Home Authors Posts by cyberparse


Our purpose is to provide the right information to our readers. For obvious reasons, our information journey will of couse be ever changing, but from the outset we plan on the following: Break down and communicate knowledge relating to Cyber Crime, Cyber Security, Information Security and Computer Security. Use Risk Management practices to help in translating the technical aspects of the Risks, Threats and Vulnerabilities into business language. Communicate the appropriate Controls necessary to reduce the Impact and Probability. We will do this by: Identifying, collating and providing relevant information. Highlighting relevant News articles. Investigating trends and providing Analysis. Providing How-to tips and tricks to reduce the Threats and Vulnerabilities. Offering Products and Solutions designed to mitigate or defend against the risks. ------ Joe Woods, Editor and CTO

What Should Post-Quantum Cryptography Look Like?

Researchers are tackling the difficult problem of transitioning toward a new mode of cryptographic protections that won't break under the pressure of quantum computing power.

FBI exaggerated the number of phones it can’t unlock by up...

FBI's case for weakening encryption suffers blow as agency admits math error.

US gov’t employee in China left with brain injury after strange...

The case draws eerie similarities to mysterious "health attacks" in Cuba.

VU#338343: strongSwan VPN charon server vulnerable to buffer underflow

strongSwan VPN's charon server prior to version 5.6.3 does not check packet length and may allow buffer underflow,resulting in denial of service.

Is Threat Intelligence Garbage?

Most security professionals in a recent survey said that threat intelligence doesn't work.
So why all the hype?

A rare, clear day afforded amazing views of a Falcon 9...

Rarely do photographers get such viewing conditions at Vandenberg Air Force Base.

Windows 10 Adoption Grew 75%, Adobe Flash Plummeted 188% in 2017:...

Authentication data reveals an increase in Apple devices, poor mobile security, and the rapid disappearance of Flash from browsers.

6 Steps for Applying Data Science to Security

Two experts share their data science know-how in a tutorial focusing on internal DNS query analysis.

How you end up sleep-deprived matters

There's more than one type of sleep deprivation, and the impacts vary.

WordPress Privacy Enhancements Help Websites Comply With GDPR

DAILY VIDEO: WordPress 4.9.6 update helps websites prepare for GDPR, and VMware Integrated OpenStack 5 aims to accelerate carrier clouds.

UKCloud Health Fosters Digital Health Innovation and Thriving Partner Ecosystem

Docman, Egton, MyLife Digital and Mayden among over 30 Healthcare tech providers flocking to UKCloud Health for secure, UK-sovereign cloud with high performance and exceptional customer supportLondon – 23 May 2018 – UKCloud Health, the easy...

LA County Nonprofit Exposes 3.2M PII Files via Unsecured S3 Bucket

A misconfiguration accidentally compromised credentials, email addresses, and 200,000 rows of notes describing abuse and suicidal distress.