Google.com Dangerous Says Google (But Not Anymore!)

Google briefly labelled Google.com as “partly dangerous.” The automated warning appears to be a quirk caused by hosted content. The warning came on Google’s own Transparency Report page, which includes details of its Safe Browsing technology. That’s the database that gives warnings in Google’s search tools and the Chrome browser when pointing to a potentially risky […]


Free Video Training Course: Kali Linux 101 (A $19 Value!)

For today’s deal, follow the “Kali Linux 101” video course, a $19 value, for free! Please note that Kali Linux is an advanced penetration testing Linux distribution. As indicated by the ‘101′ in the course title, this course is a beginner’s guide to getting started in Kali…to get your feet wet. The course is broken […]

Hackers Hijack Radio With Furries Podcast

An explicit podcast about furries went out on several US radio stations after a somewhat bizarre hacking incident. Listeners to at least three stations were unexpectedly treated to most or all of an episode of FurCast, a podcast for people with a very particular interest in anthropomorphised animals, often in the form of adults wearing […]

Free White Paper: What’s New in the Windows 10 Security Log

An interesting whitepaper for all you IT people out there who work with the Windows 10 security log as part of their job. Among the countless changes in Windows 10 Microsoft has provided IT organizations more visibility into auditable actions on Windows 10 machines and the resulting events in the Security Log. Understanding these enhancements […]

Free eBook: Implementing SSL/TLS Using Cryptography and PKI (Valued at $39.99)

Here’s our free eBook for today: Implementing SSL/TLS Using Cryptography and PKI (Valued at $39.99.) A hands-on, practical guide to implementing SSL and TLS protocols for Internet security! Coverage includes: Understanding Internet Security Protecting against Eavesdroppers with Symmetric Cryptography Secure Key Exchange over an Insecure Medium with Public Key Cryptography Authenticating Communications Using Digital Signatures […]