I used to think that the idea of banning encryption was too absurd for discussion. Whenever a politician or government official suggested it, I figured it to be a ploy covering the real desire, which was not to ban encryption, but to require backdoors that would allow encrypted content to be accessed by government agencies. […]

Without thinking twice, mixing devops and cybersecurity is really tough to do. The goal of devops is going as fast as you can, while in security, we are taught to proceed with caution. However, both of these fields serve a higher authority — the business clients — and the businesses will only be served when/if […]

Behavioral psychiatrists say that virtually all people lie. Most are little white lies to protect the feelings of others. Some lies are acts of commission — a deliberate statement of untruth — whereas others are lies of omission. In the latter case, someone tells an absolutely true fact, but leaves out a very important related […]

Following the revelations that have shown major flaws in Facebook’s privacy settings with regard to linking your mobile number, security experts are now calling for the company to get serious about protecting users. The issue relates to Facebook and one security researcher’s discovery about the impact of a person’s profile being linked with their mobile […]

Most of us get to be thoroughly relieved that our e-mails weren’t in the Ashley Madison database. But don’t get too comfortable. Whatever secrets you have, even the ones you don’t think of as secret, are more likely than you think to get dumped on the Internet. It’s not your fault, and there’s largely nothing […]

Quantum computing is a novel way to build computers — one that takes advantage of the quantum properties of particles to perform operations on data in a very different way than traditional computers. In some cases, the algorithm speedups are extraordinary. Specifically, a quantum computer using something called Shor’s algorithm can efficiently factor numbers, breaking […]

If you are currently using Linux version 4.6 series, then the Lead Maintainer has a message for you. It’s time to upgrade. Greg Kroah-Hartman on Tuesday announced the arrival of Linux 4.6.7. This is making it clear that it will be the last in the kernel’s 4.6 series of releases. Version 4.7.1 made its debut on Tuesday, […]

Google and Amazon offers management services as a part of their cloud, but not give access to their keys to third-party service providers.