Gird your Droid!

[mk_page_section bg_image=”http://searchlightassociates.com/wp-content/uploads/2018/01/dsc_6411.jpg” attachment=”fixed” bg_position=”center center” bg_stretch=”true” video_mask=”true” video_color_mask=”#ffffff” full_width=”true” full_height=”true” padding_top=”0″ padding_bottom=”0″ margin_bottom=”-60″ skip_arrow=”true” sidebar=”sidebar-1″][vc_column width=”1/4″][/vc_column][vc_column width=”1/2″][mk_fancy_title size=”45″ force_font_size=”true” size_smallscreen=”35″ size_tablet=”35″ size_phone=”25″ margin_bottom=”0″ font_family=”Arial, Helvetica, sans-serif” font_type=”safefont”]Gird your Droid![/mk_fancy_title][mk_padding_divider][mk_fancy_title size=”35″ force_font_size=”true” size_smallscreen=”25″ size_tablet=”25″ size_phone=”20″ margin_bottom=”0″ font_family=”Arial, Helvetica, sans-serif” font_type=”safefont”]Ars Technica reports on a newly discovered Android Hijacking bug.[/mk_fancy_title][/vc_column][vc_column width=”1/4″][/vc_column][/mk_page_section]

There’s a fifth browser?

[mk_page_section bg_image=”http://searchlightassociates.com/wp-content/uploads/2018/01/dsc_6411.jpg” attachment=”fixed” bg_position=”center center” bg_stretch=”true” video_mask=”true” video_color_mask=”#ffffff” full_width=”true” full_height=”true” padding_top=”0″ padding_bottom=”0″ margin_bottom=”-60″ skip_arrow=”true” sidebar=”sidebar-1″][vc_column width=”1/4″][/vc_column][vc_column width=”1/2″][mk_fancy_title size=”45″ force_font_size=”true” size_smallscreen=”35″ size_tablet=”35″ size_phone=”25″ margin_bottom=”0″ font_family=”Arial, Helvetica, sans-serif” font_type=”safefont”]There’s a fifth browser?[/mk_fancy_title][mk_padding_divider][mk_fancy_title size=”35″ force_font_size=”true” size_smallscreen=”25″ size_tablet=”25″ size_phone=”20″ margin_bottom=”0″ font_family=”Arial, Helvetica, sans-serif” font_type=”safefont”]Who knew? Power users did. Ars Technica reports on Vivaldi, the “other” browser.[/mk_fancy_title][/vc_column][vc_column width=”1/4″][/vc_column][/mk_page_section]

How encrypted is encrypted?

[mk_page_section bg_image=”http://searchlightassociates.com/wp-content/uploads/2018/01/dsc_6411.jpg” attachment=”fixed” bg_position=”center center” bg_stretch=”true” video_mask=”true” video_color_mask=”#ffffff” full_width=”true” full_height=”true” padding_top=”0″ padding_bottom=”0″ margin_bottom=”-60″ skip_arrow=”true” sidebar=”sidebar-1″][vc_column width=”1/4″][/vc_column][vc_column width=”1/2″][mk_fancy_title size=”45″ force_font_size=”true” size_smallscreen=”35″ size_tablet=”35″ size_phone=”25″ margin_bottom=”0″ font_family=”Arial, Helvetica, sans-serif” font_type=”safefont”]How encrypted is encrypted?[/mk_fancy_title][mk_padding_divider][mk_fancy_title size=”35″ force_font_size=”true” size_smallscreen=”25″ size_tablet=”25″ size_phone=”20″ margin_bottom=”0″ font_family=”Arial, Helvetica, sans-serif” font_type=”safefont”]Ars Technical reports on two new attacks that can grab passwords, credit card numbers and other sensitive data from some transmissions protected by secure sockets layer and transport layer security protocols.[/mk_fancy_title][/vc_column][vc_column width=”1/4″][/vc_column][/mk_page_section]