Skimming, leaking and guessing — some followups to earlier posts

One thing that’s difficult when I teach course 468, System and Network Security Introduction, or anything else, for that matter, is to follow up on topics we’ve discussed in the past. The format of a blog, however, makes this quite easy. Here a few follow-ups from earlier posts. In Real Keylogging Threats I talked about point-of-sale […]
Read More ›

They’ve Got My Back

My wife got a call at 8am the other morning. It was American Express letting her know that someone was using her credit card. It seems they made a purchase at 3am and two others right after that. Since my wife doesn’t generally do that with her business AmEx, their software let them know that […]
Read More ›

Type to search

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.