virtual
How to configure Android (Virtual) for Mobile PenTest
This post is about setting up an Android Virtual Machine (AVD) for a mobile application penetration test ...
Workplace Surveillance, Apple and Google Contact Tracing Tech, Virtual Cybersecurity Conferences
In episode 119 for May 4th 2020: The use of thermal cameras and other technology to monitor the workplace for COVID-19, more details about Apple and Google’s contact tracing framework, and are ...
What’s the real value—and danger—of smart assistants?
Smart assistants are programmed to eavesdrop on you in order to await commands. Sometimes they're dangerous, and other times downright hilarious. What's the real value in these devices? Categories: Security world Technology ...
Create a Team for Audit Analytics? Part 3
In the previous post, Create a Team for Audit Analytics? Part 2, I explored the pros and cons of expecting all auditors to develop a level of data and analytic proficiency. These ...

