In this book review, I looked at the topic of pentesting cloud-based applications, specifically Microsoft’s Azure. While the focus of the book was for Azure, a lot of the information will be beneficial no matter the cloud environment. […]
Most of us know about cookie being used to track what websites or searches you have been performing in order to give us web based ads on top or off to the side of your web browsers. This has been going on for a long time and has become a norm for most search engines and others that make their living off of advertising. […]
Something I see get overlooked often in reviewing products, especially expensive security products, is support. I’ve done hundreds of product reviews over the years and numerous benchmarking comparisons to find the best software/hardware for the job. Early on I took for granted the type of support and the ease of access to qualified technical support staff, now it is my 2nd priority when investigating any product. […]
Apparently, everyone was waiting for the update, while small in size and a quick download for the iPad, the same could not be said for the iPhone. The patch for the iPhone took over an hour for the 300+ MB file to be downloaded. The latest versions are now 4.0.2 for the iPhone and 3.2.2 for the iPad. […]
As the popularity of the small Apple products (iPhone, iPad, iTouch) take off, they are drawing the attentions of hackers. Some hackers just want to access the OS so they remove roadblocks for application customization and to add unauthorized tools and programs, while others might want to do damage or steal your information.