Monthly Archives: June 2016

When the Attacker Becomes the Prey: Trapping Hackers in Your Network

A recent webinar by Topspin Security (The Art of Deception: Lure, Confuse, Defeat) explained how enterprises could use cyber attacks to their own advantage. Presenter, Rami Mizrahi, elaborated on a strategy that is based on the premise that nothing will … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

Update August 14th: Hacked DNC Documents Leaked: Hacker Promises More Damaging Ones on the Way

B August 13th Update: This is the first leak of what might become a ‘leaky’ weekend. Information in other parts of the web hints that bigger things are on the way. Watch CNN’s interview with Assange on Sunday. Some of … Continue reading

Posted in Uncategorized | 1 Comment

Adblocker-blocker Blockers

Once upon a time, the internet existed without advertisements. You would type in the address you wanted and, after waiting 30 minutes for the page to load, visit a website. Then, someone got the idea that you could advertise on … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

Google’s Project Abacus: The Ultimate Security Solution or the Ultimate Source of Aggravation?

Let’s face it. Carrying around a smartphone is like having a tracking device installed on your body. Those who have access to your device can know more about you and your habits than you know yourself. Each of us has … Continue reading

Posted in Uncategorized | Tagged , , , | 1 Comment