Monthly Archives: April 2020


To be sure, contact tracing for infectious diseases is not new. This practice is vital for combating contagious viruses and has been around for a very long time, so why the controversy about it now? In bygone eras, if you were afflicted with an infectious disease, you would likely sit […]

Contact Tracing and Privacy


One of the notable perks for a journalist covering the security industry is the occasional opportunity to test and review security products and solutions. Over the last couple of weeks, I have had the chance to try three products from Kingston Technology and I am happy to provide Brilliance Security […]

Device Review – Kingston DataTraveler and Nucleum Devices




TechCrunch reported yesterday that New York payments startup, Paay, exposed millions of credit card numbers. The massive database storing millions of credit card transactions is now secure after spending close to three weeks exposed publicly to the internet. The report said, “because there was no password on the server, anyone could access the […]

Unsecured Paay Database Exposes 2.5m Card Transaction Records


New data from security firm Tessian found that 673 domains related to the $2T stimulus package have been registered since the U.S. government announced on March 19 it would issue checks.  The domains use common questions or keywords (such as whereismystimuluscheck or COVID-19-stimulus), banking on the fact that many will […]

Over 670 Stimulus-Related Domains Registered Since U.S. Gov Announcement


Following a routine iOS Digital Forensics and Incident Response (DFIR) investigation, ZecOps found a number of suspicious events that affecting the default Mail application on iOS dating as far back as Jan 2018. ZecOps analyzed these events and discovered an exploitable vulnerability affecting Apple’s iPhones and iPads. ZecOps detected multiple […]

Apple iPhone May Be Vulnerable to Email Hack







By Ian Lancaster, founder and former managing director of Reconnaissance International and lead author and editor of ‘Physical to Digital: A Revolution in Document Security’ A revolution is underway in the secured document field. Society is migrating from using physical secured documents, such as banknotes and identity cards, to the […]

Digital Document Revolution: A Cautionary Note



Any executive accountable for enabling the efficient and effective governance of cybersecurity risks will invariably agree that during compliance and risk projects, manual processes waste time and resources. Automated platforms are available, but it is not uncommon to hear of frustration with the time, level of effort, and cost associated […]

Automation and Visibility to Your Compliance and Risk Management Program