"Failure is not an option. It comes bundled with the software."

The quieter you become, the more you are able to listen.

About Me

My Services

Contact Me

Multi Media Bar

Previous Next
Hacker Lexicon: What Is Perfect Forward Secrecy?

Ecryption keeps your secrets, until it doesn’t. When you use an encryption tool like the...

3 Ways to Boost Your Family’s Online Security This Holiday

Along with strategically avoiding any remotely political conversations, now’s the...

Your DVR Didn’t Take Down the Internet—Yet

You may have noticed that for most of Friday popular sites like Netflix, Twitter,...

Elegant Physics (and Some Down and Dirty Linux Tricks) Threaten Android Phones

Even the biggest Luddite knows to download updates for his apps and phone. That ensures...

Cops Have a Database of 117M Faces. You’re Probably in It

It’s no secret that American law has been building facial recognition databases to...

Akamai Finds Longtime Security Flaw in 2 Million Devices

It’s well known that the Internet of Things is woefully insecure, but the most...

Signal, the Cypherpunk App of Choice, Adds Disappearing Messages

The encrypted ,essaging and calling app Signal built its reputation on making it simple...

The MacBook Pro’s Most Important New Feature? Touch ID

Apple’s new Macbook Pro is thinner and faster than its predecessor. It comes in a...

Internet Providers Could Be the Key to Securing All the IoT Devices Already out There

A cyber attack on the Internet infrastructure company Dyn on October 21 hindered...

How AI Is Shaking Up the Chip Market

In less than 12 hours, three different people offered to pay me if I’d spend an hour...