Imagine a remote smartphone takeover that can happen with neither party being connected to the internet. Blueborne, a Bluetooth vulnerability revealed by security firm Armis Labs, makes that possible. It is an attack vector that
In a time when smartphones have become so entrenched in our daily activity, it is important to consider how to protect your data on these devices. Encryption, a way to protect data at rest, is easier
A new threat called “ransomware” has become increasingly notorious in recent years. This is computer malware which in its simplest form encrypts all or some of the victim’s data, denying access usually until the victim