blog-img

Could You Destroy a Data Center?

Terrorist Threat Against a Data Center Seth Aaron Pendley left the January 6th riot on Capitol Hill with an idea. An idea for a novel, characteristically 21s ...

blog-img

What is Cloud Computing?

The “cloud” is just computers–lots and lots of them, stacked up in warehouses around the world. The companies that run these computers lease them o ...

blog-img

4 Ways to Hack a Hospital – Don’t Try This At Home

The Threat to Hospitals It was late on a Tuesday evening, and the MedStar Southern Maryland Hospital Center looked like a time capsule. Without an operationa ...

blog-img

How to Hack Medical Devices (It’s Not That Hard)

Hacking the Vice President On September 11th, 2001, Vice President Dick Cheney was running the United States from a bunker under the East Wing of the White H ...

blog-img

Why Does Healthcare Keep Getting Hacked?

Symptoms A patient walks into a physician’s office with pain in her right shoulder, but nothing appears to have happened there. There’s no bruise, no ras ...

blog-img

Manual vs. Automated Software Testing

What’s Wrong with QA, and Whether Algorithms Can Fix It The Monotony of Testing Software testing can be some of the least enviable work imaginable. The gam ...