Featured Blogs
June #SecChat Recap: Findings from the 2016 Verizon DBIR
This year’s highly anticipated Verizon 2016 Data Breach Investigations Report (Verizon DBIR) analyzed cybersecurity findings from 100,000 incidents and 2,260...
The Decluttering Bug
I have a confession to make – I think I have become addicted to decluttering. Perhaps it is the by-product...
Business Email Compromise Hurts Your Organization
As many workers do today, you probably get emails from your boss asking you to perform various tasks. You may...
Update Your Toaster: How IoT Devices Can Be Conscripted into Botnets
Charles Strite, according to Lemelson-MIT, first introduced the modern toaster in 1926. It was, and remains to this day, a...
Trojanized Pokémon GO Android App Found in the Wild
Pokémon GO is a new mobile game that allows fans to “catch” Pokemons in the real world using augmented reality...
The Facebook Cull and Why You Should Embrace It!
So, how many friends do you have on Facebook? Do you really know them or were they just a passing...
Patch Now: Simple Office ‘Protected View’ Bypass Could Have Big Impact
Protected View is a security feature of Microsoft Office. According to research from MWR Labs, Protected View mode is a strong...
My Favourite Mothering Apps
I honestly don’t know where I would be without my favourite collection of apps. With four kids, too many pets,...
Keeping Your Mobile Device (and Your Personal Life) Safe with IoT
Life is made up of the little things. There are ‘fuzzy feeling’ little things; like when the nice lady in...