BlueBorne: Bluetooth cyber attacks

Security researchers have disclosed multiple Bluetooth vulnerabilities that could threaten billions of smartphones from Android and Apple and millions of Internet of Things (IoT) devices, such as smart TVs, printers and others that may use the Bluetooth wireless protocol.

Continue ReadingBlueBorne: Bluetooth cyber attacks

Introduction to Information Security: 11 Key Takeaways

In case you missed it, the National Institute of Standards and Technologies (NIST) published a new guideline "An Introduction to Information Security" for individuals looking to get a better understanding of introductory information security best practices.

Continue ReadingIntroduction to Information Security: 11 Key Takeaways