The road to Java 9: Modular Java finally gets OK’d
Modularity, a key but highly controversial feature of the upcoming Java 9 release, looks to be back on track with the Java community’s adoption of a...
JSON Libraries Patched Against Invalid Curve Crypto Attack
A number of JSON libraries using the JSON Web Encryption specification (JWE) to create, sign and encrypt access tokens have been patched against an attack...
5 Questions to Determine If You’ve Outgrown Your Web Hosting
Web hosting can seem like a commodity these days. You just choose the amount of disk space and bandwidth you need, and you’re up and...
The Russian APT group Fancy Bear used a malware implant on Android devices to track and target Ukrainian artillery units from late 2014 through 2016
The popular hacking group, known as Fancy Bear, APT 28, Pawn Storm, Sednit or Sofacy, is once again in the headlines. Experts from the cyber security firm CrowdStrike reported the alleged...
iPhone Security Bypass Spills Your Photos And Contacts
You’ve got a ton of very personal information on your phone. Text messages. Emails. Browsing history. Photos. The last thing you want is someone getting...
The 5 Aspects of Amazing Web Design
At last count, there were over 767 million active websites, according to Netcraft. How does one lonely brand or company website make a dent amid...
Ransomware stops here – preventing network-wide ransom attacks
Kasey Cross explains the devastation an organisation undergoes when struck by ransomware and describes preventative measures that can be taken to avoid spread from a...