by John

Posted in Vendors & Product Reviews

by John

Posted in Exploits & Attacks, IoT, IIoT, ICS-SCADA, Medical

by John

2018 Exploit Kit Review

Posted in Exploits & Attacks

by John

I am going to share some thoughts with you. My point of view. This should lead into some articles I plan to write on various topics. These will probably lead to presentations and podcasts over the next few months.

•  IoT/IIoT/ICS: In particular related to industrial IoT (IIoT) and ethical conundrums related to consumer IoT. Compare and contrast IT/OT and IoT, IIoT, ICS-SCADA. What are the problems we need to solve? Read More

Posted in Blog

by John

Posted in Science

by John

Posted in Law and Regulations

by John

https://www.scmagazine.com/this-months-patch-tuesday-fixed-bug-that-could-exploit-authentication-in-microsoft-remote-desktop-protocol/article/750777/

Posted in Vulnerabilities

by John

https://www.scmagazine.com/the-vulnerabilities-included-a-user-after-free-and-type-confusion-vulnerability-which-could-both-result-in-remote-code-execution-if-exploited/article/750776/

Posted in Vulnerabilities