Category: Security Bloggers Network

Friday Squid Blogging: Giant Squid Stealing Food from Each Other

An interesting hunting strategy: Off of northern Spain, giant squid often feed on schools of fish called blue whiting. The…

Cloud Directory Feature Identity Bridge

The identity and access management (IAM) market is shifting and changing quickly right now. As more organizations make the shift…

The Joy of Tech®, ‘Zuckerberg’s Apology!’

Via the Facebook-spotting Comic Mages -  Nitrozac and Snaggy - at The Joy of Tech®! Permalink

A brief history of Stephen Hawking

A more than usually inept 419 scam that makes a feeble attempt to capitalize on the recent death of Stephen…

More on that Siri silliness

V3: Apple to fix iOS11 bug that enables Siri to read hidden notifications

When the Hurricane Hits, What’s Your Plan?

The post When the Hurricane Hits, What’s Your Plan? appeared first on Delta Risk.

Zeynep Tufekci on Facebook and Cambridge Analytica

Zeynep Tufekci is particularly cogent about Facebook and Cambridge Analytica. Several news outlets asked me to write about this issue.…

Computer Forensics: Embedded Device Analysis and Examination Steps

Introduction Nowadays, digital devices are everywhere and everything is connected via the Internet. These devices include digital watches, gaming consoles,…

On MIMEs, software versions and web site promiscuity (a.k.a. three new packages to round out the week)

A quick Friday post to let folks know about three in-development R packages that you’re encouraged to poke the tyres…

BSides PDX, Dan Anderson’s ‘Breaking Crypto With Randomness’