Assessing Weaknesses in Public Key Infrastructure

Academic researchers size up weaknesses in the the code-signing Public Key Infrastructure and highlight three types of flaws. Continue reading Assessing Weaknesses in Public Key Infrastructure

Would a VM such as Virtualbox be my best option for everyday security while working?

I run a small business out of my home and I’m not really doing anything labor intensive, no games and I’m not cutting any code or anything of that nature. A lot of what I do is phone based sales, so I’m basically just accessi… Continue reading Would a VM such as Virtualbox be my best option for everyday security while working?

Google empowers website owners with added security features

The Google Safe Browsing service is used by a number of other technologies to check threats against. These include Google’s own products, such as Chrome and Android, and browsers like Apple Safari and Mozilla Firefox.

Categories:

Tags:

(Read more…)

Continue reading Google empowers website owners with added security features