What is a Data Protection Officer?
Appointing a Data Protection Officer is a GDPR requirement for many companies A Data Protection Officer (DPO) is a security leadership position that many companies and organizations will be required…
Appointing a Data Protection Officer is a GDPR requirement for many companies A Data Protection Officer (DPO) is a security leadership position that many companies and organizations will be required…
Facebook, in particular, is operating in a gray area The Federal Trade Commission (FTC), along with the State Attorneys General from New York and Massachusetts have launched investigations into Cambridge…
The TLS 1.3 handshake is a dramatic improvement over the TLS 1.2 handshake The wait for TLS 1.3 seems like it may never end. Right now, the IETF (Internet Engineering…
Cambridge Analytica used stolen Facebook data to map people’s personalities One of the biggest cybersecurity stories of the moment is the Facebook Data Leak. Cambridge Analytica – a company with…
TLS vs SSL – Similar intentions, different means When you are researching SSL Certificates, or if you already work with SSL (Secure Sockets Layer) to secure your online business, websites…
Adobe has not seen this critical Flash vulnerability exploited in the wild yet A critical vulnerability in Adobe Flash has been discovered. All versions prior to 28.0.0.161 include a critical…
If a picture is worth 1,000 words, what are 7 GIFs worth? It was 9:00 in the morning, I stepped into our office, made myself a cup of tea and…
Everything you need to know about air gapped systems and their security If you follow cyber security for long enough you’re bound to come across the term “air gapped computer.”…
The Google Chrome 66 Beta is set to release March 15, 2018 While the conflict between Google and Symantec was more or less solved last Summer, the fallout from those…
Google Chrome 65 includes new features, APIs and 45 security fixes Google released the newest version of its browser, Chrome 65, on March 6th. The newest release version includes a…
5 Ways to Determine if a Website is Fake, Fraudulent, or a Scam – 2018
in Hashing Out Cyber SecurityHow to Fix ‘ERR_SSL_PROTOCOL_ERROR’ on Google Chrome
in Everything EncryptionRe-Hashed: How to Fix SSL Connection Errors on Android Phones
in Everything EncryptionCloud Security: 5 Serious Emerging Cloud Computing Threats to Avoid
in ssl certificatesThis is what happens when your SSL certificate expires
in Everything EncryptionRe-Hashed: Troubleshoot Firefox’s “Performing TLS Handshake” Message
in Hashing Out Cyber SecurityReport it Right: AMCA got hacked – Not Quest and LabCorp
in Hashing Out Cyber SecurityRe-Hashed: How to clear HSTS settings in Chrome and Firefox
in Everything EncryptionRe-Hashed: The Difference Between SHA-1, SHA-2 and SHA-256 Hash Algorithms
in Everything EncryptionThe Difference Between Root Certificates and Intermediate Certificates
in Everything EncryptionThe difference between Encryption, Hashing and Salting
in Everything EncryptionRe-Hashed: How To Disable Firefox Insecure Password Warnings
in Hashing Out Cyber SecurityCipher Suites: Ciphers, Algorithms and Negotiating Security Settings
in Everything EncryptionThe Ultimate Hacker Movies List for December 2020
in Hashing Out Cyber Security Monthly DigestAnatomy of a Scam: Work from home for Amazon
in Hashing Out Cyber SecurityThe Top 9 Cyber Security Threats That Will Ruin Your Day
in Hashing Out Cyber SecurityHow strong is 256-bit Encryption?
in Everything EncryptionRe-Hashed: How to Trust Manually Installed Root Certificates in iOS 10.3
in Everything EncryptionHow to View SSL Certificate Details in Chrome 56
in Industry LowdownPayPal Phishing Certificates Far More Prevalent Than Previously Thought
in Industry Lowdown