Blacklisting, Whitelisting and the Way Forward: Comments on the Schneier-Ranum Face-Off

In this 60-Second Window, I step aside for George Tubin, Trusteer’s Senior Security Strategist on the…

Printing Code: Programming and the Visual Arts, Rune Madsen at Heroku’s Waza 2013

A lot of people think there’s a brick wall between creative designers and web coders. This…

Unlocking Cell Phones : Statement from the Library of Congress and the White House

I don’t know if any of you have been following this ruling, and the resulting national…

False Advertising ???

True or False: Designers have disappeared from the web advertising world because they’re no longer needed…

Spectacular Vertical Gardens

I find inspiration in all sorts of places . . . even some you may not…

nCircle predicts exploits, security threats and hacks will mutate in 2013

Lamar Bailey, Director of Security Research and Development with nCircle, has released his top five security…

Can you use it?

If it’s there, can you use it? While I was putting together the article for Pamela…

Tangling with CraigsList scam artists

’twas the night before Christmas and all through the house, someone is getting seriously ripped off…

Pump-n-Dump #2

Here’s a follow-up to our January article on the Pump & Dump stock scams now barraging…