security

367 Articles 3 Followers


What Type Of 2FA App Are You Using? Google Authenticator?, Authy?, Or Other alternatives? It's Time To Switch To Aegis Authenticator.

14 Apr 2019 6 minute read 0 comments Solomon Stephen

The most common 2FA tools used by Android users are Authenticator, Authy, and some other alternatives which I don't know of. I have been privileged to use both Authenticator and Authy to an extent, and I can always stand for Google Authenticator beca...

Role of the CISO: Top 3 Questions

12 Apr 2019 3 minute read 0 comments Matthew Rosenquist

The role of Chief Information Security Officers (CISO) is evolving and requires a complex skill set. Long perceived as cost center that constrains the business in order to reduce losses from cyberattacks and to meet regulatory compliance, cybersecur...

iPad Disabled For 25 MILLION Minutes

10 Apr 2019 1 minute read 0 comments Crypto Pappy

I love kids. They're so innocent and creative. And can make things a mess in less time than it takes to sneeze. For you iPad users, here is a story you won't want to miss. iPad Disabled For 25 Million Minutes  I wonder how many text messages will go...

Hijacked To Mine Crypto? Are You Fingerprinted? I also want your paycheck!

10 Apr 2019 1 minute read 0 comments Crypto Pappy

Creative, intelligent little buggers these hackers are!  I like to have a positive attitude. Find Silver Linings. And learn something new everyday. Well, here is something I learned today. Lookie what I came across ...   415,000 routers worldwide hi...

When the Wrong Person Leads Cybersecurity

10 Apr 2019 7 minute read 5 comments Matthew Rosenquist

Succeeding at managing cybersecurity risks is tremendously difficult even for seasoned professionals. To make situations worse, poorly suited people are often chosen to lead security organizations, bringing about disastrous results. This has contrib...

“Unhackable” Product Claims are a Fiasco Waiting to Happen

10 Apr 2019 2 minute read 4 comments Matthew Rosenquist

Those who think that that technology can be made ‘unhackable’, don't comprehend the overall challenges and likely don't understand what 'hacked' means.  Trust is the currency of security. We all want our technology to be dependable, easy to use, and...

URL Short Links in Publish0x Posts

9 Apr 2019 1 minute read 2 comments Crypto Pappy

Briefly, while I am aware that URL shorteners make you a few cents, I just NEVER click those links.  I LIKE KNOWING WHERE I'M GOING!  Having been in the computer science field over 20 years, I did click those links many times for many different reaso...

After a Decade of Bitcoin, the Next Wave: Stochastic Crypto-networks

6 Apr 2019 8 minute read 0 comments GGori

Have you heard of... The blockchain? Cryptocurrencies? Digital currency Exchanges? Miners? Tokens? Smart contracts? ICOs? STOs? Blockchain applications? Jobs in the blockchain industry? None of the above would exist without a crypto-network infrastru...

3 Risks of Bitcoin and the Best Way to Avoid Them: Tips from the Experts

3 Apr 2019 4 minute read 0 comments profitofthegods

This post was originally published on Cryptorials.io and has been republished here with permission. Do you want to get into Bitcoin but feel like you might mess up? Everyone messes up sometimes. Learn the risks of bitcoin and how to make them less of...

What are hardware wallets and why are they important to you?

31 Mar 2019 6 minute read 9 comments liquidsteel

Read to the end and get some free coins! “Would you walk around town carrying a million dollars in your pocket?” is the imagery some invoke when pitching hardware wallets. That analogy is not entirely correct. The better analogy is asking whether you...