By now you’re probably used to reading about web sites getting broken into, exposing millions of accounts. How do you protect yourself and how can developers protect their users?More
The release of iOS 10 didn’t go smoothly. Here’s how to protect yourself when you update your iOS devices.More
This isn’t a “get off my lawn you kids!” story. If anything, it’s the opposite.
During my early days in the computer industry we lived in a severely resource constrained world. The constraints affected the way we approached problem solving… as does the abundance of resources in today’s world.More
What’s the story with NIST’s recent “ban” of SMS for two factor authentication?More
You’re searching your blog for spam for the fourth time in the last few days. Not only can’t you figure out how the spammer keeps getting in, you also can’t figure out what they’re trying to sell with the mangled English in their posts… hand bags? sports drinks? Something with too many consonants and not enough vowels?
If only your web site had some kind of “black box” so that you could find out what they’re doing to post the spam.