HomeKit is where the dearth is – no one wants Apple’s IoT tech
Is anyone buying it – figuratively or literally?
It's been four months since Apple half-launched its smart-home/internet-of-things service through the introduction of a new app...
Battling the Botnet Armies
Marie Hattar  wrote an interesting post about Battling the Botnet Armies that I would like to share.
"Botnet armies have become bigger, more active and more...
Dyre Authors Apparently Working on New Banking Trojan
Eduard Kovacs wrote an interesting post about Dyre Authors Apparently Working on New Banking Trojan that I would like to share.
"At least one of the...
Researchers Build Configuration Extractor for Locky Ransomware
Ionut Arghire wrote an interesting post about Researchers Build Configuration Extractor for Locky Ransomware that I would like to share."Researchers from Cisco Talos have created a new tool...
Breaking the OODA Loop!
Lance Cottrell wrote an interesting post about Breaking the OODA Loop! that I would like to share.
"The OODA loop is a well established concept often...
A Spell Check Equivalent for Building Security In
Jim Ivers  wrote an interesting post about A Spell Check Equivalent for Building Security In that I would like to share.
"I can honestly say that spell...
Want Better Security? Be a Pragmatist.
Joshua Goldfarb wrote an interesting post about Want Better Security? Be a Pragmatist. that I would like to share.
"I’ve always considered myself a pragmatist.  Perhaps not...
Using Apache Hadoop to Meet Cybersecurity Challenges
Rocky DeStefano wrote an interesting post about Using Apache Hadoop to Meet Cybersecurity Challenges that I would like to share.
"Apache Hadoop turned 10 this year.
What...
Malware Increasingly Abusing WMI for Evasion
Ionut Arghire  wrote an interesting post about Malware Increasingly Abusing WMI for Evasion that I would like to share.
"Malware is increasingly using Windows Management Instrumentation...
How to Make Threat Intelligence Practical for Your Organization
Adam Meyer wrote an interesting post about How to Make Threat Intelligence Practical for Your Organization that I would like to share.
"f there is a...