Security

Computing Trust

“From Zero to Zero Trust Apr 23, 2020 by Virag Mody Blockchain, IOT, Neural Networks, Edge Computing, Zero Trust. I played buzzword bingo at RSA 2020, where the phrase dominated the entire venue. Zero Trust is a conceptual framework for cybersecurity that characterizes the principles required to protect modern organizations with distributed infrastructure, remote workforces, Computing Trust

Stripe merchant services tracks all your users’ actions on all of your site

“Michael Lynch, blogger and former software engineer at Microsoft and Google, discovered that the payment processing platform Stripe and its official JavaScript library records all browsing activity on its customers’ websites and reports it back to the company. Lynch says this data includes the following: 1. Every URL the user visits on my site, including Stripe merchant services tracks all your users’ actions on all of your site

Creating memorable passwords that are hard to crack

Creating memorable passwords that are hard to crack

7 Tips to Create a Hack-Proof Password You’ll Actually Remember By Kerri Anne Renzulli On 02/08/20 at 7:00 AM EST https://www.newsweek.com/7-tips-create-hack-proof-password-youll-actually-remember-1486319   While Newsweek attempts to provide an article that allows you to create better passwords it falls dramatically short of the process. The NIST (National Institute of Standards and Technology) advises computer users to Creating memorable passwords that are hard to crack

ZeroDay: Remote execution and control of MS Exchange Server

Microsoft Exchange Logo

Microsoft has released a zero-day patch for all versions of the Microsoft Exchange Server.  As explained in the linked article, by examining the encryption certificate keys, a hacker is able to execute malicious code on any Exchange server via a POST to the Exchange Server’s address. CVE-2020-0688: Remote Code Execution on Microsoft Exchange Server Through ZeroDay: Remote execution and control of MS Exchange Server

WiFi hot-spot placement

WiFi hot-spot placement

“Walls and other obstructions—including but not limited to human bodies, cabinets and furniture, and appliances—will attenuate the signal further. A good rule of thumb is -3dBM for each additional wall or other significant obstruction, which we’ll talk more about later. You can see additional curves plotted above in finer lines for the same distances including WiFi hot-spot placement