD

There are a number of reasons that you might want to transport data on an external, portable storage device like a USB thumb drive or portable hard drive or SSD unit—you may need to share data with or deliver data to someone, you might want to transport data without having ... Read More
Robots Want Bitcoins Too!

Inner Circle Podcast: Episode 004

My guest on the Inner Circle podcast this week is Cesar Cerrudo, CTO of IOActive. Our topic revolves around ransomware–but with a twist that involves robots. I think we can all agree that ransomware is annoying. When it comes to the standard ransomware business model of encrypting data and holding ... Read More

How Do Websites Keep Your Data Safe?

Data protection and preventing identity theft are a top concern for most people when they go online. You may not want to, but with many websites and online services it has become a necessary evil to provide personal information when becoming a member, making a purchase or just expressing an ... Read More

Can Bitcoin Be Hacked?

Cryptocurrency—Bitcoin in particular—has seen a huge surge in popularity recently. This is partly due to a dramatic increase in the value of Bitcoin, which is currently trading at its highest ever rate of $8099.99 per coin. However, with all this fuss surrounding the digital payment system, people are starting to ... Read More
Quickly Disable TouchID or FaceID with Emergency SOS Feature

Quickly Disable TouchID or FaceID with Emergency SOS Feature

Apple added an Emergency SOS feature in iOS 11. It provides a very cool and useful function by design, and also gives you a very easy way to quickly disable TouchID or FaceID authentication. Emergency SOS The Emergency SOS feature is designed to provide quick access to critical medical information ... Read More
Review: CloudBerry Backup Desktop Pro

Review: CloudBerry Backup Desktop Pro

I can’t stress enough the importance of backing up your data. A hardware malfunction could wipe out your data in the blink of an eye. A ransomware attack could encrypt all of your data and hold it hostage. Backing up your data should be a top priority and it should ... Read More
Loading...