Secure Spaces integration with Blackphone give users unprecedented choice

Secure Spaces provides multiple virtual phone capability to Blackphone - Blackphone's Silent Space delivers the ultimate in private communications for users. OTTAWA, Ontario, Dec. 9, 2014 /PRNewswire-iReach/ -- Graphite Software announced today that the Blackphone will be updated to include Secure Spaces, adding the unique capability for users to create multiple separate spaces for apps, [...]

By |2017-07-22T13:02:51+00:00December 10th, 2014|Categories: Mobile, Security and Privacy|Tags: , , |0 Comments

The problem of buggy software components

By Bob Tarzey, Quocirca. This article first appeared on What do Heartbleed, Shellshock and Poodle all have in common? Well apart from being software vulnerabilities discovered in 2014, they were all found in pre-built software components, used by developers to speed-up the development of their own bespoke programs. Heartbleed was in OpenSSL (an open [...]

By |2017-07-22T13:02:51+00:00December 8th, 2014|Categories: Contributed Articles, Security and Privacy|Tags: , |0 Comments

Ecoh Allows Parents to View Children’s Surroundings With Wearable Outward Facing Video Camera

The wearable safety and telecommunication device that gives parents peace of mind and children freedom to play is currently crowdfunding on Indiegogo. MELBOURNE, Australia, Nov. 11, 2014 /PRNewswire-iReach/ -- Ecoh, a wearable safety and telecommunication device, is currently crowdfunding on Indiegogo in hopes of raising$100,000 for product tooling and manufacturing. Ecoh has been designed to be simple and functional, [...]

By |2017-07-22T13:02:53+00:00November 14th, 2014|Categories: Apps, Security and Privacy|Tags: , , , |0 Comments

OS X and iOS Device Owners – Read This Now – Beware Of WireLurker

In the past, Apple device owners enjoyed a rather safe experience with their Macs and iOS devices. Any viruses or intrusions were relatively trivial, couldn't spread, and were dealt with very quickly. Unfortunately, this is no longer the case. Researchers at Palo Alto Networks published a research paper about a new threat called WireLurker, which [...]

By |2017-07-22T13:02:53+00:00November 6th, 2014|Categories: Apps, Security and Privacy|Tags: , , , , , , |0 Comments

Why Should I Rent Anti-Virus Software?

Did you know there are approximately 28,000 new malware threats introduced to the web every single day?  Rapid growth of technology presents the opportunity for the development of a wide range of new viruses distributed to attack our systems in ways unrecognizable to anti-virus software packages.  Such rapid landscape changes make it difficult for traditional [...]

By |2017-07-22T13:02:53+00:00November 5th, 2014|Categories: Featured Post, Security and Privacy|Tags: |0 Comments

Android: The New DDoS Launchpad?

Igal Zeifman from Incapsula has shared a very interesting article with us about hackers turning to Android devices as a new way to create DDoS attacks. We in turn wanted to share this with our readers.   Distributed denial of service (DDoS) attacks use computers distributed across the Internet to clog a network connection or [...]

By |2017-07-22T13:02:53+00:00November 4th, 2014|Categories: Featured Post, Security and Privacy|Tags: , , , |0 Comments

Which popular smartphone app is stealing your personal information?

Bret Baier from Fox News talks to cyber-security expert, Gary Miliefsky of SnoopWall, about a popular type of smartphone app that steals your personal information.  The top 10 apps in this category all appear to have malicious malware.  The full SnoopWall report and a free flashlight app that won’t spy on you can be downloaded [...]

By |2017-07-22T13:02:53+00:00October 30th, 2014|Categories: Mobile, Security and Privacy|Tags: , |0 Comments

eBook – The Top 10 DDoS Attack Trends

Today we've added an eBook from Incapsula. Download it to learn about the top 10 DDoS attack trends.. Title eBook - The Top 10 DDoS Attack Trends Introduction The volume, size and sophistication of distributed denial of service (DDoS) attacks are increasing rapidly, which makes protecting against these threats an even bigger priority for all [...]

By |2017-07-22T13:02:54+00:00October 27th, 2014|Categories: Security and Privacy|Tags: , |0 Comments

Whitepaper – DDoS Threat Landscape Report 2013-2014

We've added a new whitepaper from Incapsula. Download it today and read what they have to say about the state of the DDoS threat landscape. Title DDoS Threat Landscape Report 2013-2014 Summary This report was originally intended to be a 2013 DDoS trends report. However, due to the significant DDoS events in January and February [...]

By |2017-07-22T13:02:54+00:00October 22nd, 2014|Categories: Security and Privacy|Tags: , , |0 Comments

The government is not the problem. Being informed is the solution.

Ever since the Snowden circus, there has been no shortage of fear, hate and mistrust towards our government. Lately, almost on a daily bases I see some ridiculous meme depicting Snowden telling people not to trust the government, or not to use social services like Facebook, or Instagram because they are not safe from the [...]

Translate »