encryption

Google Cracks Down on Malicious Chrome Extensions

The next major version of Google Chrome will give users finer-grained control over how extensions interact with the websites they visit. This decision comes after malicious extensions have repeatedly made their way ...
Security Boulevard

Most Vulnerable Adobe or Java? You Make The Call.

As it is super bowl week / end, we thought we’d conjure up our best version of the classic ‘You Make the Call’ segments that appeared on Monday Night Football. A recent ...
DataBreach Intersection

Data Breaches at The Intersection of Vulnerabilities and Data Discovery

As we learn more about the inner workings of the malware that infected Target and most likely Neiman Marcus during the holiday season I thought it would be helpful to draw some ...
Secure Laptop

Remote Vulnerable Laptops – fertile attack targets

What 3rd party apps do remote workers have installed? Remote workers are nothing new, but the challenge of hunting down employees on-the-go and assessing these devices can be a task in and ...