My health information has been stolen. Now what? Security As health data continues to be a prized target for… rooter June 21, 2024 1 min read 0
PCI DSS v4.0: What You Need to Know and What the End of v3.2.1 Means for the Future of Digital Payments Security On March 31st, 2024, The Payments Card Industry Standards Security… rooter June 20, 2024 10 min read 0
Recovering Public Keys from Signatures Security Interesting summary of various ways to derive the public key… rooter June 20, 2024 1 min read 0
Critical Vulnerabilities Found in VMware vCenter Server and Cloud Foundation Security A recent surge of critical remote code execution (RCE) vulnerabilities… rooter June 20, 2024 1 min read 0
Hacktivism is evolving – and that could be bad news for organizations everywhere Security Hacktivism is nothing new, but the increasingly fuzzy lines between… rooter June 20, 2024 1 min read 0
New Blog Moderation Policy Security There has been a lot of toxicity in the comments… rooter June 19, 2024 2 min read 0
The Hacking of Culture and the Creation of Socio-Technical Debt Security Culture is increasingly mediated through algorithms. These algorithms have splintered… rooter June 19, 2024 22 min read 0
Love Gone Wrong: Are You Protected Against Online Dating Scams? Security Have you heard about online dating scams? In the vast… rooter June 18, 2024 1 min read 0
Rethinking Democracy for the Age of AI Security There is a lot written about technology’s threats to democracy.… rooter June 18, 2024 23 min read 0
Zero-Day Marketplace Explained: How Zerodium, BugTraq, and Fear contributed to the Rise of the Zero-Day Vulnerability Black Market Security Whenever a company is notified about or discovers a critical… rooter June 17, 2024 5 min read 0