Intruder Alert

If you want to finally put an end to hacking, you must fully embrace one permanent truth: Hackers will always have the ability to create trojans that can install themselves into computers, tablets, and phones. Perhaps the following paradox springs to mind: “How can I stop hackers if I’m accepting that trojans can enter so […]

Read More…

Patently Insecure

What if each anti-malware product was forbidden, by law, to implement a list of effective methods for blocking known threats? What if hackers had free access to this list, so that they could program their malware to circumvent any anti-virus program they want? Worse still, what if the US Government was providing this list, free […]

Read More…

Welcome to Hacking Exposed

Darkness cannot drive out darkness: only light can do that. — Martin Luther King Jr. Somewhere inside you know that something’s not right. You buy the latest cybersecurity products, you keep your computers and apps up to date, and still hackers get access to anything they want, whenever they want. What’s really going on? When […]

Read More…

Link Validation Myth

What if cybersecurity vendors were selling you something that doesn’t even exist? What if you’re betting the security of your company and home on something that doesn’t exist? Most email security services not only sell Link Validation, the very core of their claimed security depends on it. And, if you haven’t guessed by now, Link […]

Read More…