Author: John Wiley

John Wiley is a Cyber security Evangelist, Researcher, Author & Speaker. He is a Security Writer & Editor-in-Chief, Author of W-Se Web Security Council.

Role-Based Access Control – The Basics

Business leaders tend to place a lot of faith in their intuition and judgment. Inherently, they trust the people hired to have the best interest of the company and believe proper care will be taken regarding security. This isn’t always the case. According to IBM, “Insider threats account for 60 percent of cyberattacks, and they…

5 Steps to Validate the Security Controls of an Organization

Nowadays, (almost) every organization is moving to the cloud, thanks to its long list of benefits like eco-friendliness, improved performance and scalability, and reduced costs. But cloud storage and systems do not come without their issues with cybersecurity being one of the most important issues with the cloud. With cloud computing and storage adoption quickly…

How Can You Create Incredible YouTube Outros for Your Videos?

Just as any video’s intro should be compelling, so must the ending or outro be prolific. Being a YouTuber, one constantly struggles to make the content of the video highly user friendly. You want to include all those aspects in a short video of a few minutes that attract the attention of the user. Likes,…

New Blindspot in Cybersecurity

The main tool used for access control and authentication has been since the advent of machines, usernames, and passwords. However, as post mortem review shows in most data breaches, compromised identities have become the main attack point for today’s cyber adversaries. Nonetheless, a recent Identity Defined Security Alliance (IDSA) study shows that credential-based data breaches…

7 Tools Should Every blogger Have

There is so much more to the blogging than to the writing. True enough, blogging is a key competency of all bloggers. A blog that isn’t shared or that readers find trivial, however, dies very soon. That’s why the savviest bloggers use the following seven blog helpers to make sure that the people who would…

How to Disable Laptop Keyboard

Have you ever thought about turning off your laptop keyboard but don’t know where to start? I know some people may find it quite difficult, but with proper guidance, it will remain to be a left-handed action. If you’re one of those people, then here’s a complete guide on how to temporarily or permanently disable…

UEFI Scan Engine in Microsoft Defender ATP

Microsoft has expanded Microsoft Defender Advanced Threat Protection (ATP) protection capabilities with the addition of a Unified Extensible Firmware Interface (UEFI) scanner. Despite hardware and firmware-level attacks rising in frequency over the past couple of years, Microsoft has decided to expand the functionality of its security solution to ensure it can keep users safe. Two…

Samsung Galaxy Watch Active 2 Supports Service as a Blood Pressure Monitor

My primary wearables usage is to track my sleep, stress and running. While the Apple Watch’s ECG function was vital to some folks, I tried the ECG several times and got normal readings so it was of limited value to me. Sometime this year, this feature will also come to users of Galaxy Watch. One…

Do you need a Streaming VPN? We’ve got one for you here

Having trouble viewing your favorite online TV shows because of restrictions in your region? If this is the case, then fortunately there have been a lot of VPN services in existence that you can use to unlock geo-restricted platforms while also safeguarding your privacy. But which factors make a VPN best? Why is it so…

Android App Hacking Demonstrated by Researcher Through Intent

A security researcher was able to compromise an Android application by invoking every component of its exposed Activity. The problem, explains Therese Mendoza of Trustwave, is not widespread, but it does exist and it could be exploited by attackers to cause Android apps to leak sensitive information that could then be misused for further compromise….