dcsimg

Bluetooth Security Problems: A Cause For Concern

Bluetooth security… Some consider it an oxymoron, like ‘global intelligence’ community or ‘offshore support’ while others recognize Bluetooth flaws and understand their causes. Whatever side of the fence your opinions lie, it’s fair to observe that Bluetooth has its issues and security vulnerabilities are now being exploited by hackers seeking access to data. … [Read more...]

What is the Hyper-V Core Scheduler?

The core scheduler provides a strong inter-virtual machine barrier against cache side-channel attacks eg Spectre variants. This guide explains how to use it Read the post here: What is the Hyper-V Core Scheduler? … [Read more...]

In Japan, Seven-Eleven’s 7pay Payment System is Hit by Fraud

According to Seven-Eleven, some 900 customers using its mobile payment service called 7pay have lost a total of 55 million yen ($510,000) due to unauthorized access to their accounts. … [Read more...]

Facebook Too Big For Compliance: Are Record Fines Ineffective?

Do the latest fines against Facebook matter or is Facebook going to continue with business as usual? … [Read more...]

Podcast: Have You Met? QBITS

In this Have You Met? podcast, we sat down with Daniel Hotz of QBITS, a Progress partner based in Switzerland, to see how they are implementing MOVEit managed file transfer in the various regions they server clients. … [Read more...]

Using Make Me Admin for Administrator Privilege

In this article, we discuss how to grant users simple admin rights temporarily like installing software. This helps keep IT from getting bogged down. … [Read more...]

The Difference Between PGP, OpenPGP, and GnuPG Encryption

Ah, cryptography. It’s so important to us in our every day lives and yet it has one of the longest and confusing pasts of any type of technology we use today. … [Read more...]

Why Your Encryption is Only as Good as Your (Multi-Factor) Authentication

Username and password may be the de-facto means of authentication for many organizations, but they can easily be the weakest link in security controls. In this article, we’ll detail why Multi-Factor Authentication (MFA) should be paired with encryption for top-level security. … [Read more...]

Hacks, cracks, and malware attacks – July 2019 

Each month, we’ll take a look at what’s happening on the front lines of the battle against various types of cyber-attacks, new variants of malicious software, phishing and other scams, vulnerability exploits, and other threats to the security of your networks, systems, and data.  There was a time, not so long ago, when the only […] … [Read more...]

Double Encryption: Is It More Secure Or Dangerous?

Since encryption is used to secure data, it would seem only natural that encrypting something twice would increase security. However, that isn't always the case. … [Read more...]