It was a morning like lots of others...I was headed to the airport for a week in our home office, so I got an early start, checked on the sheep on the way out (yes, sheep), and got on the road. Aside from being ridiculously early, the ride was uneven...
(Author's disclaimer: I originally pitched this as a humor piece, but the more I wrote, despite the light-hearted tone, the more serious I realized this is/was/will be.)
In Chapter II of Lewis Carroll's Alice in Wonderland, Alice,...
Not surprisingly, mobile security ranks among the top challenges IT faces when it comes to protecting small and mid-sized businesses. What is surprising, however, is that only 16% of SMBs worldwide responding to a recent Techaisle survey say they&rsq...
We all know the expression “a picture is worth a thousand words”. But those of us who have experienced the power of dynamic visualizations in big data analytics tools know that a good visualization can take countless words and huge datase...
FortiGuard Labs disclosed a heap overflow vulnerability earlier this week in Windows Journal, a notetaking application developed by Microsoft that is included in Windows XP Tablet PC Edition, Windows Vista, Windows 7, Windows 8, and Windows 10....
Researchers with FortiGuard Labs recently discovered a persistent cross-site scripting vulnerability in Microsoft SharePoint 2013. SharePoint is a web application platform in the Microsoft Office server suite that combines intranet, extranet, co...
Strong encryption is the security professional's arms race. There is no such thing—and never has been nor ever will be—as unbreakable code. The best we can strive for is code that will take a cyberthief's computers so long to brea...
Last month I talked about the essential nature of third-party auditing and pen testing. It's smart security policy, good business, and, more likely than not, a regulatory requirement. The problem, though, is that it tends to be pricey, time-consu...
[Editor's Note: If you haven't yet watched the season finale of Mr. Robot, there are some spoilers here. It's not a recap and it won't ruin the whole episode, but you might want to watch it first before you keep reading.]
Within...
Introduction
Last month, iSightPartners revealed a Microsoft Office zero-day leveraged in a targeted attack by a Russian cyber espionage team. This vulnerability has been patched in Microsoft bulletin MS15-070. CVE-2015-2424 was assigned to thi...