Chinese cell phone manufacturer OnePlus (incidentally my daily carry) plans on including cryptocurre...
Read More
HSTS tracking beats even incognito mode in browsers, and it more and more often used by advertisers....
Read More
No, I haven't given up on my OTHER blog series about application vulnerability assessment but an opp...
Read More
I'll be doing a live webinar on Application Vulnerability Analysis on February 8 at 2PM EST - 1 mont...
Read More
Welcome to the 6th day of the C# Advent! Let's encrypt some malware.
That sounds horrible, but in se...
Read More
Reconnaissance means something different for pentesters as it does from vulnerability analysts. ...
Read More
Being a vulnerability analyst has a few humorous artifacts. This takes a few different forms, but in...
Read More
All of this fancy organization and lists are just tools for the goal - making a list of everything t...
Read More
The vulnerabilities you hear about aren’t really the problem much of the time.
I don’t w...
Read More
We live in a world where applications run the technology that we all use. There was, once, a t...
Read More
Bryant Maddrik at ABC6 interviewed me and Todd Whittaker at Franklin about the plight of the good gu...
Read More
Monday this week, I was at lunch with the family and Adam (my son) kept bumping Gabrielle (my wife)...
Read More