YoutubeShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesResearch shows how MacBook Webcams can spy on their users without warning by Ashkan Soltani and Timothy B.L
YoutubeShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesFor Nearly Two Decades the Nuclear Launch Code at All Minuteman Silos in the United States was 00000000 by
YoutubeShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesForward Secrecy (Wikipedia), Twitter Enables Perfect Forward Secrecy Across Sites To Protect User Data Agai
YoutubeShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesOur Commitment to Protecting Your Information by Marissa Mayer (Yahoo!), After N.S.A. Disclosures, Yahoo Mo
YoutubeShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesFacebook Warns Users After Adobe Breach by Brian Krebs (Krebs on Security), Facebook mines Adobe breach dat
YoutubeShow NotesHostsPreston Wiley, CISSP, CCNAKeith Watson, CISSP-ISSAP, CISAArticlesMeet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps by Dan Goodin (Ars Technica), badBIOS by Bruce Schneie
YoutubeShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesTen Steps You Can Take Right Now Against Internet Surveillance by Danny O’Brien (EFF)Major Corporations Fa
YoutubeShow NotesHostsPreston Wiley, CISSP, CCNAKeith Watson, CISSP-ISSAP, CISAArticlesIs Truecrypt Audited Yet?, The TrueCrypt Audit Project, New effort to fully audit TrueCrypt raises $16,000+ in a few short w
YoutubeShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesAttacking Tor: how the NSA targets users’ online anonymity by Bruce Schneier (The Guardian), NSA and GCHQ t
YoutubeShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesStudents Find Ways To Hack School-Issued iPads Within A Week by Sam H. Sanders (NPR), LAUSD halts home use
YoutubeShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesOracle Java fails at security in new and creative ways by Chester Wisniewski (nakedsecurity blog)Recycled
YoutubeShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesRevealed: The NSA’s Secret Campaign to Crack, Undermine Internet Security by Jeff Larson (ProPublica), Nico
Google+ HangoutShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesAnatomy of a brute force attack - how important is password complexity? by Paul Ducklin (nakedsecur
Google+ HangoutShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesTo Our Customers by Silent Circle, Silent Circle follows Lavabit in shuttering encrypted e-mail by
Google+ HangoutShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesiPhone Hacked in Under 60 Seconds Using Malicious Charger by David Gilbert (International Business
Google+ HangoutShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPArticlesFeds Are Suspects in New Malware That Attacks Tor Anonymity by Kevin Poulsen (Wired), Freedom Hosting arrest and takedown linked to
Google+ HangoutShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesPersonal data on 72,000 staff taken in University of Delaware hack by John Hawes (nakedsecurity blo
Google+ HangoutShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesApple Developer Site Breached InfoSecurity Magazine, Apple takes Dev Center down for days, finally
Google+ HangoutShow NotesHostsPreston Wiley, CISSP, CCNAKeith Watson, CISSP-ISSAP, CISAToolsTorUsing Tor and other means to hide your location piques NSA’s interest in youVPN Services That Take Your Anonymity
Google+ HangoutShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesImportant Message from Facebook’s White Hat Program by Facebook Security (Facebook), Facebook issue
Youtube videoShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPArticlesYahoo’s going to boot us off our deadbeat accounts, but who is going to grab them? by Lisa Vaas (nakedsecurity blog), Yahoo tries to