Featured

How to Share a Secret… Secretly

Lance James Great in Theory In November of 1979, Adi Shamir published the paper “How to Share a Secret” where he came up with a mathematical method for dividing data (D) into n pieces in such a way that that D is easily reconstructed from any k pieces, and yet even complete knowledge of k-1 […]

Read More How to Share a Secret… Secretly
Featured

When Ransomware Decryptors Don’t Work

By Lance James The last few weeks, I’ve been spending my days helping victims recover from ransomware attacks. When doing this, restoration is the number one priority, and the motto becomes “as fast as you can“. There have been some challenges along the way, and some “shocking” reveals when working with criminal software when expecting […]

Read More When Ransomware Decryptors Don’t Work
Featured

WFH Security Advisory

Cats on Keyboards – 221B-01 Unit 221B is a remote business, and working from home is commonplace. Of course, a WFH environment changes the security paradigm, and one has to be vigilant against cats walking all over the keyboard while at work. The following are common use cases where this security advisory would apply: user […]

Read More WFH Security Advisory