935 posts
The 5 Pillars of IT Security (according to the NHS)
The UK government has announced 5 ways they plan to improve IT security in the National Health Service
What Is a Root Certificate? Differences Between Root and Intermediate Certificates
Root, intermediate and SSL certificates โ oh, my! These are terms you may have heard while browsing online. But what is a root certificate, and…
Western Digital hit by hackers
Western Digital refuses to cooperate, which is giving momentum to the news nearly one month after it happened.
Does my local police station use face recognition?
Facial recognition is being used by law enforcement departments across the USA. It raises security and privacy concerns.
Are public USB charging stations to be trusted?
Hackers are infecting USB charging stations in high-foot-traffic spaces with malware -they call it juice jacking. Here is how to avoid it.
How to secure your Twitter account with 2FA
Twitter is ending support for SMS login verification. Hereโs what you can do to re-secure your account.
US Federal agencies banned from using foreign spyware
The US government wants Federal Agencies to use only their self-developed tools.