Category: Best practice

Mobile location data exposure

There is a good reason why we should limit location feature in our smart phones and portable devices. The US National Security Agency published a helpful reminder. However take the following into account; the “document may be useful to a wide range of users, it is intended primarily for NSS/DoD system users”. The full document

Zoom Has Active Vulnerability

Zoom has an actively exploited vulnerability. Zoom is a “remote conferencing services company headquartered in San Jose, California. It provides a remote conferencing service that combines video conferencing, online meetings, chat, and mobile collaboration” The problem starts when you chat with other meeting attendees and in particular when you sent them a link. If the

Security is a jigsaw

Security is a jigsaw. It has a lot of pieces (network security, email security, endpoint security etc) but to have the perfect fit, you have to align them correctly. You cannot replace a piece with a different piece even if you have more than one piece! If you are missing a piece you will always