Last Friday’s post was a milestone that we have been anticipating for a while. We have written and published a thousand articles! We started this web log on October 26, 2006, and have been writing for over a decade.
We got off to a slow start, and it took us a while to find our voice, and to specialize in cybersecurity. In the beginning, we were a general computer technology blog. And ...
Continue Reading →APR




Social networks are a tremendous source of personal information leakage. Actually, more like a waterfall. As we learned in the last post, attackers use social networks to perform reconnaissance against their chosen targets. Since few of us are going to delete all our social network accounts and move of the grid, we have to find a way to live ...