Canadian Chinese Embassy spokesperson Yang Yundong can’t pull the wool over my eyes.
“The Chinese government has always been firmly opposed to and combated cyber attacks in accordance with the […]
Have New Backdoors Been Discovered in iOS? An Interview With iOS Developer and Digital Forensics Expert Jonathan Zdziarski
When the HOPE X (Hackers On Planet Earth) 2014 convention started on July 18th, one particular presentation caught the undivided attention of information security professionals. Ever since, the tech […]
The proper implementation of network appliances is vital to designing and maintaining a properly secured network. Modern networking devices usually integrate multiple functions into one box. For example, most […]
Attention Retailers and Restaurants: Three Simple Ways to Avoid What Happened to Michaels, Target and Neiman Marcus
I feel like I’m stuck in Bill Murray’s Groundhog Day. Yet again, it came to my attention that a major American retailer has been hit with POS (point-of-sale) malware. […]
More and more, small, medium, and even large businesses are migrating from Microsoft products. Many of them are ridding themselves of Microsoft completely.
If you were to ask those IT […]
Over the past twenty years or more, corporations in nearly all industries have been outsourcing and offshoring at hyperdrive.
Venture capitalist firms, public shareholders, various types of financial firms, and […]
As of this writing in February 2014, Android has the greatest OS market share on both smartphones and tablets. If you don’t own an Android device, chances are that […]
Most adults in the developed world have bank accounts and credit cards. Most of us use debit cards and credit cards at the cash registers of our favorite retailers, […]
Screenshot from ironic Daily Mail web page, credit http://ontoberlin.blogspot.ca/2013/07/three-concerns-about-camerons-porn-plans.html
It’s too easy for politicians to make promises. Throughout the 20th century and right through the 21st to the present day, […]