Blogs I Follow
Archives
- April 2018
- March 2018
- February 2018
- January 2018
- December 2017
- November 2017
- October 2017
- September 2017
- August 2017
- July 2017
- June 2017
- May 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- November 2016
- October 2016
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
Categories
- Follow Secure Your Workplace Network on WordPress.com
Workplay Tablet
Monthly Archives: June 2016
When the Attacker Becomes the Prey: Trapping Hackers in Your Network
A recent webinar by Topspin Security (The Art of Deception: Lure, Confuse, Defeat) explained how enterprises could use cyber attacks to their own advantage. Presenter, Rami Mizrahi, elaborated on a strategy that is based on the premise that nothing will … Continue reading
Update August 14th: Hacked DNC Documents Leaked: Hacker Promises More Damaging Ones on the Way
B August 13th Update: This is the first leak of what might become a ‘leaky’ weekend. Information in other parts of the web hints that bigger things are on the way. Watch CNN’s interview with Assange on Sunday. Some of … Continue reading
Posted in Uncategorized
1 Comment
Adblocker-blocker Blockers
Once upon a time, the internet existed without advertisements. You would type in the address you wanted and, after waiting 30 minutes for the page to load, visit a website. Then, someone got the idea that you could advertise on … Continue reading
Google’s Project Abacus: The Ultimate Security Solution or the Ultimate Source of Aggravation?
Let’s face it. Carrying around a smartphone is like having a tracking device installed on your body. Those who have access to your device can know more about you and your habits than you know yourself. Each of us has … Continue reading
Posted in Uncategorized
Tagged google privacy policy, google's new security app, project abacus, trust api
1 Comment